Player FM - Internet Radio Done Right
Checked 1+ y ago
Added nine years ago
Content provided by Jim Blue. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim Blue or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!
Go offline with the Player FM app!
How Secure are Your Mobile Devices?
Manage episode 152080031 series 1048271
Content provided by Jim Blue. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim Blue or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
We are living in a mobile world. Chances are that you are using your smartphone and tablet more than your computer for e-mail and information. Are your mobile devices secure? Do you know how to find them if they are lost?
Today's guest is Neil Forster, President of Forster Technology Solutions which specializes in providing computer, information-technology, tele-communication and audio-visual solutions. For more than 20 years, Neil has assisted business, residential and nonprofit clients in the New York metro area implement cost-saving and productivity enhancement technology solutions.Prior to starting his technology consulting business, Neil had a successful career serving as senior executives in the non-profit and business sectors.
Join Jim and Neil in a discussion about what you need to know about securing your mobile devices and how to locate them if they are misplaced.
…
continue reading
Today's guest is Neil Forster, President of Forster Technology Solutions which specializes in providing computer, information-technology, tele-communication and audio-visual solutions. For more than 20 years, Neil has assisted business, residential and nonprofit clients in the New York metro area implement cost-saving and productivity enhancement technology solutions.Prior to starting his technology consulting business, Neil had a successful career serving as senior executives in the non-profit and business sectors.
Join Jim and Neil in a discussion about what you need to know about securing your mobile devices and how to locate them if they are misplaced.
108 episodes
Manage episode 152080031 series 1048271
Content provided by Jim Blue. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jim Blue or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
We are living in a mobile world. Chances are that you are using your smartphone and tablet more than your computer for e-mail and information. Are your mobile devices secure? Do you know how to find them if they are lost?
Today's guest is Neil Forster, President of Forster Technology Solutions which specializes in providing computer, information-technology, tele-communication and audio-visual solutions. For more than 20 years, Neil has assisted business, residential and nonprofit clients in the New York metro area implement cost-saving and productivity enhancement technology solutions.Prior to starting his technology consulting business, Neil had a successful career serving as senior executives in the non-profit and business sectors.
Join Jim and Neil in a discussion about what you need to know about securing your mobile devices and how to locate them if they are misplaced.
…
continue reading
Today's guest is Neil Forster, President of Forster Technology Solutions which specializes in providing computer, information-technology, tele-communication and audio-visual solutions. For more than 20 years, Neil has assisted business, residential and nonprofit clients in the New York metro area implement cost-saving and productivity enhancement technology solutions.Prior to starting his technology consulting business, Neil had a successful career serving as senior executives in the non-profit and business sectors.
Join Jim and Neil in a discussion about what you need to know about securing your mobile devices and how to locate them if they are misplaced.
108 episodes
All episodes
×K
Keeping Technology Simple

How to minimize the risk of being a victim of identity Theft.
K
Keeping Technology Simple

How to safely access the Internet on the road
K
Keeping Technology Simple

1 Episode 107 - Do You have a password strategy? 1:52
1:52
Play Later
Play Later
Lists
Like
Liked1:52
Do you have a password strategy?
K
Keeping Technology Simple

1 It's Tax Time. What You Need To Know About Income Tax Fraud 18:16
18:16
Play Later
Play Later
Lists
Like
Liked18:16
Join Jim Blue and Steve Weisman in an encore broadcast of a discussion on how to reduce the risk of becoming a victim of income tax fraud. According to the IRS, “Tax-refund fraud is expected to soar again this tax season, and hit a whopping $21 billion.“ Thousands of people have lost millions of dollars and their personal information to tax scams and fake IRS communication. The most common way income tax fraud occurs is when a thief files an income tax return using a victim’s Social Security number, along with a counterfeit W-2, indicating that a large refund is due. Steve Weisman is a lawyer, a college professor, author, and one of the country's leading experts in scams and identity theft. He writes the daily blog scamicide.com, where he provides daily update information about the latest scams.…
K
Keeping Technology Simple

1 It's Tax Time. What You Need To Know About Income Tax Identity Theft 18:55
18:55
Play Later
Play Later
Lists
Like
Liked18:55
Join Jim Blue and Steve Weisman in a discussion on how to reduce the risk of becoming a victim of income tax identity theft. It's tax time and we all know that income tax identity theft is a major problem. The most common way that income tax identity theft occurs is when the identity thief files an income tax return using his or her victim’s Social Security number along with a counterfeit W-2 that indicates a large refund is due. In his most recent article in USA Today, Steve wrote "According to the General Accountability Office (GAO), the IRS paid out 5.8 billion dollars in bogus refunds to identity thieves for the tax year 2013 and, according to the GAO the real figure is probably significantly higher because of the difficulty of knowing how much income tax fraud remains undetected. But it is not as bad as you think. It is worse". Steve Weisman is a lawyer, a professor at Bentley University and one of the country's leading experts in scams and identity theft. He writes the daily blog scamicide.com, where he provides daily update information about the latest scams. His new book is Identity Theft Alert.…
K
Keeping Technology Simple

1 It's Tax Time. What You Need To Know About Income Tax Identity Theft 18:56
18:56
Play Later
Play Later
Lists
Like
Liked18:56
Join Jim Blue and Steve Weisman is a discussion on how to reduce the risk of becoming a victim of income tax identity theft. It's tax time and we all know that income tax identity theft is a major problem. The most common way that income tax identity theft occurs is when the identity thief files an income tax return using his or her victim’s Social Security number along with a counterfeit W-2 that indicates a large refund is due. Steve Weisman is a lawyer, a professor at Bentley University and one of the country's leading experts in scams and identity theft. He writes the blog scamicide.com, where he provides daily update information about the latest scams. His new book is Identity Theft Alert.…
K
Keeping Technology Simple

