<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>Cyber Care Academy</title>
		<link>https://www.cybercareacademy.com/blog</link>
		<atom:link href="https://feeds.acast.com/public/shows/66b068e51f6556b4b69c4a4d" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>ArchiTEK NumeRIK</copyright>
		<itunes:keywords/>
		<itunes:author>Michel T Dallaire</itunes:author>
		<itunes:subtitle>Join the Cyber Care Knights!</itunes:subtitle>
		<itunes:summary><![CDATA[<p>Free Family Cybersecurity Tips and Cyber Care Café Webinars.</p><br><p>Your friendly neighborhood cyber guardian talks about accessible home cybersecurity for the whole family.</p><br><p>Join the Cyber Care Knights!</p><br><p>Don't forget to sign up for our online training.</p><br><p>Web Site: <a href="https://www.academiecyberbienveillance.com" rel="noopener noreferrer" target="_blank">https://www.academiecyberbienveillance.com</a></p><p>YouTube: <a href="https://www.youtube.com/@ccaacb1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@ccaacb1</a></p><p>LinkedIn: <a href="https://www.linkedin.com/company/ccaacb1" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/ccaacb1</a></p><p>Facebook: <a href="https://www.facebook.com/ccaacb1" rel="noopener noreferrer" target="_blank">https://www.facebook.com/ccaacb1</a></p><p>TikTok: <a href="https://www.tiktok.com/@ccaacb1?lang=en" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@ccaacb1?lang=en</a></p><p>Pinterest: <a href="https://www.pinterest.ca/ccaacb1" rel="noopener noreferrer" target="_blank">https://www.pinterest.ca/ccaacb1</a></p><p>Twitch: <a href="https://www.twitch.tv/ccaacb1" rel="noopener noreferrer" target="_blank">https://www.twitch.tv/ccaacb1</a></p><br><p>© ArchiTEK NumeRIK</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[<p>Free Family Cybersecurity Tips and Cyber Care Café Webinars.</p><br><p>Your friendly neighborhood cyber guardian talks about accessible home cybersecurity for the whole family.</p><br><p>Join the Cyber Care Knights!</p><br><p>Don't forget to sign up for our online training.</p><br><p>Web Site: <a href="https://www.academiecyberbienveillance.com" rel="noopener noreferrer" target="_blank">https://www.academiecyberbienveillance.com</a></p><p>YouTube: <a href="https://www.youtube.com/@ccaacb1" rel="noopener noreferrer" target="_blank">https://www.youtube.com/@ccaacb1</a></p><p>LinkedIn: <a href="https://www.linkedin.com/company/ccaacb1" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/ccaacb1</a></p><p>Facebook: <a href="https://www.facebook.com/ccaacb1" rel="noopener noreferrer" target="_blank">https://www.facebook.com/ccaacb1</a></p><p>TikTok: <a href="https://www.tiktok.com/@ccaacb1?lang=en" rel="noopener noreferrer" target="_blank">https://www.tiktok.com/@ccaacb1?lang=en</a></p><p>Pinterest: <a href="https://www.pinterest.ca/ccaacb1" rel="noopener noreferrer" target="_blank">https://www.pinterest.ca/ccaacb1</a></p><p>Twitch: <a href="https://www.twitch.tv/ccaacb1" rel="noopener noreferrer" target="_blank">https://www.twitch.tv/ccaacb1</a></p><br><p>© ArchiTEK NumeRIK</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>false</itunes:explicit>
		<itunes:owner>
			<itunes:name>Cyber Care Academy</itunes:name>
			<itunes:email>info+66b068e51f6556b4b69c4a4d@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
		<acast:showUrl>ccaacb1</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="66a7b4f966e879d7b6943ed5" slug="michel-t-dallaire-66a7b4f966e879d7b6943ed5"><![CDATA[Michel T Dallaire]]></acast:network>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1722837295976-769dc70f-888c-4d4d-95ef-f26c82c08a6b.jpeg"/>
			<image>
				<url>https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1722837295976-769dc70f-888c-4d4d-95ef-f26c82c08a6b.jpeg</url>
				<link>https://www.cybercareacademy.com/blog</link>
				<title>Cyber Care Academy</title>
			</image>
		<item>
			<title>🎅 The Black Cookies of Holiday Shopping! 🍪</title>
			<itunes:title>🎅 The Black Cookies of Holiday Shopping! 🍪</itunes:title>
			<pubDate>Sat, 16 Nov 2024 03:24:50 GMT</pubDate>
			<itunes:duration>5:30</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/6738108396b35bc45901d51e/media.mp3" length="13265141" type="audio/mpeg"/>
			<guid isPermaLink="false">6738108396b35bc45901d51e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/the-black-cookies-of-holiday-shopping/</link>
			<acast:episodeId>6738108396b35bc45901d51e</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17v90HQpJHRJrEMeKt/mTd1y/skN+SOFmizg80BnCrc1BKAuhgngGQT9ADN8wiUOIWldDIRBtXs/V72iae+8d35j]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1731727456766-d348ed7b-8671-44f5-afd2-a9dc44cc0479.jpeg"/>
