• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    Cyber Risk Management CISO Hannah Suarez

    Cyber Risk Management Starts with Understanding the Business: CISO Hannah Suarez Explains Why

    Public Regional Hospital, cyberattack

    Cyberattack Forces Polish Hospital Revert to Paper-Based Operations

    Nasscom advisory

    Nasscom Calls for Vigilance as Firms Brace for Impact from West Asia Conflict

    Kids Internet and Digital Safety Act

    Kids Internet and Digital Safety Act Gains Momentum in U.S. House

    CVE-2026-27944

    Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data

    ClipXDaemon, Linux malware

    ClipXDaemon Malware, a Stealthy Cryptocurrency Clipboard Hijacker on Linux

    romance scams

    Ghanaian Man Pleads Guilty in U.S. Court for Romance Scams That Stole $100M

    Women in Cybersecurity initiative

    Women in Cybersecurity Reveal the Skills That Built Their Confidence

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    op 50 Women in Cybersecurity to Watch in 2026

    Top 50 Women Leaders in Cybersecurity to Watch in 2026

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    space cyber security

    India Strengthens Space Cyber Security with New CERT-In and SIA-India Framework

    CISCO SD-WAN, Cisco, SD-WAN, CISA, ASD, Zero-Day

    Hackers Exploited Cisco SD-WAN Zero-Day for Three Years Before Detection

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    Cyber Risk Management CISO Hannah Suarez

    Cyber Risk Management Starts with Understanding the Business: CISO Hannah Suarez Explains Why

    Public Regional Hospital, cyberattack

    Cyberattack Forces Polish Hospital Revert to Paper-Based Operations

    Nasscom advisory

    Nasscom Calls for Vigilance as Firms Brace for Impact from West Asia Conflict

    Kids Internet and Digital Safety Act

    Kids Internet and Digital Safety Act Gains Momentum in U.S. House

    CVE-2026-27944

    Critical Nginx UI Vulnerability Exposes Server Backups and Sensitive Data

    ClipXDaemon, Linux malware

    ClipXDaemon Malware, a Stealthy Cryptocurrency Clipboard Hijacker on Linux

    romance scams

    Ghanaian Man Pleads Guilty in U.S. Court for Romance Scams That Stole $100M

    Women in Cybersecurity initiative

    Women in Cybersecurity Reveal the Skills That Built Their Confidence

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Planning and Zoning Permit Phishing Scam

    FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

    op 50 Women in Cybersecurity to Watch in 2026

    Top 50 Women Leaders in Cybersecurity to Watch in 2026

    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Stolen Credit Card Data Trafficking

    Chilean National Extradited to U.S. Over Stolen Credit Card Data Trafficking Scheme

    cybersecurity firewall

    Vietnam Announces National Cybersecurity Firewall Plan Under New Digital Governance Law

    government cyber security

    UK Tightens Government Cyber Security After Cutting Critical Vulnerabilities by 75%

    iphone, ipad, apple devices

    Apple Devices Become First Consumer Products Cleared for NATO Classified Data—But Questions Remain

    space cyber security

    India Strengthens Space Cyber Security with New CERT-In and SIA-India Framework

    CISCO SD-WAN, Cisco, SD-WAN, CISA, ASD, Zero-Day

    Hackers Exploited Cisco SD-WAN Zero-Day for Three Years Before Detection

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    INC Ransom, Western Critical Infrastructure, Critical infrastructure, Russian GRU, Russian Threat Actor, Sandworm, APT44, Energy Supply Chain, Energy Infrastructure

    INC Ransom’s Franchise Model Is Putting Critical Infrastructure on the Chopping Block

    Terrorist Cyberattacks, UAE Cyber Security Council

    UAE Blocked AI-Powered Terrorist Cyberattacks Targeting Critical Infrastructure

    Eurail Breach, Eurail

    Eurail Breach Escalates as Stolen Passport Data and IBANs Surface on Dark Web for Sale

    Discord teen-by-default settings

    Discord Introduces Stronger Teen Safety Controls Worldwide

    The Cyber Express cybersecurity roundup

    The Cyber Express Weekly Roundup: FortiOS Exploits, Ransomware, Hacktivist Surge, and EU Telecom Rules

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

Cathy Pedrayes Dishes Out Cyber Tips: What Every Digital User Needs to Know

Samiksha Jain by Samiksha Jain
October 29, 2024
in Firewall Daily, Interviews, Malware News
0
Cathy Pedrayes
768
SHARES
4.3k
VIEWS
Share on LinkedInShare on Twitter

Imagine scrolling through your phone and seeing a familiar face—someone who’s not just dishing out the latest fashion trends or travel tips but is giving you practical advice on staying safe online. That’s Cathy Pedrayes, known to her followers as “The Mom Friend,” a TV host turned social media influencer who’s made it her mission to make cybersecurity both accessible and, believe it or not, a little fun.

