Plaintext with Rich
Cybersecurity is an everyone problem. So why does it always sound like it’s only for IT people?
Each week, Rich takes one topic, from phishing to ransomware to how your phone actually tracks you, and explains it in plain language in under ten minutes or less. No buzzwords. No condescension. Just the stuff you need to know to stay safer online, explained like you’re a smart person who never had anyone break it down properly. Because you are!
Podcasting since 2025 • 11 episodes
Plaintext with Rich
Latest Episodes
How Phishing Wins By Borrowing Your Emotions
Most breaches don’t start with malware. They start with a feeling. We explore why social engineering works so well in ordinary moments, and how attackers lean on urgency, authority, and fear to push quick clicks, rushed approvals, and hasty pay...
•
Season 1
•
Episode 11
•
8:59
Ransomware Starts With Access And Ends With Leverage
Your screens don’t go dark first they go quiet. We walk through how modern ransomware begins with access, not chaos, and why double extortion flipped the incentives: attackers steal sensitive data, then encrypt to amplify pressure. That shift t...
•
Season 1
•
Episode 10
•
8:26
IoT Security Made Simple: Protecting The Devices You Forgot You Own
Your house didn’t suddenly become unsafe it became chatty. Doorbells, cameras, smart TVs, speakers, and even “just a light bulb” are small computers that inherit real risk the moment they join your Wi‑Fi. We unpack how convenience-first design ...
•
Season 1
•
Episode 9
•
7:48
Cloud Security Without The Panic
A breach without a break-in sounds strange until you realize the cloud rarely fails with drama it fails with defaults. We walk through why identity has replaced the physical perimeter, how ordinary configuration decisions create extraordinary r...
•
Season 1
•
Episode 8
•
7:35
From Shared Secrets To Secure Proof: Why Passkeys Win
Your name or username doesn’t unlock an account—reused secrets do. We dig into why the internet’s copy‑and‑paste approach to passwords keeps failing and show how passkeys flip the model from disclosure to proof. With a device‑bound private key ...
•
Season 1
•
Episode 7
•
8:39