Dr. Janice Hooker Fortman
[Music] So [Music] [Music] Good morning, good afternoon, good evening wherever you are in the world. It’s Dr. Janice Hooker Fortman with Relationship Matters TV. I hope everyone is doing great, I hope everyone is staying safe, and again I’m going to say wear your mask and if you can, get the vaccine.
Well, I was thinking today and it has to do especially with my guests that I have on today. This show is called Relationship Matters, and you know what? We all have a relationship with our phones. For some of us, it’s the first thing that we look at and communicate with when we get up in the morning. We open our eyes, what do we do? We go and we look at our phones. Do we have any messages? Who’s on Facebook this morning? Who’s saying good morning? Who’s having coffee? What’s going on today?
Then all during the day, we have our phones in our faces. We’re walking down the street looking at our phones. We can be at breakfast with someone, we’re looking at our phones. We have a relationship with our phones. And what is the last thing you do before you go to sleep at night? Most of us, we look at our phones. Now, relationships are about trust, and it’s important that we’re able to trust our phones.
We have someone on this evening that says, “Be smarter than your phone.” And I asked that question of myself: am I smarter than my smartphone? So today, we’re going to learn how to protect ourselves from cyber criminal attacks and from people who are trying to steal our personal information, and they’re even trying to steal our money. And I’m like you, I don’t want anybody stealing my money, and I definitely don’t want anyone to feel all of my personal information.
Now, I am going to bring you a cyber security expert. As far as I’m concerned, she’s the foremost cyber security expert in the world. I’m going to bring to you Jackie Lawson.
Jacqueline Lawson
Hi Dr. Fortman, how are you doing? Thank you! Can I call you Jan or Dr. Fortman?
Dr. Janice Hooker Fortman
You can call me Dr. Jan.
Jacqueline Lawson
Thank you! Yes, I know that’s right. But now, thank you so much for that introduction. I am working with people to try to get them to understand the seriousness of cyber attacks, especially on their mobile devices. But before I get into that, I wanted to share with your audience that I recently was brave enough to take an international trip to Mexico.
When you talk about trusting your smart device, I had to really trust my smartphone while I was traveling out of the country because even though I took my laptop, it would have been awkward to try to use my laptop to get information. Some of the apps that were very important to me were several. One was I was able to download the app for my airline, which was Delta Airlines, and keep up with my ticket information. They reminded me that I needed to take my COVID test before I got back on the plane to go back to the United States.
I relied on a currency converter so that I would understand how much I’m paying for things, whether it was in U.S. dollars or in pesos. Most of the time, I used pesos, but you still need to be able to calculate exactly how much something costs. What else did I use? Oh, I used Google Language Translator because I’m in a country where I’m not 100 percent familiar with Spanish, and that could be very daunting if you’re out and about and trying to do things and you don’t understand the language.
So I had this app that allowed me to speak the question that I had, Dr. Jan, and then it would translate it into Spanish. Then I could either try to say it myself or hit the audio button, and the translator would actually speak it. I found that to be very useful, especially with my Uber driver because I had a driver that took me everywhere I wanted to go.
You know, having a smartphone, a mobile device, you know, you’re right. We get up in the mornings and we’re looking at our mobile devices, whether we’re reading the news or going on Instagram or whatever it is that we find entertaining for ourselves in the morning. And late at night, I think for me, I have a little game that I play that’s kind of relaxing, but it’s the last thing I do at night.
But now, if you are an AT&T user, AT&T has an AT&T Protect app that you can download to your phone, and it provides security measures because they’re partnered with a company called Lookout. I’ve used Lookout to find my mobile devices when I’ve misplaced them and thought they were gone on an airplane on a flight where the baggage left before I did. So I was able to use Lookout to find my device.
AT&T has AT&T Protect that not only protects you from robocalls and spam callers, it also has other protective measures on your phone. Interestingly, while I was in Mexico, I wanted to make sure that I was not roaming because the last thing I wanted, Dr. Jan, was to get home and then have a ten thousand dollar mobile device bill. So I was able to call AT&T while in Mexico, and they logged into my phone remotely and were able to check my settings to make sure that I was not roaming and that I would not have any additional charges because I had unlimited text and data.
