The Arise with Anita Podcast

From Cybercrime to Confidence: How Mom & Digital Safety Expert Allison AJ Cutts Protects Families Online

Anita Karadalian-Girgis Mindset Transformation Coach & Breathwork Guide

Urgent messages. Too-good-to-be-true offers. “We just need your card to confirm.” When life gets loud, scammers get smarter—and that’s exactly when they strike. We sit down with cybersecurity veteran and mom, Allison “A.J.” Cutts, to explore how a $30k loss became a new blueprint for digital safety, stronger boundaries, and everyday resilience you can put into practice right now.

Allison has spent nearly three decades protecting sensitive data across healthcare and enterprise systems, but what changed everything was her own “perfect storm” in 2019: divorce, a sick child, and a job search that opened the door to a sophisticated HR scam. She breaks down the psychological playbook behind cybercrime: urgency, ego-stroking, and isolation—and shares the red flags she ignored: recruiters who refuse video, calls that always go to voicemail, and text-only follow-ups. We go deeper into the age of AI and deepfakes, why grammar errors are no longer a reliable tell, and how to verify legitimacy directly at the source.

You’ll hear a clear, simple safety stack to protect your peace and your accounts: use a password manager with unique, complex logins; enable multi-factor authentication everywhere; remove real birthdays and sensitive details from social profiles; reduce your digital footprint by closing stale accounts; and assume high-risk seasons like tax time and holidays attract targeted scams. For parents, Allison offers grounded ways to talk to kids about online predators, consent, and empathy without fear or shame.

Most of all, this is a story of resilience. Allison shows how to move from self-blame to action, how to recover credit and confidence, and how to trust your intuition again. Slow down. Breathe. If you didn’t ask for it, don’t respond. Your discernment is the strongest firewall you own.

If this conversation helped you, follow the show, share it with a friend who needs it, and leave a quick review. Your support helps more women build digital safety, dignity, and confidence—online and off.

Connect with Allison below: 

Website: https://cybersecuritychic.com/

Grab her free Essential Cybersecurity Checklist for Busy Mom's checklist below: 

https://ebook.cybersecuritychic.com/opt-in-page-5420?fbclid=IwY2xjawOA3F9leHRuA2FlbQIxMABicmlkETFGaGd6NjhFeVlEalh2UzVWc3J0YwZhcHBfaWQQMjIyMDM5MTc4ODIwMDg5MgABHuiNlw-YoXjtxmnEEFmXAh-7uhqVYHiy1ac0egcNJTQz9PdczwYJAB9V0XVi_aem_aUbpZ5r5LJ6e6lcTGGkl6Q

LinkedIn: https://www.linkedin.com/in/allisoncutts/ 

Instagram: https://www.instagram.com/aj_cyberc

If you felt something shift inside you today… hold that. Honor it.

This is how we rise — one choice, one voice, one brave breath at a time.

If you’re ready to go deeper, download your free ARISE Activation Workbook at www.arisewithanita.com

Email: Anita@arisewithanita.com

Instagram: https://www.instagram.com/arisewithanita/

Facebook: https://www.facebook.com/anita.karadalian.7

Linkldn: https://www.linkedin.com/in/anita-karadalian-girgis-23362b335/f

And if this message landed in your soul, subscribe, leave a review, and share it with a woman who’s done playing small.

Because we don’t just rise alone — we rise together.

I’ll see you in the next episode. And until then… stay rising.


SPEAKER_01:

Welcome to the Rise with Anita podcast, the space where soul meet strategy and dreams are no longer optional. I'm your house and needed a line podcast. This house for two buttons for more. We embody it. We have to be four by clean bubble. You'll hear mixed up full episodes for me and interviews with school-driven leaders, the best in their field, who live what they teach and rise by example. Each conversation is a callus for your next breakthrough. You're not broken, you're breaking through. Let's go ahead and rise together.

SPEAKER_02:

Welcome back to the Rise with Anita podcast. I am joined today by a woman whose life work sits at the intersection of technology safety and empowerment, Alison A.J. Cutz, with over 28 years of experience in the world of cybersecurity. Alison has been navigating the digital landscape long before most of us ever thought about online safety. But for her, this work isn't just about firewalls and passwords. It's about people and protecting what matters most. After experiencing cybercrime herself in 2019, Allison transformed that hardship into a mission, helping women, single moms, families, and even the older generation stay safe online. She knows firsthand that the internet can be both a place of connection and of risk. And she's committed to giving people the tools to move through it with confidence rather than fear. In 2025, Allison established her impact by establishing an educational and consulting business dedicated to empowering organizations and individuals to proactively protect their assets and their customers. This work complements her role in with building cybersecurity, a pioneering nonprofit focused on safeguarding our nation's critical infrastructure. Across both platforms, Allison provides practical guidance and actual strategies to protect strat against cybercrime while fostering resilience and adaptability in the ever-changing digital world. But Alison's story is also one of resilience and heart. She's not only a cybersecurity professional, but also a mother, which makes her especially passionate about protecting families in this digital age. At the core, though, her work is something deeper than just technology, teaching boundaries, discernment, and empowerment, knowing what to let in and what to keep out, both online and in life. This conversation is going to be both a practical and soulful exploration of resilience, boundaries, and the tools we need to reclaim our power in a world that is increasingly online. So, Allison, welcome to the show.

SPEAKER_00:

Hey, Via, thank you for having me. So appreciate it. And thank you for the background on me. It's it's really relevant but irrelevant at the same time. Right. So I just for your audience, I've been around for much longer than a lot of people. I started in 1996 in the technology industry. So you can imagine I'd seen every wave of technology, right? And but back in 2019, as I was going through life transitions, I had what I call the perfect storm. And the perfect storm was I had three key life elements around myself personally outside of my professional world. I was going through a divorce, I had a sick child, and I was out of work for the first time, being middle-aged at that point. So for me, when I looked for work, I had a cyber criminal figure out my profile on a social media site, which was impactful to me. I trusted it because I had never had to look for work through recruiters or third parties. I was always referenced to somebody else throughout my career. So my mission in 20 after 2019, when I lost money, I lost$30,000 in 30 days. For some people, that's a lot. For some, it's not. But if you're a single mom going through a transition, it's a lot at the end of the day. So for me, my my goal after that was to someday bring my voice forward because I came offline for a little bit. Because I, because of that, it was on social media that I lost myself through a cybercrime. And I wanted to help others understand that easier at the personal level. And secondly, on the business side, I've been in operations and frontline sales. So I want, so I've always helped organizations help their employees connect operational workflow to the frontline and how to be connected and work. So thank you for having me on. It was so excited. And anything you want to ask me, please let me know. I have a personal mission, but a professional mission in parallel at the same time.

