Archives

Author Archive for: ‘admin’

Has Your Data Been Stolen?

According to the Identity Theft Resource Center (ITRC) and AARP, 1.3 billion American consumer records were stolen in data breaches in the first nine months of 2024. Almost one-third of Americans have been a victim of identity theft. Criminals stole nearly $23 billion from consumers last year. Every year, there are more than 50,000 individual personal data breaches in the US.

Most common causes of identity theft are when someone obtains the following personal Information

  • Name
  • Address
  • Phone numbers
  • E-mail address
  • Birthdate
  • Social Security Number
  • Drivers License
  • Credit Cards

Credit card fraud is the most common type of identity theft.

  • Don’t shop on unsecure websites.
  • Have all credit and debit card transactions sent to your email
  • Review your bank and credit card statements regularly.
  • Never send your credit card information via email or give it over the phone unsolicited.
  • Don’t use public Wi-Fi for financial transactions.
  • Shred documents that show your credit card number (bank statements) and social security numbers
  • Contact your credit card company right away if you lose your card.

Basic things not to respond to

  • Phone calls from anyone looking for personal information from you.
  • E-mails or text messages asking to verify your personal information,
  • Attachments from someone you don’t know
  • Messages stating “Don’t close this page, call this number.” If this happens, close out of the browser (Chrome, Safari, Firefox, etc.), turn off the computer by holding down the power button, and pull out the power cord.

Password rules

  • Use a combination of upper and lower case letters, numbers and symbols (i.e. Rr123456#)
  • Do not use names, your address, phone numbers, your pet’s name, or common words such as “password” or “computer”
  • Change your passwords every 6 months
  • Do not use the same password on multiple accounts
  • Do not store a list of your passwords on your computer or mobile phone
  • If you keep a list of your passwords, do not place it near your computer or in your desk

Shopping

  • Use credit cards only, no debit cards
  • Avoid saving credit card numbers at retailer sites
  • Monitor your account statements for unauthorized transactions

On the road

  • Do not make any financial transactions or enter password information at public wi-fi locations (hotels, coffee shops, airports, etc.)
  • When in a hotel, if you get a phone call from the “front desk;” asking to confirm your credit card, go directly to the desk instead of responding on the phone

 What to do if you are a victim of identity fraud

  • Call your bank and cancel your ATM/debit card
  • Change all your passwords.
  • Call your credit card companies to report that your card(s) have been stolen
  • Report your missing driver’s license to your local DMV and get a new one
  • File a police report
  • Call the three credit reporting agencies (Experian, Equifax, Transunion) and have a fraud alert and freeze your account

Experian 888 397 3742

Transunion 888 909-8872

Equifax 800 685-1111

  • Debt collectors – Tell them you are a victim and provide them with documentation

To read the complete article from AARP click here

 

 

 

Podcasts – The Return of Radio

Podcasts – The Return of Radio

It was nearing 11PM over 60 years ago, in the early 1950’s, “The Golden Age of Radio.” My father was preparing for bedtime. He brushed his teeth, grabbed his little transistor radio and hopped into bed. This little handheld device was the major vehicle for news, talk shows, and programming. He was preparing to listen to the Barry Gray Show, the unofficial “Father of Talk Radio.”

Along with Barry Gray, some of the leading personalities on the air were newsmen Edward R. Murrow and H. V. Kaltenborn, Jack Benny, Groucho Marks, Fred Allen, Bob and Ray, Arthur Godfrey, Lawrence Welk, and disk jockey Alan Freed. A few of the leading radio stations in New York were WINS, WOR, WPIX, WNEW, WMCA, WCBS, WMGM, and WNYC. The morning and afternoon newspapers were the main source of news at that time.

As the years progressed, many of the radio personalities moved on to television. Live TV/News coverage became popular in the 1960s and CNN went live in 1980. News at 5/6 PM and 11 PM became the main source for news before watching late TV or going to sleep.

Personal computers in the home became mainstream in the early 1980s. It wasn’t until the mid-1990’s that newspapers started to digitalize their content for computers.

In 2008, Apple introduced the smartphone, and for the first time, content and communications were available on a handheld device.

There was a time when the first thing we did upon waking up in the morning was to read the morning newspaper while eating breakfast. That practice gave way to turning on the TV. Now, most of us reach for our smartphone upon waking up for the news, weather, and other digital content. Most surveys report that the average cable viewer is about 70 years old, while the average podcast listener is around 34.