Okay, and calls are free out of Mexico and Canada. Text messaging and things are free. So yes, we rely on our phones a lot more, especially small businesses because of the pandemic. Most people are working remotely from home, and they rely on their mobile devices, whether it’s their laptop or whether it’s their smartphone, to be able to conduct business.
And so that’s what I’m going to talk to you about and your audience this evening. I think you said we’re going to open it up for questions. I’m open to answer as many questions as we have time.
Dr. Janice Hooker Fortman
Jackie, tell me how you got to this point. What’s your journey to technology and being a cyber security expert?
Jacqueline Lawson
Well, it’s interesting that you would ask me that because I would be aging myself if I told you that I have always been interested in technology dating back to the IBM’s electric typewriter. We used to have to use whiteout, and then they came up with the self-correcting tape where you could correct your mistakes.
Then we moved into word processing, and I became a PC guru. Anything that you could do on a Mac, I could do it on a PC. As I started to evolve, as technology started to evolve, I just kept up with it. I became interested in cyber security some years ago when I was working on a project, Dr. Jan, and I had not been saving as much as I should have been.
There was a 20-page proposal document, and all of a sudden, a pop-up came on the screen that was from Microsoft that said my system had been compromised and I needed to upgrade my protection to send them fifty dollars. Well, I panicked and I thought because I could not save the document, it had frozen. That’s called ransomware, where the spammer holds your document, holds your system in ransom until you pay.
So I paid fifty dollars that I thought I was paying to Microsoft, and after I paid the fifty dollars, I’m in the IT business, so let me call my friends at Microsoft. They said, “Girl, we would never give a pop-up on your screen telling you that you need to pay fifty.” And sure enough, Dr. Jan, when I got my credit card invoice, it was a company out of Russia that I had paid fifty dollars to.
So I became interested in cyber security way back then. But then what really kicked it off for me late 2020, early 2021, and I believe we talked about this when you were a guest on my show, a friend of mine got a text message that said that his bank account had been compromised and that he needed to call a number. Well, he called the number, and the line was busy. So he tried it a second time, and the line was busy.
So he rushed over to his bank, and while he was sitting there, he called his carrier, Verizon, and Verizon told him, “Look, another number has been added to your account. Did you do that?” He was like, “No.” That’s called smishing, where they send you a text message. There’s phishing, which is emails, and then there’s smishing.
Long story short, these people were able to steal forty-two thousand dollars out of my friend’s bank account. That’s right, forty-two thousand dollars simply because he dialed that number, and in dialing that number, he gave permission for his number to be used to make transactions. Forty-two thousand dollars.
Yeah, so that’s how I pretty much kind of decided it was time to discuss with other people, especially small businesses, the things that they need to be doing to protect themselves on their smart devices.
Dr. Janice Hooker Fortman
Well, your number is in a database, and there are systems that people use because you get these robocalls. You know when you sign up for stuff on the internet and they ask you for your telephone number and you put your telephone number in? Well, they have these systems, the scammers have these systems where they are scanning databases, they are scanning data warehouses for information.
And if those warehouses are not protected to the fullest, then they’re able to capture information. Sometimes when you sign up for newsletters and maybe the person that you’re signing up with asks you for your telephone number for whatever reason, then they sell that information to people, and it just gets rotated from one person to the next person. So there’s all kinds of ways for the scammers to get your telephone number.
Jacqueline Lawson
Well, what happens to the Do Not Call list?
Dr. Janice Hooker Fortman
You can sign up for the Do Not Call list, but there are so many companies out there that are doing the same thing, Dr. Jan, that there are different databases where your information is stored. So that every time you do something on the internet, that’s called a footprint. You’re leaving a footprint of information, and that information is worldwide because it’s the World Wide Web.
Okay, and so you could do Do Not Disturb, Do Not Call, take me off the list, but that’s why you have companies like RoboKiller. You can use an app that you can use to block phone numbers, but it’s just prevalent. It’s just something that is constant. My phone is constantly ringing. That’s why I use AT&T Protect to block numbers, and it’s a good habit for you to record people as a contact in your contact list so that when they call, their caller ID comes up.
