Apparently, I sent myself an email yesterday. It had an HTML file attachment. A malicious attachment designed to get me to click on the phishing links within. More about that later. HTM and HTML attachments are frequently used in email communications. System-generated...
Remote and hybrid work are here to stay. Some items in your office should not be. As the year end approaches, it’s a good time to do a little office archaeology work. Take a moment to uncover and dispose of these dated implements: The Stone AgeThese are the tools of...
During the first stages of my identity theft recovery (see previous blogs), my credit cards were frozen. Hackers controlled my gmail account and my linked Google Fi cell phone. I lost both of my two-step, account verification methods; I was unable to login to most of...
I have written previously offering suggestions about dealing with identity theft. Now, some months later, it is time to offer a few more ID-recovery suggestions, ones that you may not have seen elsewhere. Suggestions for EveryoneChex Systems, Inc.If you are a victim...
There’s safety in numbers.” Particularly in certain numbers. If you are a small business manager, take a break from reviewing KPIs, studying Google Analytics data, or analyzing financial results. Consider, instead, the importance of these five, simpler numbers:...