			<description><![CDATA[<p>During the holiday season, between Black Friday and Christmas, it's not just promotions everywhere but also a lot of "cookies"... And not the kind Santa loves to eat! 🤫</p><br><p>The "Santa’s cookies" on the web can track your browsing activities and sometimes even play tricks to influence your online shopping. 🎁🛍️</p><br><p>Learn how to protect yourself from digital spies while safely shopping for the holidays:</p><p>1. Regularly delete your cookies 🧹</p><p>2. Use incognito mode 🕵️‍♂️</p><p>3. Block third-party cookies 🚫</p><p>4. Check the security of websites before buying 🔒</p><p>5. Use secure payment methods 💳</p><br><p>And above all, don’t fall for fake holiday promotions! 🎄</p><br><p>🔐 Protect your purchases and stay safe during the holidays!</p><br><p>✨ Have you ever been surprised by the "magic" of cookies? 🍪</p><br><p>📖 Reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity"</p><p>via the form on my website:</p><p>👉 https://www.cybercareacademy.com</p><br><p>Don't forget to subscribe so you don’t miss anything, and share to help as many people as possible learn about family cybersecurity!</p><br><p>#cybercareacademy #OnlineSecurity #cybersecurity #onlineshopping #blackfriday #christmas #santascookies 🎄🔒🛍️</p><br><p><br></p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>During the holiday season, between Black Friday and Christmas, it's not just promotions everywhere but also a lot of "cookies"... And not the kind Santa loves to eat! 🤫</p><br><p>The "Santa’s cookies" on the web can track your browsing activities and sometimes even play tricks to influence your online shopping. 🎁🛍️</p><br><p>Learn how to protect yourself from digital spies while safely shopping for the holidays:</p><p>1. Regularly delete your cookies 🧹</p><p>2. Use incognito mode 🕵️‍♂️</p><p>3. Block third-party cookies 🚫</p><p>4. Check the security of websites before buying 🔒</p><p>5. Use secure payment methods 💳</p><br><p>And above all, don’t fall for fake holiday promotions! 🎄</p><br><p>🔐 Protect your purchases and stay safe during the holidays!</p><br><p>✨ Have you ever been surprised by the "magic" of cookies? 🍪</p><br><p>📖 Reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity"</p><p>via the form on my website:</p><p>👉 https://www.cybercareacademy.com</p><br><p>Don't forget to subscribe so you don’t miss anything, and share to help as many people as possible learn about family cybersecurity!</p><br><p>#cybercareacademy #OnlineSecurity #cybersecurity #onlineshopping #blackfriday #christmas #santascookies 🎄🔒🛍️</p><br><p><br></p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[🔒 5 Accounts a Day, Security's Here to Stay! 🔒]]></title>
			<itunes:title><![CDATA[🔒 5 Accounts a Day, Security's Here to Stay! 🔒]]></itunes:title>
			<pubDate>Wed, 06 Nov 2024 18:58:37 GMT</pubDate>
			<itunes:duration>3:23</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/672bbc941e4926b519805c30/media.mp3" length="8176145" type="audio/mpeg"/>
			<guid isPermaLink="false">672bbc941e4926b519805c30</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/5-accounts-a-day-securitys-here-to-stay/</link>
			<acast:episodeId>672bbc941e4926b519805c30</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17u+uVD/+hfR2x/hcWOKlCJf4rw2c1UDfYWl4iFWKrQXZQ2zimoCKf1XnGMXHW20IGwfIj6XtN0cVmPEVPHGlAFS]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1730919476235-342d1240-3e25-41d4-980b-7d5d9fec876f.jpeg"/>
			<description><![CDATA[<p>It's time to take control of your password security, but without any stress! Set yourself a simple goal: change 5 passwords a day to gradually strengthen your cybersecurity.</p><br><p>✨ And you, have you already started this process?</p><br><p>☕ Reserve my free eBook, "Essential Guide to Family Cybersecurity," via the form on my website:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Don't forget to subscribe to stay updated and share to spread awareness about family cybersecurity.</p><br><p>#cybercareacademy #OnlineSecurity #cybersecurity #digitalprotection #changePasswords</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>It's time to take control of your password security, but without any stress! Set yourself a simple goal: change 5 passwords a day to gradually strengthen your cybersecurity.</p><br><p>✨ And you, have you already started this process?</p><br><p>☕ Reserve my free eBook, "Essential Guide to Family Cybersecurity," via the form on my website:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Don't forget to subscribe to stay updated and share to spread awareness about family cybersecurity.</p><br><p>#cybercareacademy #OnlineSecurity #cybersecurity #digitalprotection #changePasswords</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>🔐 Your memory already thanks you! 🔐</title>
			<itunes:title>🔐 Your memory already thanks you! 🔐</itunes:title>
			<pubDate>Thu, 19 Sep 2024 16:28:00 GMT</pubDate>
			<itunes:duration>4:59</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66ec5115d4cef78b2bff8788/media.mp3" length="12006047" type="audio/mpeg"/>
			<guid isPermaLink="false">66ec5115d4cef78b2bff8788</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/your-memory-will-thank-you-later/</link>
			<acast:episodeId>66ec5115d4cef78b2bff8788</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17uSABo3iROMobu+Lov1h4csOI2Ff7/nnzEUFDuK5gWEoF86AKAXp7JpqZLE2m7kP4eO8mt1o79C9aP4l7AItcsU]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1726763239179-6d174d69-a10b-4ab2-ace1-ab2723492bfd.jpeg"/>
