Saturday, December 15, 2018

Best and Worst of Times

Best and Worst of Times

Working with my clients on tech issues day in and day out, I usually take for granted all the various ways IT has wormed its way into every nook and cranny of our lives, regardless of one's age or occupation or lifestyle.

The way we were

However, this ever-present IT condition is quite noticeable in contrast to the way things were at the end of the 20th century. When you watch movies from the 80s and 90s you can't help but notice how "antiquated" the IT stuff seems. We are also reminded that cell phones were used primarily by business executives, government VIPs, or spies!

Nowadays anywhere you go you see smartphones in use by kids from one to 92. Handling a smartphone typically means using Internet apps or texting, and not so much talking. I expect these devices won't be called phones much longer.

Tail wags the dog

So, it's a sign of the times that smartphones are ubiquitous. It's also a sign that nearly every home I visit has Internet and Wi-Fi, however rural. And it's the case that we can't stand to not know some little obscure factoid anymore - we have to Google it right away! The tail is indeed wagging the dog, meaning tech is running our lives.

Hooked on the vids 

Sure, tech keeps me in business and has many valuable uses. That's obvious. And as much as we complain about the times our tech doesn't work, we truly revel in it when it does. Some of my clients in their 70s and 80s are hooked on watching Netflix and other streaming video services nightly. When their streaming device goes down, they are not happy campers. They miss their video fix!

Speaking of which, one of my clients recently suffered an outage on his steaming device and remarked that he and his wife had an actual conversation the night it was down. That's funny, and head shaking, and startling. What kind of creatures are we turning into?

No one is safe 

The other sign-of-the times issue is the escalating cybersecurity concerns. Company's large and small are being hacked, which for us means our data is exploited. This translates to our financial accounts, emails, passwords, personal and private information, lifestyle habits, etc. being used for nefarious purposes. And when we get hacked on our home systems the perpetrators can even erase our precious files, such as family photos. 

Human-ish?

It's the best of times and the worst of times, truly. And now AI (artificial intelligence) is looming as a promising problem-solving partner and a creepy concept. How will we know we're thinking for ourselves anymore while we're streaming so much information to our brains from various computer resources?

Love thy planet! 

As it's the new year, I'll propose a toast to all the counter-culture movements out there that may just keep humans alert to being fully duped by our tech overlords. Let's be mindful that information technology is only a tool. We still need the human mind and heart to be appreciative of our special planet in order to guide all things tech, including AI, to work on more noble pursuits than addicting our vulnerable brains to technologically abstracted reality. Though that is fun...

Thanks for reading!
-Sam

Thursday, November 15, 2018

Downsizing Your Online Identity

Downsizing Your Online Identity
We all have the physical identity we present with our bodies and attire when we interact with others. There's another kind of identity we in 21st century possess as well: the one we create online. It's a composite of our social networking accounts, our email accounts, our memberships with various online services, etc. The more accounts we have, the more data and detailed "personality" we create for ourselves, and hence a unique online identity.

Carnival junkies
We have only ourselves to blame as we fall victim to the dizzy carnival-like playground we call the Internet. We get dazzled by the bright lights, the colors, the clamor, the intense energy, and so what do we naturally do? We buzz like moths near the flame. It's instructive to get our wings singed a few times to help wake us up - in this case to the risk of being hyper-exposed online, to growing an overinflated online persona. The more exposed you are, the easier it is for hackers to target you.

Zap the unwanted accounts
The good news is the online identity that we have wittingly or semi-consciously created for ourselves can also be dismantled by us, the owner of the identity. We have the power to close our accounts at any time. Goodbye Facebook! Sayonara AOL! Adios newsletter subscriptions! There are consequences and trade-offs, but we can do it.

Withdrawal pains
The real challenge in downsizing one's online identity is the same any type of addict goes through when breaking free of that which usurps willpower: withdrawal pains. Physical pains are bad enough for drug addicts. But it's the emotional ones that linger, that haunt and torment, because the ego has to redefine its identity, which to any ego is an existential threat.

Google yourself
If you're up to the challenge of downsizing your online ego then besides scrapping any obvious and unwanted aspects of your persona try Googling yourself to learn what else the Internet knows about you. Then start unplugging from places you don't want to be.

