Blog

Underwyred offer eM Client

We have been installing eM Client for over 3 years on customer computers and laptops. It offers easy setup on both Windows and Mac OSX with an ad-free clear interface. This is helpful if you struggle with distracting information on screen, there are three themes so it is possble to choose something visually clear. The eM Client offers integration with your contacts and calendar, tasks and chat. It integrates with Google Mail (gmail), Yahoo, BT Internet, iCloud, Office365 and Microsoft Exchange. 

I have chosen to be a reseller because my customers have successfully been using this software (which is free for 2 email addresses). The Pro version will provide unlimited email addresses, commercial use and access to VIP support. I am still happy to install the the basic version for users just looking for simple clear access to their email. 

For more details on em client please click this link eM Client or contact us

Social Media Safely #2

Twitter

A little blue bird told me…

Twitter has the immediacy of text messages enabling you to say what you want within 140 characters. Its great for connecting businesses, getting instant local, national or international news and a platform for your voice to the world. You can connect with followers and send them direct messages. Why not follow Western Power Distribution ? By using a twitter app on your smartphone you can get information in power cuts.

Replying to tweets can develop interesting conversations but only rarely a good argument will win someone over. Twitter is a great place to get a message out quickly and an even faster way to make a fool of yourself. Remember that what you tweet is in the public domain so never tweet drunk when your inhibitions are lowered and judgement impaired.

Backup your tweet history

In 2012 Twitter introduced an archive backup, who knew? By requesting a backup you can store your tweets, search and review them in a web browser and a csv file. Why not repost the good and the great?

Account Security

Use a good unique password and enable two-step verification whereby changes made require a code sent to your mobile phone to confirm you as account holder. Watch for profile changes or tweets you didn’t make thye may indicate your account has been compromised. 

Review your privacy settings

  • Protect tweets to be viewed by followers only unless you need a global audience
  • Remove any location labels from your tweets
  • Prevent some users from tagging you in photos
  • Decide who can send you direct messages 
  • Hide sensitive content 
  • Block accounts that tweet inappropriately 
  • Review connected apps regularly

Keep it Legal

  • Is it defamatory – will it breach libel laws?
  • Is it harrassment? – this requires two or more tweets
  • If the information is false, is it malicious?
  • Could your joke be construed as menacing?
  • Is it deceitful, breaking advertising law?
  • Is it fraud? Are you impersonating someone else?
  • Is it threatening or intimidation?
  • Does it break privacy and data protection laws?
  • Are you infringing copyright law?
  • Have you infringed a trade mark?  
    Twitter and the law: 10 legal risks

Retweets

Likes and retweets are an endorsement of the originators post. When you choose to retweet you are offered the option to comment. This might be a good time to point out why you are sharing the tweets with your followers.

Worcestershire Hourr

#WorcestershireHour is the brainchild of businessman Stuart Allen seeking to promote local prosperity through mutual support. Monday evenings between 8-9pm and 12-1pm on Wednesday afternoons are an hour of interactive tweeting likes and retweets between Worcestershire businesses. On this platform you will find goods and services locally and encourage other businesses to develop and grow.

Screen Shot 2019-02-15 at 09.18.06

Social Media safely

Part 1: Facebook

According to Statistica approximately 50% of Facebook users in the UK are over the age of 34. Still the most popular age group at 25% are in the age group 25-34 years old. This age group is internet savvy having grown up with the development of online social media. Despite some tragic mistakes, they have learned and taught each other the best ways to avoid conflict, breaches of privacy and how to identify fake news or trolls. They resent keyboard warriors who try to use social media for political ends.
The rest of us are trying to catch up with them.

When creating a Facebook account you will need to supply a profile picture. If you then want to create a business page choose one that clearly identifies you as a real person. Facebook can really help small businesses but you need to create your own Facebook presence and gather your own set of friends. Link up with people you know and have met face-to-face.

Notifications

Go to your Facebook settings and change the notifications so that your email inbox does not constantly fill up with emails from Facebook every time a friend makes a post or a cat sneezes.

Privacy

Go to your Facebook settings and change the your privacy setting to private. Be careful to read through can close down all options. I recommend making you email address, telephone number and date of birth only visible to yourself. Anything else can be friends only. Friends of Friends can open up wider discussion but if you want something to be broadcast because you have a lost dog on your doorstep just change that single post to ‘Public’ for the single post you are making to find the owner.

