I’ve been telling people for years that they need to implement two-factor authentication wherever possible. Now that you’ve done that, imagine the havoc that would happen if those security codes were sent to somebody else enabling them to access your email, social media accounts, and worse your bank accounts. It is called SIM swapping, porting out, and SIM jacking. Today’s guest is Haseeb Awan.
Haseeb is CEO of Efani, American’s most secure and private cell phone service. He is an expert at protecting high profile individual cell phone numbers. Haseeb was also co-founder of the first bitcoin ATM company.
Haseeb shares his many experiences with working with SIM swapping. We talk about how we are all at risk and the precautions we can take to avoid becoming a victim of SIM swapping.“If you can’t afford security, you can’t definitely afford a breach.” - Haseeb Awan Click To Tweet
- [01:26] – SIM swap, SIM port, SIM hack, and telephone takeover are all the same. SIM swapping is when a criminal takes over your telephone.
- [02:05] – The criminal takes control of your social media accounts or email accounts and then drains your bank account.
- [04:06] – If a person gets your account number, pin number, and telephone number and then the criminal can transfer your phone number.
- [05:36] – Often they go online and buy a new SIM card and trick someone to transfer the number to them.
- [06:51] – Social engineering is as simple as pretending to be someone you are not to gain information maliciously or for fun.
- [08:05] – Telephone companies have the ability to sell, monetize, and track your data.
- [10:47] – If I haven’t done anything wrong then why do I need privacy?
- [11:49] – The people that are criminals are working 24/7 to destroy you.
- [13:31] – The average customer is more at risk because they don’t take as many precautions.
- [14:41] – Make sure your cell phone carrier supports a pin code at a minimum.
- [16:30] – Whatever setting you have the criminal can override.
- [19:42] – The port lock might help keep your number from being taken to a different carrier, but if they go to your carrier’s store it doesn’t help at all.
- [19:58] – These criminals only need a few hours to have complete access to everything.
- [20:36] – Often they attack when you are most vulnerable like after 9 PM in the evening.
- [21:16] – You should always use an app-based or hardware key vs. SMS two-factor identification.
- [23:32] – Keep it simple and have a password on your phone and then use the Google authenticator app.
- [24:52] – We often get attacked because we are lazy and put security off until tomorrow.
- [26:22] – Efani focuses on pricing and security.
- [27:18] – Most of their customers are people who don’t want their information sold on the internet and want that extra layer of security.
- [28:15] – Doctors are the number one victims of SIM swapping attacks.
- [29:40] – Seniors are at a significantly higher risk.
- [31:19] – It is really easy to forge caller id, so never assume it is a real call.
- [32:25] – Within 90 days you will see a 90% reduction in spam calls with Efani.
- [33:27] – When you have a cell phone plan try not to be on a family plan.
- [33:47] – The two most important numbers in your life are your social security number and your cell phone number and you have way more linked to your cell phone number.
- [34:14] – He suggests getting two telephone numbers. Use one for all authentications and don’t give that number out to anyone.
- [34:42] – Keep your cell phone software up to date and don’t let children play on your phone.
Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.
Links and Resources:
- Podcast Web Page
- Facebook Page
- Easy Prey on Instagram
- Easy Prey on Twitter
- Easy Prey on LinkedIn
- Easy Prey on YouTube
- Easy Prey on Pinterest
- Have I Been Pwned
- Haseeb on LinkedIn