Tuesday, May 22, 2018

Quote of the Day

Life is like riding a bicycle. To keep your balance you must keep moving. - Albert Einstein

Monday, May 21, 2018

Your Digital Assets Part 3


Your Digital Assets Part 3
The following is the final writing of a multi-part blog series providing helpful information to protect and pass on your digital assets.
The prior two blogs detailed the potential problems and concerns of ignoring your digital assets.
This blog provides you a bullet list of points on how to prepare now for the disposition of your digital assets.

1. Create an inventory. It is in your heir’s best interest for you to create inventories of your electronic data with log-on IDs and your passwords.  You need to keep the information somewhere safe, keep it current and secure.  Update the information regularly.  The items to include in the inventory are as follows:
· Computing hardware, such as computers, external hard drives or flash drives, tablets, smartphones, digital music players, e-readers, digital cameras, and other digital devices
· Any information or data that is stored electronically, whether stored online, in the cloud, or on a physical device
· Any online accounts, such as email and communications accounts, social media accounts, shopping accounts, photo and video sharing accounts, video gaming accounts, online storage accounts, and websites and blogs that you may manage
· Domain names
· Intellectual property, including copyrighted materials, trademarks, and any code you may have written and own

2. Use a password manager, such as LastPass, 1password or Dashlane.   And share that information with your executor.  Do not put log-in information or passwords in your will.  If you have the one password, that allows the executor to see all the sites that you log into on a regular basis.  It will be like having a digital net worth statement.
3. Consider an online vault, such as box.com, Google Drive, Apple iCloud, Microsoft One Drive, Dropbox, Everplans. or ShareFile.  Box.com is very collaborative and the best overall security.  Dropbox is the easiest to use and is cross software compatible.  If you passed away, the executor who had the power of attorney would have all the digital estate planning documents, insurance planning documents, tax returns, etc., so he / she could piece together the information needed to start the disposition of the estate.  Between the online vault and LastPass, if they have the correct password, the executor will be able to do their job easily.  You can also store this information securely with your attorney or in a locked file cabinet or safe.
4. Write your digital-asset plan into your estate documents. You must be very clear about it, do not rely solely on the generic powers of an executor or a general definition of assets to assume the powers will include your digital assets. The more specific you are about your intent and that you want your executor to have access, the better.  In wills and other estate documents it is helpful to add language to make it clear that the executor should have the same access as the account holder had during his/her lifetime for all digital accounts, specifically including access to content. Or some other broad way of saying that you want your executor to step into your shoes.  A new name for your executor may be your Digital Executor.
5. Consider writing both a broad statement of intent for digital assets as well as specific directions for each account.  You should create a memorandum addressed to one’s executor and heirs indicating the intentions regarding specific digital accounts.  To avoid the problem of forgetting to include an account, you need two statements. “Due to the dynamic nature of technology and the fact that an average American could have hundreds of accounts, I also recommend a general statement of intention to encompass all other accounts — past, present, and future — belonging to the decedent.”
6. Think carefully and be specific about what you want your executor to have access to. For example, will you allow your executor to read all your email messages?  If not, you should be clear about granting such power.  When an executor is granted the power to access a decedent’s online accounts, the executor’s authority might ought to be limited and specific in nature.  This way they are not allowed an extensive and invasive search of the decedent’s online records.
7. Pick your Digital Executor carefully. Consider what information they will have access to in your online accounts.  And this person needs to have some tech savvy skills to work with the accounts.  It is so very important nowadays to think about who that person is, because they’re going to have access to some very personal information.  Plus, they will need to have the know-how to work through the maze of accounts, logons, and passwords.  Otherwise they are not going to deal with it.
The task of dealing with your digital assets will be challenging.  To help motivate you, think about the mess you may leave behind for your loved ones when you are gone.  
There is much more that we have not touched on.  For instance, the gamers out there, we know there is much value in certain characters you have developed online as well.  An asset of value should be cared for.