Have you been a victim of IdentityTheft? Are you concerned about all the reports of personal information being stolen from corporate data bases? Today's guest, Steve Weisman, a lawyer and member of the Massachusetts Bar and Federal Bar, is one of the country’s leading experts on scams and identity theft. He writes about identity theft for USA Today and has been featured on Nightline, CBS News, ABC, CNBC, among others and quoted in numerous publications including The Associated Press, The Boston Globe, Barron’s, The New York Times, Money Magazine, The Washington Post, and The Wall Street Journal. Steve has authored eight books, including Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself From America’s #1 Crime (2014) and The Truth About Avoiding Scams (2008). Today, Jim and Steve will discuss what you need to know about identity theft and what you should be doing to minimize your risk of becoming a victim.…
K
Keeping Technology Simple

1 Child Off To College? Do You Have A Communications Plan? 23:53
23:53
Play Later
Play Later
Lists
Like
Liked23:53
Do you have the right equipment and services to maintain contact with your child who might be thousands of miles away? Do you know how to control your communication costs? Chances are that your college bound child is more tech savvy than you are. Today, In an encore broadcast, Jim will discuss what you need to know before you finish packing the bags and head for campus.…
K
Keeping Technology Simple

Microsoft's new operating system, Windows 10 is finally here! What's all the noise about and what you need to know. Today's guest is Carl Mazzanti, the CEO of e-Mazzanti Technologies, and, once again, Microsoft New York Metro Partner of the Year in 2015 . His company is one of the premier IT consulting services for businesses ranging from home office and retail clients to multinational corporations throughout the New York metropolitan area and numerous international locations. Join Jim and Carl in a discussion about this revolutionary new operating system and why many people are excited about the many changes that have been built into the system…
K
Keeping Technology Simple

How safe is it to shop online? Identity theft has become a major concern of consumers who are questioning the security of online shopping sites. Today's returning guest, Steve Weisman, a lawyer and member of the Massachusetts Bar and Federal Bar, is one of the country’s leading experts on scams and identity theft. He writes about identity theft for USA Today and has been featured on Nightline, CBS News, ABC, CNBC, among others and quoted in numerous publications including The Associated Press, The Boston Globe, Barron’s, The New York Times, Money Magazine, The Washington Post, and The Wall Street Journal. Steve has authored eight books, including Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself From America’s #1 Crime (2014) and The Truth About Avoiding Scams (2008). Join Jim and Steve in a discussion about how to shop safely online…
K
Keeping Technology Simple

1 What You Need to Do If You Are a Victim of Identity Theft 14:03
14:03
Play Later
Play Later
Lists
Like
Liked14:03
Today's returning guest, Steve Weisman, a lawyer and member of the Massachusetts Bar and Federal Bar, is one of the country’s leading experts on scams and identity theft. He writes about identity theft for USA Today and has been featured on Nightline, CBS News, ABC, CNBC, among others and quoted in numerous publications including The Associated Press, The Boston Globe, Barron’s, The New York Times, Money Magazine, The Washington Post, and The Wall Street Journal. Steve has authored eight books, including Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself From America’s #1 Crime (2014) and The Truth About Avoiding Scams (2008). Join Jim and Steve as they discuss what steps you should take if you become a victim of identity theft.…
K
Keeping Technology Simple

1 Why You Should Be Concerned About Identity Theft 13:59
13:59
Play Later
Play Later
Lists
Like
Liked13:59
Have you been a victim of IdentityTheft?Are you concerned about all the reports of personal information being stolen from corporate data bases? Today's guest, Steve Weisman, a lawyer and member of the Massachusetts Bar and Federal Bar, is one of the country’s leading experts on scams and identity theft. He writes about identity theft for USA Today and has been featured on Nightline, CBS News, ABC, CNBC, among others and quoted in numerous publications including The Associated Press, The Boston Globe, Barron’s, The New York Times, Money Magazine, The Washington Post, and The Wall Street Journal. Steve has authored eight books, including Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself From America’s #1 Crime (2014) and The Truth About Avoiding Scams (2008). Today, Jim and Steve will discuss what you need to know about identity theft and what you should be doing to minimize your risk of becoming a victim.…
K
Keeping Technology Simple

1 What's Up With All The Wireless Cell Providers? 11:26
11:26
Play Later
Play Later
Lists
Like
Liked11:26
Confused by all the offers from the major cell phone providers (Verizon, AT&T, Sprint, T-Mobile, etc.)? Forget the offers. It's about COVERAGE!! There’s a price war going on between the major carriers. Although price is a consideration in selecting a carrier, saving a few dollars should not be the major factor when signing a contract. Having an unlimited or discounted data or phone plan is useless if your service is poor. In today's broadcast, Jim explains what you should know before selecting or switching providers.…
K
Keeping Technology Simple

1 How To Keep in Touch With Your College Bound Child 21:05
21:05
Play Later
Play Later
Lists
Like
Liked21:05
Have you discussed a communication plan with your college bound child? Do you have the right equipment and services to maintain contact with your child who might be thousands of miles away? Do you know how to control your communication costs? Chances are that your college bound child is more tech savvy than you are. Today, In an encore broadcast, Jim will discuss what you need to know before you finish packing the bags and heading for campus.…
K
Keeping Technology Simple

What are the differences between being the President and CEO of a multi-million dollar company and being a first time entrepreneur? What are the major technology challengies facing a former corporate executive once the administrative and tech support is not there? Sandy Elsass was faced with many of these issues when he left corporate life over a year ago. Not only did he need to determine what type of equipment he needed but how to perform tasks that had been delegated to others in the past. Join Jim and Sandy in a discussion on how he handled the transition and what he would recommend to others who are thinking about a similar path.…
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.