It’s that time of year. Santa is “making a list and checking it twice.” Accounting managers should do the same: They should prepare a year end closing checklist. Not all year end tasks must be accomplished before December 31st but, without a checklist, managers can...
You probably have a Gmail account. If you do, you are one of over 1.5 billion Gmail users. You may think you’re in good company. You’re not. It’s time to change to a more secure email service. Gmail is ubiquitous. Want to post a comment on YouTube? You’ll need a...
Apparently, I sent myself an email yesterday. It had an HTML file attachment. A malicious attachment designed to get me to click on the phishing links within. More about that later. HTM and HTML attachments are frequently used in email communications. System-generated...
Remote and hybrid work are here to stay. Some items in your office should not be. As the year end approaches, it’s a good time to do a little office archaeology work. Take a moment to uncover and dispose of these dated implements: The Stone AgeThese are the tools of...
During the first stages of my identity theft recovery (see previous blogs), my credit cards were frozen. Hackers controlled my gmail account and my linked Google Fi cell phone. I lost both of my two-step, account verification methods; I was unable to login to most of...
I have written previously offering suggestions about dealing with identity theft. Now, some months later, it is time to offer a few more ID-recovery suggestions, ones that you may not have seen elsewhere. Suggestions for EveryoneChex Systems, Inc.If you are a victim...