This concludes my three-part blog series.  If you feel we have missed a certain segment or an important point, we gladly accept any additional thoughts or criticism. We can always blog more.

Corey N. Callaway
Investment Advisor Representative
721 N Fielder Rd., Suite C
Arlington, TX  76012
817-274-4877

Securities offered thru Callaway Financial Services, Inc.
Member FINRA and SIPC


Never Share Your Security Access Information



Protect Yourself From Fraud
Because protecting your accounts and personal information from fraud is and always will be a priority, we want to make you aware of a recent scam and what you can do to protect yourself.
Recently, fraudsters have started "spoofing" or falsifying the phone number displayed on your caller ID to disguise themselves as a reputable company. The scammer pretends to be from a trusted source and asks for your account access credentials and uses them to directly access your account, your money and your personal information.
For your protection, we want to remind you that most providers you do business with, including Frost, will never call, email or text you to update, provide or confirm your account access credentials. Only you should know your account access credentials and as your trusted partner in banking, we would never reach out to you to ask for them.
Your account access credentials can include:
  • User ID
  • Password
  • Security questions
  • 4-digit password for the Frost mobile app
  • 6-digit debit card PIN
  • One-time passcodes delivered to you via text message
Under no circumstance should you provide your account access credentials to anyone over the phone, via email or text. Should you receive a suspicious call or believe you have provided your account access credentials to a fraudster, hang up and call us immediately at 800-513-7678.
To learn more about how we can work together to help protect you against fraud, visit our Fraud Prevention page.

Wednesday, May 16, 2018

Do you have a great install utility? This will help..

Thought I would share a great tool to make you life easier if you have to rebuild your computer..

Reinstalling is a time consuming process, but the real time come in when you have to reinstall all the little programs you use to make you computer work for you..


www.ninite.com will help automate the process. try it out..


If you really need help and have a lot of machines to refresh, Bit by Bit can help..  give us a call 877.860.5831


5 Critical Facts Every Business Owner Must Know Before Moving Their Network To The Cloud - New York City, New Jersey, Dallas, Boston | Bit by Bit




http://www.bitxbit.com/5critical-facts-ebook/


5 CRITICAL FACTS EVERY BUSINESS OWNER MUST KNOW BEFORE MOVING THEIR NETWORK TO THE CLOUD

This guide answers your questions about the cloud in plain English. It provides vital, experience-based information that most IT companies don't know or won't tell you.

Discover the answer


  •  
    •  


We have relied on Bit by Bit's highly-trained, knowledgeable team for three years to host our servers, provide outstanding help desk service, and eventually move us to their hosted VoIP phone systems. They listened to our concerns and needs as they implemented a strategy that met and exceeded our expectations. They are a valued long-term partner and we highly recommend them.

Northern Fund Management
We've been a client of Bit by Bit's for over 20 years. As a matter of fact, they put our server in the cloud over ten years ago, before it was the hottest craze. They have always been very responsive to our needs and operate with the highest integrity. I'm very comfortable recommending them to other law firms.

Yacker Glatt LLC
Prior to using Bit by Bit, we encountered many instances requiring technology solutions. Since converting to their reverse cloud model, our system has been running smoothly. They are very responsive to our needs and their services are highly recommended.

Goetz Fitzpatrick LLP

11 Ways to Defeat Two-Factor Authentication


Hi Robert,
Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!
Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution. 

The webinar will include a (pre-filmed) hacking demo by worldwide hacking expert Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.
You'll learn about the good and bad of 2FA, and become a better computer security defender in the process.
This webinar will cover:
  • 11 ways hackers get around two-factor authentication
  • How to defend your two-factor authentication solution
  • The role humans play in a blended-defense strategy

Date/Time: Monday, May 21st at 1:00 PM ET
Register Now 

Don't like to click on redirected buttons? Copy & paste this link into your browser: 
https://attendee.gotowebinar.com/register/5841469274003006978?source=HS
Warm regards,
Stu Sjouwerman
Founder and CEO
KnowBe4, Inc.




Quote of the Day