I’ve gotten into the habit now where if I get a phone call and there’s no caller ID attached to it, I punch the button, “Text me, please.” Because if it’s somebody I know, they will text me. Nine times out of ten, it’s from a telephone that cannot text, and so it just becomes spam. AT&T will tell me if it’s a spam risk, a telemarketer, and then I don’t have to answer.
So these are the things that you have to do to protect yourself because it’s prevalent, Dr. Jan. It’s just going to continue.
Dr. Janice Hooker Fortman
Oh my goodness! What I’m going to have to do is type you the questions in the private chat because I’m echoing on YouTube and everywhere. I don’t know if you could hear it.
Jacqueline Lawson
I do hear it.
Dr. Janice Hooker Fortman
Okay, and so I’m going to text you. Well, I’m going to say this question, and then after that, I’m going to text you some questions.
Okay, I can do it as far as echo is. Okay, do you hear me echoing when I talk?
Jacqueline Lawson
At first, I did, but now I don’t.
Dr. Janice Hooker Fortman
Okay, between your words and your lip movements.
Jacqueline Lawson
Okay, I don’t know if it’s because where I am is a little stormy. But let me ask you this question while I try and do something about the echo.
How is it that banks do not question large deductions from an individual account?
Jacqueline Lawson
Well, just like anything, you would have to have something set up in place to where you set parameters that say if I spend over X amount of dollars, send me an alert. I myself don’t use a bank; I use my Fidelity investment account because they offer me the same services that a bank offers, with the exception of I don’t pay a bank’s monthly $25 fees.
And my money is protected in my Fidelity account, and I’m sure banks do the same thing. But when you’re traveling, you can contact your financial institution and say, “Listen, I’m going to be traveling for the next five days, and here’s where I’m going to be.” So that way, if you are away from your home base and you’re doing money transactions, your account won’t be frozen.
The last thing you want to do is not contact your financial institution and let them know you’re traveling and get somewhere and you can’t get to your money. And so that’s one thing that you could do. But for my friend to have forty-two thousand dollars taken from his account, we’re still not sure how that was done or whether or not he will actually recover 100 percent.
But these are things that you need to be aware of when it comes to fake emails. You get emails that look like it’s from Microsoft or it looks like it’s from a legitimate vendor. It’s got the logo, they’ve got your name in there and your email address, and you are thinking that it is legitimate. But you have to pay very close attention to the message because a lot of times it’s a fake name, the URL, the web address is a fake URL, fake address, or there’s misspellings in it.
And so there are telltale signs, but sometimes we are moving so fast because the screen on our phone is small and we’re scrolling and we’re going through it. You have to now slow down and pay attention to the information that you are receiving on your phone.
And so when we talk about the scale of threats, there was a cyber attack sometime around this time last year called SolarWinds, and they’re not sure exactly where that came from—China, where they came from, Russia, or where it came from. But these were some very sophisticated hackers that were able to get in the back end of Microsoft and Amazon and some other major companies and compromised information.
And they are still trying to figure out how to fix it because sometimes a cyber attack will attack this one particular spot on a database, and the developers are able to go in there and fix it. But this particular SolarWinds just migrated all through the system.
And so cyber attacks generally go after financial institutions and medical institutions so that they are able to capture your personal information. So again, you need to be aware that this is something that’s going on, and it’s not going to stop anytime soon. And that’s why you have to be smarter than your phone and do some things to be able to protect yourself.
Dr. Janice Hooker Fortman
Okay, I have on my website hotandmobile.com, H-O-T-A-N-D-M-O-B-I-L-E, hotandmobile.com, on the podcast page, I have a series of where we talked about something that is really critical right now, and that is internet safety for children—tips to keep your child safe.
We hear these stories about children committing suicide because they’re being bullied, and nowadays kids are walking around with smartphones just like adults. There are apps that parents can use, like Bark, I think Google has one, there are several apps that parents can download to their phones to be able to monitor their children’s activity, especially these 10, 11, and 12-year-olds who are just throwing caution to the wind when it comes to their mobile devices.