SPEAKER_02:

I love this. So I always start off the interviews with a little bit of an off-the-cusp question that you would probably not normally hear on a podcast, which is what is currently bringing you joy this current season?

SPEAKER_00:

Me? Well, I'm entering fall season where I live. I'm so excited about the cool air because I am miserable in the heat. I love, I walk in the morning every day with my my two dogs, and I carry a bunny on my back because my bunny is inside a lot. And it's between 55 and 60 degrees. So I love just being out with nature at the end of the day. And it sets my day to be grounded and to be focused.

SPEAKER_02:

Beautiful answer. I love nature as well. Granted, last time I was in nature, I got a little hurt. So diving right in, I guess, you've spent more than 25 years in the cybersecurity world. What first drew you to this field, and then what kept you there?

SPEAKER_00:

So I started technology before cybersecurity was defined. My background was more in hardware and software, safety around firewalls and protection of corporate networks. And as the internet grew, cybersecurity became more of a reality, right? So within my corporate career, I covered a lot of healthcare systems and pharmaceutical companies where PHI or personal health information, or what they call 21 CR11, was clinical trial information to be protected. So for me, my career evolved from being in hardware, software, security to online applications, how do you protect personal information at the end of the day? And I did that throughout a majority of my career. And, you know, for me, I ran the frontline operations and I realized there was a gap between technology and operational workflow with people in the corporate world. And then when I went through my personal cybercrime, I had all the tools necessary to protect me. But like I said earlier, I had the perfect storm. I had three key elements. I saw the red flags and I ignored them, even coming from high tech. So if you can imagine this happens to corporations, this happens to individuals all the time. And the one thing I learned from it was I didn't slow down. I didn't take a breath. I didn't, I we I saw the red, what they call red flags. And I said, you know, when I looked back at my behavior, I realized I had unhealthy boundaries. And a lot of those boundaries developed well before I entered the corporate world. I was a people pleaser, I wanted to solve a problem. I was a yes female or yes, like most people say, yes, ma'am, but I was a yes fina. Right. So, and my mother being an educator, similar to how your mom's a role model, my mom was always solving problems. So I learned to solve problems. Even if I had no solution, I I would just jump in. And I was okay with that. Like I didn't worry about any red flags. And but I also learned through ignoring red flags, you can learn from that lesson. And that's the lesson I learned in 2019. I learned no matter how much experience I had, no matter what technology I knew, no matter what I knew was right for my family, and no matter what I was in the middle of through a life transition, which was me going through divorce, I learned if I just slowed down and fully listened to those flags, it literally, even if I just would breathe, right? And you know, like I know you're into involving people's wellness through breath and slowing down. If I slowed down because I was in a fair flight mode, going through a divorce, right? That's normal. If I just slowed down, I probably wouldn't have gone that route. But I think my route was to fast forward through the pain of all of that to help others in the future. That that's my guess. But I'm excited to be here, like I said. And I think it doesn't matter if you're technical or not, it's at the end of the day just slowing down when we see the flags. At the end of the day, slowing down, recognizing red flags, taking time to be centered would have been hugely helpful through my cybercrime. And I learned a lot of those tactics throughout my career, but personally did not, right? At the end of the day. Beautiful.

SPEAKER_02:

Actually, before we dive into some of the mindset and practical tactics, how about you kind of come to share in your experience what were some of the red flags that you actually should have noticed but didn't notice at the time? And how we could be maybe a little more cautious with our online habits.

SPEAKER_00:

Well, number one, especially people do online dating, if they can't jump face, they're not real. Number one. Number two, because I went through an interview process where no one would get on video. That was a big flag. Number two, when I would call to follow up, I got a voicemail. So then they would respond appropriately back through a message via email. So it wasn't enough live one-on-one conversation. So if you were to take my business experience and apply it to the personal world, what that would look like with social dating is you try to call someone you're you think you're dating, and then you get a text message bad. That's not real at the end of the day. If you can't see the person, talk to the person in person through video, like we are today, it's not real. They're scamming. The bottom line. Like, listen, if you meet somebody in a coffee shop, less dangerous. If you meet someone in person for an interview on the business side, more appropriate, right? At the end of the day. So the two red flags were no one was on camera, no one was faked to be live, would go to a voicemail, they would send me a message back. Who knows what that was? Now, listen, this is in 2019 before AI, right? So if you think of AI and machine learning, those voices and those people are gonna look more real when they're not at the end of the day. I was dealing with antiquated, you know, versions of AI machine learning, even way back then, right? Because it's evolved over time. So seeing a person talking to them live visually, not just on the phone, is key. I think the other thing was for me, I was looking for work and I went through training and it was an HR scam, obviously. And every time I would submit my onboard training, they would give me all these and all this amazing feedback, but it was feeding my ego. It was all ego driven. They knew based on my LinkedIn profile that was online, I was an achiever. So their tactic was okay, let's feed her ego so she'll do work for us. So I did. And listen, I had great credit availability, I still do, but they use me to ship equipment all over the world, not just in the United States, all over. So you can imagine I probably funded equipment going to places that we all don't even want to know about, right? At the end of the day. So for me, they knew me more than I knew myself, right? And I knew myself, but going through divorce, out of work, looking for work, thinking I'm gonna be paid, those were all the barriers I kept that kept coming down. So my flags were there, but I dismissed them at the end of the day, psychologically.

SPEAKER_02:

And so going forward, besides the because you gave me a tip before we logged on, and it was about a birthday. So I thought if you touch on that, because you know, I didn't think about this until I was until you said it, but actually I got I was on either TikTok or Instagram or whatever video platform, and someone was like, hey, you should not be using your birthday. And when you said it, I was like, oh shoot, it's coming up again. Maybe I should bring you into not using my birthday.

