• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

aSKaVIE

Your Tech Concierge™

  • Not tech savvy?
  • Room Service
    • 10-Ingredient Cocktail
    • New Installs
  • aSKaVIE
    • Troubleshooter
    • Q&A
    • Training
    • Anchor Archives
    • tECH tALKtIPS
  • Boutique
    • Anti-Virus
    • Backup
    • Digital Imaging
    • Hardware
    • Software
    • Other
    • Personal Computer Driver’s License
    • aVIEzON
  • Contact
    • Testimonials
    • Privacy Policy
  • Payment

Q&A

“Windows Users – Time for a Tune-Up?”

October 31, 2017 By Avie Uniglicht

This is your Tech Talk Tip for Tuesday October 31, 2017

Today’s discussion is for Windows users or for those of you who may know a Windows user. You see, Windows suffers from a common complaint. It tends to slow down over time. It doesn’t self-optimize.

While Windows has gotten better over the years, I deal with unhappy clients daily who come to me asking what I can do to help them. They seek a Tune-Up and I’ve found a solution for them. While I offer custom clean-ups and remote room-service for clients around the world, I’m always in search of tools that not only make my job easier and more efficient, but tools that my clients can use on their own for self-maintenance. If you’d like to know more, stay tuned as I review a product from one of my affiliates who has provided an outrageous offer that I can pass on to you today.

The product that I’m reviewing is the latest release from iolo technologies – System Mechanic Pro 17. It has been a popular product for 18-years and every version seems to get better. PC Magazine, NetworkWorld, Laptop Magazine, C-Net have all chosen System Mechanic as their Editor’s Choice – multiple times. I use it personally and you know I never endorse a product or service that I can’t stand behind and support. My reputation is too important to me to simply recommend something because of a referral fee. As a matter of fact, if I can’t justify using anything I recommend myself, you won’t find it on my website. Now that I’ve gotten that piece of business out of the way, let me tell you why I like System Mechanic Pro 17. #1 It is easy to install and use. #2- It is comprehensive and packs a number of tools into one nicely organized suite. #3- It does what it says it will do.

System Mechanic Pro 17 Keeps your Hard drive clean and error-free. It Automatically deletes junk files left behind by untidy programs, system freezes, and sudden restarts. It Easily fixes hundreds of errors involving the hard drive, system components, installed software, hardware, and more.

It Tunes your PC automatically
Using its Patented ActiveCare® technology, it runs in the background, fixing and optimizing your PC during periods of inactivity. It never interrupts with schedulers or messages, and stops the instant your system needs resources for other tasks.

It Boosts PC and internet performance
You’ll find that it Improves Windows startup, your internet connection speed, and download times.

It helps to Protect your system
It helps to Automatically repair Windows security flaws that leave you vulnerable to hackers and identity thieves.

Before I get a bit more into the detail of how the product works, I want to let you know that it routinely lists for $69.95
iolo technologies came to me and gave me an exclusive limited time offer with a coupon code. Make a note of this please. The coupon code is ASKAVIE. You’ll want to use the System Mechanic Pro 17 banner link on my askavie software page in my Boutique menu at askavie.com By using that link with the coupon code, you will save 70% off the annual subscription price resulting in a download price of only $20.98. Know that the usual discount is just 29%.

Get a massive 70% off either System Mechanic 17, or System Mechanic 17 Pro. Coupon code: ASKAVIE

You can buy this on the retail shelves in your favorite store – Walmart, BestBuy Stapes, OfficeMax, Costco, Frys, Office Depot, Target. They all have it. Just not at a price like this.
So hopefully, I don’t need to hard sell you on this, that’s not my goal. If you need a solution that will help you do what a professional cleanup will do for a fraction of the price, you should seriously consider this amazing offer.

Iolo technologies, LLC

Now please let me describe the menu of options that you’ll find once you download and install System Mechanic Pro 17.