And so there’s a podcast on that. There’s a podcast on disaster recovery because when Texas had that snowstorm, Dr. Jan, that ice storm, and the electricity was out for several days, when you don’t have any electricity, then you can’t get to the internet unless you have a backup generator or some type of power source to get to the internet.
Which means that if you’re operating a small business, you can’t get to the things that are critical for your business. And so information that you need, whether it’s proposals, whether it’s invoices, whether it’s contact information, now we have to go old school and make hard copies and print it out and keep binders, keep binders of information so that if you have a disaster in your business, then you will have that information available to you in a hard copy.
Or the other thing too that’s important is to do backup. Now, I have a WordPress website, and I’m with GoDaddy, and I invested in GoDaddy’s website security and website backup, and they back up my site every day. Every morning, I get an email that says my WordPress website has been backed up. I have a firewall to protect me against cyber attacks because if you don’t have protection on your website, that is another entry point that the scammers use to gather information.
And so there’s an importance—it’s very important for you to have a disaster recovery plan and a backup on your WordPress website. We also talked about Instagram and Facebook scams. You know, I just recently reset my Instagram to private because all of a sudden, I’m seeing people on my Instagram, people that I don’t even know who they are, sending me private messages.
And so, you know, to avoid that, you just set your app to private. If your phone is hacked—and there’s a question in the chat room that says, “What can you do if your phone is hacked?”—it depends on to what level your phone is hacked. If your phone is hacked to the point where you’re not able to use it, then you need to take it to your carrier and let them know your phone has been hacked and see if they cannot somehow restore it.
They may have to give you a different SIM card; you may have to change your phone number. That’s why it’s important to, if you’ve got images, pictures that you’ve taken at the family reunion or on vacation, then you need to be storing those pictures either on your laptop and saving them to a SIM card, or you can save them to the cloud, like Amazon Photos and Google Photos.
But if your phone’s been hacked, it might be that you might need to get rid of that phone and get a whole new phone because they can reset it. It might be able to reset it.
Dr. Janice Hooker Fortman
I think we’re going to take a quick break right now, and Dr. Jan will be right back with you. [Music]
Jacqueline Lawson
So [Music] [Music] [Applause] [Music] Everything that could go wrong, but the camera just kept going.
Dr. Janice Hooker Fortman
Can I do this? Because there’s a very important question in the chat.
Jacqueline Lawson
Yes.
Dr. Janice Hooker Fortman
Okay, someone asked, “Are financials by the phones safe?” Okay, and I have my Fidelity app on my phone, but now here is where it becomes safer for you to use it on your phone, and that’s called multi-factor authentication. In other words, you set it up with your financial institution to where if you are logging in or you’re calling in, actually calling in, they will send you a code. They will text you a code to your phone, and you have to give that code to them to authenticate that it’s you that’s actually calling in.
The other thing is you can set it up on your phone to use biometrics, and that is your thumb, where you access your financial app using your thumb. Your thumb is unique to you, just like your social security number. So if you set that up, then no one else will be able to access your financials if you lose your phone or something happens to your phone.
Jacqueline Lawson
Oh yeah, I do that with GoDaddy as well. You know, when I call in for support, they will say, “Okay, we’re going to send you a code. You have to give us the code before we’ll even talk to you.” It’s called authentication. They have to actually figure out if it’s you that’s on the account. You are the account holder before they conduct any business with you. I hope that answers your question.
Jacqueline Lawson
So this is from Mark: “I have WordPress too, and there’s a freemium plugin called Wordfence that secures your site. They will alert you when users are locked out from fake sign-ins.”
Jacqueline Lawson
Well, that’s wonderful! I’m glad that you have found a plugin called Wordfence. If that works for you, that’s wonderful. My experience has been with some plugins; some plugins do not get along. They’re not friendly; they don’t get along with one another.
And so what happens is you’ll download a plugin, and it won’t get along with another plugin, and then your site goes down. The other thing about plugins, and the same thing with mobile apps, is you need to read the reviews. How many people have downloaded that plugin? What star rating have they gotten? Is it a three-star? Is it a four-star? Is it a five-star? Is it 300 people that have downloaded, or is it a million people that have downloaded? Those are telltale signs to let you know whether that plugin or whether that app has been verified.
