Time for a Secure Email

Time for a Secure Email

You probably have a Gmail account. If you do, you are one of over 1.5 billion Gmail users. You may think you’re in good company.  You’re not.  It’s time to change to a more secure email service. Gmail is ubiquitous. Want to post a comment on YouTube?  You’ll need a...
HTM and HTML Attachments

HTM and HTML Attachments

Apparently, I sent myself an email yesterday. It had an HTML file attachment. A malicious attachment designed to get me to click on the phishing links within. More about that later. HTM and HTML attachments are frequently used in email communications. System-generated...
Office Archaeology

Office Archaeology

Remote and hybrid work are here to stay. Some items in your office should not be. As the year end approaches, it’s a good time to do a little office archaeology work. Take a moment to uncover and dispose of these dated implements: The Stone AgeThese are the tools of...
Still Writing Checks?

Still Writing Checks?

During the first stages of my identity theft recovery (see previous blogs), my credit cards were frozen. Hackers controlled my gmail account and my linked Google Fi cell phone. I lost both of my two-step, account verification methods; I was unable to login to most of...
Identity Theft Revisited

Identity Theft Revisited

I have written previously offering suggestions about dealing with identity theft. Now, some months later, it is time to offer a few more ID-recovery suggestions, ones that you may not have seen elsewhere. Suggestions for EveryoneChex Systems, Inc.If you are a victim...
World Wide Local Connect