			<description><![CDATA[<p>Passwords are everywhere, and let’s admit it... we can’t remember them all! Luckily, there’s a simple solution that makes managing your accounts easier and more secure.</p><br><p>🌟 Discover the benefits of password managers and how they can transform your digital life!</p><br><p>How many different passwords do you use regularly?</p><br><p>📖 Reserve my free eBook now:&nbsp;</p><p>"Essential Guide to Family Cybersecurity"</p><p>via the form on my website: 👉 https://www.cybercareacademy.com</p><br><p>Don’t forget to subscribe so you don’t miss anything, and share to help raise awareness about family cybersecurity.</p><br><p>#cybercareacademy #CyberCareKnights #OnlineSecurity #cybersecurity #passwordmanager #protectyouraccounts</p><br><p><br></p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Passwords are everywhere, and let’s admit it... we can’t remember them all! Luckily, there’s a simple solution that makes managing your accounts easier and more secure.</p><br><p>🌟 Discover the benefits of password managers and how they can transform your digital life!</p><br><p>How many different passwords do you use regularly?</p><br><p>📖 Reserve my free eBook now:&nbsp;</p><p>"Essential Guide to Family Cybersecurity"</p><p>via the form on my website: 👉 https://www.cybercareacademy.com</p><br><p>Don’t forget to subscribe so you don’t miss anything, and share to help raise awareness about family cybersecurity.</p><br><p>#cybercareacademy #CyberCareKnights #OnlineSecurity #cybersecurity #passwordmanager #protectyouraccounts</p><br><p><br></p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>It’s Not Magic: Why Ads Follow You</title>
			<itunes:title>It’s Not Magic: Why Ads Follow You</itunes:title>
			<pubDate>Thu, 05 Sep 2024 17:11:54 GMT</pubDate>
			<itunes:duration>3:54</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66d9e65a0ef29103a193800e/media.mp3" length="9429881" type="audio/mpeg"/>
			<guid isPermaLink="false">66d9e65a0ef29103a193800e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/its-not-magic-why-ads-follow-you/</link>
			<acast:episodeId>66d9e65a0ef29103a193800e</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17t6gflet323J4mQfF6PD3Lmu9XSCFvzpD/eaouMx4dD43FE0o2Gp1roc83YRrZ7vhK5DdZ8ztZo+zGNNFfD2Juq]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1725556259035-bf8687dc-5955-4ac3-80bf-4516a2ee5500.jpeg"/>
			<description><![CDATA[<p>Have you ever searched for something online, and suddenly ads for it pop up on Facebook or other platforms? Don't worry, your phone isn't eavesdropping on your conversations! In our latest article, we break down what's really happening. Learn how Facebook pixels and other web scripts track your online behavior and why it feels like your phone can read your mind!</p><br><p>Did you ever think your phone was really listening to you? 🤔</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my website:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>New here? Don’t hesitate to subscribe so you don’t miss out!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity #TargetedAds</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Have you ever searched for something online, and suddenly ads for it pop up on Facebook or other platforms? Don't worry, your phone isn't eavesdropping on your conversations! In our latest article, we break down what's really happening. Learn how Facebook pixels and other web scripts track your online behavior and why it feels like your phone can read your mind!</p><br><p>Did you ever think your phone was really listening to you? 🤔</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my website:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>New here? Don’t hesitate to subscribe so you don’t miss out!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity #TargetedAds</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyberbullying and Cyberviolence Among Children: Identify, Understand, and Act</title>
			<itunes:title>Cyberbullying and Cyberviolence Among Children: Identify, Understand, and Act</itunes:title>
			<pubDate>Thu, 29 Aug 2024 20:00:01 GMT</pubDate>
			<itunes:duration>4:46</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66d0d3676c31f9ac7d48cd52/media.mp3" length="11515451" type="audio/mpeg"/>
			<guid isPermaLink="false">66d0d3676c31f9ac7d48cd52</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/understanding-and-preventing-cyberbullying-and-cyberviolence-3-3/</link>
			<acast:episodeId>66d0d3676c31f9ac7d48cd52</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17tlVNcbfHY4i2yZ72ETEjKfVpUqZBxnENFye3I4U6OiBO6Pamucy1fWpgnGbK0NNQMW2OoDF+nbtApSzumy2U92]]></acast:settings>
			<itunes:subtitle>Understanding and Preventing Cyberbullying and Cyberviolence - 3 of 3</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1724961536808-e6d76310-573a-4d53-98ac-7a72e4028562.jpeg"/>