Dr. Janice Hooker Fortman
Now, what I’d like to do…
Jacqueline Lawson
You got another question?
Dr. Janice Hooker Fortman
Yeah, okay. What happens when you are totally locked out of your computer? If you put a password on your computer, a user ID and a password, in order to get to the screen that has all your apps for you to be able to function, if you don’t know the password, you can’t get in.
I mean, you might take it to a computer technician that might be able to work some magic, but if you don’t know the password, then you can’t get in.
Jacqueline Lawson
Okay, okay. Now, you were getting ready to comment on something.
Dr. Janice Hooker Fortman
Yeah, I wanted to go over some tips, Dr. Jan, that people need to start practicing for cyber security in order to protect their mobile devices and for small businesses and individuals.
One of them is number one is to update your software and operating system. When you get the notification that there’s a new version of your operating system or that you need to update your software, update your mobile apps, don’t ignore that because there are developers working on the back end to make sure that that software or those apps are, number one, secure and they have bug fixes.
So, you know, it’s important for you to pay attention to those notifications and update your software. Number two is to use antivirus software. My laptop, which happens to be a Microsoft Surface, comes with a McAfee antivirus, and so it gives me notifications and lets me know that it scanned the system and that there are no threats.
Then you can go into your settings, go into antivirus, and see on the back end whether or not there are some issues after a scan has taken place. You can set it up when the scan, whether it’s late at night or early in the morning before you get started. But there are things already in your systems that maybe you don’t know about, especially in settings. Settings is your best friend, whether it’s on your mobile device or your laptop.
You go into settings, you can see all kinds of things that you can do to protect yourself by simply changing some of those settings. Use strong passwords. One, two, three, four, five, six is not a strong password. My birthday, my grandson’s name, those are not strong passwords because we remember. Now, cyber criminals are scanning databases. They’ve got tools that just go out there and scan, and once they get a hit on your telephone number, on your email address, or whatever information, then they store that in order to target you for an attack.
So, and it’s a good idea to change your password because sometimes we come up with a good password, and we use that password across the board for everything. You might want to think about having several passwords, and again, don’t store it on your electronic device. Make a hard copy of your password so you can get to them easily.
Do not open email attachments from unknown senders. If you don’t know these people, I don’t care if it says you just won a million dollars in the lottery. Okay, now you need to call the lottery people to verify that instead of opening emails because they tug at our emotions, Dr. Jan, and a lot of times we’re not paying attention. Who wouldn’t want a million dollars? But that could be a scam email like you would never believe.
Okay, do not click on links. So in other words, don’t open attachments and don’t click on links in emails from unknown senders, people you don’t know, and unfamiliar websites. You know the websites that you go to, they’re too frequent.
Okay, and if you get a link in an email from a website that you’ve never heard of or it looks suspicious, you know, because we know, does that look suspicious? But let me click. No, don’t click.
Now, avoid using Wi-Fi networks in public. Now, I know a lot of times we’re out, and if you don’t have a carrier data service, if you don’t have a data plan, then you’re relying on Wi-Fi. Okay, and you want to check your Facebook page, you want to check your Instagram, but you don’t have data, but you have Wi-Fi.
So you’re out there signal searching. You signal searching for Wi-Fi, so you run into Starbucks or you run into Panera’s or you run into some place that has free Wi-Fi. But if you’re going to use free Wi-Fi, do not check your finances using free Wi-Fi.
Okay, the email real quick, take a picture and post on Instagram real quick, but do not spend a lot of time using free Wi-Fi. If I had my purse, hold on, Dr. Jan, I’m going to show you something that I use. I bought this, I think I bought it on Amazon.
Okay, this is a credit card protected, Dr. Jan, that has a metal piece. Okay, and all my cards are located on the inside because people are using devices to scan your purse or scan your wallet and capture information that way. But with this little wallet that I have, they can’t get through to my card numbers or the PIN number. They can’t get to it.
