Share content with your friends and fans!

Sunday, June 29, 2008

On Line Identity Theft--Who Left the Door Open?

Show Notes from Episode 57 with Greer Stasko of Pre Paid Legal Services

Techno Granny TalkShoe Podcast Monday, June 9th High Tech Identity Theft

Greer G. Stasko
Small Business & Group Benefits Specialist
Pre-Paid Legal Services
412.951.5341
greerstasko@prepaidlegal.com
www.prepaidlegal.com/hub/greerstasko

*In 2007, a group called the Privacy Rights Clearing House estimates that 8.4 million people had their identities stolen.
*Every 2 seconds a person becomes a victim of IDT.

*There are no guarantees that your identity will never be stolen or compromised, there are several steps you can take to minimize your risk.
*These may sound like common things to do, but many people still don’t do these simple things!

LOW-TECH IDT
- Shred all documents, mail, receipts, etc. that have any of your personal information
- What is Personal information? Name, passwords, SS#, address, bank info, driver’s license info, medical info, credit card info, etc, - everything.
- Unique passwords – make them have no connection to anything that someone could guess.
- Don’t give your SS# to people or companies you don’t know.
- Whenever someone asks you for any of your Personal Info, ask what they need it for – don’t be afraid to ask WHY they need it and if you don’t give it to them, then what will or will not happen.
- Think about investing in a locked mailbox. Don’t put outgoing mail into your mailbox to sit until the mail person picks it up. Take it to the post office or a secure mailbox. If you don’t have a locked mailbox, remove incoming mail promptly.
- Reduce junk mail by calling 1.888.567.8688 (OPT OUT)

HI-TECH IDT
- Phishing and Pharming: While phishing is a scam in which consumers are tricked into entering their personal information via a bogus email and website form, pharming occurs where hackers steal personal information from numerous people simultaneously through something known as "domain spoofing". They take over a DNS server and redirect user information to a new website that they use to gather, collect, "pharm" illegal information.
- Skimming: Thieves quickly and temporarily steal a credit card and run it through a skimmer, a credit card reader that has been reprogrammed to steal information off the card.
- Install on your computer three things – firewall program, anti-virus program and an anti-spyware program.

People who are 65 years old or older or are documented victims of identity fraud will not be charged the $3 fee for placing or removing a freeze.
What can you do?
Many people store identifying information, like their names, social security numbers, birth dates, bank accounts, financial records and tax returns, on their computers, and at times they may reveal some of this information for specific purposes on the Internet. The question thus arises as to how this identifying information can be protected so that identity theft can be avoided.
The Federal Trade Commission (FTC) prudently has suggested that the following steps be taken to protect against high-tech identity theft:
• Update virus protection software regularly or whenever there is a new virus alert. It turns our that computer viruses can introduce program code that causes a computer to transmit files or other stored information that includes identifying details.
• Do not download files sent by people that you do not know. Opening such a file could expose a person's system to a computer virus or program that could "hijack" the modem.
• Use a firewall program, and this is especially the case for people who have high-speed Internet connections that make their computers connected to the Internet at all times. Such a program will help stop uninvited persons from accessing a computer.
• Use a secure browser, meaning software that encrypts or scrambles information sent over the Internet. This helps protect the security of online transactions.
• Make best efforts not to store financial information on a laptop. Obviously, laptops (and other small devices such as PDA's) can be lost or stolen, making the information contained on them available to others. If identifying information needs to be stored on a laptop and portable devices, it is important to use a "strong" password — a combination of upper and lower case letters, numbers and symbols.
• Delete identifying information before disposing of computer devices. Simple deletion by way of a keyboard or mouse may not be enough. The use of a "wipe" utility program can overwrite the entire hard drive.
• Closely analyze Web site privacy policies that should address access and security questions relating to the control of identifying information. If a Web site does not have such a policy, or if it does not promise a satisfactory level of security, move on and do not reveal identifying information to that Web site.
THE FACTS
•The average amount stolen is over $92,000 1•The average cost to the victim including legal fees and lost work time is $16,971 2
••The average time required to straighten out the whole mess is about 607 hours 2
••1 in 4 chance of being victimized in the next five years3
1 USA Today 1/14/05
2 Identity Theft Resource Center 2003
3 Identity Safeguards 2004

Wednesday, June 18, 2008

Warning to XP Users

From: Bonnie Boots (editor@theinternetwizards.com)

Now, Windows XP Users, PAY ATTENTION! If you prefer Windows XP over Vista (I do!)you only have 2 weeks left to make sureyou have a back up copy of XP. At the end of June, Windows XP is officiallyat its "end of life" as far as Microsoft isconcerned. After that, no updates or suppportwill be offered and it can not be sold in retailoutlets.

