Other Ways To Connect

Friday, February 27, 2015

Is Your Personal Data Worth $35K?

When we hear about security breaches of big businesses, we understand immediately that there must be some value to the data they store, even if it's only email addresses the hackers get. But we rarely think about the value of our personal data sitting on our own digital devices.

To be quite honest, I've never really thought about it myself.  I know the information and Apps I use on my devices are very valuable to me personally.  I love the fact that I can access information at the push of a couple of buttons and love the convenience of being able to access information from anywhere.  But you have to wonder, with the rise in malware and viruses on phones and tablets, what is it that hackers find so valuable?  Why and how can so many companies and individuals afford to offer free Apps and push us to download the latest mind numbing game?

Wednesday, February 18, 2015

Getting to a Better Digital Estate via Facebook's Legacy Contact Feature

Post-death access to digital assets is a hot topic due to the unresolved tensions between online service provider privacy terms that users agree to and their heirs’ rights and access to their remaining digital “footprints.”    

Last week, Facebook made headlines with its launch of an additional feature that allows members to designate other members as beneficiaries for—partial—postmortem account access. Most media outlets and pundits agreed that the additional controls are a step in the right direction. The announcement adds poignancy to the broader growing issue of claiming digital assets after death. 

Monday, February 16, 2015

Life Events & Records - Divorce

Divorce isn't something that I've experienced personally--thank goodness!  But sadly, many people have.


Elissa Goldberg, a divorce attorney in Bucks County PA, recently shared with us that there are many documents that people need to provide during the divorce process.

Sometimes, depending on how difficult the divorce is, those documents are hard for one party in the divorce to provide because either the other person has (or had) them, the documents cannot be easily found, or the documents aren't provided out of spite. 

Thursday, February 12, 2015

3 Rules for Communicating Securely with Your Tax Preparer

Justifiably Appalled

It's been quite a few years since this happened, but I remember getting my completed tax returns emailed to me by my accountant.  No encryption, no security.  Just my social security number, income, address and dependent social security numbers out there for any hacker to view.  You can imagine my reaction.

That will not happen again - at least to me.  But as most of the US population gets ready for the annual tax preparation extravaganza, and we get really rushed for time,  we might be tempted to cut a few security corners.  

Here is some advice.  Don't.


Here are 3 things to NEVER do and alternative ways to stay secure


Thursday, February 5, 2015

3 Steps to Security Diversification for Your Business

Do you keep all your eggs in one basket?

What is important for your finances is also important for your online security.

Every legitimate financial adviser will tell you that investing in only one stock or type of investment is a recipe for disaster.  Sure, if you only have to follow one stock, you can always and easily know your position, but knowing you're broke doesn't make you less broke.

So you diversify.  The actual way you should diversify is a function of your age, your tolerance for risk, your goals and special circumstances, like family medical needs, etc.  But diversification works and over time, diversification pays off.

You wouldn't have to diversify if everything always went just fine.  You diversify to mitigate the impact of things going wrong. And someday, things will go wrong. That's not being pessimistic.  It's being realistic.  We buy insurance, don't we? 

For the past 25 years, there's been quite a bit of press about hacking and online account information being stolen from businesses.  But for every Sony case, there are thousands of individual losses that we never hear about.  Just because we don't know about them, doesn't mean nobody was hurt.  So how can you make sure that if one of your accounts get hacked, the rest don't get hacked and you don't get wiped out?


1. Passwords

2. Online storage accounts

3. Your servers

Here's how