It may take time to reduce your imprint, but for the average Joe and Jane, not too long. After all, a carnival doesn't want bystanders, it wants big spenders. Save your ticket money for the attractions you like best, not what others want you to see and do.

Get off the hackers' radar
As mentioned earlier if you head towards the down low you'll also reduce your visibility to hackers, which will lessen your anxiety and make life more fun, whether online or off. In the long run, that's a better high than any carnival can provide.

Here's a related article with step-by-step guidance on removing yourself from high profile sites:

https://www.cnet.com/how-to/remove-delete-yourself-from-the-internet

Thanks for reading!

-Sam

Monday, October 15, 2018

Use 2 Factor Authentication to Decrease Your Risk of Getting Hacked

Use 2 Factor Authentication to Decrease Risk of Getting Hacked


If you're even vaguely aware of the news these days about online account hacks - like the recent Facebook breach - then you know the importance of changing your password immediately if you're at risk.
 

Post breach, change password!
Changing your password asap after such a breach prevents a hacker from accessing your account, as long as you change it before the hacker logs in! Otherwise, you have to go through an often-stressful password reset process, during which you have to prove your identity by some other means such as email, phone, or security question answers.
 

Password reset game is no fun
I have helped many clients through this reset process and it's not fun. It's not hard, it just takes time and costs money: my billable time. Believe me, it's not a preferred IT task for either me or my clients. We get painfully reminded about the importance of locking down account access using multiple layers of identification.        
 

Use unique passwords 
While strong and unique passwords raise the bar for anyone trying to hack your account directly, they don't prevent the types of hacks Facebook disclosed. Yet if your Facebook password or any other online password is unique, and you change it right away after a reported breach, then your vulnerability is reduced.

Don't give the keys to the kingdom!
If, however, you use the same password on multiple sites and a hacker obtains info on you, such as your name, email location, and a precious password, you can bet they will try that same identify combination to crack your other accounts. That's why it's critical to have unique and complex passwords, not just variations of a theme like "mydogbruno" and "mydogbruno1".
 

2 Factor authentication boosts security
So, the first line of defense is strong and unique passwords for EVERY online account. The second line is two-factor authentication (2FA), which requires access to something besides the knowledge of a password, like a cell phone. (The password is considered something you know, a first factor. The phone is something you have, a second factor.) The phone lets you receive a call or a text with a code to unlock your account, so it authenticates you beyond your password.
 

2-Step Verification in Gmail
Not all accounts provide two-factor authentication, but for the ones that do, I highly recommend it. Gmail is one. Google calls it 2-Step Verification. Here is a simple scenario after you set this up in Gmail: You get a new device, you try to log in to your Gmail account on it, and Gmail won't let you until you receive a code texted to your phone. You type into your browser or Gmail app that one-time-only code, then you're given access to Gmail on that new device. You won't be asked again, unless something changes on that device to make Google not recognize it.  
 

After setting up 2-step in Gmail, if someone elsewhere tried to log in to your Gmail you'd receive a code on your phone. As long as that phone is with you, that person would have more difficulty accessing your email.
 

Set up 2 Factor where available
Besides Google, here is a short list of sites offering two-factor authentication: Facebook, Microsoft, Yahoo, AOL, and Twitter. If you have an account with any of these sites, take the time to set up 2FA.

Thanks for reading!
-Sam

Wednesday, August 15, 2018

Safer Cell Phone Use for Kids

Safer Cell Phone Use for Kids

It's back to school time again. Ah the memories… some good, some bad. The worst for me was dealing with the jerks who wanted to ruin your day.

Well, nowadays those jerks aren't just at school. Yes, they can be near - or far, far away... anywhere there's internet service.

Cell phones with internet access put kids in touch not only with the bully down the hall, but also a sociopath in Eastern Europe, or a creepy adult in town.

Have "the Talk" 

Yes, cell phones are a great way for parents to keep in touch with their children before, during, and after school. But it's important to have a conversation with kids about potential risks.

Tips from the FBI
Here are six tips offered by the FBI to help keep your child safe on his or her cell phone. And for readers without kids, some of these tips apply equally to you. We're all more vulnerable online if we're not proactive about security and privacy.