SPEAKER_00:

Listen, social media, think of it this way: if you were to take work separate from personal life, social is social, right? So very early on, I learned as tech tools developed, whether it was Facebook, it I can't even remember the name of it before it was Facebook because I'm that old. But it it was another site before that. But you have Facebook, you have TikTok, you have all these locate, all these social media platforms. They want to validate that you're old enough to use their platforms, right? At the end of the day. But the challenge is this for everybody. You could enter your personal birthday in, but you have no control, and nobody does, by the way. And not even these organizations of who could potentially hack their environments. So the more information that's personal to you, whether it's your birth date, your height, weight, whatever, right? I'm just saying, like medical is a little bit different, but but if the more you put in a platform, and even if they have cyber safe or cybersecurity practices, they don't even have a control if that one employee lets that criminal into their environment. And that that that person who is hacking their data could be an employee as well, by the way. So there's people that are highly intelligent that work for organizations. I'm not saying mistrust people that work for corporate environments, but you take a rogue employee like this came up last week on a podcast I did. You take one rogue employee and they're angry, pissed off. Sorry for the French or English. But what I'm saying is you take somebody who has keys to the kingdom and they're not psychologically balanced at the end of the day, that's a risk, right? So my breach when I went through it in 2019 actually happened two years prior in 2016 and 17. And what happened was there was someone who breached a database of a social media site. I put on the social media site, I was open to work. Because for the first time at 44 plus years old, I was out of work. And all I wanted to do was work because I've always worked. And I was in the middle of chaos, right? So once I put that flag on, that's how the predators came in. They knew like she's always worked, she's had a consistent career. She's like, they had no idea I was going through a divorce, by the way. That wasn't on, I don't post that on business social media, but they also knew I was open and available. So they had my email because they breached the corporation's content through scrape screen scraping and data downloads, and I fell for it. So, you know, those are the things people have to think of when on social media. And I know we talked about because you kept asking me what's my birthday. I'm like, I'm not I'll let you. I don't think if you should. I think even for you, Anita, if you're on Facebook or Instagram or wherever, put a false birthday in. Don't put your birthday. It's none of their business. Unless you're paying your medical, unless you're paying a medical bill, none of their business. And I know they have to screen litigiously because they need to make sure kids aren't underage, but guess what kids do? They're looking. So what's the point of having that question is to cover the corporate butt over the issue, right? It's like, well, we asked the question. Well, guess what? The next question should be, did you validate? They don't ask that question. No one knows, right? Very true. Okay. Corporate narrowing.

SPEAKER_02:

You know what? I was so grateful that you brought this up right before because it was something that came up in my vortex. And then I was like, how to think of it. She actually is very right. Like it was something that was kind of like, I have a universal, if it comes up more than twice, paying attention. And this was like number two, three. And I was just like, okay, there's something to this. I probably should scrape my birthday off. So if you know, you know. If you don't, you don't.

SPEAKER_00:

No. I think the thing on social media, and I should probably say this for the audience if you put your birthday, your true birthday, into a profile, it doesn't matter if it's LinkedIn, Facebook. I I'm not on TikTok, by the way, but Instagram, wherever, because I'm I'm older, like I my kids are on it, but I'm not. But what I would say is this when you set up your profile, set up your security settings, it doesn't have to be public. However, the one risk is you have to rely on that organization that hosts your personal date of birth to if they have a crime, and you even if you get notified, it's out of your control at the end of the day, right? Because that's what happened to me. My birthday was in there, my email, my really old email was in there. And listen, I'm on the dark web. All if I I've only had two sites. If you can imagine, only two sites breached, and the breach was in 2016, 2017, both sites. Other than that, I have no other breaches on every single email I have. So there's tools and tactics around you can give that information, but just be aware, right? And I think from a personal perspective, and I can send this after the podcast, there's websites you can use to search up all your personal emails, even your professional, and see where they're breached. Because then if you know where you're breached, you know where the noise is coming from. And understanding your own personal digital footprint is key because the more your digital footprint grows, right? You're on social media, you want to know how much is noise is coming back to you. It's okay because that you may be on social media for a good reason, but just know where it's been breached so you could be ready for a potential fraudulent flag. I endured it. Listen, I was so proud. I was doing financial analysis through my big fraud job. And I was so excited to be working again because I'd never been at work. But they it's more psychology driven than it is technology driven at the end of the day. And with AI machine learning, it's gonna get even more difficult. It's gonna be more frequent.

SPEAKER_02:

Oh, yeah. You are incredible. Let me just take a pause just to let you know you're incredible. I am so grateful that we met. And for those of you wondering, yes, I asked her for her birthday. No, we did not meet through a cybersecurity situation.

SPEAKER_00:

Well, we actually met through a professional network of respectable people at the end of the day. And we're not gonna say where it was because it's none of your business. No, but you might see us together soon.

SPEAKER_02:

That's all you're not you never know. But okay. So going back, because you just touched on kind of your boundaries being lowered and so many things, but let's let's go back to the boundaries aspect for it for a second. Sure. And I wanted to kind of so Alison is currently about to release her book, and part of what we in our experience have discussed a lot is how her boundaries being kind of weakened across life also led to this. So now going back after the wake-up call around your self-worth and trust, how would you say you are learning to hold boundaries as a woman and teach women to hold boundaries today?

SPEAKER_00:

Well, I think the number one thing is confidence and self. So when I reflected back on my cybercrime and even my life, because I was in the middle of a lot of stuff at one time, I really looked back at how I viewed myself a long time ago. So I had to do a lot of reflection back. When did I lose my boundaries? Because I I had lost them throughout a long period of time that I was not even aware of. So I was I've worked since I was 11. I I have a twin sister. We loved, I I know people laugh when I say this, but we we had a paper out before papers went away. We used to iron our dollar bills because my brothers would try to take some. And we also waitressed and we used to clean our coin because I would we like to clean money. So not that word laundering money, but I that's my joke, right? But what I learned was I had very firm boundaries in my younger years. I went to college, ended up in business. But as I went into business, some of my natural attributes went away because I was in a box. I had always grown up with being outside of the box and being okay with that. And as I got older or got more mature or seasoned, I was more and more in a box. So the the flags I would have seen in my younger years, I dismissed in my older years, which was refer some people pick up on flags later in life. I grew up in a situation where we worked very early. We grew up in a town that at times wasn't safe in certain sections, but we had physical boundaries and awareness. When I moved into technology in 1996, so remember, 1996 is when I entered technology, those boundaries became virtual, right? So those are a lot different than physical boundaries that you can see, hear, and touch. So that's where I think all my boundaries kind of started to break down because even if I wasn't as social on social media personally, because I was very private, but professionally, I was okay with changing my status, looking for work. And when the when the cybercrime happened, I even went and looked at their website. It looked legit. They were connected to friends, it was legit. But the flags were they wouldn't get on camera, they wouldn't talk to me live on a phone call, they would only take a voicemail. And I would never take that from any employer prior to this one experience. So I let my boundaries down because I was in a chaotic situation. So I think those are the lessons as people look at cyber safety, it's just recognize where you are in your life. Be okay with pausing because they want you to accelerate faster and respond. Where if I slowed down a little bit, if I wasn't in that storm of craziness, I would have been probably fine. But when you look at where most people are, is they don't have those boundaries anymore because they're all digital. They trust whoever they see at the end of the day, right? And even if they don't see them, they still trust whatever's coming back digitally. So for me, I've learned I have to peel back and and validate are they real? Are they authentic? Um, are they really from a reputable organization or even a person? If they're not willing to meet in person, turn on their camera and talk to them person, I wouldn't, I wouldn't go there. Bottom line, personally or professionally.