			<description><![CDATA[<p>Understanding and Preventing Cyberbullying and Cyberviolence</p><br><p>Article 3 of 3:</p><p>Cyberbullying and Cyberviolence Among Children: Identify, Understand, and Act</p><br><p>Cyberbullying and cyberviolence are serious issues that affect not only victims but also aggressors and bystanders. In this final article of our three-part series, we explore different forms of cyberviolence among children, including how victims can become aggressors and how bystanders may unknowingly contribute to the problem.</p><br><p>Key points discussed:</p><p>1. Identifying aggressive behaviors in children.</p><p>2. Understanding how victims can turn into aggressors.</p><p>3. Recognizing the role of bystanders and how they can help or harm.</p><p>4. Advice for parents and educators on how to intervene effectively.</p><br><p>Have you ever encountered such a situation? How did you respond?</p><br><p>To reserve my free eBook:</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my website:&nbsp;&nbsp;</p><p>https://www.cybercareacademy.com</p><br><p>Just discovering me now? Be sure to subscribe so you don’t miss out!&nbsp;&nbsp;</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#cybercareacademy #cyberknights #OnlineSafety #cybersecurity #cyberbullying #cyberviolence</p><br><p><br></p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Understanding and Preventing Cyberbullying and Cyberviolence</p><br><p>Article 3 of 3:</p><p>Cyberbullying and Cyberviolence Among Children: Identify, Understand, and Act</p><br><p>Cyberbullying and cyberviolence are serious issues that affect not only victims but also aggressors and bystanders. In this final article of our three-part series, we explore different forms of cyberviolence among children, including how victims can become aggressors and how bystanders may unknowingly contribute to the problem.</p><br><p>Key points discussed:</p><p>1. Identifying aggressive behaviors in children.</p><p>2. Understanding how victims can turn into aggressors.</p><p>3. Recognizing the role of bystanders and how they can help or harm.</p><p>4. Advice for parents and educators on how to intervene effectively.</p><br><p>Have you ever encountered such a situation? How did you respond?</p><br><p>To reserve my free eBook:</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my website:&nbsp;&nbsp;</p><p>https://www.cybercareacademy.com</p><br><p>Just discovering me now? Be sure to subscribe so you don’t miss out!&nbsp;&nbsp;</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#cybercareacademy #cyberknights #OnlineSafety #cybersecurity #cyberbullying #cyberviolence</p><br><p><br></p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyberbullying and Cyberviolence Among Child Victims: How to Identify and Respond Effectively</title>
			<itunes:title>Cyberbullying and Cyberviolence Among Child Victims: How to Identify and Respond Effectively</itunes:title>
			<pubDate>Fri, 23 Aug 2024 13:22:15 GMT</pubDate>
			<itunes:duration>3:58</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66c88d2d0f3233b2d3dcf248/media.mp3" length="9574781" type="audio/mpeg"/>
			<guid isPermaLink="false">66c88d2d0f3233b2d3dcf248</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/understanding-and-preventing-cyberbullying-and-cyberviolence-2-3/</link>
			<acast:episodeId>66c88d2d0f3233b2d3dcf248</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17suZdCLSxBRdm5zcHK3B71Wcmfi/4erUByeNxj2aVjUVTaIh3g8Y+sf7JUp6uzdcpmzRE5Phd3+Nc5lmFeF8CVc]]></acast:settings>
			<itunes:subtitle>Understanding and Preventing Cyberbullying and Cyberviolence - 2 of 3</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1724419286336-32159920-2935-458e-8b34-635443c29a5c.jpeg"/>
			<description><![CDATA[<p>Campaign of 3 Articles:</p><p>Understanding and Preventing Cyberbullying and Cyberviolence</p><br><p>Article 2 of 3:</p><p>Cyberbullying and Cyberviolence Among Child Victims: How to Identify and Respond Effectively</p><br><p>Children and teenagers are particularly vulnerable to cyberbullying and cyberviolence. As parents or educators, it’s crucial to know how to recognize the signs of these harmful behaviors and understand how to intervene to protect young victims.</p><br><p>Key Points Covered:</p><p>1. What is cyberbullying and cyberviolence among children?</p><p>2. How to detect signs of cyberbullying in young people?</p><p>3. Actions to take to support and protect a child victim.</p><br><p>Have your children ever been victims of cyberbullying? How did you respond?</p><br><p>To reserve my free eBook:&nbsp;&nbsp;</p><p>"Essential Guide to Family Cybersecurity,"&nbsp;&nbsp;</p><p>use the form at the top of my webpage:&nbsp;&nbsp;</p><p>https://www.cybercareacademy.com</p><br><p>Discovering me for the first time? Don’t hesitate to subscribe so you don’t miss out!&nbsp;&nbsp;</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#cybercareacademy #cybercareknights #OnlineSafety #cybersecurity #cyberbullying #cyberviolence</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Campaign of 3 Articles:</p><p>Understanding and Preventing Cyberbullying and Cyberviolence</p><br><p>Article 2 of 3:</p><p>Cyberbullying and Cyberviolence Among Child Victims: How to Identify and Respond Effectively</p><br><p>Children and teenagers are particularly vulnerable to cyberbullying and cyberviolence. As parents or educators, it’s crucial to know how to recognize the signs of these harmful behaviors and understand how to intervene to protect young victims.</p><br><p>Key Points Covered:</p><p>1. What is cyberbullying and cyberviolence among children?</p><p>2. How to detect signs of cyberbullying in young people?</p><p>3. Actions to take to support and protect a child victim.</p><br><p>Have your children ever been victims of cyberbullying? How did you respond?</p><br><p>To reserve my free eBook:&nbsp;&nbsp;</p><p>"Essential Guide to Family Cybersecurity,"&nbsp;&nbsp;</p><p>use the form at the top of my webpage:&nbsp;&nbsp;</p><p>https://www.cybercareacademy.com</p><br><p>Discovering me for the first time? Don’t hesitate to subscribe so you don’t miss out!&nbsp;&nbsp;</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#cybercareacademy #cybercareknights #OnlineSafety #cybersecurity #cyberbullying #cyberviolence</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Cyberbullying and Cyberviolence Among Adults: Identifying and Responding Effectively</title>