  1. Parents should know every password to every device, and every password to every app on that device. Parents pay the bill, and as long as that child is a minor, he or she is your responsibility. You should be able to login to all devices, sites, and services to check for safety issues.
  2. Check all accounts for disturbing content. You and your kids should have a non-negotiable understanding that your access is a requirement for continued cell phone use.
  3. Learn about how photos are geotagged. Do you want just anybody to know what school your child goes to or what field his team uses for soccer practice? You should be able to turn this feature off in settings. Here's a related link for changing geotagging settings for iPhone and iPads:
    https://www.techbout.com/turn-off-geotagging-for-photos-iphone-ipad-8738/
  4. Teach your kids to never respond to calls, texts, or emails from unknown numbers or people. Scam artists and predators will victimize anyone, regardless of age.
  5. Talk to your kids about what constitutes appropriate language and photos. One sexually explicit photo can change a life forever. It is crucial that your kids understand that just because something starts out as a private communication between two people does not mean that it can't be shared with thousands of people in seconds.
  6. Teach your children to program the privacy settings on social media feeds to the highest level and to reject any "friend requests" from those they don't know and trust in a face-to-face relationship. Parents should also consider forbidding any new "friend requests" by their kids, without parent approval. Here's a link with info on Facebook privacy settings:
    https://www.facebook.com/help/325807937506242/

Thanks for reading!

-Sam

Sunday, July 15, 2018

Make Patching a Priority

Make Patching a Priority

There are three things I recommend you do to keep your devices and software better protected from online attacks. 

1. Update
2. Update
3. Update
 

Yes, no joke. 

Don't Get Exploited
A top priority of hackers is to exploit known vulnerabilities in software and hardware devices. Software vendors like Microsoft, Apple, Adobe, etc. and hardware manufacturers like Cisco, Netgear, Linksys, etc. release updates a.k.a. patches to fix security holes and bugs. Microsoft, for example, releases patches on a regular schedule for Windows - the second Tuesday of each month. That day is called "Patch Tuesday" in the industry.
 

Updates for Mobile Devices
On our mobile devices, updates should be notifying you, or automatically updating if you have the auto-update feature enabled. 

Be Proactive on Your Computers
On your computers you will get notifications for updates to programs such as Adobe Reader, web browsers, security software, iTunes, etc. However, not all programs notify you. So it's up to you to be proactive. Check in a program's menus for the command to check for updates. This is often under the Help menu.  

Patching the Internet of Things (IoT)
As I alluded, it's not just software that needs patching; hardware devices like routers do as well, as do printers, watches, X-boxes, smart-TVs, Internet-connected cameras, etc. Any device connected to the Internet, or which can connect to it in order to download data or programming, such as medical devices (which aren't always online), is part of the "Internet of Things", or IoT. Almost every IoT device can and should be patched when the fixes are released. 
 

When in Doubt, Get Help
So, as laborious as it seems, and can be, do NOT ignore the update notices of software you trust, and notices for your IoT devices. If you are ever in doubt, ask a trusted IT guy/gal or local store, or check the vendor's website directly, such as hp.com, adobe.com, etc. Don't just Google "update my such and such". That's risky, because there are bogus sites out there that will infect your system or scam you.
 

Updates Change Features
Here's one caveat to installing updates, especially on Apple devices: Updates can change the appearance, features, and security requirements of the system. Apple, like all vendors, will implement changes per their discretion, which is not always pleasing to the end user. 

Older, Incompatible Systems
Also, some older hardware and operating systems won't accept the latest software updates; they are no longer compatible with the latest release. Ultimately, this can translate into a vulnerability for a system with known issues, like old versions of Windows, which can't be patched. It's best to keep such computers offline, or replace them. Otherwise, each is a honey pot for a hacker.   

Thanks for reading!
-Sam

---

If you haven't already, you can subscribe to our email tips by visiting www.kokuadigital.com and entering your name, email, and "add to email list" in the request form, then click Send.

Friday, June 15, 2018

Data Backup, Get it Done!

Data Backup, Get it Done!
The concept of data backup doesn't come naturally to many computer users. I remember in a previous life when I was working on computers in a marketing communications job... data backup was the last thing in my mind then. The first was deadlines and getting work done, mostly desktop publishing.

Don't Rely only on the IT Department 

Back in my desktop publishing days data backup was for the IT guy to handle, not me. Turns out, we lost some important data because the IT guy wasn't backing up the stuff we thought he was. That was a light bulb moment for me: I see, I need to make sure anything important to me is being backed up, even it means me doing it.