Podcasting started to become popular in 2003/4. Now, with many of the major news networks experiencing at least a 50% drop in viewership, many high-profile media personalities are turning to podcasting.

Today, the first thing I do upon waking up is to reach for my smartphone. The TV frequently is not turned on until later. As I walk around the city between meetings or stop at a restaurant, I am listening to either a podcast or a book. Before I go out, the first thing I look for is my smartphone even before my wallet.

Yes, Welcome to the return of “Radio.”

The Internet’s Impact on Running an International Business

Then and Now

I arrived at the airport 3 hours in advance of departure per the instructions of the airline. As was my practice, I had called the airline prior to leaving, waited on hold for over 30 minutes, and confirmed the departure time.  Once at the airport, I stood on line to check my bags and received my boarding pass.  

The objective of the trip was to get a contract signed that was negotiated over the course of the past 6 months after a number of trips back and forth on the part of all parties. Time was of the essence. I booked a round trip ticket on the Concord to Paris, planned on meeting at the airport, and returning the same day.

The date was sometime in the early 80’s. I had been selected to head the International Division of  the company in late 1979. Prior to launching our business abroad, as part of the due diligence process, I spent a year visiting key markets. During this time, I retained a former head of the International Division of a major consumer products company to assist in evaluating our potential overseas and to develop a business plan.

Once the business was underway, my traveling schedule consisted of going to Europe every 6-8 weeks and to the Far East every 3-4 months. Representatives from our various business entities came to our home office usually twice a year. Communications were limited to expensive phone calls and faxes. 

Life as an international businessman has changed radically in the past 40+ years. Technology has played a major role in changing how business is conducted, particularly on a global scale. 

Communications 

As indicated above, the only means of corresponding 40+ years ago was by phone or fax, both impersonal and costly. I started and managed the company’s global business long before the Internet was available. At that time, frequent traveling was the only means of maintaining contact and controlling the local markets. Phone calls were only handled in the office. Due to the time differences, I was in the office earlier than anyone else and was able to leave prior to the evening rush hour, since it was already nighttime abroad.

In today’s world, business is conducted 24/7. All communication vehicles (telephone, video conferencing, emails) are free.  Mobile technology allows us to stay in touch wherever we are, in the office, at home, or on the beach.

Managing a global business

“Google is to the Internet what the card file is to the library.”  The accumulation of information is a much simpler process now than it was when I was going through the due diligence process many years ago. While onsite visits are still an essential part of building a business plan, market research of all types is at one’s fingertips.  

There is no doubt that if the Internet was available during my tenure. my life would have been quite different. To name a few, Email, Texting, Whats App, Video Conferencing, Cloud computing, and Docusign, and others have substantially reduced the need to be on the road as much. Reliance on local partners to provide performance analysis has been replaced by the ability to receive data directly from sales outlets.

In today’s world, the trip described in the opening paragraph would probably not have been necessary. However let’s look at the differences in traveling then and now.

  • Then: Booking the flight involved calling the airline, waiting on hold, and a discussion about the various travel options available.  
  • Now: Through my mobile phone, I book all flights along with seat selections online.
  • Then: Once at the airport, there were long lines to check my bags, get a boarding pass, and go through security. 
  • Now: Again, with your mobile phone, you can check in the night before and  receive flight status updates, check bags at an airport kiosk, and breeze through Security using TSA.
  • Then: On the return to the US, confirming flight status abroad was often challenging. Once home, processing through Security and baggage check could take hours.
  • Now: From nearly anywhere in the world, it is possible to book, revise travel plans, check in and get boarding passes online. Upon arriving home, with Global Pass, it’s possible to avoid the long lines. It’s easy to book a car service before even leaving the plane.

Although I did enjoy flying on the Concord back then. all negotiations now are handled through cloud based services such as video conferencing, and email. Contracts for the most part are finalized using a program like Docusign.

I left corporate life just as the Internet started to enter both our professional and personal lives. Although I don’t miss it, I do wonder, from time to time, what my life would have been like with the tools of today.

 

Do You Need Tech Help?

The phone rang indicating an unknown number. As is my practice, I ignored the call. If it was important, the caller would most likely leave a voicemail message. Indeed, there was a message.

Upon listening to the message, I realized it was yet another similar request starting with, “I got your name from ________ , who indicated that you could help me with my computer, mobile phone, Internet, etc.”

My Program

Before taking on a new client, it is important to determine in advance whether or not I can help them. The following is the process I follow:

–          Return the phone call and discuss the client’s needs. If I could not help them, I didn’t want to waste their time or money.

