Social Media Security Tips

Social networking sites build upon the concept of traditional social networks where you are connected to new people through people you already know. The purpose of some networking sites may be purely social, allowing users to establish friendships or romantic relationships, while others may focus on establishing business connections.

Social networking sites rely on connections and communication, so they encourage you to provide a certain amount of personal information. When deciding how much information to reveal, people may not exercise the same amount of caution as they would when meeting someone in person because

  • the internet provides a sense of anonymity
  • the lack of physical interaction provides a false sense of security
  • they tailor the information for their friends to read, forgetting that others may see it
  • they want to offer insights to impress potential friends or associates

While the majority of people using these sites do not pose a threat, malicious people may be drawn to them because of the accessibility and amount of personal information that’s available. The more information malicious people have about you, the easier it is for them to take advantage of you. Predators may form relationships online and then convince unsuspecting individuals to meet them in person. That could lead to a dangerous situation. The personal information can also be used to conduct a social engineering attack. Using information that you provide about your location, hobbies,

  • Limit the amount of personal information you post – Do not post information that would make you vulnerable, such as your address or information about your schedule or routine. If your connections post information about you, make sure the combined information is not more than you would be comfortable with strangers knowing. Also be considerate when posting information, including photos, about your connections.
  • Remember that the internet is a public resource – Only post information you are comfortable with anyone seeing. This includes information and photos in your profile and in blogs and other forums. Also, once you post information online, you can’t retract it. Even if you remove the information from a site, saved or cached versions may still exist on other people’s machines.
  • Be wary of strangers – The internet makes it easy for people to misrepresent their identities and motives. Consider limiting the people who are allowed to contact you on these sites. If you interact with people you do not know, be cautious about the amount of information you reveal or agreeing to meet them in person.
  • Be skeptical – Don’t believe everything you read online. People may post false or misleading information about various topics, including their own identities. This is not necessarily done with malicious intent; it could be unintentional, an exaggeration, or a joke. Take appropriate precautions, though, and try to verify the authenticity of any information before taking any action.
  • Evaluate your settings – Take advantage of a site’s privacy settings. The default settings for some sites may allow anyone to see your profile. You can customize your settings to restrict access to only certain people. However, there is a risk that even this private information could be exposed, so don’t post anything that you wouldn’t want the public to see. Also, be cautious when deciding which applications to enable, and check your settings to see what information the applications will be able to access.
  • Use strong passwords – Protect your account with passwords that cannot easily be guessed. If your password is compromised, someone else may be able to access your account and pretend to be you.
  • Check privacy policies – Some sites may share information such as email addresses or user preferences with other companies. This may lead to an increase in spam. Also, try to locate the policy for handling referrals to make sure that you do not unintentionally sign your friends up for spam. Some sites will continue to send email messages to anyone you refer until they join.
  • Use and maintain anti-virus software – Anti-virus software recognizes most known viruses and protects your computer against them, so you may be able to detect and remove the virus before it can do any damage. Because attackers are continually writing new viruses, it is important to keep your definitions up to date.

Source:  US Computer Readiness Team,

About Afinety:  IT services for law firms provided throughout California and beyond, including Orange County, Los Angeles, San Diego, the Bay Area and Las Vegas.  Cloud services and document management for law firms throughout the nation.

Manage Your Email With MS Clutter Feature


If you’re currently using Microsoft Office 365, you probably noticed a new folder called Clutter in Outlook.  Clutter is a new feature designed to move low priority messages out of your Inbox and into their own folder, saving you time when you scan for important messages.

It works like this: The email server learns what you ignore and what you don’t.  As new email comes in, Clutter takes messages you’re most likely to ignore and moves them here.. The result is a faster, cleaner and more manageable inbox.

Once you turn it on, Clutter is automatic. The more you use it, the better it gets.

And if you find Clutter isn’t for you, you can turn it off any time.

Generally, Clutter can be addressed once per day and cleared out after a brief look. It is simple and easy to manage, much like your junk mail and deleted folders.

Current Afinety Cloud Platform (ACP)  clients now have this feature as part of MS Office 365. It’s free and requires no user intervention.