First, what’s New in Version 17:
There is a new super definition database of over 40,000 programs and processes that helps empower System Mechanic to identify and classify the newest apps, tasks and services that tax the Windows Operating system by running in the background constantly without your knowledge.

iolo labs benchmark testing has found that after installing and optimizing with System Mechanic, startup times decreased an average of nearly 90%. This was due to its ability to identify bloatware at startup and allowing the user to choose whether they wish to turn it off. Software tends to hog even the fastest processors. Programmers tend to add more of these unwanted apps and processes to their software which isn’t necessary and simply slows down the startup process. Turning it off adds valuable time back to the boot process. By eliminating these uneeded programs from running at startup, it frees up RAM, CPU, Graphics chips and hard drive to perform the more valuable operations which results in faster performance for the user.

System Mechanic Pro 17 has a new continuous real time update capability to constantly update this definition database and keep on top of the ever changing app population.

The interface which I’ll cover in a moment has been redesigned to be easier to use than ever. There is even a performance impact index that shows how certain programs affect overall performance so you can choose which ones to keep and which to disable. What I like is the User sourcing that is done to reflect what percentage of users disable certain programs and which don’t, to help guide you in making your choices. Once you get hands on the software, you’ll see how easy it is to decide with this thumbs up and thumbs down approach. Because your subscription to System Mechanic Pro 17 allows for updating, many significant enhancements are slated to be coming soon and will automatically be offered and added throughout your subscription period.

So, the System Mechanic download size is a bit over 100MB. It’s a relatively quick install and upon launch you’ll find a Dashboard which offers Recommendations, A History of actions taken, and a PC Status. Tapping the PC Staus menu offers up info on your Hard Drive Space, System Memory, Startup Programs, and Running Programs,

The menu on the left panel offers up a Toolbox, Active Care, LiveBoost and Security options.

The Toolbox includes options to Clean, Speed Up, Protect, Recover, and Manage. Each of these categories has subcategories. For example the Clean category includes the All-in-One PC Cleanup which is the All-in-one tool to clean out junk files, registry issues, private data and more. Internet Cleanup removes internet junk files, private browsing data and more. Windows Cleanup removes windows junk files, broken shortcuts and more. Registry Cleanup cleans out and repairs registry problems and an Advanced Uninstaller thoroughly removes installed programs. The Speed Up category has a NetBooster which Optimizes Basic internet settings, restores internet settings as necessary and customizes advance internet settings. Speed Up also includes a Disk Defragmenter, a Program Accelerator, a Memory Mechanic and the Startup Optimizer. Protect offers a System Shield which scans the entire system for malware with configuration options. A Drive Scrubber which can secrely wipe all data from a drive so if you are donating a computer to a cause, your valuable data won’t go with it. It can create a bootable USB to wipe the system drive. There is a Security Optimizer which Fixes Windows security vulnerabilities, a Privacy shield which can disable personal data, wi-fi and bandwidth sharing and an Incinerator that installs on the desktop and acts like a shredder for unwanted files. Recover will help to search and recover accidentally deleted files. The system troubleshooter finds solutions to fix common computer problems. System Restore will undo recent system changes.

The Manage option offers a Super Control panel that will help you customize advance Windows settings.

Active Care performs Automatic PC Maintenance while you are away from your PC. It can automatically analyze your system and repair problems. So, you can set the program and forget it or get your hands dirty and control all of the features yourself, your choice.  If you already use a Security solution, you can disable the built-in optional security that comes with System Mechanic Pro 17 and it will monitor your current Anti-Malware product. That’s what I do. I use Webroot Secure Anywhere and while Webroot is friendly with other security products, it’s not a good idea to have more than one running in memory at a time.

I can tell you even more about the product, however my goal today was simply to give you a good overview of the comprehensive nature of System Mechanic Pro 17 and suggest that from my Professional Point of view, it is great choice if you are in the market for a tune-up package like this. I have always installed the free version of CCleaner for my clients. It offers a small fraction of the cleanup capability of System Mechanic Pro 17. I haven’t found a similar product with the value it packs under one easy to use umbrella.