SPEAKER_02:

Yeah. I think in a cyber-driven world, if you can't get a person on a Zoom call or a FaceTime call or whatever video call, it becomes a little harder to trust. However, you've brought up AI a few times. So what do you think about these potential AI bots that are now able to actually mimic video and mimic identities?

SPEAKER_00:

It's it's really interesting. AI is developing more and more. I think they can replicate people by stealing existing content. So you don't really know what's real. But I think if you were, you and I, if I was sitting here with an AI bot, I it's not there yet, but it will be, by the way. It will be. So really using your own personal discernment and gut around is this real? Does this make sense? Right. And like in the old days, it would like you get a bad email with bad grammar. Or it was like, it was like links. Yeah, it was like even not even the links, it was like even the title had like a different language partially in with the English language, that's all gonna go away with AI machine learning. I think as you look at AI and machine learning, I think it's amazing technology. I I was exposed and worked with companies that did AI machine learning around drug development over eight years ago. So it's been around a long time. It's not, it's now on the commercial side, which I call the consumer side or the interpersonal side of life. So that's the part we're not trained for, right? At the end of the day. So a couple of my concerns are you get young kids who are socially isolated at school, whether they're preteens, teenagers, or young adults, and they're using chat GBT or other tools similar, and they think it's a human being on the other end, and it's not, right? So, and I have to talk to my kids all the time about did you are you on video if they're a stranger? Because when I grew up, and this is not, it's aging me, but it was strange or danger. If you couldn't physically see or touch it, it's not safe, right? So I just have to run to a telephone booth before there was cell phones. So we had tactical awareness of our surroundings, but like fast forward to like I've been in technology forever. All those boundaries and that situational awareness psychologically has gone away. So it's really teaching children, even adults, by the way, even people my age, we're online, like slow down. Is this real? Is it not? Because, like, if you were without technology, would you like I always ask myself all the time, would I do this at the end of the day? And sometimes I say no, I'm like, you know what? My instinct is right. All the flags are here. But that was only through my personal experience coming from technology and going through a cybercrime. I had to really slow myself down and go, is this real? It doesn't matter that I want to work at the end of the day. They took more money from me being a single mom with no income, off work, like unemployment temporarily. And I was still in a heated battle, right? Of a divorce. So I was fortunate where I could bounce back and put measures in place because I knew what they were. A lot of people aren't in that position at the end of the day, right? That that could paralyze somebody for a very long time. I was very fortunate, and and that's why I'm launching my book. Still recording it, it's an audiobook. I'm not like the most avid reader. I fall asleep when I read. So the fact I'm launching a book is amazing for me personally. I love this. Yeah, no, I personally feel, and the reason why I'm doing audio, I think my voice makes a difference more than the words at the end of the day. And I want to help people understand it, understand the psychology, because I think cybercrimes are more psychology-based than they are technology based. Because if I was settled in my own personal psychology, I never would have fallen for that. It was very evident that I was going right into a cybercrime at the end of the day. But I was so desperate to please my family, keep incoming income coming in, get through my divorce, help my sick child. All that other stuff went away. And that's what they're banking on. They're banking on the perfect storm. Three elements that are going on, whether it's in business or personal, and they will get through. It doesn't matter. We're all human at the end of the day, right? That's amazing.

SPEAKER_02:

And I love that you brought it to psychology and trusting your intuition. And because I find that when we ignore our intuition, that's when we have issues. Doesn't matter if it's a cybercrime. For example, a couple of weeks ago. Now it's probably gonna be months ago by the time you guys hear this. But I had done a trip to Sedona. And my mom had this intuitive hit of like, I probably shouldn't let her go hiking. But I was very stubborn and I was like, I am not going to Sedona, I'm not hiking. Let's just that is not a thing. So she ended up deciding to quiet her voice. And I think part of that was because I was like, I am the one with the stronger third. As one Scorpio child won't do. And she goes, uh okay, I like I didn't say anything, and then I go on this hike, and my knee is completely busted from it. All that to say, trust your intuition. If you know something or you sense something for someone you love, probably falls off.

SPEAKER_00:

Yeah, listen, my my family, when I was going through that job recruitment, fake recruitment, I call it, I'm a twin and you want to talk about intuition, right? She's connected to me through and through. I don't care what people say about intuition, but unless you're a twin, you won't understand this. However, she constantly said, Are you sure this is real? Are you sure this is real? And I kept validating what was real to me. And she let me, she let me go through that process. And let me tell you, I came to my knees the day I realized it wasn't real, right? On my floor in my kitchen, trying to figure out how I'm gonna pay my bills, how am I gonna, how am I gonna pay through my divorce challenge, and how to help my kid who's sick, right? At the end of the day. And yeah, I ignored my intuition, which is exactly what they wanted at the end of the day. So I think the more people use slowing down tactics, breathing, not responding. And remember, with cyber crimes, most of them they reach out to you, right? At the end of the day. So for me, I just changed my one flag on the professional website that said open to work at the end of the day. They reached out to me. I wasn't looking for them, right? That was flag, actually, that was flag number one. So when people get the phone calls to their house, they get the weird mail. If you're not looking for it, don't respond. If you think you owe somebody something, go on the original sites, whether it's a creditor, bank, whatever, or recruitment site or a company that you've applied to, go to them directly. Because that's this, that was the first crucial step I missed. And that's that's like cyber safety 101, by the way. Go to the organization that reached out because there's so many things that are so sophisticated now. You would never know if it was your bank, your stockbroker, you're a recruiter. Unless you pick up the phone or go directly to the source. If you're not looking for it, delete it, get rid of it. Don't answer, don't respond. It's it's none of their business at the end of the day. I think we're all welcoming stuff in because we're used to the noise. The less noise you have in your life, the better at the end of the day, right? If you think about it.

