• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

aSKaVIE

Your Tech Concierge™

  • Not tech savvy?
  • Room Service
    • 10-Ingredient Cocktail
    • New Installs
    • AI
  • aSKaVIE
    • Troubleshooter
    • Q&A
    • Training
    • Anchor Archives
    • tECH tALKtIPS
  • Boutique
    • Anti-Virus
    • Backup
    • Digital Imaging
    • Hardware
    • Hardware – Pre-Owned
    • Software
    • Other
    • aVIEzON-2024
    • Personal Computer Driver’s License
  • Contact
    • Testimonials
    • Privacy Policy
  • Payment
You are here: Home / Archives for Blog

Blog

Protect your Credit and Identity

September 20, 2017 By Avie Uniglicht

“Affected by a data breach?, it’s likely inevitable. . .”

“We entrust our confidential information to entities that presumably have a fiduciary responsibility to protect it. However, no matter what, the ultimate responsibility rests on us to be certain no harm is done to our Identity and Credit Profiles.”


👂 Listen to “Protect Your Credit and Identity” – Tech Talk Tip™

Recent activities continue to remind us that we must do more to prevent misuse of our private credit profiles and information than ever. Criminals are on a never-ending path to do their best to access our personal information and use it to their enterprising ventures. In the United States, the Social Security number was introduced in 1936 with the sole purpose of identifying and tracking our lifetime earnings and calculating our Social Security benefits. Because of it’s unique nature, the use of the SS # has been adopted over the years by many organizations and systems to further identify us. You know the many times that you’ve offered up your SS # to Financial, Medical, Educational, and Government institutions when completing applications and verifying your identity. Most have no idea who you truly are, they simply validate your existence based upon the information that you provide and have access to. This makes it much too easy for criminals to impersonate you and take advantage of your good name.

The key to preserving your identity and protecting your interests is in limiting access to this information and if it is released in an unauthorized manner, preventing it from being used against you. The information is only valuable to a criminal when they can exploit it. So, what does one do? We should presume that our identity can already be easily “purchased” on the black market. By taking a pro-active approach, we invoke those key steps that will prevent any serious damage from being done to us with the misappropriated information.

What could be done if one has access to our personal information? Let’s presume they have access to our:

Names, addresses, social security numbers, birthdates, driver’s license IDs and credit card numbers. These for instance were data points allegedly gleaned from the Equifax breach. Upwards of 143 million unique individuals were affected.  These are just some of the things that can be done:

• Access existing accounts via identification
• Open new financial accounts and…
• Apply for credit cards, mortgages, auto loans student loans and other financial services
• Get medical care at your expense
• File for a tax refund in your name
• Get a job in your name and let you pay the taxes
• Steal your benefits
• And more. . .

Preventing abuse is the first step to protecting our identity, so follow these steps:
First, be certain that YOU have registered a secure account with “My Social Security” at: https://www.ssa.gov/

You don’t want anyone but YOU to create or access your information that has already been accumulated in your Social Security profile. Be certain to protect the account with 2-Step verification. While we are on the subject, 2-step verification with Pin numbers or secret phrases should be used whenever possible with all accounts. (ie. e-Mail, Credit Cards, Credit Bureaus, Banking, Insurance, Mortgages, etc.).

Next, Freeze your Credit. By freezing your credit, you’ll prevent criminals from trying to open new accounts in your name—all of your current credit cards will still work. You’ll only need to consider unfreezing your credit at those times you wish to apply for a loan, open a new credit card, or make any type of purchase that requires a check on your credit. Before ordering a Credit Freeze, there are 3 things to know:

One: You’ll want to pull a credit report. You can get a free report legitimately from https://www.annualcreditreport.com for each of the major credit bureas each year. It doesn’t matter if you’ve already frozen your accounts, you can still monitor using the free tool. We recommend you pull only one report now, another one in four months, and the third in another four months. Your reports will provide you with a benchmark of what is currently listed in your credit profile. If you find errors or any discrepancies with what you know about your profile, make the necessary corrections. By monitoring each of your reports throughout the year, it will allow you to see and track any potential changes as well as confirm that your accounts are as expected.