Remember to use coupon code “ASKAVIE” at checkout to gain our full 70% discount. If you need assistance with the purchase or installation or at anytime, just let me know. Get a massive 70% off either System Mechanic 17, or System Mechanic 17 Pro. Coupon code: ASKAVIE

You’ll likely have follow-up questions about this or any other tech topic on your mind.
I invite you to reach out so that we may continue the conversation together. As always, I’ll be offering up my tech talk tips and Av-servations as I do daily on my station at anchor.fm/aSKaVIE. For an archive of all my previous Tech Talk Tips please visit www.techtalktips.com

For Anchor. FM, iTunes, Google Play, the Amazon Echo Platform and more, I’m Avie Uniglicht – Your Tech Concierge, and you can connect with me at my website at www.aSKaVIE.com . I hope you have a great week.

Filed Under: Uncategorized

So you want to Broadcast?

October 10, 2017 By Avie Uniglicht

Now more than ever before, we, you and me, have access to numerous venues where we can share our message as a broadcaster. Yes! Live Streaming via Periscope, Facebook Live, YouTube Live, just to name a few, and easy to use Public Radio and Podcasting apps such as Anchor. FM, have eliminated the barriers to entry for even the novice broadcaster. There has just been one challenge for many — getting noticed and grabbing listeners. Because of the number of interested broadcasters vying for the attention of time starved listeners, and truly a lack of a comprehensive index for folks to easily be found, it has been and continues to be an effort to gain exposure.

There is great value for young and old to participate in this growing medium. Because of my involvement over the years in training new broadcasters and live streamers on the technical aspects of things, I wanted to provide a way to not only educate, but to promote and create a supportive organization that could bring both experienced and novice broadcasters together in a Collaborative setting. Recently, I had a brain storm. Have you ever had an idea that gave birth to something that you just couldn’t stop thinking about? Well, occasionally, I let my imagination run wild when such ideas hit me. To address this challenge, I’ve started an organization called Broadcasters United™.

I wanted to build a global resource for the broadcasting community. Broadcasters United™ offers members the opportunity to explore, share, and learn from the diverse backgrounds, interests, and experience of others in the group. As an incubator for ideas, a source of Masterminds for current and future projects, a global directory for members, and the possibility for potential collaborative options, the value of this organization is expansive. Organizations seeking access to specific types of broadcasters will also find a diverse pool of experienced individuals who may wish to participate in this arena.

This is for users of existing broadcasting platforms and individuals with an interest in learning how to participate in these mediums. Media Hosts, Vendors, Educational Resources, Supporters and Sponsors are all welcome to contribute to the effort. The nature of this organization spans many demographics from young participants to mature and seasoned broadcasters. Language, Income, National Origin and Current Location is no barrier to entry. Podcasters, Live Streamers, You Tubers, Traditional Broadcasters (i.e.. Radio, Television), and others engaged in similar mediums that share an interest in modern mass communication are all welcome.

Broadcasters United™ objective is to be a consortium of unique voices who utilize the latest in digital Streaming, Podcasting, Radio, TV and yet to be discovered mediums to share their message Worldwide. Our objective is to provide a venue where contributors can collaborate, train, learn, and share their wisdom with other members.
I believe that “One Voice Can Change the World.” Collaborative efforts can amplify that voice. United, through clear communication and the combined efforts and support of members, each voice can and will be heard.

We’ll be formally launching this group soon and our Membership Directory is currently accepting new accounts. Membership is currently free and will be supported via Patreon donations. All interested members will initially meet in a Closed Facebook Group via www.BroadcastersUnited.com If you know someone who might be a good candidate for membership, please share this with them.
I invite you to reach out so that we may continue the conversation together. As always, I’ll be offering up my tech talk tips and Av-servations as I do daily on my station at anchor.fm/aSKaVIE. For an archive of all my previous Tech Talk Tips please visit www.techtalktips.com

For Anchor. FM, iTunes, Google Play, the Amazon Echo Platform and more, I’m Avie Uniglicht — Your Tech Concierge, and you can connect with me at my website at www.aSKaVIE.com .