			<itunes:title>Cyberbullying and Cyberviolence Among Adults: Identifying and Responding Effectively</itunes:title>
			<pubDate>Thu, 15 Aug 2024 20:35:59 GMT</pubDate>
			<itunes:duration>3:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66be66c9844d4451538dd6ef/media.mp3" length="9531083" type="audio/mpeg"/>
			<guid isPermaLink="false">66be66c9844d4451538dd6ef</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/understanding-and-preventing-cyberbullying-and-cyberviolence-1-3/</link>
			<acast:episodeId>66be66c9844d4451538dd6ef</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17voTKelAw0svUbq+8pzkfQmURZCUD3GYoSUefxBXdRGcnn8Tx6gRgvx/hx/zZG21r8pURugFOJQVnd/5tNcwHk5]]></acast:settings>
			<itunes:subtitle>Understanding and Preventing Cyberbullying and Cyberviolence - 1 of 3</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1723754093109-8c6d4471-4c77-48ca-81c9-354d47cfa513.jpeg"/>
			<description><![CDATA[<p>Campaign of 3 Articles:</p><p>Understanding and Preventing Cyberbullying and Cyberviolence</p><br><p>Article 1 of 3:</p><p>Cyberbullying and Cyberviolence Among Adults: Identifying and Responding Effectively</p><br><p>Cyberbullying and cyberviolence aren't just issues for the young; they also affect many adults in both their personal and professional lives. Learn how to recognize these harmful behaviors and what practical steps you can take to protect yourself.</p><br><p>Key Points Covered:</p><p>1. Defining what cyberbullying and cyberviolence are.</p><p>2. Identifying the signs of online aggression.</p><p>3. Taking steps to protect yourself and safeguard your mental health.</p><br><p>Have you ever been a victim of cyberviolence? How did you handle it?</p><br><p>To reserve my free eBook:</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:&nbsp;&nbsp;</p><p>https://www.cybercareacademy.com</p><br><p>New to my content? Feel free to subscribe so you don't miss anything!&nbsp;&nbsp;</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#cybercareacademy #CyberCareKnights #OnlineSecurity #cybersecurity #cyberbullying #cyberviolence</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Campaign of 3 Articles:</p><p>Understanding and Preventing Cyberbullying and Cyberviolence</p><br><p>Article 1 of 3:</p><p>Cyberbullying and Cyberviolence Among Adults: Identifying and Responding Effectively</p><br><p>Cyberbullying and cyberviolence aren't just issues for the young; they also affect many adults in both their personal and professional lives. Learn how to recognize these harmful behaviors and what practical steps you can take to protect yourself.</p><br><p>Key Points Covered:</p><p>1. Defining what cyberbullying and cyberviolence are.</p><p>2. Identifying the signs of online aggression.</p><p>3. Taking steps to protect yourself and safeguard your mental health.</p><br><p>Have you ever been a victim of cyberviolence? How did you handle it?</p><br><p>To reserve my free eBook:</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:&nbsp;&nbsp;</p><p>https://www.cybercareacademy.com</p><br><p>New to my content? Feel free to subscribe so you don't miss anything!&nbsp;&nbsp;</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#cybercareacademy #CyberCareKnights #OnlineSecurity #cybersecurity #cyberbullying #cyberviolence</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Social Media Security Basics</title>
			<itunes:title>Social Media Security Basics</itunes:title>
			<pubDate>Thu, 15 Aug 2024 20:32:27 GMT</pubDate>
			<itunes:duration>4:15</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66be65f6844d4451538da6fd/media.mp3" length="10237607" type="audio/mpeg"/>
			<guid isPermaLink="false">66be65f6844d4451538da6fd</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/social-media-security-basics</link>
			<acast:episodeId>66be65f6844d4451538da6fd</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17vnujxIpNanjfA2F98+Hpl5fzxGMkL50sV+bkBHBm8JzYmBnaW+WkrbacaM70MmnsRaQSRndEWVIkqOayNLcVuN]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1723753900061-c3e92fa7-6108-4460-899f-9ad27be72d89.jpeg"/>
			<description><![CDATA[<p>Social media is an important part of our lives, but it comes with risks. Learn how to protect your personal information with our essential tips.</p><br><p>1. Adjust your privacy settings</p><p>2. Be wary of scams</p><p>3. Limit sharing sensitive information</p><p>4. Manage third-party apps</p><br><p>Has your social media account ever been hacked?&nbsp;&nbsp;</p><p>How did you handle it?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my webpage:</p><p>https://www.cybercareacademy.com</p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Social media is an important part of our lives, but it comes with risks. Learn how to protect your personal information with our essential tips.</p><br><p>1. Adjust your privacy settings</p><p>2. Be wary of scams</p><p>3. Limit sharing sensitive information</p><p>4. Manage third-party apps</p><br><p>Has your social media account ever been hacked?&nbsp;&nbsp;</p><p>How did you handle it?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my webpage:</p><p>https://www.cybercareacademy.com</p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Protecting Your Personal Data Online</title>