–           If we jointly determine to move forward, before setting up a meeting, I discuss my fees and ask them to compose a list of topics they are interested in addressing.

–          At our first meeting, we discuss their needs and set priorities.

–          I evaluate if their existing equipment supports their needs. Perhaps simple upgrades/maintenance is necessary. If not, I recommend and assist in ordering and installing a new computer, mobile phone, etc.

Once we are ready to tackle the prioritized list of projects, we discuss my rules:

–          Initially, each meeting lasts only one hour. I have found my clients tend to feel overloaded after an hour.

–          Only one topic will be discussed per session.

–          The client should have a separate notebook and take their own notes.

–          Once I have demonstrated a task, its up to the the client to take over and practice with my supervision.

–          If follow-up meetings are scheduled, we first review the work of the previous meeting to make sure that there are no questions before proceeding with a new task.

–          I indicate that I am available via phone or e-mail to answer questions between meetings at no charge.

I do not prepare notes or work with a standard list of recommended equipment. I often meet many people in the course of a day and personalize their hardware and software to fit their needs. 

 

 

 

 

 

 

 

 

 

Have You Recently Left Corporate Life?

What You Need to Know

  • Have you recently left corporate life either by choice or the result of downsizing?
  • Do you have the right tools for your job search?
  • Do you have the most cost effective system for your home office?
  • Are you an effective “Road Warrior?” Does your technology support your mobile needs?
  • Since you no longer have a support desk, do you have someone to help you with maintenance issues?
  • What about security issues, backup, and a disaster plan?

Setting up a Home Office

  • Equipment selection
  • Software
  • Services
  • Maintenance and security

On the Road – Mobile Needs

  • Laptops
  • Internet access
  • Smartphones and tablets
  • Minimizing communication costs
  • Online services (cloud computing)
  • Maintenance and security

Need help making the right decisions regarding your tech requirements for home and on the road? Contact me either by phone 917 921-4518 or by e-mail at jblue@bluetutor.com for a free consultation.

About Steve Jobs

Steve Jobs (From the Archives – 2011)

It’s hard to start a technology program without taking a moment to reflect on the life of Steve Jobs and the impact he has had on all our lives. So much has been written about him since his passing. I can only reflect on the impact he has made on me personally. There isn’t a day that goes by that I don’t rely on a product or service that Steve Jobs did not have a hand in creating. Whether it is the computer, iPod, iPhone, iPad, iTunes, etc., try to think of a day that goes by that doesn’t include the creative genius of Steve Jobs. His vision has created many products and services that have been copied, but not successfully duplicated in performance. Look at iTunes and the iPad where everyone has attempted to emulate his genius with little success.

While I never met the man, he was truly one of the most remarkable people of the past century, if not history, and had a profound impact on my life. If not for Steve Jobs, I would not have discovered technology, which has become my passion, since I left a career in the corporate world.

It is only fitting that today’s program, which was planned before his death, is about the cell phone market. Without his vision, my show would not be possible, and my career change would probably have resulted in yet another unfulfilling job. Thank you, Steve, and today’s program is dedicated to you.

From The Desk to My Hand

It was the middle of 1982, and as my business partner and I were making our way through The Netherlands Schiphol Airport, we decided to stop by the local Duty Free Shop. One of the busiest stores in the terminal, they carried some of the most recognizable brands and designer items. As we made our way through their many aisles, we stopped at a new department featuring some of their latest products.

Our eyes were immediately drawn to a new electronic device which was getting a great deal of attention. And there it was, the Commodore 64 computer, the first of its kind. Up until that time, my partner and I had never utilized any technology for our business or personal lives. So, without hesitation, we both lined up and each purchased our first computer. We both struggled to learn how to use it and had no idea how this simple computer would start a revolution that would change our lives and how businesses would operate in the future.

For the past few years, I had been hopping around the world with only telephones and faxes (very expensive!) as a means to communicate with business partners. All meetings were conducted face to face. I was making monthly trips to Europe and at least 4 trips a year to the Far East. There were several instances when I would fly to a country, meet with associates in the airport to sign agreements, and hop on the next plane home.

As the ‘80s moved forward, Microsoft introduced their first Windows computer, while Apple launched its initial Macintosh unit. Companies started to provide their staffs with desktop computers for word processing. Computers started to pop up in homes. The Age of Technology was in full swing, and in the mid nineties, AOL started offering Internet access through telephone lines. However, it would take time before any work could be done away from your desk.