I find a lot of my clients have the same mindset, neglecting to c.y.a. by backing up. They're nonchalant because they haven't been burned by losing an important file. I have convinced some of my clients to implement online backup and others to at least back up to USB drives. I guess it's just so ingrained in my brain now, but I'm still surprised when I work with a new client, especially a business client, who is not backing up data as a habit.

Hazards abound, backup now
Given all the online threats, including ransomware attacks (which lock your computer and require payment to free it), and hardware failures, human error, and environmental factors like storms (and where I live, in Hawaii, volcanoes!), it's really, really, really important that you have a data backup plan.

Backup to to a USB drive - easy peasy 

Your plan can be a simple as inserting a USB thumb drive and copying the contents of your Documents folder to the drive (if Documents holds your most important files). Then weekly, you can copy any new docs to the same folder on the drive. You'll store the backup drive in a drawer. Voila! You are doing data backup!

Online backup

For businesses, I recommend an online backup solution with either Mozy or Carbonite. (Carbonite recently acquired Mozy, so I'm steering now towards the parent company, Carbonite.) The benefit of online backup is this: If any files are damaged or compromised on your computer, whether from offline or online causes, you can login to the backup server and restore the files to ANY computer.

First the program, then the data 

Keep in mind, if you have a serious computer failure you'll need to get a computer running again to use programs with specific data sets, like QuickBooks, Quicken, etc. You can't restore your backed-up data from those programs and access it unless you are running the actual program, e.g. QuickBooks. This is not true with photos, PDFs, Word documents, etc.

Get help

If you're still glassy-eyed about this topic after reading this article, get some help from a friend or IT consultant. Avoid the pain of learning the importance of data backup after critical files are lost or damaged. Invest in some peace of mind; implement a plan soon.

Thanks for reading!

-Sam

---

If you haven't already, you can subscribe to our email tips by visiting www.kokuadigital.com and entering your name, email, and "add to email list" in the request form, then click Send.

Sunday, April 15, 2018

A Case for Multiple Email Accounts

A Case for Multiple Email Accounts

As the web of our digital life expands, so does our risk of getting hacked. For various reasons and by various means, our email addresses are scattered around the Internet. Because of this exposure any one of us can become a target, even the kindly grandmother who rarely does much online. All it takes to get invaded is to click one poisoned weblink in an email. 

Sometimes the poisoned weblink infects only the browser (browser hijacking); sometimes it infects the whole computer (a ransomware attack). Sometimes though, the hack is a more focused attempt to breach an email account.


Tempting Targets
Email accounts are rich targets. If someone can gain unauthorized access to an email account s/he can view our contacts and our email database - the content of all the emails we keep, even the "deleted" stuff!


Don't Mix Business with Pleasure

For years I have been recommending that my commercial clients do not use business email accounts for personal use. It's best to use the company email for commercial contacts only. In my experience, hacks are more likely to occur through personal emails, as they're linked to social networking and a whole variety of people who may not be as security-conscious as corporate email systems tend to be.
 

Three's Company
For personal email accounts, I'd recommend three email accounts: one for family and close friends; another for finance and banking; and a third for everything else, such as subscriptions, online shopping, social networks, etc. 

For the first email, you can choose something personal, like part of your name for the address; for the second, be a little vaguer; for the third, be very vague - don't use any part of your name or personal info. 


Damage Control
Now just because you have three email accounts this doesn't mean you're bulletproof online. But if someone hacks the third account, they won't gain access to the content of the first or second. The last thing you want is someone gaining access to ALL your email contacts when they hack your account. That's a nightmare for everyone.   

A Vote for Gmail

As much as I like to support the "little guy and gal" in business, I think Gmail is the best bet for personal email. It has good spam filtering, good 2-step authentication, and other security features. Of course, when using Gmail, you must put up with ads and whatever online tracking Google is currently implementing. But it is free, so we can't expect to get something for nothing. 

Best Practices to Keep Safe

Whichever email service you use, and whatever strategy you use to keep some segregation between email accounts, it's best to use unique passwords for each email account, set strict spam controls, and be very careful when clicking any links in email messages. When in doubt, delete. And never transmit personally identifying information (PII) like social security numbers, etc. by email. 

Email is a wonderful tool for personal and business communications. Just keep your guard up while using it, because it's a portal to so much about you, and you have rights as to what is disclosed.   


