SYNOPSIS

Alice is feeling down. She has a steady job, a great relationship with her boyfriend and a nephew she adores; but, something’s amiss. One day, a phone call changes everything. She becomes the perfect mark for a cyber crime. Alice’s life turns upside down. Things will never be the same. In a web of deceit, manipulation, data theft and impersonation, Alice becomes part of a chilling plot where conspiracy and artificial intelligence show her who she really is and the reality of the carefree world she thought she was living in.


Episode 1 - Bootstrapping

On her way to a job interview, Alice receives a call from her sister, Rebecca. An inconsolable Rebecca tells Alice that her son is missing.


Episode 2 - Attack vector

With John and Rebecca by her side, Alice recovers from a cyber attack. While the police investigate the theft, John suggests that Alice talk to his cyber security expert friend, Gabe.


Episode 3 - Synergy

Gabe’s advice helps Alice find out the address of Julia Suances, the lady who has the stolen box. Alice and John lie in wait in their car to confront Julia outside her home.


Episode 4 - Firewall

Alice tells John everything she found out at Julia’s house and her suspicions that the thief might have an ulterior motive. Alice believes her sister might be in danger.


Episode 5 - Hibernation

Three days after the car accident, Alice wakes up in hospital. Alice and John had a lucky escape. An injured Alice uncovers something that makes her think the accident had nothing to do with her and John’s argument.


Episode 6 - Imitation

With Julia’s help, Alice passes herself off as Rebecca to sneak into her sister’s workplace, the ADA headquarters. Her aim? To steal the code that they hope to use as evidence of the conspiracy they believe to have uncovered.


Episode 7 - System failure

After Alice is arrested and interrogated at the ADA headquarters, UnleashedTM threatens to harm her loved ones if she doesn’t cooperate. But something unexpected happens that completely changes Alice’s plans.


Episode 8 - Restart

While Alice eats breakfast in the hotel where she's hiding out, she meets the person who appears to be behind everything that’s happening. It’s time for some answers.


*The characters and events in this podcast are entirely fictional. This podcast is for informational purposes only. Santander Bank, N.A. and its affiliates (“Santander”) do not make any claims, promises, or guarantees about the accuracy, completeness, currency, or adequacy of any content. Santander expressly disclaims all express and implied warranties of accuracy, completeness, currency, or adequacy of the information and content in this podcast. Listeners should consult their own attorneys or tax or other advisors regarding the applicability of any referenced information or business or other strategies to their own unique circumstances.

Santander Bank, N.A. is a Member FDIC and a wholly owned subsidiary of Banco Santander, S.A. ©2024 Santander Bank, N.A. All rights reserved. Santander, Santander Bank, and the Flame Logo are trademarks of Banco Santander, S.A. or its subsidiaries in the United States or other countries. All other trademarks are the property of their respective owners.


How to be safer online

 
  • Be aware of what you share and who with. Avoid giving sensitive personal information to strangers or on dubious websites.

     

    • If you receive a suspicious message or call, check the information you’re given and contact an expert.

     
    • Keep your devices up to date to guard against any weak spots that cyber criminals could exploit.

       
      • Spot social engineering techniques: learn about tactics such as impersonation, phishing and fake profiles.

         

        • Don’t respond to suspicious requests for personal information, even if they seem genuine.

         
        • Use multifactor authentication on all your accounts. This will make it difficult for cyber criminals to obtain your information even if they succeed in impersonating you.

           
          • Check the identity of who is requesting confidential information or access to your accounts and systems. Don’t trust emails and phone calls as they may be fake.

            • Run important data backups on your devices, external units, hard drives and private clouds, and encrypt your copies for greater security.