Filed Under: Uncategorized

Protect your Credit and Identity

September 20, 2017 By Avie Uniglicht

“Affected by a data breach?, it’s likely inevitable. . .”

“We entrust our confidential information to entities that presumably have a fiduciary responsibility to protect it. However, no matter what, the ultimate responsibility rests on us to be certain no harm is done to our Identity and Credit Profiles.”


👂 Listen to “Protect Your Credit and Identity” – Tech Talk Tip™

Recent activities continue to remind us that we must do more to prevent misuse of our private credit profiles and information than ever. Criminals are on a never-ending path to do their best to access our personal information and use it to their enterprising ventures. In the United States, the Social Security number was introduced in 1936 with the sole purpose of identifying and tracking our lifetime earnings and calculating our Social Security benefits. Because of it’s unique nature, the use of the SS # has been adopted over the years by many organizations and systems to further identify us. You know the many times that you’ve offered up your SS # to Financial, Medical, Educational, and Government institutions when completing applications and verifying your identity. Most have no idea who you truly are, they simply validate your existence based upon the information that you provide and have access to. This makes it much too easy for criminals to impersonate you and take advantage of your good name.

The key to preserving your identity and protecting your interests is in limiting access to this information and if it is released in an unauthorized manner, preventing it from being used against you. The information is only valuable to a criminal when they can exploit it. So, what does one do? We should presume that our identity can already be easily “purchased” on the black market. By taking a pro-active approach, we invoke those key steps that will prevent any serious damage from being done to us with the misappropriated information.

What could be done if one has access to our personal information? Let’s presume they have access to our:

Names, addresses, social security numbers, birthdates, driver’s license IDs and credit card numbers. These for instance were data points allegedly gleaned from the Equifax breach. Upwards of 143 million unique individuals were affected.  These are just some of the things that can be done:

• Access existing accounts via identification
• Open new financial accounts and…
• Apply for credit cards, mortgages, auto loans student loans and other financial services
• Get medical care at your expense
• File for a tax refund in your name
• Get a job in your name and let you pay the taxes
• Steal your benefits
• And more. . .

Preventing abuse is the first step to protecting our identity, so follow these steps:
First, be certain that YOU have registered a secure account with “My Social Security” at: https://www.ssa.gov/

You don’t want anyone but YOU to create or access your information that has already been accumulated in your Social Security profile. Be certain to protect the account with 2-Step verification. While we are on the subject, 2-step verification with Pin numbers or secret phrases should be used whenever possible with all accounts. (ie. e-Mail, Credit Cards, Credit Bureaus, Banking, Insurance, Mortgages, etc.).

Next, Freeze your Credit. By freezing your credit, you’ll prevent criminals from trying to open new accounts in your name—all of your current credit cards will still work. You’ll only need to consider unfreezing your credit at those times you wish to apply for a loan, open a new credit card, or make any type of purchase that requires a check on your credit. Before ordering a Credit Freeze, there are 3 things to know:

One: You’ll want to pull a credit report. You can get a free report legitimately from https://www.annualcreditreport.com for each of the major credit bureas each year. It doesn’t matter if you’ve already frozen your accounts, you can still monitor using the free tool. We recommend you pull only one report now, another one in four months, and the third in another four months. Your reports will provide you with a benchmark of what is currently listed in your credit profile. If you find errors or any discrepancies with what you know about your profile, make the necessary corrections. By monitoring each of your reports throughout the year, it will allow you to see and track any potential changes as well as confirm that your accounts are as expected.

Two: Freezing credit usually only costs a one-time fee of $10 per bureau. That’s a reasonable price to pay for additional control over your credit access. A $10 charge is also required to temporarily lift a credit freeze. Permanent removal of credit freezes are routinely free of charge.