Fake News

Identifying fake news can be difficult. “On average, users over 65 shared nearly seven times as many articles from fake news domains as the youngest age group” said researchers. However, before you share anything please check when it was first published, scroll down a read a few comments and just check for updates (the dog is now happily reunited with its owner). Check the original source of the post; do you know the political motives of the initiator or agree with his religious stance? Some stories can be checked out on websites listed below.
Snopes
Full Fact
Urban Myths

NB On 1/2/2019 it was announced that Assocated Press and Snopes are no longing working with Facebook see BBC News for further details. That does not mean they are not able to verify or deny news. As with all sources caution is the watchword.

Enjoy

Facebook is great for contacting long lost school pals, seeing your grandchildren in Australia and finding local news, local history and even selling unwanted furniture. Enjoy it, use it. Book a visit if you want help with your privacy settings and you live in Worcestershire. Remote support and tuition is possible if you are further away.

Safer Internet Day

Safer Internet Day is 5th February 2019

Safer internet day

In the last week, I have been contacted by two individuals who have been hacked and paid money to telephone scammers. They dutifully followed telephone instructions and allowed access to their laptop. One was charged £3.99 and the other £20. These are small amounts but the greater danger is in the bank details being handed over. One device was blocked when the password was changed.

In the event of being caught by this deception, switch off your computer or router to prevent any further access to your data. Next, report to the police on 101 and contact your bank on their fraudline and explain what has happened. Then get a trusted local person to remove any unauthorised remote access to the computer and run full virus scans. It can take about 1 hour to 1 1/2 hours to run a scan using a utility such as malwarebytes Look at recently installed programs or apps to see if anything new has been installed, run a cleaner utility, remove any adware and check that the anti-virus software and firewall are up-to-date.

Avoiding the issues

  • Change your router SSID and key make a hand written record of it.
  • Always password protect your computer/device
  • Remember Microsoft and BT cannot tell if you have a virus
  • Never save passwords for your bank accounts
  • Only let trusted people have access to your device
  • Buy online using Paypal or a credit card (avoid using a debit card).
  • Get help in managing your privacy settings on social media

Passwords

Losing a password can be an expensive error of judgement. It can render an expensive tablet useless or block access to an important document. However, passwords, pins and thumbprints are there to protect your data thus they are essential. 

Most of my time is spent helping people recover passwords. Using passwords that are simply the name of your cat are no longer secure and we are forced into using upper and lowercase numbers and punctuation symbols. This makes ‘Kittycat’ into a far more complicated ‘K1ttyc@t’ and unless you use this password regularly it is easy to forget a password setup 2 years ago and never typed in since then. Click Here for a list of most common passwords 2018

Sites will give guidance on weak and strong passwords

If you have a poor memory or do not use the password regularly, I recommend writing the password down in a place where only a trusted family member can find it. so an unmarked plain books ideal (indexed may be helpful). 

Password generators and password managers online are useful but there are logins such as your router that they cannot store or login to the laptop or the password manager. 

Frequent Password mistakes

  • Using the web browser options to save the password then never using the password so its not committed to memory
  • Using your pets’s name and then posting pictures on  Facebook 
  • Writing your password in uppercase not the case you typed
  • Using your birthday
  • Creating the password with the caps lock on
  • Using the same password for your email account and website login
  • leaving the password on a post-it note on your desk
  • Typing all your passwords in a spreadsheet or Word document that can be read by hacker who has gained access to your computer

Postscript 26/1/2019

After reading this blog post Jack Foster was inspired to write his own much more detailed guidance on creating secure passwords. It is well worth reading and choosing the method that you find suits your own purposes best. https://www.vpngeeks.com/how-to-secure-your-passwords 

Email client (App)

Using an email client (email application)

Many computer and smartphone users are finding it increasingly difficult to setup email access on their devices. Often issues don’t show up until there are software updates or device upgrades. The setup can be challenging on older operating systems or accessing an email account related to another operating system. For example setting up gmail in Outlook or accessing an iCloud account on a non-apple device.

The following email accounts require two factor authentication  and/or an app specific password. [This list is not comprehensive and may change as email providers change their security policies.]

  • Outlook.com
  • iCloud
  • Gmail
  • Yahoo
  • AOL mail

We recommend the using eM Client as a contemporary utility for managing contacts and sending/receiving emails. It offers a good clear layout without the use of adverts and an easy setup. It is free for use with up to two email addresses, after which you may need to pay for the facility. Outlook is another good application with powerful features but costly and not easy to setup. If you need any help setting up access to your emails with eMClient or another email app please contact us.

Click here to download eM client.