HTM and HTML Attachments

HTM and HTML Attachments

Apparently, I sent myself an email yesterday. It had an HTML file attachment. A malicious attachment designed to get me to click on the phishing links within. More about that later. HTM and HTML attachments are frequently used in email communications. System-generated...
Office Archaeology

Office Archaeology

Remote and hybrid work are here to stay. Some items in your office should not be. As the year end approaches, it’s a good time to do a little office archaeology work. Take a moment to uncover and dispose of these dated implements: The Stone AgeThese are the tools of...
Still Writing Checks?

Still Writing Checks?

During the first stages of my identity theft recovery (see previous blogs), my credit cards were frozen. Hackers controlled my gmail account and my linked Google Fi cell phone. I lost both of my two-step, account verification methods; I was unable to login to most of...
Identity Theft Revisited

Identity Theft Revisited

I have written previously offering suggestions about dealing with identity theft. Now, some months later, it is time to offer a few more ID-recovery suggestions, ones that you may not have seen elsewhere. Suggestions for EveryoneChex Systems, Inc.If you are a victim...
Five Numbers to Remember

Five Numbers to Remember

There’s safety in numbers.” Particularly in certain numbers. If you are a small business manager, take a break from reviewing KPIs, studying Google Analytics data, or analyzing financial results. Consider, instead, the importance of these five, simpler numbers:...
World Wide Local Connect