			<itunes:title>Protecting Your Personal Data Online</itunes:title>
			<pubDate>Fri, 09 Aug 2024 16:41:20 GMT</pubDate>
			<itunes:duration>3:32</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66b646cba20d945cbca4e44b/media.mp3" length="8544629" type="audio/mpeg"/>
			<guid isPermaLink="false">66b646cba20d945cbca4e44b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/protecting-your-personal-data-online</link>
			<acast:episodeId>66b646cba20d945cbca4e44b</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17uGGaekuO9hkEzbmC6SjlzjA7UNpVps08bSEjzH6ZadSvdOUm0ZmxgI8MlKZv7N64kwrtWV0vTek1yC8SYt99sz]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1723221614919-e74a61c5-a4e6-44f0-b025-ab1676555299.jpeg"/>
			<description><![CDATA[<p>Protecting Your Personal Data Online</p><br><p>Our personal data is constantly exposed to various online risks. Here are some practical tips to effectively protect it:</p><p>1. Use strong and unique passwords and enable 2FA.</p><p>2. Use a VPN and connect only to secure Wi-Fi networks and SSL websites.</p><p>3. Adjust your privacy settings on social media.</p><p>4. Think before posting and be wary of scams and online games.</p><br><p>Protecting your personal data online requires constant vigilance.</p><br><p>What tips do you already follow to secure your online information?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my webpage:</p><p>https://www.cybercareacademy.com</p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Protecting Your Personal Data Online</p><br><p>Our personal data is constantly exposed to various online risks. Here are some practical tips to effectively protect it:</p><p>1. Use strong and unique passwords and enable 2FA.</p><p>2. Use a VPN and connect only to secure Wi-Fi networks and SSL websites.</p><p>3. Adjust your privacy settings on social media.</p><p>4. Think before posting and be wary of scams and online games.</p><br><p>Protecting your personal data online requires constant vigilance.</p><br><p>What tips do you already follow to secure your online information?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my webpage:</p><p>https://www.cybercareacademy.com</p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><br><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Protecting Your Children Online</title>
			<itunes:title>Protecting Your Children Online</itunes:title>
			<pubDate>Thu, 08 Aug 2024 18:39:11 GMT</pubDate>
			<itunes:duration>4:48</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66b510ea976d724bf6e143e6/media.mp3" length="11575313" type="audio/mpeg"/>
			<guid isPermaLink="false">66b510ea976d724bf6e143e6</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/protecting-your-children-online/</link>
			<acast:episodeId>66b510ea976d724bf6e143e6</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17uu+Zh6+70BE1Yv3Y+LXWFAD8GwaMrlORdJp4hr4Nh+zTPKCb58mSEP12u2KGCAHfg3b3M42rpt4Ehj8BSgPMu6]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1723142288668-3409d8da-2acd-4ff6-8553-5cb2142597b5.jpeg"/>
			<description><![CDATA[<p>Protecting Your Children Online</p><br><p>Protecting your children on the Internet is essential. Here are some practical tips to ensure their online safety:</p><p>1. Use parental controls</p><p>2. Maintain trust and open dialogue</p><p>3. Be cautious with your devices</p><p>4. Educate your children about cybersecurity</p><br><p>Protecting your children online requires the application of good security practices, but above all, your care and attention.</p><br><p>How do you ensure your children's safety on the Internet?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Protecting Your Children Online</p><br><p>Protecting your children on the Internet is essential. Here are some practical tips to ensure their online safety:</p><p>1. Use parental controls</p><p>2. Maintain trust and open dialogue</p><p>3. Be cautious with your devices</p><p>4. Educate your children about cybersecurity</p><br><p>Protecting your children online requires the application of good security practices, but above all, your care and attention.</p><br><p>How do you ensure your children's safety on the Internet?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity",</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Securing Your Online Transactions</title>
			<itunes:title>Securing Your Online Transactions</itunes:title>
			<pubDate>Wed, 07 Aug 2024 15:33:22 GMT</pubDate>
			<itunes:duration>3:39</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66b393dbec20c36e8e13da68/media.mp3" length="8787449" type="audio/mpeg"/>
			<guid isPermaLink="false">66b393dbec20c36e8e13da68</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/securing-your-online-transactions/</link>
			<acast:episodeId>66b393dbec20c36e8e13da68</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17tDBgjlOVSOVN6Q676n8kyTrnihgAoP7M5lOm4/dmDxqyLvR49eLdHhZ7SMhfe5TRCrC1sDvmpp1ARMIpGnGZ75]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1723044753606-27da544c-5ca3-4140-8800-3473479644bf.jpeg"/>