Okay, so that I think that cost me about $35 on Amazon, this protective wallet. And so that’s pretty much what I have in terms of cyber security and some of the things that you could be doing to protect yourself from viruses, Trojans, ransomware, adware, botnets. I mean, there’s just so much that’s out there, and you need to be diligent.
Don’t depend upon your company; don’t depend upon your tech friend. No, you need to depend on yourself. Trust people like me, cyber security speakers that are out here. I have a passion for sharing this information because it’s just so much going on, and what you don’t want is your personal information, your identity stolen, or your money stolen. You know, everybody doesn’t have forty-two thousand dollars to just lose, so we need to be diligent in doing some things for ourselves.
Dr. Janice Hooker Fortman
How often should we change our password?
Jacqueline Lawson
I would say every quarter. That’s every three months. And if for some reason your screen starts shimmering for no reason at all or the mouse starts moving for no reason at all, then it’s time to change your passwords, especially on your financial information. It’s time to scan your system to make sure that you don’t have a virus, so somebody’s trying to get into the back end of your mobile device.
Dr. Janice Hooker Fortman
Oh my goodness! That’s so much to remember, especially for non-techies like me.
Jacqueline Lawson
Right, but now you’re telling me that when I see it, go ahead and do what they asked me to do.
Dr. Janice Hooker Fortman
Exactly right, but make sure that it is the carrier or whoever that is legitimate. Okay? Because like I said, the people that are working at these companies, the developers, they don’t want people to have problems with the devices, and then you get on Instagram or TikTok and say, “You know, XYZ carrier is wrong because I got scammed.” No!
So they have these people, these professionals that are reading the emails, they are reading the surveys, and they are working behind the scenes to fix things. That’s what bug fixes are, and when they send out a notification to update, update.
Also, sometimes we download protective services that are free. Free services are not bad, but they are limited, and so you have to decide whether or not it’s important to you to upgrade and pay. It might be a hundred dollars a year to get a more robust security to protect your investment because these devices are not cheap. These phones are running a grand, a thousand dollars, and so you want a return on your investment. You want to protect your investment by making sure that it is protected.
Jacqueline Lawson
The best virus protection, in my opinion, well, there are—there’s Norton, there’s Kaspersky, there’s all kinds of virus protection out there. But what I’m discovering is that these devices and the carriers that you use, they have protection already built in. Like AT&T has AT&T Protect. My Samsung Galaxy has protection.
You have to be very careful about some of these no-name antivirus software companies because their purpose is to generate viruses just so you would buy their services, thinking that you’re protected. So that’s something you have to be careful about too.
Dr. Janice Hooker Fortman
Okay, someone has sent a question: “Should you use different ones for different devices?”
Jacqueline Lawson
I think you kind of answered that. What should you use, a different antivirus for…?
Dr. Janice Hooker Fortman
Yeah, well, it depends because, like I said, my Microsoft Surface came with McAfee, so it automatically started working for me. Plus, I go into the settings; I check things on the settings.
Jacqueline Lawson
Okay, let me share this, and I hope I’m not overloading your audience. Every time you download a mobile app, you are giving it permission unless you just deny it. You are giving that app permission to your contacts, to your location, to all kinds of information.
So you need to go into your settings and go to apps and go to permissions and see what permissions you are giving these apps. If they don’t need access to your contacts, turn it off. If they don’t need access to your camera, turn it off. Just disable it. But settings—go into settings. Settings is your best friend on your mobile device.
Dr. Janice Hooker Fortman
You know what your model is? Be smarter than your smartphone!
Jacqueline Lawson
[Laughter] Be smarter than your phone!
Dr. Janice Hooker Fortman
Now, Jackie, you’re giving us so much advice. Now, do you coach people in groups or one-on-one or something? You know, do you offer that service?
Jacqueline Lawson
What I recommend people do is go out to the website hotandmobile.com and go to the contact page and fill out the contact information. Tell me what phone you’re using. There’s some information out there that I’ll gather, and join our community so that you can stay updated on the things that I talk about in terms of cyber security.