Two: Freezing credit usually only costs a one-time fee of $10 per bureau. That’s a reasonable price to pay for additional control over your credit access. A $10 charge is also required to temporarily lift a credit freeze. Permanent removal of credit freezes are routinely free of charge.

Three: You must set or receive PINs when freezing your credit. Save these in a secure location, whether that’s using a password manager or physically storing the printed PIN paper someplace safe and out of sight.  Where to go to freeze your credit:

 • Equifax: (800) 685-1111 or 
    https://www.freeze.equifax.com/
 • Experian: (888) 397-3742 or
    https://www.experian.com/ncaconline/freeze
 • TransUnion: (888) 909-8872 or
    https://freeze.transunion.com/
 • Innovis: (800) 540-2505 or
    https://www.innovis.com/securityFreeze
(Note: their phone prompts move quickly, so have your newly thought-up PIN 
 and credit card information readily available.)

Other documented numbers for the 4-Major Credit Bureaus:

TransUnion: 1-800-680-7289
Experian: 1-888-397-3742
Equifax: 1-888-766-0008
Innovis Consumer Assistance: 1-800-540-2505

Your Tech Concierge™ recommends the use of secure password managers. They provide you with a way to encrypt your private passwords and information and to create strong and “unmemorable” passwords that are “long and strong”. Two of my favorites are Roboform and Dashlane – both are available for trial via the banner links on my Backup Boutique web page.

Also consider a good credit monitoring service that provides regular notifications, credit reporting, and identity theft insurance in the event of a breach that requires legal and professional consultation. My affiliate and product of choice is LifeLock Premium. Save 10% off of your annual membership via the Lifelock banner link on my Anti-Virus page.

The Malwarebytes Labs team, makers of Malwarebytes Anti-Malware software that I use and recommend to my clients via my 10-Ingredient Cocktail also suggests the following:

Passwords and two-factor authentication
Ensure you’re using smart password strategy (complex, do not repeat them, do not use the same one across multiple sites/services, etc.) and if available, enable two-factor authentication (2FA) on every account possible. You can check the 2FA availability on your sites and services at: https://twofactorauth.org/

Enable alerts on your accounts
It’s never a bad idea to keep an eye on your bank accounts and credit cards for larger purchases. For accounts rarely used, you could set alerts to $1 so you’re notified the second any transaction happens. For regular accounts, set the alerts to a dollar amount that would seem out of place for that card, whether it’s $20 or $500.

New phone accounts
A common attack vector with credit/personal data breaches is to purchase new phone accounts through your provider, with your account! Once criminals have your info, they’ll call up the phone company and say they want to add a new line but don’t have a PIN number. If you haven’t set up a PIN number with your phone company already, they have no way to verify your account. So guess what? BAM! There’s a new phone on your bill. In order to protect yourself from this type of attack, go ahead and set up a PIN with your provider.

Taxes
File these as soon as possible next year! For multiple years we’ve heard about victims of tax return fraud, wherein a scammer using your personal information files YOUR return before you can.


This is another in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! Stay tuned. Please send your questions to questions@askavie.com.

About Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

“Can I Trust That Connection?”

October 13, 2014 By Avie Uniglicht

Is it safe to do this on-line…

You’ve asked these questions time and time again while working on your private transactions.  Whether it be on-line banking, financial transactions, cloud storage, etc.  With all of the data breaches, snooping, and malicious activities that blemish the otherwise incredible convenience we experience when using the Internet, what can we as users do to make our lives safer on-line?  Let’s discuss this a bit.

First, it is important to understand the dynamics of an “on-line” transaction.  There are several components that come into play that serve to either enhance our security or that act to weaken it. Let’s begin with the “device” we are using as the “data entry point”.  The device we choose (ie. Desktop, Laptop, Tablet, Smart Phone) may be prepared to better handle secure transactions or may be compromised in some way, weakening the security. There are many steps to securing a device including installing the latest Operating System Patches, Other software updates, Security Software including Firewall, Anti-Virus/Anti-Malware, Browser Choices and Security Add-Ins, to name  just a handful of key elements that help to prepare the device for more secure use. A weak device, one that may be compromised with a key-logger or screen capture program that can capture and send keystrokes to a 3rd party can serve to eliminate any other controls that may be in place that might serve to otherwise create a secure  transaction. So, step one – SECURE YOUR DEVICE.