			<description><![CDATA[<p>Securing Your Online Transactions</p><br><p>The security of your online transactions is essential to protect your financial information. Discover simple but effective practices to secure your online payments:</p><p>1. Use secure websites (HTTPS)</p><p>2. Avoid public Wi-Fi networks</p><p>3. Prefer credit cards or online payment services</p><p>4.Regularly monitor your bank statements</p><br><p>Which security measure do you already use for your online transactions?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Securing Your Online Transactions</p><br><p>The security of your online transactions is essential to protect your financial information. Discover simple but effective practices to secure your online payments:</p><p>1. Use secure websites (HTTPS)</p><p>2. Avoid public Wi-Fi networks</p><p>3. Prefer credit cards or online payment services</p><p>4.Regularly monitor your bank statements</p><br><p>Which security measure do you already use for your online transactions?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><br><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Best Practices for Email Security</title>
			<itunes:title>Best Practices for Email Security</itunes:title>
			<pubDate>Tue, 06 Aug 2024 14:52:53 GMT</pubDate>
			<itunes:duration>4:05</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66b238de129e9b2ef645657e/media.mp3" length="9854471" type="audio/mpeg"/>
			<guid isPermaLink="false">66b238de129e9b2ef645657e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://cybercareacademy.com/best-practices-for-email-security/</link>
			<acast:episodeId>66b238de129e9b2ef645657e</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17t9YmNgH+hps/Tt09fk4LIsClrcfjTPz0IU0HUcIv9JzKrByuASK5kHO2Ptr/GM5HnVFlYHjrOdMdpakji4+7oH]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>4</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1722955933879-14170a02-067b-4ff8-85e2-e87b99a54a0f.jpeg"/>
			<description><![CDATA[<p>Best Practices for Email Security</p><br><p>Securing your emails is essential to protect your personal information from cyber threats. Here are some practices to adopt to ensure the security of your email communications:</p><br><p>Use strong passwords and two-factor authentication.</p><p>1. Beware of suspicious attachments and links.</p><p>2. Detect scams and phishing attempts.</p><p>3. Use security software.</p><p>4. Educate yourself and your loved ones.</p><p>5. Adopt these practices to effectively secure your emails and protect your personal information.</p><br><p>Have you ever fallen victim to a fake email? Tell us how you dealt with it!</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Best Practices for Email Security</p><br><p>Securing your emails is essential to protect your personal information from cyber threats. Here are some practices to adopt to ensure the security of your email communications:</p><br><p>Use strong passwords and two-factor authentication.</p><p>1. Beware of suspicious attachments and links.</p><p>2. Detect scams and phishing attempts.</p><p>3. Use security software.</p><p>4. Educate yourself and your loved ones.</p><p>5. Adopt these practices to effectively secure your emails and protect your personal information.</p><br><p>Have you ever fallen victim to a fake email? Tell us how you dealt with it!</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>5 Tips to Secure Your Home Devices</title>
			<itunes:title>5 Tips to Secure Your Home Devices</itunes:title>
			<pubDate>Mon, 05 Aug 2024 23:58:37 GMT</pubDate>
			<itunes:duration>4:46</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66b167459e1ac8d5e36b8a6a/media.mp3" length="11500847" type="audio/mpeg"/>
			<guid isPermaLink="false">66b167459e1ac8d5e36b8a6a</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.cybercareacademy.com/5-tips-to-secure-your-home-devices/</link>
			<acast:episodeId>66b167459e1ac8d5e36b8a6a</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17sezgGj/guoHyEupsTKHHyj9wNKPML+GqPXuWHM4gmbSSAOmrWFpTWf0YO9TEvzNGFBZc4Ng9fDYRC039cXUg4x]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1722902270387-ddbef313-e846-4f4c-b4b4-31e656d548e5.jpeg"/>
			<description><![CDATA[<p>5 Tips to Secure Your Home Devices</p><br><p>Protecting your home devices is crucial to ensuring your family's online safety. Here are 5 essential tips to strengthen the security of your equipment:</p><p>1. Regularly update your devices</p><p>2. Use strong passwords</p><p>3. Enable two-factor authentication</p><p>4. Install antivirus software</p><p>5. Secure your Wi-Fi network</p><br><p>Which tip from this article will you apply first?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>5 Tips to Secure Your Home Devices</p><br><p>Protecting your home devices is crucial to ensuring your family's online safety. Here are 5 essential tips to strengthen the security of your equipment:</p><p>1. Regularly update your devices</p><p>2. Use strong passwords</p><p>3. Enable two-factor authentication</p><p>4. Install antivirus software</p><p>5. Secure your Wi-Fi network</p><br><p>Which tip from this article will you apply first?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>5 Common Family Cybersecurity Threats</title>