Three: You must set or receive PINs when freezing your credit. Save these in a secure location, whether that’s using a password manager or physically storing the printed PIN paper someplace safe and out of sight.  Where to go to freeze your credit:

 • Equifax: (800) 685-1111 or 
    https://www.freeze.equifax.com/
 • Experian: (888) 397-3742 or
    https://www.experian.com/ncaconline/freeze
 • TransUnion: (888) 909-8872 or
    https://freeze.transunion.com/
 • Innovis: (800) 540-2505 or
    https://www.innovis.com/securityFreeze
(Note: their phone prompts move quickly, so have your newly thought-up PIN 
 and credit card information readily available.)

Other documented numbers for the 4-Major Credit Bureaus:

TransUnion: 1-800-680-7289
Experian: 1-888-397-3742
Equifax: 1-888-766-0008
Innovis Consumer Assistance: 1-800-540-2505

Your Tech Concierge™ recommends the use of secure password managers. They provide you with a way to encrypt your private passwords and information and to create strong and “unmemorable” passwords that are “long and strong”. Two of my favorites are Roboform and Dashlane – both are available for trial via the banner links on my Backup Boutique web page.

Also consider a good credit monitoring service that provides regular notifications, credit reporting, and identity theft insurance in the event of a breach that requires legal and professional consultation. My affiliate and product of choice is LifeLock Premium. Save 10% off of your annual membership via the Lifelock banner link on my Anti-Virus page.

The Malwarebytes Labs team, makers of Malwarebytes Anti-Malware software that I use and recommend to my clients via my 10-Ingredient Cocktail also suggests the following:

Passwords and two-factor authentication
Ensure you’re using smart password strategy (complex, do not repeat them, do not use the same one across multiple sites/services, etc.) and if available, enable two-factor authentication (2FA) on every account possible. You can check the 2FA availability on your sites and services at: https://twofactorauth.org/

Enable alerts on your accounts
It’s never a bad idea to keep an eye on your bank accounts and credit cards for larger purchases. For accounts rarely used, you could set alerts to $1 so you’re notified the second any transaction happens. For regular accounts, set the alerts to a dollar amount that would seem out of place for that card, whether it’s $20 or $500.

New phone accounts
A common attack vector with credit/personal data breaches is to purchase new phone accounts through your provider, with your account! Once criminals have your info, they’ll call up the phone company and say they want to add a new line but don’t have a PIN number. If you haven’t set up a PIN number with your phone company already, they have no way to verify your account. So guess what? BAM! There’s a new phone on your bill. In order to protect yourself from this type of attack, go ahead and set up a PIN with your provider.

Taxes
File these as soon as possible next year! For multiple years we’ve heard about victims of tax return fraud, wherein a scammer using your personal information files YOUR return before you can.


This is another in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! Stay tuned. Please send your questions to questions@askavie.com.

About Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

The File Cabinet

March 21, 2016 By Avie Uniglicht

“Where’s Your Data?”

📂📁 Easy way to Organize your Files📁📂

We all create it, yet how do we manage it?…

“Where’s your data?” You create it, you store it, hopefully, you’ve taken my advice and backed it up – yet I’ve found through my years of work with individuals, companies, and professionals – this question often remains. From e-mail storage, to pictures, to music, to important proposals, accounting files and databases, many USE their information on a daily basis, but ask them where it actually RESIDES on their digital devices or servers, and you’ll get a blank stare and a shoulder shrug. The most important component of their digital world is often a mystery.   Without knowing WHERE it is, it is difficult to manage it. So what do YOU do?

Your Tech Concierge™ advises that to manage your data, you must first establish a structure to organize your personally created files so that you can easily store and retrieve them. Knowing WHERE you store and place your files is the first step in the data management cycle. The “WHERE” includes the physical storage location which might be your local hard drive, a USB storage device, a Network Attached Storage device, a Server, or a Cloud storage host. In addition to the physical device, the location where you save your data on that device is important for easy access. That leads us to Step 2 of the cycle.