Second, know your data connection.  Secure transactions should ONLY be made over secure, encrypted connections and further, NOT over public Internet sources.  Public Internet sources such as Restaurant, Hotel, Library, Airport and other shared WiFi Hotspots can easily be monitored and compromised by 3rd parties who seek to gain information from unsuspecting users.  Rogue WiFi connections can easily be setup to spoof users into thinking they are on a trusted connection when in fact they are purposely there to monitor every bit of data passing through their router.  When traveling, it is best to carry your own mobile cellular hot spot either via your wireless phone or a dedicated device designed to handle multiple devices over your carriers cellular network.

Third, know your Financial Institution’s policies regarding on-line transactions.  For Credit Card transactions, know the levels of fraud protection offered by your specific card provider.  Many companies now offer $0 liability regarding unauthorized transactions.  Others have low dollar limits if your card is compromised.  Know the specific risks of loss and understand the remedy process if you encounter a challenge with a charge.  Same considerations apply with on-line banking transactions.  Mobile deposits are now becoming more popular for consumer accounts. Scanning or photographing a check and transmitting the copy via your Bank’s Mobile App can help you conveniently and securely get that check into your account. Using responsible computing habits – Steps #1 and #2 above can make these transactions as secure as possible and minimize your risk of  loss.

Lastly, once your information is stored in the hands of a 3rd Party, it is important to know their privacy policies regarding the handling and control of your data.  Data encryption, Backup, Limited and Secure access, are all key important factors.  Even the best intentions can be compromised by mishandled or weak passwords, malicious software, and human engineering tactics that trick users into giving up their security information.  Due diligence and awareness is important when dealing with these issues.

Many are opting to use Identity Protection services such as LifeLock™ that provide an additional layer of fraud detection and data surveillance techniques above and beyond local security controls.  This helps us identify breaches that may have occurred even “off-line”.With all that we know, remember, presenting a credit card to a clerk, cashier, waiter or waitress or a banking transaction to a teller can serve to compromise our identity and often much more easily than via the Internet.  Internet transactions still provide us with more control and security than the manual transactions we have come to know and love.

For the readers of this article, I’d very much appreciate the opportunity to answer your specific security questions and help you with implementation concerns.  Please send me your comments and I’ll be certain to post your remarks in a future article.

Avie Uniglicht
Avie Uniglicht

About Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

Your Personal Computer Driver’s License

June 17, 2014 By Avie Uniglicht

Traverse the Internet Superhighway Safely, Knowledgeably, and Maintain Control

For years, I’ve thought that everyone “behind the wheel” of a Personal Computer should have a basic level of competence regarding security, backup strategies, password organization, e-mail etiquette, and routine maintenance. Let’s face it – all owners of Internet connected devices potentially have a responsibility to each other to reduce the risks they may pose to themselves and each other. An infected device or one used in a negligent manner can raise risks – and these risks can easily be reduced with basic levels of education. While we know we must abide by State laws when operating a Motor Vehicle, no such demands are made on those who “cruise” the Internet. Back in early 2000, knowing there had been no effort to create such “rules”, I set out to change that. I created an e-Book entitled “Your Personal Computer Driver’s License”

computer drivers licenseNow, almost 15 years later, with the proliferation of mobile devices, we are not only faced with similar challenges, but the risks multiply as these devices are used more and more in moving vehicles, compounding the challenges I identified back then. Is the responsibility to educate owners and users of communication devices that of the reseller, the provider of the communication medium, the manufacturers of the hardware, the creators of the software, the state, all or none of these? Do we already have enough rules and regulations? Are we able to self-govern and self-educate?

Avie Uniglicht
Avie Uniglicht

About Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.