Thanks for reading!

-Sam

---

If you haven't already, you can subscribe to our email tips by visiting www.kokuadigital.com and entering your name, email, and "add to email list" in the request form, then click Send.

Thursday, March 15, 2018

Eternal Sunshine of the Spotless IT Equipment

Eternal Sunshine of the Spotless IT Equipment

If it’s gettin' old, it’s gonna fail, or at least some part of it will.

Just like bodies and cars and power tools, our digital devices have their healthy life spans. Problem is, we don’t like to believe this. When one of our devices is chugging along, maybe not as well as in the past, but still tolerable, we hope the state will last.

Wishful Thinking
Even though I’m an IT guy, dealing with hardware and software failures day in a day out, believe me, I don’t want my stuff to fail. (And I’m always secretly hoping I won't have to deal with the problems my clients have!) It’s a classic mental state called wishful thinking.

Glitches, noises, sputtering, etc… we like to shake ‘em away, re-adjust, power cycle, or say some kind words (or not so kind ones!). Hope springs eternal!

Anthropomorphism
Just like every other object we encounter, animate or inanimate, we like to project our feelings and our relationship expectations onto our devices. So in our heads, the essence of the message is: "Hey machine, my friend, I treat you a certain way, please treat me the same."

But when things don't go well, you know the drill, something like this comes out: “Come on printer, I just installed new ink! I’ve cleaned you out with compressed air. I’ve power cycled you and put in clean paper. Can’t you just print these two pages I need right now? Just one more print job is all I need…”

Rant at the Machine
Then if our expectations aren’t met, the rant begins… “You p.o.s.! I’m never buying this brand again! I’m never buying from “Store A” again! I’ve only had it for 3 years, shouldn’t it last for like 4 or 5 (or 10)! My husband must have bought that damn refilled ink from that site online.” Yada, yada.

I’m not getting on my high horse here. Trust me, I’ve been there. Problem is, stuff happens. Problem is, we are short tempered when it comes to our electronics these days because we are so spoiled.

What We Lack is Appreciation...
The made-in-China electronics mill churns out stuff that’s gonna break before our expected device lifecycle. Guaranteed. Actually, it’s pretty amazing how well things do work, like our powerhouse phones, most of the time, for all we put them through. My daughter dropped her phone in the toilet recently, then quickly put it in a bag of rice to dry out, and voila, it still works!

...And Resilience 

The thing is, we really need to work on being more resilient. It would help our mental state if we could do these things: 1)be more grateful for devices that do work pretty reliably most of the time; 2)be more flexible about asking for help, such as leaning on a friend at times when a device is not working – maybe asking to use their printer, for example; 3)be able to step away from a failed device, and get some space, some perspective, to consider our options, to see the pointlessness of ranting at a piece of equipment.

Karmic Payback 

And who knows, maybe inanimate objects have feelings too. If they do, maybe a device fails because of the way we treat it (like rarely doing maintenance or ignoring the warning signs of glitches). On second thought, that’s not about feelings, just basic karma in the physical world.

Here’s to wishing all of us more patience and compassion and wisdom when our precious yet under-appreciated digital devices fail.

Thanks for reading!

-Sam

---

If you haven't already, you can subscribe to our email tips by visiting www.kokuadigital.com and entering your name, email, and "add to email list" in the request form, then click Send.

Thursday, February 15, 2018

Update Your Router To Boost Security

Update Your Router To Boost Security

You know those movies depicting the days of yore when the royals lived in a castle? Such a flick wouldn't seem authentic without a scene of people passing through the castle gates, complete with a drawbridge and a moat. Given such castles were built of solid, high walls, it's implied there was no way in or out except through the gate. 


Your modem is the castle gate
In the kingdom of the Internet, as far as homes and small businesses are concerned, there's only one way in and out, only one castle gate: the modem. On Hawaii Island, the modems are provided by Hawaiian Telcom, Spectrum, satellite internet providers, or cell providers like AT&T and Verizon. 

So the modem is THE conduit to the Internet. No modem, no Internet. (Here I'm limiting the scope to not include connecting on a cell phone to the Internet via a cellular data plan.)


Modem/router

Some of these modems are actually a modem/router combo. The router component is what allows multiple users to connect through one modem via a wired or wireless connection. Some folks have a modem from the telco provider and a router they bought off the shelf, like a Linksys or Netgear brand.