This is important if you already have WindowsXP installed but have misplaced your original (back up) copy of it. If you ever need to reinstallWindows XP on a repaired or new computer, you musthave your own backup copy in hand. If you don't have a copy of the software anymore you will want to move fast to purchase a back up before it is removed permanently from retail shelves.

Check your software files now. Make sure you have a good back up. If you need to secure one, check withthe place you purchased your computer to see if they'llreplace your OEM copy, or look on Amazon.com for thefull retail package. Do this BEFORE JUNE ENDS!

Sunday, June 8, 2008

Technical Tactics as Alternatives to Business Travel--Episode 56

You Can Hear Janet Christy's archived interview on Techno Granny Show, Epsisode 56-TEchnical Tactics to Alternatives to Business Travel Listen at: http://www.talkshoe.com/talkshoe/web/tscmd/tc/30986

MINIMIZING TRAVEL WITHOUT SACRIFICING BUSINESS

By Janet W. Christy

Before I started doing consulting and training for Woman and Minority Owned Businesses I spent more than 25 years in the telecommunications industry. In February 2002 (soon after the tragedy of 9/11) I wrote a white paper on “Minimizing Travel.” Even though six years have passed the situation has not improved because security regulations and gas prices keep increasing. Even though these pointers on Minimizing Travel are not directly related to being a Woman/Minority Owned Business I thought you might still find them helpful. Following is a slightly updated version of the 2002 white paper.

The Dilemma


The cost and complications of business travel have increased tremendously over the last few years and especially in recent months. Many businesses and organizations are struggling with the decision of whether to travel or not and how to effectively do business if they reduce the amount of travel. Some of the factors in these decisions are:

Cost of airline tickets, gas, rental cars
Cost of overnight stay (with increased security and related travel time one-day trips are not as easily accomplished)
Cost associated with increased time involved in travel (monetary and personal sacrifice)
Apprehension to travel/Concern for staff traveling
Frustration in the time and complication of travel
The old “revenue to expense” formula – weighs heavier on the expense side today


We are all ready to strongly consider alternatives to travel. However, much like a very hungry person in a buffet line – everything looks good. You will have to carefully analyze possibilities and be sure the methods compliment to the specific ways you do business and the outcomes you need. Following is a tested method for insuring the right choices are made.

Determine what type of trips you and your staff make and the desired outcome(s)
List the real negatives of not being face-to-face with the person(s) at the far end of the trip
List the time and dollar costs associated with the trip
Compare the two lists
Think of all possible methods of interaction (listed later) short of an actual trip
Compare each of the interaction methods with the negative of not being face-to-face and decide if there are ways to overcome the negatives
Ask the person(s) at the far end of the trip how they feel about other methods of interaction
Determine if you can serve more clients/customers and thus increase revenue by using alternatives to travel
Make a decision on each trip or type of trip based on the above factors
The Solutions

There are many ways to communicate and conduct business without traveling. There are also measures you can take to insure trips are more effective. A business must realistically evaluate the options to determine what is best for the situation. Several non-travel interaction methods may be employed by a business, depending on the specific situation and desired outcome. You must educate yourself and/or call on consultants and customer advocates to ensure you are not unduly influenced by the immediacy of the situation or the hype of the proposed solution.

Here is a list of some of the possible alternatives to business travel. (Some situations may require a mixture of the alternatives either simultaneously or at specific junctures in the process.)

Video Conferencing
Via your private network
Via the Internet
Via a video conferencing service/facility
Audio Teleconferencing
Online Presentation
Online Meeting with or without screen sharing
Email
Instant messaging
Online Chat
Bulletin Board
Extranet (allow clients access to applicable information within your network)
Hard copy (US Mail, overnight delivery, private courier service, etc.)
One-on-One Phone Conversation (it sounds silly, but it is sometimes overlooked)
There are probably others that I don’t know about since I’ve been away from telecom for several years


Even though the logistics of travel have become more complicated, it is still the same set of logistics every time. Getting to the airport, allowing time for security checks, dealing with luggage and luggage screening – it’s the same every trip. If the trip is made by car it’s also a uniform set of activities. Preparing to “do business from home base” requires a whole new set of preparation and execution logistics. It also necessitates a new set of precautions. Here are some of the basic considerations and actions:

Appropriate network speed and size (phone lines or wireless)
Adequate network security
Proper software
Necessary equipment (video, quality speaker phones, headsets to filter out noise, etc.)
Suitable spaces that are acoustically adequate for video conferencing or audio conferencing
Training (equipment and procedures)