We’re also going to be focusing on mobile apps for small businesses. What type of mobile apps do you really need on your phone? Because to just have a bunch of apps on your phone that’s just taking up space, you know, that loads every time you turn it on, and you don’t know how to turn it off.
We’re going to be talking about that. Like I said, there were things that I was able to do, Dr. Jan, while I was down there on the beach in Mexico, girl! Okay, just straight from my phone because I’m smarter than my phone, and I want you to be smarter than your phone.
Dr. Janice Hooker Fortman
Yeah, just go out to the website hotandmobile.com, go to the contact page, and sign up to join our community, and we will keep you updated on the things that are going on out here in the world.
Dr. Janice Hooker Fortman
Well, I’m running on the bottom on the lower third your website. I see it. Thank you! And you know, I wanted to have you on, and I’m sorry we’re having these technical issues, so I’m going to have to have you back again.
Jacqueline Lawson
Oh, I’d love that!
Dr. Janice Hooker Fortman
Because this is so important because we all have our smartphones, and I’m sure that part of my audience, including me, have run into situations with this phone. Where is my phone? I don’t even know where it is now!
Oh yeah, this, you know, when we saw that we were—or you’re wondering, “Why is it that I’m getting all of these robocalls and all of these phone calls from people I don’t know?” And also with my computer, I have clicked on something, and all of a sudden, I get a big red X, and in order to get back on the computer, you have to go to this site or that site, and then you have to pay this much money.
But what I found is that if I shut my computer off, leave it off for a little while, and turn it back on, I don’t see that.
Jacqueline Lawson
[Laughter] But my website was hacked, and I could never—I forgot what they called that—but I could never get back in. I had to get a whole new website.
Jacqueline Lawson
That might have been that brute force.
Dr. Janice Hooker Fortman
Yeah, brute force. But now the thing about having that red X is your system is giving you warnings before you get there. When it starts twitching, you know, or the mouse starts moving or stuff starts shutting down, then that’s the time when you want to either scan it or take it to somebody, a computer tech, because a lot of times, Dr. Jan, they’re just waiting for you to power down.
Because you power down, and once you power back on, then whatever they have added to your back end into your system, it goes into effect. And some of them are able to watch your keystrokes.
Jacqueline Lawson
Yes, watch your keystrokes!
Dr. Janice Hooker Fortman
So when you get the notion that, you know, something just ain’t right, that’s when you need to do some cyber security on your system.
Jacqueline Lawson
Oh, you know what? I’m old school; I love pencil and paper!
Dr. Janice Hooker Fortman
Yes, yes, yes, yes! So I thank you, and I would love to come back on your show. I know sometimes we have technical difficulties, but I think we did pretty good. We got through it; we really did.
And so, you know, you just let me know if you want me to come back. I definitely will. I definitely will. I don’t—you know, when we started off, everything was fine, then it just went bluey.
Jacqueline Lawson
There’s no gremlins in your system!
Dr. Janice Hooker Fortman
Gremlins! You’ve got drivers talking to you!
Jacqueline Lawson
All right! You can tell me about these. I’m what you call a perfectionist. I very pertinent information, and I pray, and I will have my husband was here, right? He told me, “Do not throw this computer out of the window!”
Dr. Janice Hooker Fortman
So thank you again!
Jacqueline Lawson
Thank you so much!
Dr. Janice Hooker Fortman
And I know that my audience will be going to your hotandmobile.com page, and I’m going to leave it up until I go off. So thank you so much!
Jacqueline Lawson
Thank you! Thank you so much! My pleasure, Dr. Jan, and I’ll talk to you real soon. And don’t forget, be smarter than your phone!
Dr. Janice Hooker Fortman
Well, this has really, really been, I was saying, an experience for me. But I know things go wrong, and today was the Peter Principle. Everything went wrong except for our guest.
But I want to thank all of you for tuning in, and next week on my show will be two photographers. These photographers are going to talk with you—one is a niece and the other one is Scott—and they’re going to talk to you about relationships and how they get that essence from you when you take a photo.
But in the meantime, in between times, stay safe, get your vaccine, wear your mask, and be blessed. Until then, this is Relationship Matters, and I will see you next time. Bye! [Music]