SPEAKER_02:

Yeah, actually, it's funny you brought that up because for me, I'm in the middle of a few trademarks right now. And this was actually a somewhat recent uh issue I had where I had a trademark that was pending. I got a phone call, and it was one of those phone calls, like, hey, I see that I'm from the trademark office. And I was like, I don't think they would call, but okay. And they were just like, for$425, your trademark is finished. And I was just like, and in that moment, I had that like, let's just rush to get this over with. I'm tired of this price. Oh wow, how easy is it for us to find ourselves susceptible? Because obviously with the trademark, you can just go online and type it up and then you get my information, and now you're bugging me about it. But I realized, like, wait, the trademark office would never actually call. If they're gonna correspond with me, they're gonna email me.

SPEAKER_00:

But yeah, these moments of when our guards are down or when we're desperate to solve a solution. Like, we just we let that stuff flow, and that's where people get caught. And think of it during tax time, right? There's certain seasons, excuse me, I have allergies, but Christmas time, like I got an Amazon call. I I never ever have ever received a call from Amazon many years ago, by the way. It's not, it was probably two, three years ago. Frage, oh, we your computer you ordered is not available to ship to the wrong location. We need your credit card. I'm like, and I that was after my cybercrime, by the way. So I was educated. So I said, I go, okay, well, if it was shipped, and I I did not order a computer. And I ordered a computer two or three years prior. So I said, okay, what's my what's my credit card? And they're like, well, you have to give that to us. I'm like, no, you would already know it. Right? And they're like, oh, well, we need to transfer you to the credit card company. And what a lot of the scammers will do is they'll say, Oh, let me connect you directly. That's to the other scammer on the other side of the fence on the cubicle wall, right? So I'm like, so I just hung up.

SPEAKER_02:

And that's how you handle it.

SPEAKER_00:

It's like, hang up, like stop, like, or say, I know you're a scammer, shut the blank blank up. Like, whoa, like whatever you want to do as a human being. Like, I I don't swear normally unless I do it and stub my dough. But but what I'm saying is like it's very easy, and especially you take someone who's a baby boomer or someone who is always taking care of finances, they're easily trapped in those things. So you have Christmas season, you have Hanukkah, you have all the holidays, like, and there's so many, right? If you take all the face, then you have, you know, tax season. Tax season is the most common fraudulent opportunity for people to give up their information. So, you know, one of the things around taxes on the Social Security Administration, you can set up a PIN number just to you on top of your social security. So there's things like that you can build in personally to protect you from fraudulent behavior. So there's like so much stuff out there from a day-to-day.

SPEAKER_02:

Love this. And you again, you're incredible. I just I have to tell you this because it's this awareness that you have and the way that you make it digestible for the common person to just really realize like slowing down is your tactic here.

SPEAKER_00:

It really is. That's the number one defense. Besides secure passwords, multi-factor authentication, which I want to use here, password managers. I listen, I'm gonna be over 50. I'm oh I'm already over 50. I'm not gonna say my birth date because you know I will not share that. I use a password manager for over 15 years. So imagine someone my age using a password manager. That's not very heard of, right? So when I tell my friends, I'm like, get a password manager, whether it's one password, whether it's, you know, there's so many out there. But what I'm saying is just understand you have to change passwords across every site that you log into personally, and it has to be complex and it has to be different passwords, not the same one. Now listen, your password manager login could be one password into your tool. And there's web browsers like you have Safari for Mac users, you have Google Chrome who has your own password managers, and just understand every tool has a different level of security, but remember you're better off with something versus nothing at the end of the day. And you gotta keep, you gotta protect yourself. But number one thing, just pause, breathe, and say, Did I reach out for this? And if you didn't, hang up the phone, don't respond to the email, don't, especially texting. I mean, everyone gets fraudulent texts every day on like droves, right? It's become the new spam of texting. Just don't respond and delete and report it and block it. That's all you can do. And just know it's not real at the end of the day. They just want your money. Absolutely.

SPEAKER_02:

And actually, you brought me to a good question, which is when we get these fraudulent phone calls or these fraudulent text messages, would you say that that's actually a sign that your data might have already been leaked?

SPEAKER_00:

Or is it just you know, I don't know the exact answer because I get so many, well, probably because of my breach, I get so much scamming stuff, whether it's phone. I had to block so many. There's, and by the way, guys, there's there's free ways to block phone numbers, right? And then there's applications that block it as well. I prefer free because I'm on a budget at the end of the day. And texting, same things. So it just depends on how loose your data is out there and if you've been breached, right? So I think the first tool I recommend for most people, see if your information has been breached on the dark web. And if it has, see which sites breached it, because then you know what information you provided, whether it's your phone number, email. And I had two sites that breached, one was professional, one was personal. And thankfully, they were really old email addresses that I still have today. So all that junk goes there. However, they also got my date of birth and my information, right? So I have to be very vigilant. And even like medical, I get medical alerts all the time, like my information is on breach. I don't respond. It's like I go directly to the institution every single time. So I think it's figure out if you've been breached on the dark web and then go directly to the source that reached out to at the end of the day. Two simple steps. And Brutum, don't respond right away. Beautiful.

SPEAKER_02:

I'm just so grateful again. So what would you say? Shifting the focus a little bit, what mindset shifts would you say helped you go from a victim of cybercrime to an empowered leader who's teaching others how to stay safe online now?

SPEAKER_00:

Well, I think my mindset shift was I was never evade films. I just I had enough knowledge. I like I was more upset with myself initially, but then I thankfully I had enough wherewithal to know I was human, right? So I went to survivor mode quicker and I went from having the crime to recovery because I knew what to do in high tech. I knew how to recover myself technically. A lot of people personally do not, right? I knew check all my monitoring services around my credit, check all my credit cards, check my banking. Like I had a punch list I went through right away. So I think for most people out there, just be grateful to give grace back to yourself, number one, because people beat themselves up about it personally. Corporations are different. The IT guy is probably mad at himself or the employee who breached the call, whatever. But just be great, have grace, figure out where the risk is, mitigate your risk by knowing what's exposed. And I was fortunate at the time, and maybe that's why I only have two sides breached in over six plus years. I was fortunate. I've always had a lockdown approach to my personal information and my websites. I just did something through a divorce that I just it was, it was like the perfect storm, right? Like it, and I'm not embarrassed about it coming from my deck. I'm like grateful I can share it with the world at the end of the day. And I think just give yourself grace and go through the punch list and understand your own personal digital footprint and figure out how you mitigate your risk for future impact. And I literally, it was really difficult. I had an amazing credit score, still did. And it happened, I bought IT equipment, I shipped all over the world, who knows where it went. And my credit was locked down for two years. So I've lived paycheck to paycheck through not so good jobs. Or like I was a professional most of my career, and I was looking for work, and I just stayed patient with myself and then realized I just had to keep going and keep paying bills on time and keeping my credit, protecting myself from anything else that could come in because a lot of people give up when that happens. They're mad. Like I had to go, what else can I do to protect myself? And a lot of it I did personally come offline because that was a personal attack. And I shared limited information, and and that's it at the end of the day. I think everyone's like litmus test is different on what they do and what they do for their personal lives. Like it's all different. But the smaller digital footprint, the easier it is to mitigate.