Cathy didn’t set out to become a cybersecurity advocate. It all started when she began noticing just how easy it was for strangers to dig up personal information online. As she dug deeper, what she uncovered was eye-opening—and a bit terrifying. She realized that many of us, herself included, were leaving ourselves wide open to digital threats simply because we didn’t know any better.

In this feature, Cathy opens up about her personal journey into the world of cybersecurity, sharing insights and everyday habits that can help everyone —whether you’re a busy parent, a college student, or just someone who spends a lot of time online—navigate the digital world with more confidence and less worry. In her own words, it’s not about being paranoid; it’s about being smart. Cathy’s journey into cybersecurity might have been unplanned, but her advice is spot-on for anyone looking to protect their digital life in a world where cyber threats are increasingly hard to ignore.

Cathy Pedrayes Journey into Cybersecurity

Cathy’s foray into cybersecurity wasn’t planned; it was born out of necessity. During her time on live national television, she witnessed firsthand the unsettling experiences of colleagues dealing with stalkers and overzealous fans. “I saw many of my colleagues deal with people showing up at their homes, and it made me wonder how they were finding their information to begin with,” she recalls.

This unsettling reality prompted Cathy Pedrayes to dive into the world of online safety, seeking out tips and strategies to protect herself and others from similar threats. With a tech-savvy family to bounce ideas off of, Cathy began sharing her findings, helping others take back control of their digital lives.

Daily Cybersecurity Habits for Everyone

When it comes to cybersecurity, Cathy emphasizes the importance of practical, everyday habits that anyone can adopt, regardless of their technical skills. While strong passwords and multifactor authentication are essential, Cathy Pedrayes shares some lesser-known tips that can significantly boost online security.

report-ad-banner
  1. Use Different Emails and Phone Numbers: Cathy advises using different emails and even phone numbers for different tasks. “A phone number is tied to a ton of your information, so use VoIP numbers for things that aren’t important, like a grocery store rewards program,” she suggests. This simple strategy can help protect against data breaches and reduce spam.
  2. Change Your Name on Shipments: One of Cathy’s favorite hacks involves changing her last name or adding a code to her shipping address. This allows her to trace the source of her data if it’s ever sold. “If I start receiving junk mail with that name, I’ll know it came from my magazine subscription,” she explains.
  3. Use E-Wallets and 3rd Party Payment Tools: To reduce the risk of data breaches and skimming devices, Cathy recommends using e-wallets or payment tools like PayPal. These options allow you to pay without sharing your payment details directly with vendors.

Making Cybersecurity Accessible

Cathy’s approach to sharing cybersecurity advice is rooted in her deep understanding of her audience. She knows that her followers are often busy moms, students, and everyday individuals who might be vulnerable to online threats due to a lack of awareness.

“The real threat for people like us is making a mistake when we get an unsuspecting text or email,” she says. By focusing on education and relatable examples, Cathy helps her audience identify red flags before it’s too late.

Securing Social Media: Tips from The Mom Friend

Social media platforms are a common target for cybercriminals, and Cathy has some practical advice for keeping these accounts secure:

  1. Use Strong Passwords and Multifactor Authentication: These basics are essential for any online account.
  2. Limit Access to 3rd Party Apps: Cathy advises against giving unnecessary access to apps that want to pull data from social media. If access is no longer needed, be sure to revoke it.
  3. Use Filters to Protect Personal Information: Cathy recommends using filters to prevent others from sharing your personal information, such as your street address or phone number, in public comments.
  4. Trust Less and Verify More: With so many scams on social media, Cathy encourages a healthy dose of skepticism. “Be more suspicious. Look at reviews, find access to the site from another browser rather than clicking on the direct link,” she advises.