Filed Under: Blog

“Nobody ever showed me that!” 5 Reasons People Fear their Gadgets

June 3, 2014 By Avie Uniglicht

“Nobody ever showed me that!” 5 Reasons People Fear their Gadgets

Sure, you own a Computer, a Smartphone, perhaps a Tablet – all of these and maybe even more than one.  It’s difficult to imagine getting through our modern world without access to these.  Yet, most users have had little formal training on how to get the most out of their “stuff”.  Sure, through trial and error, (or the help of a tech savvy friend or relative), you picked up the necessary basics to “get by”.  You can access your e-mail, visit a web site, handle your daily routine, yet when it comes to doing or understanding more, you may be reluctant to “experiment” for fear that you may do something “wrong”.  We often fear what we don’t understand, and when it comes to “breaking” things, we just don’t like to take risks.  After all, if it ain’t broke, why break it? So what are 5 main reasons we fear doing more? Let’s break down those areas, defining what it is that we “should” do and “don’t” first.

1)     Denial.  In the back of our minds, we know we should be using better security, running a routine backup, doing regular cleanups and maintenance – yet we struggle with the idea because we have a NEW device – how can it get infected or compromised, how can it break down and cause data loss, why clean it– it’s new!

2)     Ignorance.  More often than not, no one ever explained HOW, or WHY to do it.  You may either not be aware of the importance or you know that you SHOULD you just don’t know how to go about it.

3)     Procrastination: You know you NEED to do it, you just keep putting it off until you have the TIME.  Of course, there is ALWAYS something more important to do, so it never gets done.

4)     Dis-Interest:  Face it!  We just want to “get in the car and drive”.  It’s just not any FUN to do these mundane tasks, and while they may be important, in the scheme of our daily life, we just HATE doing these tasks.

5)     Fear:  We often avoid those things we don’t fully understand.  And when we believe that doing something the “wrong way” can be worse for us than not doing it at all, we choose the latter.

Awareness of the “unknown” is the key to dealing with it.  Once we identify the “reason(s)” for our lack of participation, we can learn to agree that while they are important, we just might not be the best one to DO what it takes.  Acknowledging that they MUST be done, we can get help from someone that actually ENJOYS these tasks and is willing to make sure they get done.  They may even be supportive enough to assure you that you CAN do some of these things on your own. You’ll discover that many routine maintenance tasks can be AUTOMATED, making them happen without your conscious participation.  By setting these tasks up on “auto-pilot”, all that is necessary is that a system be “powered on” and they happen.  An occasional “monitoring” of the results is all that is required.

Learning NEW things that are geared to your lifestyle – things that make your life simpler, easier, and more fun, can be exciting.  Technology doesn’t have to be “scary”.  Just find someone who can take the “fear” out of it, and you’ll be on your way to  richer, more rewarding experiences.

This is 12th in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.


askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

Your Personal Internet “Traffic Cop” Routers: The What, Why and How

June 2, 2014 By Avie Uniglicht

Your Personal Internet “Traffic Cop” Routers: The What, Why and How

For most of us, long gone are the days of slow, “dial-up” telephone modem based Internet connections. Many younger Internet users today, in fact, have never even experienced anything other than high-speed, broadband Internet. This long sought after “luxury” is now considered a “necessity” and without high-speed Internet access, many of us would have a difficult time communicating. The fact that households and offices share high-speed Internet today is the direct result of a little electronic device known as a “Router”. Acting as a “Traffic Cop” for all inbound and outbound digital data network traffic, your router serves to seamlessly manage all of the data sent and received through your broadband modem. Through a subscription with your Internet provider, (or one you may “borrow” from one who has a subscription), you obtain a unique “public” IP address, which identifies your connection so that it can converse with other “devices” throughout the vast network we call the Internet. Similar to a telephone number, (but not that), that IP address is transmitted to and from your broadband modem so that it can send your data from your computer or Internet connected device out to and through your Internet provider, and in turn out to other Internet connected servers and devices. This is routinely all handled transparently through a network of switches and routing equipment using a structured Internet Protocol (ie. IP ). You can well imagine that a vast number of unique Public IP addresses are required so that all Internet connected devices can communicate with each other. Routers help to make this process possible and manageable.