Step 2 in the data management cycle is establishing the “HOW?” Individual needs tend to dictate the “HOW?”, yet initially, for most of us, mimicking a Paper-Style organization strategy helps us to easily visualize a workable system of cabinets, drawers, folders and files. Picturing a storage location as a “cabinet” and within that “cabinet” having “drawers” or what we call “directories”, and within those “directories” having defined “folders” and within those our individual files, we build an easily manageable structure to work within. As an example of this approach, you might have a location or “Cabinet” on your “WHERE (the storage device)” named “Filing Cabinet”. “Filing Cabinet” would be a primary storage location for all of your related “files”.  Within that “Filing Cabinet”, you create 26 drawers or “folders” named “A” thru “Z”. Within each “drawer folder”, you would structure your hanging file folders by Company Name, Client Name, or Subject – alphabetically. And within each “Hanging File Folder” you would place “Manilla Folders” by subject, and lastly, saving the related subject files inside. Pictures are worth a thousand words:

FileCabinet

Being diligent and systematic about where and how you store your data will help you quickly locate it when you need it, move it and transfer it as needed and also help you more effectively organize your backup strategies. This approach works on both Windows and Mac platforms as well as any storage medium. For the readers of this article, I’d very much appreciate the opportunity to answer your specific “Data Management” questions and help you with implementation concerns. Please send me your comments and I’ll be certain to post your remarks in a future article.

If you’d like to download the File Cabinet .zip file template that I use, Click Here and Save the the File Cabinet to your PC or Mac . Extract the .zip file in your documents directory or directory of choice and it’s ready to go!

This is 17th in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to questions@askavie.com.

About Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

 

Filed Under: Uncategorized

“Can I Trust That Connection?”

October 13, 2014 By Avie Uniglicht

Is it safe to do this on-line…

You’ve asked these questions time and time again while working on your private transactions.  Whether it be on-line banking, financial transactions, cloud storage, etc.  With all of the data breaches, snooping, and malicious activities that blemish the otherwise incredible convenience we experience when using the Internet, what can we as users do to make our lives safer on-line?  Let’s discuss this a bit.

First, it is important to understand the dynamics of an “on-line” transaction.  There are several components that come into play that serve to either enhance our security or that act to weaken it. Let’s begin with the “device” we are using as the “data entry point”.  The device we choose (ie. Desktop, Laptop, Tablet, Smart Phone) may be prepared to better handle secure transactions or may be compromised in some way, weakening the security. There are many steps to securing a device including installing the latest Operating System Patches, Other software updates, Security Software including Firewall, Anti-Virus/Anti-Malware, Browser Choices and Security Add-Ins, to name  just a handful of key elements that help to prepare the device for more secure use. A weak device, one that may be compromised with a key-logger or screen capture program that can capture and send keystrokes to a 3rd party can serve to eliminate any other controls that may be in place that might serve to otherwise create a secure  transaction. So, step one – SECURE YOUR DEVICE.

Second, know your data connection.  Secure transactions should ONLY be made over secure, encrypted connections and further, NOT over public Internet sources.  Public Internet sources such as Restaurant, Hotel, Library, Airport and other shared WiFi Hotspots can easily be monitored and compromised by 3rd parties who seek to gain information from unsuspecting users.  Rogue WiFi connections can easily be setup to spoof users into thinking they are on a trusted connection when in fact they are purposely there to monitor every bit of data passing through their router.  When traveling, it is best to carry your own mobile cellular hot spot either via your wireless phone or a dedicated device designed to handle multiple devices over your carriers cellular network.

Third, know your Financial Institution’s policies regarding on-line transactions.  For Credit Card transactions, know the levels of fraud protection offered by your specific card provider.  Many companies now offer $0 liability regarding unauthorized transactions.  Others have low dollar limits if your card is compromised.  Know the specific risks of loss and understand the remedy process if you encounter a challenge with a charge.  Same considerations apply with on-line banking transactions.  Mobile deposits are now becoming more popular for consumer accounts. Scanning or photographing a check and transmitting the copy via your Bank’s Mobile App can help you conveniently and securely get that check into your account. Using responsible computing habits – Steps #1 and #2 above can make these transactions as secure as possible and minimize your risk of  loss.