SPEAKER_02:

Actually, you brought me back to a very interesting point because you did get offline and now you're barely resurfacing quite on.

SPEAKER_00:

Um it took a while. Hard.

SPEAKER_02:

How was that for you in terms of a fear of being seen now? Especially when you have such a big broad must message and you have this big mission to help women and empower them in the cybersecurity era. So how what was it like navigating that? That a being that position of being afraid of being online because your data was breached, but also coming to that term of like, I have to come back and make my way back.

SPEAKER_00:

It was a long journey. Some of it was me going getting through my career and figuring out what I wanted to do for myself personally. So, first, my first step was to educate myself more. So I went back to school on cybersecurity governance. I went to a great school in Boston. I'm not gonna, I don't want to name drop the school, but it was a great school. And I was in a medical school.

SPEAKER_02:

Let's just be honest.

SPEAKER_00:

Waiting to Harvard. Listen, I did not go to Harvard in my undergrad, but I I did do a course at Harvard that was very helpful because I was in medical and technology, and it was important for me because I dealt with patient data. Like I personally was like, God, I went through this crime. What could I do to learn more about why I got breached? Right. Because that could happen in the corporate world. So for me, me going back to school was my first step around understanding me. And then I realized the psychology of it. What was that? Your table went up. So when I went back to school, if you can cut wherever you need to, when I went back to school, it showed me where I was at risk. And it was okay. It was a social psychology approach to my crime. Not every, by the way, not every cyber attack is psychology driven. Mine was. I did pull myself off of personal, what I call personal social media. I kept myself on even the site that breached my confidence because I had to for income and work, but I limited how much I shared, right? And then I went through to recover my balances or my financial debt. I had absorbed my full cybercrime and pay off debt that wasn't real. So I had to pay that off, get through my divorce. And then my I knew someday I was gonna be able to share it with the world and share it with others. You can still get yourself out of a bad situation. It just, you gotta be patient with yourself. Just like I had to be with myself. I had to learn about why it happened, what my personal boundaries were, which were not healthy, because I obviously let someone play games with my head, which was not fun. And I was already going through a head game, going through court, if you could imagine. And then at the same time, I was not mad at myself. I think people get mad at themselves. It's okay. It's it's not fun to lose money, by the way. But I looked at myself as fortunate, the fact I could recover financially, because I was I worked after that and I rebounded. And I was very grateful for that. But not everyone can rebound. That's the thing. So, you know, my hope is, but my goal is through my education, through me building my consulting business, I eventually want to do like a nonprofit tied to funding victims of or survivors, outcome survivors. I don't like the word, I'm not a big victim person.

SPEAKER_02:

Sorry.

SPEAKER_00:

Thrivers, survivors, whatever. Well, I I think people go through that. Not everyone can rebound the way I did. I was very fortunate I was a saver. I had credit availability, even if it was frozen for a little bit. Not everyone's in that situation. Everyone grows up different, right? Everyone saves differently, everyone works differently. So my goal over time is if I can build the fun to help survivors or thrivers. I don't like the word victim. I'm not a victim mentality set, but I think I could help the world in so many different ways. I'm just starting. So I'm at the infancy of where I'm going.

SPEAKER_02:

I love this. I really just want to acknowledge how much of a resilient and incredible human you are because you don't look at it as why did this happen to me, but more so you took the situation and you're fully going into the how can I use this for not only myself to educate those around me, but also to take this worldwide. And how do I educate and make this more of an available information?

SPEAKER_00:

Listen, my mom was an educator. She did it from her heart. It wasn't about the income at the end of the day. And what I realized through that was I'm probably very similar. I'm more of an educator than a business person. And that that's probably more my heart at the end of the day to help others, help people thrive, regardless what that means coming back to me. It's more of giving out more than taking in at the end of the day. That's that's in my heart. So it's always been that way, but it's even more so now that I went through this. Beautiful.

SPEAKER_02:

You're a gorgeous soul, but okay, so one more well, not one more. I have a few more questions. Let's just teach them.

SPEAKER_00:

At some point, because it might be right one for social media. Oh god.

SPEAKER_02:

How did you rebuild your confidence and trust after feeling violated like this?

SPEAKER_00:

Honestly, I had to go back to my early childhood to go. When was I the most safe? When did I feel free? When did I feel less violated? It was very violating. It was a very difficult journey when that happened. So I went back to when did I feel most innocent and more open? Because that that piece was taken away from me. Right? The second thing was I shared it with my friends. I wasn't embarrassed because I had so many other wacky things happen in my life. They're like, oh, that makes sense. So what name that made sense? It made it wore middle for me because I said, I guess we'll go this path at the end of the day. Like the weird things that had happened throughout my life, before even like I went back to where I felt safe as a child. Like, which was I have great memories. I felt I felt I went grounded that way to figure out where do I feel safe. And I went back to my childhood. That was the last time I probably felt safe, honestly. And then I Ben said, you know, when my friends like laughed, well, they were shocked, they were upset, and it happened to me, but they're like, you're the only person who could bounce back from that because you are so resourceful. So then I built confidence through friendship. And I also spoke to colleagues as well. And then I got educated. That was a third step. How do I don't do this again? How do I or reduce my risk? Because I think it's going to happen more and more. So it was going back to where I felt safe, sharing information with others, and then educating myself. Those are the three steps to how I rebounded. And listen, it was ugly, it was embarrassing. I was not happy about it, but I'm like, this must be teaching me something so I can share it to somebody else at the end of the day. And I share this with my neighbor who's 92, who gets fake mail. I share it with my neighborhood. I'm at a group chat. Like, the more you can educate others to be safe, the better, right? Because a lot of people, it's very easy to fall to a scam or, you know, I mean, there's so many other topics like cyberbullying, kids, whatever. But when you talk about loss of money, it's it's very violating, especially if you've worked most of your life and saved, and all of a sudden parts of it goes away. Like right? You know, at the end of I didn't listen, even if you didn't work for your dollar and someone stole it, don't be happy, right? Just because you have money, it's okay. Keep it. Don't let someone take it. Right? Listen, everyone has different circumstances. Mine, I worried for every dollar I have. And it was really hard to lose, you know, at the end of the day.

SPEAKER_02:

You know what I love about you is just how you're literally like, how is this happening for me, not to me?

