That's important to remember, and many of them have your credit card information still attached to them. So it's important for you to go out and find those old accounts, log into the website and literally say, close this account. That helps to reduce the opportunity for these crooks to use something that you put together. You're not using it anymore, but somebody else might be close your accounts, next one, and I'm sure we've all gotten these when you get those notices from your operating system, from your phone, from your routers, wherever, and it says we've got a new update. Is it okay to apply it? The answer should always be yes, because in some cases, those updates are the result of immediate needs to stop your system, your particular device, from becoming compromised. They're called zero day exploits, and they occur frequently. So when it asks to apply your updates, please answer yes. Another way you can do it is set your devices, your laptop or whatever, to update itself overnight, and it will do that. Just remember, don't put it off. Pass keys. If you haven't heard about PASS keys, I'm telling you right now, pass keys are the bomb. They are a new method of verification that literally does not transmit passwords. It's using what used to be called Public Key Infrastructure, or a web of trust, where, when you authenticate into your phone, by the way, you have to authenticate, but I'll talk about that as well. But I try and connect into my phone, and it asks me for a code or a pin or a pass pattern or fingerprint recognition or facial recognition, any of those. Once you've authenticated into your device, the pass key is where the device now says this person has validated with me, please let them in, and you can use that pass key to get into your Gmail account, your Microsoft account, your Amazon account, your AT and T account, your Yeah, your Amazon account, the big wigs are all starting to incorporate pass keys. So watch for it. If they suggest a pass key, the answer should be yes, let's do it, because they are trillions of times more secure than any password or passphrase, and are even better than multi factor authentication. So watch for it, pass keys are coming next one password managers. A few years ago, people didn't recommend password managers at all. Nowadays, they're saying, You know what, because of the complexity of the environment, password managers can be a useful tool, and they're built into things like your apple key chain, or Google password manager, or Microsoft has it as part of edge. You can also go with over the counter downloadable ones like last pass or keeper. Just pick one, protect it strongly, and then consider using it as part of your day to day, password management, oh, by the way, pass phrase management, next one, freeze your reports. A lot of people may or may not do this already, but all three of the credit reporting agencies, Experian, Equifax and TransUnion, are now recommending that you freeze your credit reports. Leave them frozen if you need to unfreeze it to, let's say, apply for a car loan. You can do that, but leave your credit reports frozen, all three of them. If you go to usa.gov type in the word freeze, you'll find instructions to contact all three of the different agencies. You have to create free accounts with each one of them. But then after that, you just log into the account, say, freeze this. And it's frozen all three of them. When you log in to your account, it'll say right across the top, you. Your credit report is frozen. Very reassuring, because no one, not even you, can initiate a credit transaction. For new accounts, anything that's existing won't be touched. But for new credit granting you have to go in there and personally unfreeze it. It's a very, very safe approach. And because of all the massive data breaches in the last couple of years, the presumption is now that your data is out there on the internet. The presumption is more people have their data out on the dark web then do not all right. Number 12, this is just a hygiene type recommendation, but whenever you are doing something online, remember that things are listening. Four feet behind me is a cute little black ball called Alexa, they are listening. My web browser is listening. My cell phone is listening. Also, when you share out on social media, you share things like, Hey, we're going to be, you know, on the west coast for two weeks. You may be sharing it to family and friends, but you're also sharing it to potential burglars, so minimize your public sharing. Number 13, no more. Swipe up. I train a lot of retirees and they unlock their phones by doing this. No more. You must secure your phone. If you wish to use pass keys, if you're just swiping up, then you are this phone is not secure, can be taken by someone and can be used. So make sure you protect your phone. You can do all sorts of things. Mine requires either a code or a fingerprint or facial recognition. I can use any one of the three to log in, but just remember to protect your phones so that you can then use pass keys when they're enabled for your organization number 14, who has jurisdiction. This is my second to the last slide, except for the summary, whenever someone commits fraud or compromises your accounts or steals your money, makes you turn over gift card money, or whatever the jurisdiction is wherever that crime occurred, and if it's you, then it's your house. That means you call local law enforcement and file your report in Green Valley, where we live. It's the Pima County Sheriff's right next door to us at saharita. It's the saharita police department. You report to the local law enforcement when you are compromised, even it's even if it's from that Nigerian prince, you still report it to your local law enforcement. Many people aren't aware of that. I briefed yesterday morning at Ollie, the Osher Lifelong Learning Institute, I was talking to a group, and they said, We don't know where. Well, let me tell you, it's where the crime occurred, and that's your house last one. Don't even unsubscribe. What I mean by that is you get these cute little emails from someone who says they're Ace Hardware, and then right up at the top is that convenient little unsubscribe button. That unsubscribe button is enough to move you onto their premium reseller list, because you have now interacted with them. So don't even unsubscribe when you see something if you don't want it, report it, block it, mark it as spam and move on. There's no need for you to unsubscribe if you mark it as spam, because it's never going to reoccur in your inbox, don't interact with the bad folks. Don't ever interact, even if clicking that unsubscribe is put out there for you to take a look at and say, Ooh, all I have to do is this that also interacts with them. Okay, so just a real quick slide that I am part of the cybersecurity career ambassadors I'm responsible for the 13 western United States to try and help promote and demystify cybersecurity careers. So. If there's any group or school that wants to talk to me, please have them do so. Give me a contact. My email. Here is, it's rhetorical@gmail.com,