8 Tips to Protect Yourself from Identity Theft (Cyber Security)

The following tech tip is provided by the Afinety Support Department

Data breaches, unfortunately, are almost becoming a routine occurrence.  About 174 million records across the globe were exposed during 855 data breaches last year, according to Verizon’s annual data breach report, and expect that number to increase this year.  Even if your records haven’t been exposed, it may still be a good idea to follow these precautions.

  1. Check your credit reports regularly. When you get your credit reports, check for address changes, accounts, late payments and other activity that you don’t recognize for signs of possible identity theft.
  2. Watch out for medical identity theft. Read the Explanation of Benefits that you receive from your insurance company and check your medical bills to make sure they’re accurate. If you notice a doctor you’ve never visited or a procedure you didn’t receive, contact your insurer at once.
  3. Guard your social networks. If you have a blog or social accounts, such as Facebook and Twitter, use the highest security settings possible to ensure your information, posts and photos aren’t being leaked onto the Internet. Also to avoid being a victim of burglary or identity theft, don’t advertise the fact that you’re traveling.
  4. Use strong passwords. Use a mix of upper and lowercase letters, numbers, symbols and punctuation to make your passwords harder to crack.
  5. Connect securely. Use firewall, anti-virus and anti-spyware software on your home computers and laptops. Keep all software, as well as your operating system, updated.
  6. Protect your mobile devices. Losing your mobile phone, a thumb drive or laptop can be just as bad as losing your wallet. Be sure to protect your mobile devices with passwords and encryption.
  7. Limit what you carry. You’ll have less to lose and a lower risk of identity theft if your wallet is lost or stolen. Don’t carry your Social Security card, extra credit cards or a list of your PINs and passwords.
  8. Purchase a home safe and shredder. Store documents with personal information, such as tax returns, W2s, passports and your Social Security card in a home safe.  And, if you don’t need to keep account statements, bills and other sensitive documents, shred them.

How Afinety Remote Support Works

Afinety Support is available to firms using any Windows desktop or server operating system. We can remotely support all clients – not just those that have Afinety networks.

Read more

Outstanding Client of the Quarter – Nevers, Palazzo, Packard, Wildermuth & Wynner, PC

Outstanding Client Of Fourth Quarter 2014

Every quarter, Afinety selects a client to name as the “Outstanding Client of the Quarter.” This quarter we would like to recognize Nevers, Palazzo, Packard, Wildermuth & Wynner, PC. The firm will receive a catered lunch delivered to their Westlake Village office, along with our thanks and admiration.
All of our clients are special to us and the relationships we form with them are very much a partnership. The Outstanding Client of the Quarter is selected for their professionalism as well as the benefits they receive from Afinety’s unique standardization and planned refresh approach. A professional firm like Nevers, Palazzo, Packard, Wildermuth & Wynner requires a professional computer system and this becomes part of their own clients’ perception of the firm.
We caught up with Firm administrator, Christi Baker. Christi has been with the firm for 20 years. Like many of our clients, she was referred to Afinety by a Greater Los Angeles ALA member.
“I like feeling that I can ask any question to Afinety. IT is not my area of expertise so it’s nice to be able to rely on Afinety to fulfill that need,” explained Christi. Nevers, Palazzo has been an Afinety client for several years. They decided to move from a hosted environment to a fully standardized Afinety network with proactive services designed to keep their system running with minimal interruptions. If any problems are detected by Afinety’s daily monitoring service, the issue is resolved immediately.
“When law firms have IT issues they need them resolved ASAP. Afinety provides this urgent response whenever called upon to do so,” Christi described. When asked if she would like to mention any specific services, Christi responded, “Patrick and Kip are by far the best techs! They always follow-up and make sure any issues are resolved. I would definitely recommend Afinety to others.”
About Nevers, Palazzo, Packard, Wildermuth & Wynner, PC
Nevers Palazzo provides the highest quality, innovative legal services for businesses and their owners. Since 1992, the firm has maintained this objective, enhancing and preserving their clients’ successes, while also nurturing their families and personal interests. Their practice areas include Corporate and Business Law, Mergers and Acquisitions, Employment Law, Business Litigation, Real Estate and Insurance Coverage.
For more information please visit their website:
Congratulations to all of our friends at Nevers Palazzo Packard, Wildermuth & Wynner. We look forward to seeing you at the luncheon!