Lastly, once your information is stored in the hands of a 3rd Party, it is important to know their privacy policies regarding the handling and control of your data.  Data encryption, Backup, Limited and Secure access, are all key important factors.  Even the best intentions can be compromised by mishandled or weak passwords, malicious software, and human engineering tactics that trick users into giving up their security information.  Due diligence and awareness is important when dealing with these issues.

Many are opting to use Identity Protection services such as LifeLock™ that provide an additional layer of fraud detection and data surveillance techniques above and beyond local security controls.  This helps us identify breaches that may have occurred even “off-line”.With all that we know, remember, presenting a credit card to a clerk, cashier, waiter or waitress or a banking transaction to a teller can serve to compromise our identity and often much more easily than via the Internet.  Internet transactions still provide us with more control and security than the manual transactions we have come to know and love.

For the readers of this article, I’d very much appreciate the opportunity to answer your specific security questions and help you with implementation concerns.  Please send me your comments and I’ll be certain to post your remarks in a future article.

Avie Uniglicht
Avie Uniglicht

About Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

Your Personal Computer Driver’s License

June 17, 2014 By Avie Uniglicht

Traverse the Internet Superhighway Safely, Knowledgeably, and Maintain Control

For years, I’ve thought that everyone “behind the wheel” of a Personal Computer should have a basic level of competence regarding security, backup strategies, password organization, e-mail etiquette, and routine maintenance. Let’s face it – all owners of Internet connected devices potentially have a responsibility to each other to reduce the risks they may pose to themselves and each other. An infected device or one used in a negligent manner can raise risks – and these risks can easily be reduced with basic levels of education. While we know we must abide by State laws when operating a Motor Vehicle, no such demands are made on those who “cruise” the Internet. Back in early 2000, knowing there had been no effort to create such “rules”, I set out to change that. I created an e-Book entitled “Your Personal Computer Driver’s License”

computer drivers licenseNow, almost 15 years later, with the proliferation of mobile devices, we are not only faced with similar challenges, but the risks multiply as these devices are used more and more in moving vehicles, compounding the challenges I identified back then. Is the responsibility to educate owners and users of communication devices that of the reseller, the provider of the communication medium, the manufacturers of the hardware, the creators of the software, the state, all or none of these? Do we already have enough rules and regulations? Are we able to self-govern and self-educate?

Avie Uniglicht
Avie Uniglicht

About Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.


Filed Under: Blog

  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Primary Sidebar

aSKaVIE’s Remote Room Service™

Your Tech Concierge

Be a VIP and Join

aSKaVIE's Silver Platter™

* indicates required
Silver Platter Archive

Thank you so much Avie, you’ve always helped me tremendously. I’ve worked on computers all through my 47 years service to the oil industry, but you’re still teaching me things I never knew. You’re the BEST!!!! — Marsha

Ok Seriously! Avie Uniglicht just save me $500 on upgrading my Mac! If anyone has computer problems or questions…Avie is the expert! You must friend him! Now!

Best in the country and truly fixed in minutes! Thank -you again for your awesome quick service…He’s the best people don’t mess with the rest!

hello all my fb friends…I want to share with you an amazing experience I just had. Was having problems with internet connection (so I thought) and contacted Comcast… we all know what a joy calling them is… of course no help there so I reached out to someone I met through FB, Avie Uniglicht of […]

Hi Karen, He is in PA and I am in FL – He works remotely and takes control of your computer by way of a pass code that you approve. he can only do it with your approval. I’ve known him since 5th grade and I trust him completely. He made my computers so good […]

Recent Posts

  • “Windows Users – Time for a Tune-Up?”
  • So you want to Broadcast?
  • Protect your Credit and Identity
  • The File Cabinet
  • “Can I Trust That Connection?”
  • Boutique
  • Contact
  • Room Service
  • Testimonials
  • Privacy Policy

Copyright © 2023