SPEAKER_00:

Absolutely. Well, you know, being from a big family, you tend to get for me versus why there's no to me in a big family. I'll be honest. It's like you move forward. You have to, there's no choice. In a in a healthy big family. Not every family is built that way, but my family was.

SPEAKER_02:

I mean, I grew up as an only child, so I cannot relate. Son, we are total polar opposites to dawn. But I think that's incredible, just having that mentality of what added to your resilience because you already had this kind of resilient nature.

SPEAKER_00:

Yeah, I mean, listen, I I love my family. My mom did my mom and dad did everything to stabilize our family, but we didn't grow up in the most stable environments financially, right? But we were all taught that education was a key to solving problems at the end of the day, and also building compassion for others who had less, right? Because he grew up with a lot less, even if people viewed our family as doing well, there was people who had far less than our family, right? And we all paid for our colleges, our parents contributed a portion of it, but all seven of us were educated. So imagine that, like that's hard to do in a modern day. But the message we all got was education's key, compassion's key. Doesn't matter socially or economic status. And if there's a problem, how do you solve it? Right? At the end, and don't repeat it or learn from it and share it to others. Because that's what good educators do. They share their own situations to others, they don't just keep it bottled up like maybe they'll ask me someday. But you gotta share it, right? It's not like Smithers from Bart Simpsons, right? Getting kept all the secrets. I love you. No, but like I say, like you gotta share your knowledge. I don't care if it's ugly or pretty, but just do it with grace and no arrogance. That's it. Like I literally, like, you think it was pretty, like it's not to lose money. I can't tag I could crawl under a rock and not share it with one soul on this planet, and what good would that do at the end of the day?

SPEAKER_02:

Right. Well, I have a curious question for you. Cybersecurity can feel intimidating, especially for women. How do you simplify it? And especially when they feel like they're not techie enough.

SPEAKER_00:

So number one, cybersecurity is most individuals outside of high tech think it as an engineer title, right? So step number one, or not even step, but I would think of cybersecurity as more as cyber safety at any level, whether you're male or female. It doesn't even matter gender at the end of the day. And if most people understand it's all about the psychology of your response and your ability to pause and build healthy boundaries, it doesn't matter if you just picked up the mouse or just got an iPhone or just got, you know, I'm a Mac user, so a Google, whatever device, it doesn't matter how old you are. You don't have to be technical to protect yourself. I think the basic steps are one set up when you set up anything online. You always need to have a password manager. That's my number one rule, because those password managers can allow you to store complex passwords that you can change out frequently and switch up. And you only have one login into those, and they're downloadable, so it's not like they're just in the browser. If you're offline, you still have access. You could use Safari for Google Chrome, they have their own password managers in the browsers. Just know with Apple, their keys are encrypted, so only you could see them, not Apple. But on Google, they manage that encryption. So a little bit less secure, right? And there's other technical terms. So I think password manager, complex passwords, number one. Number two, don't share your birthday unless you really have to. Well, like seriously, I yeah, or your information unless you know, I know like people have to put in their address for banking and other stuff, but it like I'm sorry, until there's like double verification of your birthday on these social media platforms, they're lower priority. Make up a birthday, honestly. I I am not trying to down any social media platforms. Thirdly, I think learning to slow down and understand what's fraudulent person, what's real, right? So if you're not searching for it, don't respond to it. That's the easiest step out there. Like it doesn't matter if some hot guy reaches out to me on Facebook, I'm not gonna connect with them. Like, if he has more pretty pictures and just reaching out to me, I'm like, sorry, I'm way hotter and way smarter. Thank you. So no, but I'm not a thing, like, those are the things like you have to say if I'm not searching for it. Don't respond, bottom line. And then that was the third comment. Fourth one is if you have children, educate them early, talk to them openly, talk to them about internet safety and be open around it. Because the more you set up security settings, multi-factor authentication, all that stuff, they become more aware early on. So that's less chaos coming into their life or your own life, right? They could, there's predators out there. So, I mean, those are the things I took for me personally, because I was a single mom. Like, how do I protect my financials? How do I not respond to something that I didn't reach out to? And I don't care anymore. Like, I literally, if I've not reached out, none of your business, right? And then, and then protect my kids the best I can. And it's not perfect. I'm human like everyone else. It's gonna, everyone's gonna make a mistake at the end of the day. But I think taking basic, simple steps is key. And then also reevaluating what your digital footprint is. Do you have like old emails that you don't ever log into? Do you have old apps on your phone that are not secure? Get rid of all those accounts. They're just noise, and it's open opportunity to come into your home environment or your networks to impact you financially.

SPEAKER_02:

So incredible. So as we wrap up, you're not only a cybersecurity professional, you're also a mom with a huge mission. So how has motherhood influenced the way you think about resilience and safety today?

SPEAKER_00:

Well, I think that's a mom with safety, number one, protective nature. Mama bear. I literally am a mama bear. I always have been. I think with family and especially my children, I just I go back to my mom. She always like she said, treat others like you would treat yourself at the end of the day. And if someone's not treating you the way you'd want to be treated, don't respond to it. And I think in a digital world, that's a lot harder. And my oldest daughter always says the word FOMO, and I'm like, what's FOMO? Now listen, I'm aging myself, but just like rare missing out. And I said, God, I'm like, I would love to miss out. I wouldn't that even love. So the one thing that's helped me with my own kids growing up in the digital era is do onto others as you do onto yourself, which is very, I'm not saying it's biblical, but it's very traditional. But I also say to my kids, if the rules were reversed, would you include that kid in your life? And the answer is no, don't expect the same back. Right. So when they get FOMO or fear of missing out or being online, social media, who's popular, who's not. I always take them back. I ground them again. And I'm like, did you treat them kind? If you did great, if they're not nice back, just move on. They're an acquaintance acquaintance. I think social media and digital world has dehumanized a lot of our emotions. So for me, being a mama beer, I I go back to my grassroots of analog, running in the streets for a telephone booth, duking it out at the lunch table with some kid that I had words with. No, I'm not kidding. I'm not, I wasn't like a I wasn't a biter, but I think each of my kids' human decency and patience, and also compassion for the other side, because you don't really know what that kid on the other side's feeling. Because a lot of times when I was bullied as a younger child, it was because that kid had a way worse situation at home than my own life, right? So understanding that empathy, but also not feeding into it at the end of the day as a mom, like like from that safety perspective. So it's really do unto others as you do unto yourself. And just teaching those life skills in a digital world, it's hard. It's constant. You have to talk to your kids for sure.