What is a Router and Why do we use them?

As referred to above, a router is like a “traffic cop”. It is a device that connects to or is often combined with a modem. It receives “packets” of data from connected devices, and sends them off to specific destinations. Often, routers are used in homes and offices to “translate” public IP addresses received from modems to “private” IP address that are assigned to devices connected to and considered “behind” the routers. Specific “ranges” of IP addresses are deemed Private and are not “publically” routable – so that when these “private” IP addresses are used, they can remain within the confines of your home or office and the “same” IP addresses can be utilized in other homes and offices behind their respective routers. This effectively multiplies the number of devices that can effectively be used on the Internet, by permitting them to share the “same” “Public” IP address subscribed to through the Internet provider. While each home and office gets assigned a unique “public” IP address, these “public” IP’s can be split into many “private” IP’s through a process called “Network Address Translation (ie. NAT) and the router is used for this purpose – to split and manage communication from each connected device. It is quite remarkable that this complex process continues over and over again, routinely without missing a beat. An additional benefit of using a router is the firewall protection provided. Attempts to directly access our “public” IP to get to our individually “router-connected devices” are effectively blocked as a result of the work the router does, and only when instructions are given to the router to allow such “public” contact to individual devices, will that happen. Routers are often used as a result as a “first-line” of defense for Internet Security.

How are Routers utilized and what are the best types to use?

We’ve briefly discussed what a router is and why we use them. How they are used varies depending upon the need. Today, Wireless Routers have become very popular as we don’t always enjoy being “tethered” to connections with wires. While wires often establish the initial connections to the Internet Service Provider (ISP) via a wired modem, wireless modem connections via cellular carriers are now very popular. Via wireless transmission, packets are sent and managed with the same concept as the wired transmissions previously described. One distinction is that while wired connections are limited to the physical “wire” locations strung between devices, wireless devices can be anywhere within range of the wireless broadcast. To protect communication, encryption techniques are often used and recommended to protect wireless connections to prevent those packets from being intercepted by unauthorized users. Wireless Fidelity (ie WiFi) connected users are often greeted with requests for “Wireless Passwords” and this is to help restrict access to only those who are permitted to “view” or access the devices and services on the respective network. Depending upon the range, number of users, and types of data being transmitted over a router – the best type, brand, and model to use will often be a result of an analysis of the unique circumstances. Often, to achieve coverage in a larger home or office facility, a combination of wireless access points are used in conjunction with a “base router” to achieve adequate radio strength and reach. For help setting up, securing and troubleshooting routers or for related questions, please be certain to “AskAvie™”.

This is 11th in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.

Filed Under: Blog

e-Mail e-Tiquette e-Ssentials

May 18, 2014 By Avie Uniglicht

The Triple-“e” “e”-Mail + “e”tiquette + “e”ssentials

One of the first things most of us learned to do when we began using our computer was electronic mail or “e-Mail”.  Before Texting and Social Media became popular mediums for communication, and after hand writing letters and post cards became “old-fashioned”, corresponding via e-Mail has been a blessing for many who desire the ability for fairly instantaneous transfer of digital content. As high-speed Internet service is enjoyed by most connected users, the use of e-Mail for sending larger and larger “payloads” has become common.

With the efficiency and high-speed delivery capability of the Internet, the essential rules of  e-Mail etiquette have too frequently been ignored or  even more commonly misunderstood or unknown.  The purpose of my Triple-“e” strategy is to offer some helpful direction for those who may have overlooked some basic elements of e-Mail and how these elements affect us and those with whom we communicate.

#1) Traditional e-Mail (the type most of us use daily) is not in any way “secure”. When we send an e-mail from our “address” (the sender) to another “address” (the recipient), that e-mail leaves our mailbox and travels through the Internet often jumping from Server to Server before arriving at its final destination (the e-mail server of your recipient). Anywhere along the “road” so to speak, your e-mail can be intercepted, viewed, corrupted, etc.  So, unlike a traditional “Fax”, transmission, your e-mail doesn’t go from Point A (you) to Point B (your recipient).  This process then results in a number of challenges.  First, if you are sending private, personal, or even secret information via e-Mail, you are potentially exposing that information to unknown parties. To avoid this, your e-mail must be sent via an “Encrypted” format so unintended parties are prevented from accessing it.  There are many methods and services available to handle encrypted transmissions, but your traditional e-mail service is likely not secure.

#2) Traditional e-Mail was not designed to handle “large attachments”.  As a communication medium, e-mail was designed initially as a “text-only” handler.  As Internet speeds and devices became faster and more sophisticated, e-Mail was “stretched” to handle document, photo, video, and other digital payloads.  Mail Servers that transport this information don’t process these larger payloads efficiently and some recipients on slower connections just can’t receive what you attempt to send them. Limiting attachments to under 2MB in size is wise and using another medium of exchange for larger attachments is recommended.  Services like Hightail.com, Cloud storage services that offer the ability to share your info via links like Dropbox, Bitcasa  and Cubby do a much better job for storing large file transfers that are communicated first via e-mail to alert the recipient of your download.

#3) After the Security concerns and Attachment considerations, the next category of etiquette is “Who” we send mail to, “How” we address it, and “What” we say in the content.  It is so simple to send e-mail today, that many take advantage of the medium to “blast” an entire list of addresses without first obtaining permission to do so from the individuals or companies on the list.  In addition, people tend to use the Carbon Copy or “CC” line to include all of the e-mail addresses of their intended without regard to the fact that everyone who receives that e-mail gets a “copy” of all of those e-mail addresses. Many on your list I am certain would not be happy that you “shared” their address with others on your list by using the “CC” line.  It is best to use the Blind Carbon Copy “BCC” to handle such a list so that those names are “hidden” from all that receive it.

Remember, common courtesy should always trump your eagerness to get your message out.

Back in December, 2003, Congress passed the “Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003″ also known as the “CAN-SPAM ACT of 2003”.  The Act created National guidelines for delivering commercial e-mail and for individuals who engaged in marketing via e-mail solicitations.  I address more details on this subject in my e-Book entitled “Your Personal Computer Driver’s License”.  You’ll find a link to that e-book here: https://www.askavie.com/boutique/other/ .

This is 10th in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.


askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

Primary Sidebar

aSKaVIE’s Remote Room Service™

Your Tech Concierge

tECHtALK tIP Newsletter

Thank you for subscribing to my aSKaVIE’s Silver Platter™. I value you and your time and promise not to overwhelm you with frequent contact. On occasion, I will share some information with you which includes our latest tech news and special offers only available to my Silver Platter™ VIP's.

 

Select list(s) to subscribe to


By submitting this form, you are consenting to receive marketing emails from: aSKaVIE. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Thank you so much Avie, you’ve always helped me tremendously. I’ve worked on computers all through my 47 years service to the oil industry, but you’re still teaching me things I never knew. You’re the BEST!!!! — Marsha

Ok Seriously! Avie Uniglicht just save me $500 on upgrading my Mac! If anyone has computer problems or questions…Avie is the expert! You must friend him! Now!

Best in the country and truly fixed in minutes! Thank -you again for your awesome quick service…He’s the best people don’t mess with the rest!

hello all my fb friends…I want to share with you an amazing experience I just had. Was having problems with internet connection (so I thought) and contacted Comcast… we all know what a joy calling them is… of course no help there so I reached out to someone I met through FB, Avie Uniglicht of […]

Hi Karen, He is in PA and I am in FL – He works remotely and takes control of your computer by way of a pass code that you approve. he can only do it with your approval. I’ve known him since 5th grade and I trust him completely. He made my computers so good […]

Recent Posts

  • “Windows Users – Time for a Tune-Up?”
  • So you want to Broadcast?
  • Protect your Credit and Identity
  • The File Cabinet
  • “Can I Trust That Connection?”
  • Boutique
  • Contact
  • Room Service
  • Testimonials
  • Privacy Policy

Copyright © 2025