Moving through the ‘90’s, technology gradually crept into our lives. Computers became more powerful, and laptops became a necessary accessory. Toward the end of the decade, handheld devices started to enter the market. The blackberry became a staple as a pager, email provider, and a rudimentary means of access to the Internet. Starting in 2001, Apple entered the handheld market with its first iPod, offering music and other features, such as the ability to listen to books through Audible. The introduction of the iPhone in 2007 was a game changer. Google’s Android followed shortly thereafter, in 2008. Starting in 2010, tablets were introduced by both Apple and Google.

All of a sudden, we became a mobile society. No longer were we tethered to our desks. We were able to communicate and access information on the road. As we moved through the decade, it was possible to leave our computers at the office and home. Phones and tablets became mainstream, as handheld devices outsold computers. It is estimated that in 2021, the number of mobile devices operating worldwide stood at almost 15 billion, up from just over 14 billion in the previous year.

I have been writing this document on a number of different devices from several locations. In the past, this could only have been accomplished by saving the file on a “flash drive” and transferring it from device to device. Now, with the advent of “cloud storage,” it can be accessed on any computer I use, as well as a phone or tablet.

Growing up, television was still in its infancy. Listening to the radio was mainstream. We now have “Smart TVs” with Internet access. Why go to movies with the advent of “streaming?” Isn’t it ironic that radio has returned in the form of podcasts which lets us enjoy programs similar to how we relied on radios 70 – 80 years ago?

I often look at my life through a prism of “pre and post technology’s infancy.” I have written about my overall discomfort with corporate life, particularly the travel that was involved, prior to the Internet becoming mainstream. Having made the decision in the early 90’s to change careers, what would have happened if I hadn’t recognized the potential of the Internet and decided to be a computer tutor and technology consultant? At 52, where would I have turned. I had a successful corporate career, but needed another challenge. Looking back to nearly 30 years ago, the world of technology offered me the opportunity to pursue a second career, which has been rewarding and exciting.

As I complete this article from my handheld device in the park, thank you Steve Jobs, Bill Gates, Steve Case, and the many others who have made this ride so enjoyable.

Do You Have a Password Strategy?

One of the most common ways that hackers break into computers and mobile devices is by obtaining passwords. Although, I realize that it is easy to have one password for all your sites, this approach significantly increases your risk of identity theft.
 Here is my 10 top list of simple password rules:
 
10 – Do not share your passwords
 
 9 – Avoid using birthdays, family names, addresses, or any other obvious personal information 
 
 8 – Include letters (at least one capitalized), numbers, and symbols
 
 7 – Do not use the same password for your e-mail and web based accounts
 
 6 –  Do not reuse the same password for all your accounts
 
 5 – Change your passwords every 6 months or as soon as you suspect any unauthorized activities on any of your accounts
 
 4 – Do not respond to ANY requests (e-mails or text messages) for personal information
 3 – Do not enter password information at any free wi-fi locations such as coffee shops, public parks, hotels, airports, etc. 
 
 2-  Always log off when you leave your computer or device, and if you are using anyone else’s equipment
 
And my number one recommendation:
 
1 – DO NOT KEEP A LIST OF YOUR PASSWORDS ON YOUR COMPUTER OR MOBILE DEVICE
 
Some of you may already be using one of the many online password managers. However, the important point is that you have a strategy that you are comfortable with that reduces the risk of being hacked and a victim of identity fraud.

 

Are You Being Overwhelmed by Spam Phone Calls and Text Messages?

Unwanted calls and spam texts are annoying, but you can do something about them. The New York Times has reported that there are steps you can take to block and report spam calls and texts. Here are some basic recommendations.

– Block and report individual numbers.

– Don’t dial any numbers in an automated menu, don’t reply to any text messages with “STOP,” don’t even talk.

– You can put your number on the Do Not Call list and report unwanted calls to the Federal Trade Commission.

CLICK HERE to read the complete article in the New York Times and learn more about the action you can take to reduce the number of unwanted calls and texts.

 

What is Malware?

Wikipedia describes Malware as any software intentionally designed to cause damage to a computer, server or computer network.

PC Mag reports that the following are the most common signs that your computer has been infested with Malware.

Popup Ads Start Popping Up Everywhere

Your Browser Keeps Getting Redirected

An Unknown App Sends Scary Warnings

Mysterious Posts Appear on Your Social Media

You Get Ransom Demands

Your System Tools Are Disabled

In addition to having an anti-virus program (with the latest updates) installed in your computer, a strong malware program such as Malwarebytes must be installed as well.

Page 1 of 2012345»1020...Last »