SPEAKER_02:

So when you think about your legacy, what do you want your work to remind people about? The connection between safety, software, and resilience.

SPEAKER_00:

You can still win the war for even the lost battle, right? At the end of the day. And I think learning from the losses, you gain a lot more knowledge, and you can help others, not kind of go down that path at the end of the day. So I think from a resilience, self-worth, and not repeating the past, it's being able to share that knowledge on to others and help them out along the path. Beautiful.

SPEAKER_02:

And promise you we're at our two final questions before we head into the fire round. Oh no, there's a fire round. There is a fire round. But I warned you about this. We're good. Yeah. So what's one thing you want every woman listening to remember about her resilience and her power, both online and offline?

SPEAKER_00:

I think no matter what happens, just go back to where you've like believe in yourself again and understand that mistakes happen. And sometimes you may it be all those circumstances may be out of your control, but the control is living in the now and learning from the past and just moving forward and not letting it define you. Beautiful.

SPEAKER_02:

And lastly, what does it look like for you to currently rise into your next level?

SPEAKER_00:

Oh, it's it's a little overwhelming because I was offline for many years, except for limited social media. Just being on camera, I was in the corporate world every day. I mean, think about it. I was I've been on video for 20 plus years. So that's a little bit easier. But being out in social media after that's where my crime started is very intimidating. It's very humanizing in the way who else is going to come my way? Are they real or are they fake? So, but at the same time, I look at someone who doesn't have the knowledge or experience. How can I help them reduce their risk? And I'm used to kind of weird, quirky things happening. So I kind of go with the flow. I've learned to go with the flow at the end of the day. So beautiful.

SPEAKER_02:

All right, so quick fire round. These are going to be some fun answers. And I'm just excited to see what you come up with. One word that describes your current season. Fall. She went literal.

SPEAKER_00:

Oh, I literally falls my favorite season, so I went to fall.

unknown:

Okay.

SPEAKER_00:

There's a little word. True.

SPEAKER_02:

I would have thought resilient, but okay.

SPEAKER_00:

Well, you said with season so okay. So current season. Like what current season would be I would say rebirth of myself.

SPEAKER_02:

I actually knowing you, yes, I would probably say it is rebirth. Daily non-go non-negotiable that grounds your mindset.

SPEAKER_00:

Daily non-negotiable that grounds your mindset. I have to walk every morning with my dogs and my bunny on my back. Non-negotiable if I don't do it.

SPEAKER_02:

For you guys who are listening, we didn't get into this. But Alison fully has a consume. I do. I'm an animal lover. A book that shifted the way you think.

SPEAKER_00:

Where the side again. I love that. I love that book. Only because it was the first book I could read in the library because I struggle with reading. And it was the first book that built me confidence in learning how to read aloud and internally. I'm right and left-handed, so that that book was my favorite. Where the side. And I ran operations at a very early age in my career. And I had a lot of things on my plate. And I was a problem solver, so he would sit me down because I was so full of energy. How do you eat an elephant? Is one bite at a time. Beautiful. I'm working on the patience aspect in life.

SPEAKER_02:

So that was a good reminder for me.

SPEAKER_00:

I'm many years older, trust me.

SPEAKER_02:

Well, a song that always lifts your mood.

SPEAKER_00:

The Eye of the Tiger. It's my favorite, favorite motivational song, Eye of the Tiger. Well, it didn't have to be motivational, but if it works, it works.

SPEAKER_02:

That is for me. It's like all right, and final one. What is one thing you want women to stop apologizing for? Themselves.

SPEAKER_00:

Beautiful. I think we apologize for ourselves way too much for being us. And I think what I learned even through my cybercrime, I wanted to apologize to my own self, but I've learned I'm not going to be apologetic anymore. I'm here to be who I am authentically. And I don't think women should ever apologize for themselves ever. I think as long as they have good intentions, have empathy, and if they if words have impacted their relationship with someone, sometimes we don't say it the perfect way, but we can also recognize that from the other side if we are empathetic and also still get our point across, even if it didn't come out perfect the first time.

SPEAKER_02:

Beautiful. Well, it was an honor to have you. And what I love about this conversation with Alison is it reminds us that resilience isn't always just bouncing back. It's about rebuilding stronger, clearer, and more anchored. But it also was a great reminder on how to actually take actionable steps to protect yourselves, protect your assets, protect who it is you are. So I am just honored. As we started talking about boundaries, where in life are you being invited to set stronger boundaries? Where can you shift your mindset from fear to night or naivety to resilience and empowerment? Because in this heart of Allison's work, she's showing us safety, dignity, and confidence are not separate from our mindset, they are reflections of it. So thank you for joining us on this episode of the Rise with Anita podcast. Until next time, keep protecting what matters, keep honoring your boundaries, and keep rising into your resilient, most powerful selves. Thank you.

SPEAKER_00:

And thank you for having me, Anita. It's been a pleasure. And anytime you want me to join in, I'd be more than happy. I would love to have a second round, honestly.

SPEAKER_02:

Oh, listen. Should be pretty easy. Alrighty. Well, until next time. For those of you guys who are wondering how to connect with Allison, her social media links, where available, will be below. And also her the link to her website. And we will be doing a part two because quite frankly, I could have asked her so many more questions.

SPEAKER_00:

Yeah, no, absolutely. And in the uh so YouTube is cybersafe at AJ. I'm also when I do recordings, there's podcast audio as well. I'm on Facebook as Allison AJ Cuts. I'm on LinkedIn as Allison Cuts. And hopefully I'll finish recording my book. Now hopefully, I will be refinishing my book by September so I can launch it on Amazon. But I can provide you the links for people if they want to reach out and figure out where we can help. Like honestly, it's just helping empower other people, especially women. And my book is focused on females and single moms, right? Being from high tech, I was graced with being exposed to a lot of technology and still fell like to a victim, non-victim, but fell to a crime. And so many people don't even understand how much that risk. So I my book is to help help those moms that are busy like me. Stay yeah.

SPEAKER_02:

Beautiful. Well, it was a pleasure to have you. I will have our social links below. If you guys like this episode, please go ahead and reach out to us on Instagram or Facebook or whatever social media platform you want to come to us on. Let us know your thoughts, let us know your biggest takeaways. And until the next one, that's all for now.

SPEAKER_01:

Thank you for rising with me today. If this episode moved you, share it, tag me at Arise with Anita, and make sure to subscribe so you never miss a future activation. And if you feel cold, leave a quick review. It helps more women find the space and rise into their power. Your next level is already waiting. Now go clean it. I'll see you in the next episode.