Episodes

  • Tax Season Is Scammer Season: What You Need to Know
    Mar 18 2026

    Trust is the thing scammers exploit most—and tax season hands it to them on a silver platter. In this episode of SipCyber, Jen Lotze visits The Mixing Jug, a hidden courtyard gem in Marlow, England, and draws a powerful parallel between the quiet trust of a neighborhood coffee shop and the misplaced trust that costs people thousands every April.

    When your inbox is already flooded with W2s, refund notices, and filing deadlines, a convincing phishing email doesn't feel like a threat—it feels expected. That's exactly how scammers want it. From fake IRS emails demanding identity verification to fraudulent tax documents loaded with malware, these attacks are timed precisely for the moment your guard is down.

    Key Topics Covered:

    • The three most common tax season scams hitting inboxes right now
    • Why the IRS will never email, text, or DM you—ever
    • How to spot a spoofed sender address before it's too late
    • What to do if you receive a suspicious "IRS" message
    • Simple verification habits that stop tax phishing cold

    The IRS doesn't do urgency. Scammers do. If a message is pressuring you to act fast, that's your first red flag.

    ☕ Featured Spot: The Mixing Jug, Marlow, England

    Before you click anything this tax season—pause. Subscribe for weekly cybersecurity tips delivered from coffee shops across the country, and share this with someone who could use a reminder before April.

    #CyberSecurity #TaxScams #IRSScam #Phishing #IdentityTheft #TaxSeason #ScamAwareness #CyberSafety #InfoSec #SipCyber #DigitalSafety #PhishingAlert #CyberAwareness

    Show More Show Less
    5 mins
  • Stop Being Tracked: Phone Privacy Tips That Actually Work
    Mar 11 2026

    Your phone isn't eavesdropping—it's doing something far more calculated. In this episode of SipCyber, Jen Lotze visits Meta Coffee and Bookstore in Anoka, MN, where the warmth of an old-school wooden bar and a quiet cup of herbal tea set the stage for one of the most common digital mysteries people experience: why does an ad show up seconds after you mention something out loud?

    The answer isn't magic—and it isn't your microphone. It's math. Advertising systems build behavioral profiles using what you search, click, buy, and browse. Cross-app tracking stitches those signals together across every platform you use, creating a picture of you that's more precise than most people realize.

    Key Topics Covered:

    • How pattern recognition—not microphone access—powers eerily accurate ads What cross-app tracking is and why it follows you everywhere
    • Step-by-step: disabling ad tracking on iPhone (Settings → Privacy → Tracking)
    • Step-by-step: resetting your Advertising ID on Android
    • Why reducing your digital "resolution" is a realistic, empowering goal

    This isn't about paranoia—it's about understanding the system so you can make informed choices about your privacy.

    ☕ Featured Spot: Meta Coffee and Bookstore, Anoka, MN

    #PhonePrivacy #CrossAppTracking #DataPrivacy #AdTracking #Cybersecurity #DigitalPrivacy #iPhonePrivacy #AndroidPrivacy #SipCyber #InfoSec #CyberSafety #OnlineSafety #PrivacyTips

    Show More Show Less
    3 mins
  • The Quiet Data Collector in Your Pocket
    Mar 4 2026

    Your phone is never fully asleep—and most people have no idea what's running quietly in the background. In this episode of SipCyber, Jen Lotze visits Compassion Coffee in Anoka, MN—a nonprofit built on second chances—and draws a powerful parallel: just like the unseen systems keeping a coffee shop running smoothly, your devices are constantly working behind the scenes, tracking locations, scanning for wake phrases, and logging your habits.

    Jen breaks down exactly what's happening on your iPhone and Android right now, and gives you a clear, 10-minute action plan to take back control without turning off everything you love about your device.

    Key Topics Covered:

    • Why your phone is always "listening"—even when you're not using it
    • What that orange or green dot actually means (hint: it's not protection)
    • How to audit location permissions on iPhone and Android
    • The "Significant Locations" feature most iPhone users don't know exists
    • Simple permission changes that dramatically reduce background tracking

    This isn't about fear—it's about intention. Your digital life deserves the same care as anything else you value.

