SipCyber - Presented by IT Audit Labs cover art

SipCyber - Presented by IT Audit Labs

SipCyber - Presented by IT Audit Labs

By: IT Audit Labs
Listen for free

Summary

SipCyber: Where Great Coffee Meets Essential Cybersecurity


What happens when a former special education teacher turned Minnesota State Cybersecurity Coordinator sits down with a perfect cup of coffee? You get cybersecurity advice that's actually approachable.


Jen Lotze from IT Audit Labs brings you SipCyber — the podcast that pairs cozy coffee shop discoveries with decaffeinated cybersecurity tips. No jargon. No fear-mongering. Just practical ways to protect yourself, your family, and your organization from digital criminals who want to ruin your perfectly good day.


What You'll Get:

  • Real-world cybersecurity advice anyone can follow
  • Coffee shop reviews and community spotlights
  • Stories from someone who's been in classrooms, boardrooms, and government coordination centers
  • A mission to make security everyone's job, not just the IT team's

From teaching special needs students to coordinating statewide cyber defense, Jen proves that cybersecurity expertise comes from the most unexpected places. And the best conversations happen over great coffee.


Perfect for: Coffee lovers, small business owners, educators, parents, and anyone who wants to stay safe online without the technical overwhelm. Let's get brewing.

© 2026 SipCyber - Presented by IT Audit Labs
Episodes
  • AI Phishing Attacks: When Fake Emails Feel Too Real
    May 6 2026

    If something feels right, do you question it? In this episode of SipCyber, Jen Lotze sits down at Walden Coffee in Minnesota with a plain latte—one with just enough latte art to make her stop and look twice. And that moment of recognition becomes the perfect lens for one of the most dangerous trends in cybersecurity right now: AI-generated phishing emails that sound exactly like the people you trust.

    Attackers aren't guessing anymore. They're studying. Pulling patterns from LinkedIn, past emails, and social media to reconstruct how your boss writes, how your coworker asks for favors, and what a "normal" request looks like in your world. Then they send something that fits. Perfectly.

    Key Topics Covered:

    • How AI learns your communication style to impersonate people you trust
    • Why today's phishing emails have no typos, no red flags—just context
    • The one-step verification habit that breaks the attacker's pattern
    • How businesses can implement a simple "second check" policy for urgent requests
    • Why the things that feel most natural online deserve a second look

    This isn't about paranoia. It's about adding one intentional pause before acting—because that's all it takes to break the spell.

    ☕ Featured Spot: Walden Coffee, Minnesota 🍵 Jen's Order: Plain latte

    Don't click before you think twice. Subscribe for weekly cybersecurity insights from the best local spots across the country—and share this with someone who's ever gotten an email that felt just a little too convenient.

    #Phishing #AIPhishing #CyberSecurity #EmailSecurity #SocialEngineering #InfoSec #SipCyber #CyberAwareness #AIThreats #DigitalSafety #CyberCrime #HumanHacking #ScamAlert #SecurityTips

    Show More Show Less
    4 mins
  • AI Is Reading Your Emails Before You Do
    Apr 29 2026

    AI doesn't just help defenders anymore—attackers are using it to study you before you ever know you're a target.

    In this episode of SipCyber, Jen Lotze sits down at Forgotten Star Brewing in Fridley, MN—a former WWII manufacturing facility built on a legacy of doing things right—with a rare seasonal Maibock in hand, and a sharp warning about how AI is quietly transforming phishing attacks into something far more dangerous: emails that look exactly like everything else in your inbox.

    Key Topics Covered:

    • How attackers use AI to map relationships and mimic writing styles inside your organization
    • Why 91% of successful cyberattacks still start with an email
    • Advanced email filtering tools (Harmony, Abnormal) and what they actually do
    • What you can do if you don't have enterprise-level protection at home
    • The simple habit—verify outside the email—that can stop even sophisticated attacks

    This isn't about fear. It's about the one pause that changes everything.

    🍺 Featured Spot: Forgotten Star Brewing, Fridley, MN (Formerly a WWII boiler room—and yes, the Maibock is worth the wait.)

    Don't let a "normal-looking" email cost you everything. Subscribe for weekly cybersecurity insights delivered from the best local spots across the country—and share this with anyone who uses email at work.

    #AIPhishing #CyberSecurity #EmailSecurity #PhishingAttack #InfoSec #SipCyber #AIThreats #CyberAwareness #SocialEngineering #DigitalSafety #EmailHacking #CyberDefense #ForgottenStarBrewing

    Show More Show Less
    5 mins
  • Your Photos Are Sharing More Than You Think
    Apr 15 2026

    Your photos are talking behind your back — and most people have no idea.

    In this episode of SipCyber, Jen Lotze stops into Profit Coffee in North Charleston, SC — a thoughtfully designed space where even the milk choices signal awareness — and unpacks a privacy habit you probably never knew you needed. Inspired by a fisherman friend who screenshots every photo before sending it, Jen breaks down what's quietly hiding inside the images you share every day.

    Key Topics Covered:

    • What photo metadata is — and why it matters for your privacy
    • How a single image can reveal your home, your routines, and your location history
    • The simple screenshot trick that strips hidden data before you share
    • How to disable location tagging in your camera settings in under a minute
    • Why awareness — not paranoia — is the most powerful privacy tool you have

    You're not oversharing on purpose. You're oversharing by default. One small setting change fixes that.

    ☕ Featured Spot: Profit Coffee, North Charleston, SC

    Think privacy is complicated? It doesn't have to be. Subscribe for weekly cybersecurity tips from the best local spots across the country — and share this with someone who still sends photos straight from their camera roll.

    #PhotoPrivacy #Metadata #CyberSecurity #DigitalPrivacy #InfoSec #SipCyber #DataPrivacy #OnlineSafety #CyberAwareness #PrivacyTips #LocationData #EXIF #PhotoSecurity #CyberTips #DigitalSafety

    Show More Show Less
    4 mins
adbl_web_anon_alc_button_suppression_c
No reviews yet