The old “tried and true” preparation actions for doing business are even more important when doing business without traveling and for making travel more efficient. Some of those actions are:

Research the other party (website, other internet sources, newspaper articles, financial report, and other appropriate material)
Reading ahead (the proposal, the past correspondence, any other background or appropriate information)
Test equipment and/or line at least a day before it is to be used
Know how to use the equipment or software
Have a technical expert available – a life line
Practice (on-line presentation, video or audio speech, etc.)
Allow enough time for the meeting (people tend to think a video or phone meeting will not take as long as an in-person one, your time savings comes from not having to travel)
Schedule multiple meetings or contacts if you do travel
Be sure you have proper materials with you whether you travel or have a meeting online or by phone
Be sure the right people do the traveling or are involved in the online interaction (do not involve unnecessary people in a video or phone meeting just because you can without having to incur travel expense)
Send one or two people to a conference and have them provide the information to other appropriate staff. Purchasing videos of the presentations may be an alternative to attending at all.

Travel is a way of life and business for commercial, non-profit, education and government entities. However, economic and security conditions require evaluation of travel practices and the implementation of alternatives It will take some effort to overhaul attitudes and procedures, but the results will be a more efficient and effective way of doing business.


I do consultations, research, radio interviews and meetings by phone all the time. During a phone consultation or meeting I often have the other participants go directly to websites and help them walk through forms, understand procedures and find information expediting their ability to action. Doing consultations by phone makes it affordable and possible for my clients to use my services.

Janet W. Christy is the author of Capitalizing On Being Woman Owned, a marketing guide for Woman Owned Businesses. She is the founder and President of Leverage & Development, LLC, a consulting firm that helps Women and Minority owned businesses use their status to their advantage. Her services include marketing research and planning, certification assistance, sales guidance, and assistance in government bidding. www.leverageanddevelopment.com www.businesshospitalforwomen.com.

Friday, June 6, 2008

Ad Age Says Amazon Just Lost $1.8 Million in Half an Hour

Amazon Just Lost $1.8 Million in an Hour
E-commerce Site Was Down for 90 Minutes June 6, 2008 NEW YORK (AdAge.com)
-- E-commerce site Amazon went down this afternoon around 1:30 EDT and stayed down for at least an hour. Attempts to access Amazon.com were met with the following message: "Http/1.1 Service Unavailable." It's hard to know exactly how many dollars a minute Amazon loses in sales for every moment its site is down, but simple math pegs it at about $1.8 million an hour, based on Ad Age estimates. Read the full story at: http://adage.com/digital/article?article_id=127593 -- Abbey Klaassen

Techno Granny Note: Other companies should be in such a posiiton to lose that much money in an hour! As my grandson would say, Awesome!

Sunday, June 1, 2008

Let's Settle the Trade Deficit with China

This was sent to my by Maureen Ciarolla of AmeriSource Trust and Envy White Teeth, don't know the origin but let me know if You think it makes sense?


Are we Americans as dumb as we appear or is it that we just don't think? While the Chinese, knowingly and intentionally, export inferior products and dangerous toys and goods to be sold in American markets, the media wrings its hands and criticizes the Bush Administration for perceived errors. Yet 70% of Americans believe that the trading privileges afforded to the Chinese should be suspended. Well, duh..why do you need the government to suspend trading privileges? DO IT YOURSELF!!

Simply look on the bottom of every product you buy, and if it says 'Made in China' or 'PRC' (and that now includes Hong Kong), simply choose another product or none at all. You will be amazed at how dependent you are on Chinese products, however you will be equally amazed at what you can do without. Who needs plastic eggs to celebrate Easter? If you must have eggs, use real ones and benefit some American farmer. Easter is just an example, the point is.. do not wait for the government to act. Just go ahead and assume control on your own.
If 200 million Americans refuse to buy just $20 each of Chinese goods, that's a billion dollar trade imbalance resolved in our favor...fast!! The downside? Some American businesses will feel a temporary pinch from having foreign stockpiles of inventory. ** Downside ??

The solution ?
Let's give them fair warning and send our own message. We will not implement this UNTIL June 4, and we will only continue it until July 4. That is only one month of trading losses, but it will hit the Chinese for 1/12th of the total, or 8%, of their American exports. Then they will at least have to ask themselves if the benefits of their arrogance and lawlessness were worth it.
Remember, June 4 to July 4.
Send this to everybody you know.
Show them we are Americans
and NOBODY can take us for granted.
If we can't live without cheap Chinese
goods for one month out of our lives,
WE DESERVE WHAT WE GET!
Pass it on America !!!