Published: July 22, 2020, 10 a.m.
I\u2019ve been telling people for years that they need to implement two-factor authentication wherever possible.\xa0 Now that you\u2019ve done that, imagine the havoc that would happen if those security codes were sent to somebody else enabling them to access your email, social media accounts, and worse your bank accounts. It is called SIM swapping, porting out, and SIM jacking. Today\u2019s guest is Haseeb Awan.\xa0
Haseeb is CEO of Efani, American\u2019s most secure and private cell phone service. He is an expert at protecting high profile individual cell phone numbers. Haseeb was also co-founder of the first bitcoin ATM company.\xa0
Haseeb shares his many experiences with working with SIM swapping. We talk about how we are all at risk and the precautions we can take to avoid becoming a victim of SIM swapping.\xa0
Show Notes: - [01:26] - SIM swap, SIM port, SIM hack, and telephone takeover are all the same.\xa0 SIM swapping is when a criminal takes over your telephone.\xa0\xa0
- [02:05] - The criminal takes control of your social media accounts or email accounts and then drains your bank account.\xa0\xa0
- [04:06] - If a person gets your account number, pin number, and telephone number and then the criminal can transfer your phone number.\xa0\xa0
- [05:36] - Often they go online and buy a new SIM card and trick someone to transfer the number to them.\xa0\xa0\xa0
- [06:51] - Social engineering is as simple as pretending to be someone you are not to gain information maliciously or for fun.\xa0\xa0
- [08:05] - Telephone companies have the ability to sell, monetize, and track your data.\xa0\xa0
- [10:47] - If I haven\u2019t done anything wrong then why do I need privacy?
- [11:49] - The people that are criminals are working 24/7 to destroy you.\xa0
- [13:31] - The average customer is more at risk because they don\u2019t take as many precautions.\xa0\xa0
- [14:41] - Make sure your cell phone carrier supports a pin code at a minimum.\xa0\xa0
- [16:30] - Whatever setting you have the criminal can override.\xa0\xa0
- [19:42] - The port lock might help keep your number from being taken to a different carrier, but if they go to your carrier\u2019s store it doesn\u2019t help at all.\xa0\xa0
- [19:58] - These criminals only need a few hours to have complete access to everything.\xa0\xa0
- [20:36] - Often they attack when you are most vulnerable like after 9 PM in the evening.\xa0\xa0
- [21:16] - You should always use an app-based or hardware key vs. SMS two-factor identification.\xa0
- [23:32] - Keep it simple and have a password on your phone and then use the Google authenticator app.
- [24:52] - We often get attacked because we are lazy and put security off until tomorrow.
- [26:22] - Efani focuses on pricing and security.\xa0
- [27:18] - Most of their customers are people who don\u2019t want their information sold on the internet and want that extra layer of security.\xa0
- [28:15] - Doctors are the number one victims of SIM swapping attacks.\xa0\xa0
- [29:40] - Seniors are at a significantly higher risk.\xa0\xa0
- [31:19] - It is really easy to forge caller id, so never assume it is a real call.\xa0
- [32:25] - Within 90 days you will see a 90% reduction in spam calls with Efani.\xa0\xa0
- [33:27] - When you have a cell phone plan try not to be on a family plan.\xa0\xa0
- [33:47] - The two most important numbers in your life are your social security number and your cell phone number and you have way more linked to your cell phone number.\xa0\xa0
- [34:14] - He suggests getting two telephone numbers.\xa0 Use one for all authentications and don\u2019t give that number out to anyone.\xa0
- [34:42] - Keep your cell phone software up to date and don\u2019t let children play on your phone.\xa0\xa0
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.\xa0
Links and Resources: