• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

aSKaVIE

Your Tech Concierge™

  • Not tech savvy?
  • Room Service
    • 10-Ingredient Cocktail
    • New Installs
    • AI
  • aSKaVIE
    • Troubleshooter
    • Q&A
    • Training
    • Anchor Archives
    • tECH tALKtIPS
  • Boutique
    • Anti-Virus
    • Backup
    • Digital Imaging
    • Hardware
    • Hardware – Pre-Owned
    • Software
    • Other
    • aVIEzON-2024
    • Personal Computer Driver’s License
  • Contact
    • Testimonials
    • Privacy Policy
  • Payment
You are here: Home / Archives for Blog

Blog

7 Common Mistakes to Avoid

May 1, 2014 By Avie Uniglicht

The 7 MOST COMMON MISTAKES SMALL BUSINESS OWNERS MAKE… EVERY TIME THEY TURN ON & TURN OFF THEIR COMPUTERS

Do you have these “7” handled?

For over 30-years, I have been an advocate for Safe, Secure, Effective computing. In the process of witnessing how entrepreneurs cope with the day to day challenges they face and knowing how costly and frustrating computing and technical issues can be for them, I’ve put together this list of the 7 most common mistakes and how to prevent them. With the proper knowledge and preparation, many of these time wasters and money eating events can easily be avoided. Why deal with these issues AFTER they become a drag on your resources?  We can make it easy and eliminate the causes and as a bonus, STREAMLINE your daily activities to make your entire computing experience a more favorable one.

The #1 most common challenge that I see is “Lack of Accurate Documentation”.  There is no greater time waster than searching for information that you need to complete a computing process.  Whether it be usernames/passwords to the computers, servers, websites, e-mail accounts, etc.  that you need to do your business, or vendor phone numbers, purchase registrations, warranty expirations,  license numbers – you think of the need – an organized system to keep the information easily accessible should be your first priority to help streamline the process.

Number 2 on our list of 7 is “Data backup and preservation”.  It is ALL ABOUT YOUR DATA!  Hardware, Software, Peripherals – they will all fail and can routinely be replaced.

Your DATA however, this is the meat and potatoes of your business. Being personal and strategic to your business, your data can’t be “purchased” from a 3rd party and provisions for protecting it, preserving it, and controlling it must be made.  This means using techniques of Backup and Encryption necessary to keep the data available no matter what the circumstance.

Number 3 – “Data Access”.  Controlling who has access to your computers is a key element to protecting them and the data on them.  Physical access to computers allows anyone with limited knowledge the ability to do almost anything to them and their contents.  It is important that controls be in place to restrict who, when, and what users are permitted to do with your information.  When employees are terminated, immediate action steps should be in place to change passwords and access to company property. With Bring Your Own Devices (BYOD) now very common in the workplace, Employees often not only have access to e-mail on their Smart Phones, Tablets, and Laptops, they may also have access via remote access to your other data sources.  Closing these gaps while first being aware of them is key to a strong “Data Access” policy.

Number 4 – Current “Anti-Malware / Anti-Virus / Firewall protection” is necessary for all endpoints, Servers, and Network Connected Smart Devices. I’ve recommended a “cocktail approach” to layering security using the latest technologies available. So many risks exist today that single vendor solutions often miss intrusions not because they are ineffective, but because different approaches and methods are necessary to identify and neutralize these “attacks”.

Number 5 – “Educating and “Licensing” Users” is a required element in the process.  Back in the early 2000’s I created a concept I call “The Personal Computer Driver’s License”.  While it has always been a State requirement to gain a familiarity and level of competence with a moving vehicle, I too believe that computer users should also be licensed to “traverse the data super-highway”. Too often, intrusions occur via phishing schemes, e-mail downloads, poor search habits, and other “preventable” actions a bit of knowledge could easily address.  Regular training can reinforce the importance of steps that I refer to as “The 2-Minute Pause™” and “The Pushaway™”.

Number 6 – “Routine Maintenance” – Using utilities to help cleanup temp files, surfing histories, old outdated registry entries, etc., running routine scans, and verifying that all necessary backups and programs are updated and running properly are all necessary to keep systems running like new.  System inspections, following up on any user reported errors, etc. are measures that keep systems and users content.

Number 7 – “Power Management” – Controlling how systems are powered, cooled, started and shut down are all part of good system management.  For Desktop systems and Servers, reliable Battery Backup devices are recommended to control the clean and consistent power necessary to keep systems from “locking up” or shutting down unexpectedly.  For those who use Laptops, maintaining proper cooling and air flow is necessary.  Users often close the lid of a laptop and “take off” in a rush without waiting for the system to properly “sleep”.  For longer term “excursions”, laptops should be placed in hibernation of completely shut off to protect the hard drive.

There is much more information than this article has time to cover on each of these 7 Steps.  I am planning a webinar that will elaborate on these as well as provide answers to your related questions. If you’d like more information about the Webinar or to request a personal consult anytime, please complete the Contact form at: https://www.askavie.com/contact/ and mention “7 Steps Webinar” in the Comment section. I’ll be certain to keep you informed.

This is 9th in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.


askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

Paper-less!

April 26, 2014 By Avie Uniglicht

“Paper-less!” Overwhelmed with Paper?

The promise of a “paperless” office has teased those of us responsible for managing the seemingly endless stacks of information delivered to us daily.  Technology increasingly offers many excellent solutions. Those who have adopted these techniques have not only been able to tame the “paper tiger”, they have reduced storage costs, streamlined workflows, and eased accessibility to what previously had been centered around  metal filing cabinets and missing folders and files. In this article, I discuss some of the concepts that may help you to deal with less paper.

One way to help with paper overwhelm is to REDUCE the amount of paper entering your work space.  First, we must think about the different ways that paper actually arrives at our desk. If we can attack and deal with the source of paper BEFORE it comes into our work space, we will eliminate the need to do more with it.  This means checking with Vendors and requesting “Paperless Billing” and communications when possible.  A free service that helps manage, consolidate and communicate all of your incoming Paperless Billing activities is Manilla™.  (Visit https://www.manilla.com/ for details.)  While we have become accustomed to “touching” paper and being “reminded” of bills by “seeing” the actual paper statements arriving in our Snail Mail boxes, it is surprising how easy it is to digitize this process with Paperless Billing Statements and a service such as Manilla along with e-mail there to do the reminding for us.

Once we eliminate all the paper sources from entering our space that we can, we next deal with the paper we MUST handle on a daily basis. This is where a quality scanner and/or the camera on our smart phone help us work wonders. I routinely recommend a good quality scanner that can efficiently process receipts, business cards, and documents of all types.  Combined with an intelligent software program that can store, organize, help us retrieve, report and share the information as we need it.  I use several and recommend different products and services to accomplish this, depending on the volume and the demands of a specific business type. Entrepreneurs working in a small business may find solutions from NEAT™ appropriate.

Visit my Digital Imaging https://www.askavie.com/boutique/digital-imaging/ and Software https://www.askavie.com/boutique/software/ pages in my Boutique at www.askavie.com for details.  You will learn about Neat Desk and Neat Cloud as well as Nuance Paperport™.  Many APPS are available that help turn your Smart Phone Camera into a scanner.  If you are a Neat user, their free App integrates with Neat Cloud providing a mobile solution.  Also consider Scanner Pro by Readdle,  CamScanner Free, and Genius Scan-PDF Scanner.  iPhone and Android versions are available. I am also a fan for those seeking a high-quality desktop scanner, those offered in the ScanSnap™ brand by Fujitsu.  Search keyword “ScanSnap” via the Amazon banner in my hardware boutique page: https://www.askavie.com/boutique/hardware/ for a number of models both mobile and stationary.

Beginning to store and organize digitized PDF versions of documents can be a daunting task, though easiest when we mimic the analog versions of the same.  Just as we utilize old fashioned filing cabinets to store hanging file folders labeled alphabetically or numerically depending upon application, we can create digital folders on our magnetic storage locally or in the Cloud for easy retrieval.  Naming files, tagging their content and using search features to retrieve them later makes the digital versions even easier to access and use.  In traditional offices, when paper files were removed from their storage, it was often a challenge tracking them down.  Today, sharing digital files with others is simple and no longer requires the need for multiple copies to be had.

As a bonus to those reading this article today, I am offering a FREE DIGITAL FILING CABINET that has gotten rave reviews from my clients that put it to work, and it is compatible with both Windows, Mac and Cloud Storage systems.  If you’d like to have it, request a copy via the Contact form at: https://www.askavie.com/contact/ and mention FREE DIGITAL FILING CABINET in the Comment section. I’ll be certain to e-mail it right out to you.

This is 8th in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.


askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

Anytime, Anywhere, Anyhow…

April 13, 2014 By Avie Uniglicht

“Anywhere, Anytime, Anyhow…” Ubiquitous Access to your Data . .

Personal computers have come quite a long way since the days of WordPerfect and Lotus 1-2-3 on the original IBM PC™.  Back in the early 1980’s, 5.25” Floppy Disks were the primary means for storing and sharing our data.

Today, over 30 years later, we take “Networks” for granted, especially the largest “Network” of all – the Internet.  Our ability to connect, store, and share information has evolved and many options now exist to accomplish what was nearly impossible back then.  The “Cloud”, has become synonymous with “an unknown virtual place where we go to get the information we seek”.  Over the years, I have learned that:

“It’s all about the data. It doesn’t matter what platform, device, program, version, none of that really matters. It’s the Availability, Security, Speed, Ease and Utility. The ubiquitous access to information is what we are seeking. And the ones who provide it – to the ones that need it – well they will be the winners of the prize!”   –Avie Uniglicht

The Cloud storage landscape has many “players” and more arrive on the scene regularly- as demand for reliable, functional, secure and reasonably priced solutions is growing.  Free offerings for personal/home consumers exist in services provided by  Google with “Drive”, Microsoft with “OneDrive”, and Apple with “iCloud”.  Others include “DropBox™”, “BitCasa™”, “Cubby™”, “PogoPlug™”, and “Box™”. Each of these provide FREE limited storage accounts for consumers and PAID versions with more capacity and features. Google and Microsoft also empower their users with applications that allow users to not only store and retrieve their data, but create and edit it as well – all while in the “Cloud”.

For those of us who may have a business and are considering moving  existing in-house file sharing to the Cloud, virtual products are growing to address this need too. Many small and midsize businesses are looking for a business class cloud storage solution that enables fast, secure access from anywhere, any device; the ability to share documents and collaborate with clients, and even replace their aging File Server with a supported cloud environment designed with redundancy and regulatory compliance in mind. Commercial versions of Google Docs and Microsoft Office 365 are examples. One company that I recommend to my clients is Egnyte.  Egnyte not only offers secure cloud storage, they have a unique “hybrid” approach wherein a company can store their data locally for fast access while in the confines of their private local network, yet their data is also securely “mirrored” to the Egnyte Cloud offering employees and collaborators remote “cloud” access to their data from any Internet connected device.  Affordable pricing plans depending upon the number of users and storage requirements are available.  Please contact me for access to a free trial and more information about Egnyte or any of the Cloud solutions mentioned today.

This is sixth in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.


askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

“Open Sesame!”

April 13, 2014 By Avie Uniglicht

“Open Sesame!” What is your password strategy?

Do you use sticky notes, scraps of paper,  a word processor or spreadsheet to document your passwords?  Or, do you just use the SAME password every time/ every place just so you can remember it or worse yet, use a common word or phrase that can easily be guessed or “cracked” in seconds?  Our digital world is routinely just a password away from being accessible to those who have the “key”.  Even with strong encryption, a password that can easily be discovered will render your secure storage space an open book.  So, what password strategy might we put in place that could work for us – both to make it easy enough, yet strong enough to actually serve a protective purpose?  Some ground rules are in order here.

First, research has proven that the length of a password (i.e. the more characters used no matter what the composition of those characters is to create the password) is superior to a shorter password with random and varied characters.  This leads us to the conclusion that a longer phrase is better than a single word.  The length makes it more difficult for automated password crackers to “hack”.  Statistically, the number of possibilities for each character times the number of characters in the password makes the odds of discovery much lower as the length of the password grows.  So, Rule #1:  Increase the length of your password to make it stronger.

Second, avoid commonly used passwords – those that we might use that are easily remembered such as “123456,” “password” and “12345678.” Adding a “1” to a common password is also a frequent practice when an alpha-numeric password is required.

So, Rule #2: Avoid common passwords, proper nouns, and any word found in a standard dictionary.

Third, once we create a “strong” password, we commit it to memory, then, we make the mistake of using it EVERYWHERE and we NEVER change it.  The challenge with this is that if it gets hacked, it becomes the first password that is attempted at every popular website where you may have an account.  Remember, a hacker just loves to gain access to your e-mail account.  Why?  Because most password reset processes routinely use your e-Mail account to send you a link to do so.  If the hacker has access to your e-mail account, it is very likely your e-mail address will not only be used for SPAM, but to gain access through password reset requests to your other more sensitive accounts where financial data may be stored. So, Rule #3: Use a different unique password for each of your digital accounts, never duplicate it, AND change your passwords on a regular basis so that you don’t give a hacker UNLIMITED chances to break yours.

Fine!  Now you’ve read all this and now say: “How in the world am I going to keep track of all these passwords?  The whole reason I’ve been doing it the way I am is that I just have no way of securely remembering multiple, strong passwords and I don’t even know how to quickly create a STRONG password”   “H E L P!”

Password creation and management has become much easier with the use of software that not only handles the secure encrypted storage, but also allows you to access and use your stored passwords to automatically login to websites and programs on each of your protected devices. These programs allow you to create and remember just one strong master password that then gives you access to the encrypted vault of all your stored passwords.  The software works on multiple platforms including Windows, Mac, iOS, and Android and even encrypts and syncs your passwords to a cloud storage site so that all of your devices have immediate access to your most currently added password.  One popular program that does all of this is called “Roboform”.

Other options include

To learn more about Roboform,  why I recommend it, and to get a Free Trial, visit my Backup page and look for the Roboform Banner there:  https://www.askavie.com/boutique/backup/

This is 7th in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.


askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

Going, Going, Gone…

March 24, 2014 By Avie Uniglicht

Mar 24, 2014
“Going, Going, Gone…” Still Running Windows XP?– 4/8/14 looms. . .

It was August 24, 2001 when Windows XP was first released to manufacturing. Millions of systems are still running this robust and well-healed version of Microsoft’s Graphic Operating System, and now after nearly 13 years, Security Updates and Support will no longer be provided after April 8, 2014. What does this mean to those who are still relying on and running Windows XP? Will it cease to operate on April 9, 2014? No. It will still function, and that presents a dilemma for many users. What it means is that as vulnerabilities are discovered, (and they continue to be, even after all these years), those “holes” won’t be patched. Clues to vulnerabilities are often signaled to “hackers” when updates are released for more current operating systems. Other weaknesses may have already been discovered and the malware purveyors are simply waiting until the deadline for support so that they can take advantage of them. So, we know that unpatched Windows XP machines will be targets.

What can one do if they own a Windows XP system or many XP systems? The safest approach will be to disconnect any Windows XP machine from the Internet and from other systems that are connected to the Internet. Even if a Windows XP machine is protected with a strong Anti-Virus/Firewall Security product; is configured to run as a “Standard” user (non-Administrative rights), if connected to the Internet, it is akin to locking the doors to a building and leaving the “Windows” open (pun intended). It just won’t be safe to use a Windows XP system long after April 8th. Plans should include replacing hardware equipped with Windows XP with either Windows 7 or Windows 8.1. Many Windows users who are not committed to Windows-based proprietary software have the option to moving to an Apple OS platform or even a version of Linux.

Many users who are committed to Windows XP own software that just won’t run on the newer platforms. They often have substantial investments in proprietary, custom-written, software programs that do not run properly on anything BUT XP. For those users, I recommend limiting their exposure to Internet related activities as much as possible. If at all possible, they should be restricted from directly accessing the Internet and setting up newer systems that will handle the Internet traffic. Even systems that utilize Virtual installations of Windows XP are vulnerable. These are commonly found on Windows Virtual PC installations; Windows Terminal Servers and Mac systems running Windows inside a virtual environment. Think also of the many Automated Teller Systems running Windows XP in a Kiosk style mode. There are so many exposed installations that one would think that Microsoft would change their deadline.

Now, let’s be fair to Microsoft. They have given Windows XP quite a long run given the normal life-span of technology. 12+ Years is really an “eternity” when it comes to the life span of other products and software in the techno-world. Consider how many other software companies are still supporting software versions that they developed in 2001? Many aren’t even in business, let alone supporting their products from that time. Intuit, the makers of Quicken™ and Quickbooks™ for example, have a product life-cycle of only 3 years. They force users to upgrade EVERY 3 years to maintain current support. So, XP users – you have had a good run, you are now aware of your exposure, you know the risks, and the real question is – What are you going to do?

This is fifth in a series of aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to info@askavie.com.

askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

The STARS™ System

March 7, 2014 By Avie Uniglicht

“The STARS™ System”: e-Mail Out of Control?– “Look to the STARS™”. . .

You are busy.  One of the daily challenges you face is taming your e-mail. Without a system, the task of managing your electronic mail can become a growing burden, slowing down your ability to communicate effectively.  Today, I’ll introduce you to “The STARS™” system– an easy 5-step approach to effectively managing your mail.  STARS™ as you might guess is an acronym and represents the words:   Scan, Trash, Act, Read, and Store.  Let’s break each one down to get a feel for how the STARS™ system might work for you:

Scan It

Many e-Mail servers provide a “pre-delivery” SPAM filter – a way to reduce the amount of unsolicited mail from entering your “inbox”.  This filter can often be adjusted if it is “too aggressive” (i.e. identifying too many valid e-mails as SPAM) or “not aggressive enough” (i.e. allowing too many SPAM e-mails through).  If you are troubled by large amounts of SPAM, and your e-Mail provider doesn’t offer an effective means for controlling it, I recommend a program called Mailwasher Pro™  for Windows users (available via the banner link on  my Anti-Virus page at https://www.askavie.com/boutique/anti-virus/ ).  MailWasher Pro™ lets you preview all your email before it gets to your computer or mobile device, enabling you to read all your email securely, and instantly delete any unwanted or suspicious email. Your remaining good email is downloaded to your PC or mobile device, saving you from receiving any spam or email viruses.

Even without the benefit of a SPAM filter, the “Scan It” process gives you the “bird’s eye” view of your mail so that you can move to the next step:

Trash It

The best way to reduce the e-Mail overload is to use the “Delete” button and TRASH all mail that has no use to you.  Of course, SPAM is the #1 offender and that should be deleted immediately.  The next would be those items that you may have “subscribed to” but no longer serve a purpose.  For the legitimate lists that you have requested via an  opt-in, you can routinely safely “Unsubscribe” and remove yourself from the regular burden of having to trash those you no longer find useful.  I don’t recommend “Unsubscribing” from lists that you don’t recognize, as this simply confirms to the sender that you exist, and the unscrupulous ones will continue to burden your inbox with them and possibly even increase the volume by alerting others of your e-mail address.

Always remember to “empty your trash” folder.  It tends to accumulate if you don’t make the effort to delete its contents.  After you have eliminated the unwanted mail, the next step is to:

Act On It

Here is where you either immediately Reply to It, Forward it to someone who may be better suited to “Act On It”, or Hold it until you have more information to deal with it. The secret in this step is to “Do Something with it”, don’t let it just sit there. Your inbox really should be treated like a “landing strip” in an Airport.  Like an airplane, your mail “lands” in your inbox and needs to have a “destination”.  It can’t just stay on the runway or it will hold up traffic and jam up the works.  So the secret to the STARS™ system is to ACT on the mail as soon as possible – and regular time and attention is needed to deal with your mail.

Read It

Sometimes, your e-mail is a newsletter, document, or other information that is interesting and requires more concentrated time and attention in the form of “reading time”.  Schedule chunks of dedicated “reading time”.  For those “spare minutes” when you are not in front of your computer, you may even wish to use a Tablet and make time to read those pieces that provide valuable information.

Store It

Setting up “rules” or “filters” in your e-Mail client helps to automatically “route” your mail to folders – helping you organize and store those items you know you need for future reference, yet don’t need to deal with during the previous 4 Steps.  Setting up mail folders and organizing them in a way that you can easily locate those “confirmations”, “receipts”, “instructions”, etc. will go a long way to helping you cope with the load.

This is fourth in a series of weekly aSKaVIE articles devoted to your productivity, digital privacy and protection. In future articles, you can look forward to tips and tricks that you can use to make sense out of your digital investments as well as reviews of new and exciting things that will likely provide value to your home and business. I invite you to write me with your questions and feedback. We’ll also be helping and inspiring others by answering your questions and that’s what makes my job so much fun! So stay tuned. Please send your questions to TheRosyReport@askavie.com.


askavietechquestionsforbusinessownersAbout Avie Uniglicht: For over 30-years, Avie Uniglicht – “Your Tech Concierge™” has provided technology support and solutions to entrepreneurs who don’t have time to worry about the details. Specializing in “White-Glove Remote Room-Service,” Avie’s concept of giving you, his client, virtual “house calls” is cited regularly as invaluable and many of Avie’s clients say they couldn’t live without him on speed dial. Avie graduated Summa Cum Laude from Temple University with a BS in Business Administration. A former auditor for Price Waterhouse and past President of Ace Computer Center Inc., he is also the author of the e-Book, “Your Personal Computer Driver’s License.” Avie’s extensive business background and strong experience in accounting enhances his natural talent for helping his clients see the bigger picture regarding their business. “Your Tech Concierge” helps clients evaluate strategy so that together, they create an action plan with the end in mind. For more information or to “Ask Avie,” please call him at (888)-374-3712, and visit www.askavie.com.

Filed Under: Blog

  • « Go to Previous Page
  • Page 1
  • Page 2
  • Page 3
  • Go to Next Page »

Primary Sidebar

aSKaVIE’s Remote Room Service™

Your Tech Concierge

tECHtALK tIP Newsletter

Thank you for subscribing to my aSKaVIE’s Silver Platter™. I value you and your time and promise not to overwhelm you with frequent contact. On occasion, I will share some information with you which includes our latest tech news and special offers only available to my Silver Platter™ VIP's.

 

Select list(s) to subscribe to


By submitting this form, you are consenting to receive marketing emails from: aSKaVIE. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Thank you so much Avie, you’ve always helped me tremendously. I’ve worked on computers all through my 47 years service to the oil industry, but you’re still teaching me things I never knew. You’re the BEST!!!! — Marsha

Ok Seriously! Avie Uniglicht just save me $500 on upgrading my Mac! If anyone has computer problems or questions…Avie is the expert! You must friend him! Now!

Best in the country and truly fixed in minutes! Thank -you again for your awesome quick service…He’s the best people don’t mess with the rest!

hello all my fb friends…I want to share with you an amazing experience I just had. Was having problems with internet connection (so I thought) and contacted Comcast… we all know what a joy calling them is… of course no help there so I reached out to someone I met through FB, Avie Uniglicht of […]

Hi Karen, He is in PA and I am in FL – He works remotely and takes control of your computer by way of a pass code that you approve. he can only do it with your approval. I’ve known him since 5th grade and I trust him completely. He made my computers so good […]

Recent Posts

  • “Windows Users – Time for a Tune-Up?”
  • So you want to Broadcast?
  • Protect your Credit and Identity
  • The File Cabinet
  • “Can I Trust That Connection?”
  • Boutique
  • Contact
  • Room Service
  • Testimonials
  • Privacy Policy

Copyright © 2025