			<itunes:title>5 Common Family Cybersecurity Threats</itunes:title>
			<pubDate>Mon, 05 Aug 2024 23:57:05 GMT</pubDate>
			<itunes:duration>4:57</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66b166eac061bfe5b1ef134b/media.mp3" length="11924681" type="audio/mpeg"/>
			<guid isPermaLink="false">66b166eac061bfe5b1ef134b</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.cybercareacademy.com/5-common-threats-in-family-cybersecurity/</link>
			<acast:episodeId>66b166eac061bfe5b1ef134b</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17sl2ddC01lDzkWOs8S0Unq31K3RpY/qzm4e1COEEEKcimBi8PkAfXdjb7ZUuaqGAFSC9mjNDLonsK4FKd7SUuRY]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1722902163099-89d9ca0a-2e02-4748-bcc9-d3f7a383cf14.jpeg"/>
			<description><![CDATA[<p>5 Common Family Cybersecurity Threats</p><br><p>Cybersecurity is essential to protect your family from online dangers. Discover the 5 common threats you need to know to better prevent them:</p><p>1. Phishing</p><p>2. Ransomware</p><p>3. Spyware</p><p>4. Cyberbullying</p><p>5. Malware</p><br><p>It is crucial to stay informed and vigilant.</p><br><p>Among all the free methods I propose, which one do you prefer?</p><p>Which of these threats have you experienced online?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>5 Common Family Cybersecurity Threats</p><br><p>Cybersecurity is essential to protect your family from online dangers. Discover the 5 common threats you need to know to better prevent them:</p><p>1. Phishing</p><p>2. Ransomware</p><p>3. Spyware</p><p>4. Cyberbullying</p><p>5. Malware</p><br><p>It is crucial to stay informed and vigilant.</p><br><p>Among all the free methods I propose, which one do you prefer?</p><p>Which of these threats have you experienced online?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Introduction to Cyber Care Academy</title>
			<itunes:title>Introduction to Cyber Care Academy</itunes:title>
			<pubDate>Mon, 05 Aug 2024 18:39:09 GMT</pubDate>
			<itunes:duration>3:19</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/66b068e51f6556b4b69c4a4d/e/66b11c655da099b7d20c3f94/media.mp3" length="7982387" type="audio/mpeg"/>
			<guid isPermaLink="false">66b11c655da099b7d20c3f94</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://www.cybercareacademy.com/introduction-to-cyber-care-academy/</link>
			<acast:episodeId>66b11c655da099b7d20c3f94</acast:episodeId>
			<acast:showId>66b068e51f6556b4b69c4a4d</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6Zs1sz0dz3YQpSuNDI1vuqwtSl57b5oGUM6529ju06g17t8GX8Ioi0nm68uhHgBu7ptza5GqMLO05fGTTO4z1FFJQdb30/yufhfNrYsjU9Ay0uRvkLrrxm0xmXDojtLEc4V]]></acast:settings>
			<itunes:subtitle>Welcome</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/66b068e51f6556b4b69c4a4d/1722883083028-13a3c495-467d-4f72-ba63-757c367ab6c7.jpeg"/>
			<description><![CDATA[<p>Introduction to Cyber Care Academy</p><br><p>What if cybersecurity and care combined to protect your family?</p><br><p>Welcome! My goal is to raise awareness, educate, and provide practical tools to secure your online activities.</p><br><p>I offer you free tips and, if you want to go further, we have solutions for everyone!</p><br><p>Become a Cyber Care Knight and share to help as many people as possible discover the academy! Don't forget to bookmark it for yourself.</p><br><p>Among all the free methods I propose, which one do you prefer?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Introduction to Cyber Care Academy</p><br><p>What if cybersecurity and care combined to protect your family?</p><br><p>Welcome! My goal is to raise awareness, educate, and provide practical tools to secure your online activities.</p><br><p>I offer you free tips and, if you want to go further, we have solutions for everyone!</p><br><p>Become a Cyber Care Knight and share to help as many people as possible discover the academy! Don't forget to bookmark it for yourself.</p><br><p>Among all the free methods I propose, which one do you prefer?</p><br><p>To reserve my free eBook</p><p>"Essential Guide to Family Cybersecurity,"</p><p>use the form at the top of my webpage:</p><p><a href="https://www.cybercareacademy.com" rel="noopener noreferrer" target="_blank">https://www.cybercareacademy.com</a></p><br><p>Are you discovering me now? Don't hesitate to subscribe to not miss anything!</p><p>Share our mission and help as many people as possible discover the academy.</p><br><p>#CyberCareAcademy #CyberCareKnights #OnlineSecurity #Cybersecurity</p><br><p><br></p><p>Disclaimer</p><p>The information presented here is provided for informational and academic purposes at the time of publication. Although often still relevant, the Cyber Care Academy, ArchiTEK NumeRIK, and Michel T Dallaire cannot be held responsible for any issues, rights violations, or damages you may incur as a result of the information presented.</p><br><p>Technology and cyber threats are constantly evolving, and hackers are continuously developing new bypass methods. We do our best to provide up-to-date and accurate information, but it is your responsibility to stay vigilant and adapt to technological changes.</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Education"/>
    	<itunes:category text="Technology"/>
    </channel>
</rss>