The Overlap of Physical and Cyber Safety

Cathy sees a clear connection between physical safety and cybersecurity, noting that the instincts we use to stay safe in the physical world should also apply online. However, she acknowledges that when people are scrolling in the comfort of their own homes, those instincts often fade. “My goal is to break down some of that comfort and remind people how they would act in the physical world is exactly what they should be doing online too,” she explains.

Debunking Cybersecurity Myths

One of the most common misconceptions Cathy encounters is the belief that “I have nothing to hide” or “I’m not important enough to get hacked.” Cathy firmly counters this notion, reminding everyone that we all have a right to privacy and that our data is incredibly valuable. “It’s literally a multi-billion-dollar industry,” she emphasizes.

Educating Through Entertainment

Cathy’s unique approach to educating her audience about phishing and online scams involves adding a touch of fun and creativity. Whether through skits, direct-to-camera news segments, or comedy, she finds engaging ways to make these serious topics more accessible and memorable. For example, she enjoys using the humor of extended warranty scam memes to highlight the underlying educational message.

Smart Home Security Tips

With the rise of smart home devices, Cathy offers practical tips to keep these gadgets secure. She prefers buying smart devices from reputable U.S.-based companies, avoids those that use third-party data storage, and keeps her smart devices on a separate email account. Regularly updating devices is another key practice she follows, as many security breaches occur due to outdated software.

Cathy is dedicated to staying informed about the latest cybersecurity threats by being “chronically online,” following industry experts, and using tools like Google Alerts. She carefully curates the information she shares with her audience, focusing on new tactics or updates to ongoing threats.

The Role of Influencers in Cybersecurity Awareness

As a social media influencer, Cathy believes that influencers have a significant role to play in raising cybersecurity awareness. However, she also acknowledges the challenges of presenting information ethically in a landscape that often rewards clickbait and fearmongering. Cathy encourages her audience to verify the information they consume and to remain open to changing their perspectives with new knowledge.

Despite her expertise, Cathy Pedrayes admits that she’s not immune to digital challenges. Her cautious approach, rooted in her background as a scientist and journalist, has helped her avoid scams so far. However, she shares a humorous anecdote about how her skepticism led her to triple-check the legitimacy of a book deal with Simon & Schuster, only to find out it was genuine.

Looking ahead, Cathy Pedrayes is particularly concerned about the rise of misinformation online and the role of foreign influence. She emphasizes the importance of verifying information and remaining vigilant in the face of these emerging threats.

Cybersecurity as a Shared Responsibility

Cathy’s approach to cybersecurity is refreshingly relatable—she’s been there, learning along the way just like the rest of us. She reminds us that staying safe online isn’t about being paranoid but about being smart with our choices. Whether it’s using a different email for your online shopping or pausing before you click on that suspicious link, her advice is grounded in common sense.

In a world where our lives are increasingly digital, Cathy’s message is clear: a little caution can go a long way. We all have a role to play in protecting our data and helping those around us stay safe too. It’s not about being an expert; it’s about making small, mindful decisions every day. After all, cybersecurity isn’t just for tech gurus—it’s for everyone.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: Cathy PedrayesCyber Safetycybersecurity awarenessCybersecurity HabitsCybersecurity MythsSocial Media InfluencerThe Cyber Express
Previous Post

Minister Ma’awali Drives Oman’s Cybersecurity Ambitions with New Initiatives

Next Post

U.S. Charges Man Behind RedLine Infostealer that Infected U.S. DoD Personnel Systems

Next Post
RedLine Infostealer, Maxim Rudometov, Infostealer, Malware, Stealer Malware, Infostealer Malware, DOJ, Dutch Police, Meta Stealer, Meta Infostealer,

U.S. Charges Man Behind RedLine Infostealer that Infected U.S. DoD Personnel Systems

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

Planning and Zoning Permit Phishing Scam
Cyber Essentials

FBI Flags Phishing Campaign Collecting Planning and Zoning Permit Payments

March 11, 2026
Psychological Cyber Warfare, Cyber Warfare, Cyberwarfare, Iran Israel War, US Iran Israel War
Cyber News

Iran’s Fake “Shelter Danger” Calls Part of Psychological Cyber Warfare Playbook

March 11, 2026
Cyber Risk Management CISO Hannah Suarez
Features

Cyber Risk Management Starts with Understanding the Business: CISO Hannah Suarez Explains Why

March 10, 2026
Public Regional Hospital, cyberattack
Firewall Daily

Cyberattack Forces Polish Hospital Revert to Paper-Based Operations

March 10, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information