    ☕ Featured Coffee Shop: Compassion Coffee, Anoka, MN

    Take 10 minutes this week and review your app permissions. Subscribe for weekly cybersecurity tips from the best coffee shops across the country—and share this with someone who's never checked their location settings.

    #PhonePrivacy #DataPrivacy #Cybersecurity #LocationTracking #iPhonePrivacy #AndroidSecurity #SipCyber #DigitalSafety #InfoSec #CyberAwareness #AppPermissions #PrivacyTips

    Show More Show Less
    4 mins
  • AI Is Already Inside Your Kids' World—Are They Ready?
    Feb 25 2026

    A third-grader mishearing a Paul Simon song just delivered the most important cybersecurity lesson of the year. In this episode of SipCyber, Jen Lotze stops into Conscious Cup Coffee in Crystal Lake, IL—home of the salted hazelnut latte that turned her into a coffee lover—to talk about what it really means to raise a generation that's growing up inside AI, not just alongside it.

    This isn't a panic piece. It's a practical, grounded conversation about why kids interact with AI fundamentally differently than adults do—and what that means for families, educators, and anyone responsible for the next generation's digital safety.

    Key Topics Covered:

    • Why kids born into AI see it as invisible infrastructure, not a tool
    • The critical difference between AI predicting vs. AI knowing
    • How to start age-appropriate AI literacy conversations at home
    • What should never be typed into a chatbot, search bar, or image generator
    • Treating AI like a public space—not a private conversation

    The cybersecurity threat isn't just hackers. It's misplaced trust. And when a friendly, helpful AI voice feels like a confidant, that's where risk quietly walks in the door.

    ☕ Featured Spot: Conscious Cup Coffee, Crystal Lake, IL

    // Learn More About IT Audit Labs //

    AI can be a great assistant—it just shouldn't be your confidant. Subscribe for weekly cybersecurity tips from the best local spots across the country, and share this with every parent and educator in your life.

    #AILiteracy #KidsAndAI #CyberSecurity #DigitalSafety #AIAwareness #ParentingInTheDigitalAge #SipCyber #ChatGPT #ArtificialIntelligence #CyberEducation #InfoSec #OnlineSafety #AIRisks #DigitalParenting #TechForKids

    Show More Show Less
    6 mins
  • What Flying a Plane Taught Me About Cybersecurity
    Feb 18 2026

    What does flying a small airplane have to do with cybersecurity? More than you'd think. In this episode of SipCyber, host Jen Lotze visits Grounds Coffee Bar in Crystal Lake, IL, and draws a powerful connection between the calm of flight preparation and the peace of mind that comes from digital preparedness. After the loss of her father, Jen shares how navigating the digital side of grief revealed a hard truth: preparation isn't just smart—it's a gift to the people you love.

    This isn't about firewalls or threat feeds. It's about the human side of security—knowing where your passwords are, who has access, and what happens when you can't be the one to log in.

    Key Takeaways:

    • Why preparation eliminates panic—in the cockpit and in your digital life
    • The questions everyone should answer before an emergency hits • How personal loss revealed the real cost of digital unpreparedness
    • Why cybersecurity should feel like calm, not complexity
    • A heartfelt look at Grounds Coffee Bar and the moments that shape our perspective

    📍 Featured Coffee Shop: Grounds Coffee Bar — Crystal Lake, IL (right by the Metra station)

    If today's episode made you think about your own digital preparedness—even just a little—then this conversation mattered. Like, subscribe, and share it with someone who needs to hear it.

    #SipCyber #cybersecurity #digitalpreparedness #passwordmanagement #cybersecuritypodcast #digitalestate #onlinesafety #preparedness #crystallake #coffeeshop

    Show More Show Less
    4 mins
  • Identity Theft 2.0: Ghost Students & Financial Aid Fraud
    Feb 11 2026

    You don't have to be in college to become a victim. In this episode of SipCyber, Jen Lotze visits Sunshine Coffee in Lake Elmo, MN, to break down the "ghost student scam"—a sophisticated identity theft operation targeting anyone with a Social Security number, including children.

    Scammers are using stolen identities to enroll in online college programs, drain financial aid funds, and vanish—leaving real people to discover fraudulent student loans and destroyed credit years later. This isn't a distant threat. It's happening now, and your name (or your child's) could already be enrolled somewhere without your knowledge.