Castle gate, but no protection
Now here my catle gate analogy breaks down a little, becuase a modem by itself affords virtually no protection against Internet crooks. It's actually the router that provides gate keeping. The basic protection a router affords is a firewall, but there are other security features like WiFi encryption, etc. 

I highly recommend not connecting a computer to the Internet directly via a modem, even if you have only one computer. Install a router between your computer and the modem.  
Hacking Targets
Given that we depend on our routers for security, it's very important to know they are regularly the target of hacking. Cybercrooks are constantly on the lookout for router vulnerabilities. The cheaper and older a router is, the less likely the manufacturer is to "patch" it, which means to keep the software up-to-date against known threats. 

How to secure your router

What can you do to keep your router as secure as possible? There are several things, but one of the most important and oft-neglected is to update the firmware (the router software). The most common way to do this is login to your router via the router's IP address in a web browser, then locate the update option. Note: Only do this when you can afford for the router to be shut down, because the firmware update will reboot the device. You can check for specific firmware instructions on the vendor's site for your router, such as linksys.com or netgear.com, etc.

Additionally, if your router is older than two years, I suggest replacing it. A router's performance decreases over time; and as mentioned, security can be compromised if vendors don't keep patching the defects.
 

Get some help
Be sure to get some help configuring a new router, because out of the box it's not optimally secure. If the router is provided by your telco, they will upgrade you to the latest model for free. 
 


Here's another article with more info and tips on this subject:

https://www.lifewire.com/how-to-upgrade-your-wireless-routers-firmware-2487671

Thanks for reading!
-Sam

---

If you haven't already, you can subscribe to our email tips by visiting www.kokuadigital.com and entering your name, email, and "add to email list" in the request form, then click Send.

Monday, January 15, 2018

Hey Mac Users: Get Your Guard Up!

Hey Mac Users: Get Your Guard Up!

There was a recent news article about a 28-year-old man who allegedly hacked into thousands of computers. Federal prosecutors say he created malware that enabled him to remotely access and turn on the cameras and microphones of the computers.  

His malware program is named Fruitfly. It was found in both PCs and Macs. The article reported that many cybersecurity researchers were surprised it was on so many Macs. Why surprised? Because there are far more Windows PCs in the world, so most hackers don't target Macs. 

However, as I and my other tech colleagues on island well know, there is plenty of malware out there aimed at Macs. We've seen it and removed it.

The cited article reports a 270 percent increase last year in new strains of malware for Macs. 

So what can Mac users do to better protect their systems? Here are some suggestions, most of which pertain to Windows PCs too. 
  • The primary shield is you. Be careful which sites you visit, which links you click, who you let on your computer, which programs you install, etc. 
  • Back up all important data frequently, preferably online. For local backup to external hard drive you can use Time Machine. For online backup I recommend Mozy.com (it's free for up to 2 GB backup).
  • Make sure to install all Apple updates when they're issued.
  • Create an admin account, password protect it, and demote your usual account to standard user level, and password protect it.
  • Install anti-malware software. A good free program is Bitdefender, or Malwarebytes. For a paid program, I recommend ESET Cyber Security. If you suspect you're already infected, you can run a scan with the free Malwarebytes program, then download, install, and scan with Bitdefender or ESET as well. [disclosure: I'm reseller of ESET]
  • Make sure you are behind a hardware firewall on your network and update it. (This usually means your router.)
  • Enable the Mac OS X firewall.
  • If you have children using a Mac, enable Parental Controls. 
  • If you're a mobile professional (using a MacBook) I suggest enabling FileVault, which encrypts your files. And enable Find My Mac.
  • Keep up with Mac-specific security news.
Thanks for reading.
Sam

Article referenced above
https://www.npr.org/sections/alltechconsidered/2018/01/12/577761143/ohio-man-charged-with-putting-spyware-on-thousands-of-computers?sc=tw

Here's another article about Mac vulnerabilties to malware infections:
https://www.malwarebytes.com/mac-antivirus/?utm_source=double-opt-in&utm_medium=email-internal-b2c&utm_campaign=EM-B2C-2018-May-newsletter&utm_content=macbookT


---
If you haven't already, you can subscribe to our email tips by visiting www.kokuadigital.com and entering your name, email, and "add to email list" in the request form, then click Send.