    • Key Topics Covered:
    • How ghost student scams work and why they're so hard to detect
    • Why children's identities are prime targets for financial aid fraud
    • The single most effective defense: freezing your credit (and your kids')
    • How to check if your identity has already been compromised
    • Practical steps to protect financial aid and education accounts

    This isn't about fear—it's about action. Credit freezes work. Monitoring works. And awareness is the first line of defense against identity thieves who count on you doing nothing.

    Featured Coffee Shop: Sunshine Coffee, Lake Elmo, MN

    🍯 Jen's Drink: The Miel (espresso with honey and spice)

    Action Step: Freeze your credit at all four bureaus—Equifax, Experian, TransUnion, and Innovis. Do it for your kids too. Subscribe for weekly cybersecurity insights from coffee shops across the country, and share this with parents, educators, and anyone who needs to hear it.

    #GhostStudent #IdentityTheft #CreditFreeze #FinancialAidFraud #CyberSecurity #ParentingTips #InfoSec #StudentLoans #DataProtection #SipCyber #DigitalSafety #CreditProtection

    Show More Show Less
    4 mins
  • TikTok's New Terms - What You Need to Know
    Feb 4 2026

    The agreement you clicked through without reading just changed the rules. In this episode of SipCyber, Jen Lotze visits Raw Deal in Menominee, Wisconsin, and breaks down TikTok's recent U.S. Terms and Privacy Policy update—the one most people accepted without a second thought while scrolling between videos.

    Recorded fresh off a middle school basketball tournament, Jen reflects on watching kids toggle between the game and their screens, building digital footprints they don't yet understand. The new policy isn't just another legal update—it's a meaningful expansion of what TikTok collects, how precisely it tracks location, how it uses AI interactions, and how that data follows users long after the moment it was captured.

    This isn't about banning apps or blaming parents. It's about awareness. Because the systems collecting data on all of us—adults and kids alike—are sophisticated, persistent, and not designed with our best interests in mind.

    • Key Topics Covered:
    • What actually changed in TikTok's updated U.S. privacy policy
    • How precise location tracking works—and why it matters
    • AI feature data collection you might not realize you're participating in
    • Why data patterns are more dangerous than individual data points
    • How digital footprints follow kids into adulthood
    • Practical steps to review app permissions and protect your household

    Don't let the fine print decide for you. Subscribe for weekly cybersecurity insights delivered from local coffee shops across the country—and share this with any parent who needs to hear it.

    #TikTok #Privacy #DataTracking #ParentalControls #Cybersecurity #DigitalFootprint #OnlineSafety #AppPermissions #SocialMedia #InfoSec #KidsOnline #SipCyber #PrivacyPolicy #TechForParents

    Show More Show Less
    6 mins
  • OSINT Secrets: Control Your Digital Reputation Before It's Too Late
    Jan 28 2026

    In this episode, Jen breaks down how to "rabbit hole yourself" before someone else does. She walks through practical steps to audit your digital footprint, delete dormant accounts, and intentionally curate the top results that show up when someone searches your name. This isn't about scrubbing the truth—it's about making sure the best version of you shows up first.

    Whether you're a high school senior applying to colleges, a professional navigating career moves, or a parent helping your kids understand digital responsibility, this episode gives you actionable steps to protect your reputation in a world where everything is public—and permanent.

    🔑 KEY TOPICS COVERED:

    • What OSINT (Open Source Intelligence) is and how employers use it
    • AI-powered background check tools like Fama and Ferretly
    • How to audit your own digital footprint using Incognito mode
    • Why deleting old accounts matters (yes, even that MySpace profile)
    • The power of intentionally planting positive content online
    • How to shape your digital reputation before someone else does

    Take control of your digital reputation today. Like, share, and subscribe for more coffee shop cybersecurity wisdom that keeps you and your family safe online.

    #OSINT #DigitalReputation #Cybersecurity #JobSearch #SocialMediaSafety #OpenSourceIntelligence #OnlinePrivacy #SipCyber #CuriosityCoffe #EaganMN

    Show More Show Less
    3 mins