About Shannon Curkendoll

This author has not yet filled in any details.
So far Shannon Curkendoll has created 4 blog entries.

Conquer Your Paper Piles

Shannon Curkendoll - conquer your paper pilesWe’re living in an electronic age. Yet, many of us still have piles of paper throughout our homes. Money and finances are the biggest culprits when it comes to paperwork – bills, bank statements, insurance records, loan documents, investment accounts, and the list goes on. Here are some guidelines to help conquer your paper piles.

Sort and Organize

Tackle one pile at a time, and sort papers into  categories, like Pay, Read, File, Shred, and Recycle. You may find important receipts, unpaid bills, and other important items you didn’t realize were there. You’ll also probably find a lot of things you don’t need to keep. This flow chart can help you sort and organize.

Convert to Electronic

Once you’ve sorted your piles, you’ll probably find items and accounts that can go electronic. At Perspective, we converted client files to a secure online portal years ago (which clients can access at here). Important items like estate planning documents, insurance paperwork, and loan documents can be scanned and uploaded to your Perspective document vault.

Things like your credit card, phone, and utility bills can be managed online with text/email notifications or auto-pay.

After you’ve sorted your documents and determined which ones you need to keep in printed form, designate an easily-accessible place in your home where they can be filed and stored.

Cyber Security Checkup

Curkendoll-WEBCyber attacks on government agencies and major companies around the world are on the rise. In the past several months, ransomware attacks have breached networks for Microsoft, the Irish Department of Health, U.S. Colonial Pipeline, and JBS meat processing in North America and Australia, to name just a few. After hearing such news, the idea of protecting your personal data can seem overwhelming or futile. Yet, conducting a cyber security checkup — quick a review and update of your accounts and electronic devices — can help more than you might think.

Following are some steps you can take to simplify and maintain cyber security efforts. Each only takes a few minutes to complete. It’s a worthy investment of your time. Block 15 to 20 minutes in your calendar this week to conduct a cyber security checkup.

Use antivirus software, and keep apps and software current.

Make sure you have trustworthy antivirus software installed and updated to protect your computers and mobile devices from viruses and malware. Keep software up to date with the latest patches and upgrades. Sign up for automatic updates.

Close or delete unused accounts.

The smaller your online presence, the more secure your information. Take a few minutes to close unused accounts and minimize your vulnerability. Sign up for account activity notifications to help you keep track.

Use multi-factor authentication.

Also called two-factor authentication, this requires a second credential to verify your identity. (e.g. It may require entering a code sent in real-time by text, email or phone call.)

Use screen locks on every device.

Set a password or PIN for every laptop, smartphone and tablet you own. Any lost device without a screen lock is a gateway for someone to access your email, banking and social accounts; thieves can change passwords and take control of your digital life.

Check your data-breach status.

A data-breach, or being pwned (pronounced pōned), means your personal data has been stolen and possibly sold. At, you can check your email addresses against lists from 120 known company breaches (i.e. Adobe, LinkedIn, Facebook, Daily Quiz). Be sure to change the password for any compromised accounts, as well as any other sites where you used the same password.

Beware of Phishing

Phishing is a malicious text or email that seems to be from a trusted source. The object is to trick you into clicking on a dangerous link or providing confidential information. Common warning signs include:

  • A message you didn’t expect or that comes from a person or service you don’t know.
  • Spelling errors or poor grammar.
  • Strange or mismatched sender addresses.
  • Mismatched links (a seemingly legitimate link sends you to an unexpected address).
  • Odd links or addresses.
  • Requests for passwords, account numbers, personal information or answers to  security questions.
  • Offers that seem too good to be true, or messages that express great urgency.
By |2021-06-11T16:34:54-07:00June 15th, 2021|Current Affairs, Cyber Security|

Understand and Reduce Wi-Fi Risk

Shannon Curkendoll researches cyber security to help clients understand and reduce Wi-Fi risk.

Shannon Curkendoll researches cyber security to help clients understand and reduce Wi-Fi risk.

Cyber criminals continue to come up with new ways to gain access to your electronic devices and, in turn, your most personal data. According to, numerous new hacking techniques have emerged in just the past few months that exploit small flaws in routers, browsers and Wi-Fi security. SureCloud recently published a report on how password auto-saving features of internet browsers and unsecured home routers can put you at risk. It’s important to stay up-to-date on cyber secuity issues to better understand and reduce Wi-Fi risk.

“By renaming a malicious Wi-Fi access point to impersonate yours, a hacker then waits until your gadget connects to the fake router under his/her control, hoping that you won’t notice the difference. Once connected, the hacker can then have full control,” Komando reports.

Home Wi-Fi routers aren’t the only systems that are vulnerable. Few public Wi-Fi services have secure routers, even in locations where you might expect high security.

Cloud security company Coronet released a report in July that studied Wi-Fi security in America’s 45 busiest airports. According to the report, to maximize traveler convenience, most airports provide free or low-cost Wi-Fi. Regrettably, Wi-Fi security is often sacrificed in exchange for simplicity, leaving networks unencrypted, unsecured or improperly configured.

“Until such time when airports take responsibility and improve their cyber-security posture, the accountability is on each individual flyer to be aware of the risks and take the appropriate steps to minimize the danger,” stresses Dror Liwer, Coronet’s chief information systems officer. This advice applies to users of any public or unsecured Wi-Fi.

“Most of the time, individuals find themselves hastily connecting to public Wi-Fi networks to save themselves from overage charges on their phone bills,” wrote Justin Dolly, Malwarebytes chief security officer, in an opinion piece at “Investing in an unlimited data plan will not only eliminate your need for accessing insecure Wi-Fi networks, it will also often allow you to use your mobile device to create a personal internet hotspot.”

A personal hotspot creates an encrypted wireless network, which prevents people on devices near you from accessing your network without a password.

If you’ve used public Wi-Fi, SureCloud recommends that you clear your browser’s saved passwords and don’t save credentials for unsecured HTTP pages. Also delete saved open-networks and don’t allow automatic reconnection.[/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]

By |2019-10-15T18:56:03-07:00October 8th, 2018|Current Affairs|

Privacy Requires Extra Effort

In this digital age, privacy requires extra effort for each of us.

Hackers use a number of ways to get into electronic devices (laptops, smart phones, tablets). The most common type of cyber crime is the phishing scam, which can arrive in the form of an email or text and contains a link. These messages are often realistic-looking, use fraudulent websites and appear to be sent from a friend or trusted sender (such as a bank or social network), so you’ll feel safe to click on the link. Yet, clicking on these links loads software onto your device, which gives hackers access to install any number of other programs that allow them to spy on you and steal your data.

Installing security software on all your electronic devices is a critical first step in beating cyber crime. In addition, it’s important to understand how phishing scams work and what they look like when they land in your inbox.

Some of the sites spoofed most regularly include PayPal, eBay, Yahoo! and MSN, as well as financial institutions. Any legitimate site can be spoofed; and hackers also create fake websites, emails and text for cartoon gaming, celebrities and other popular children’s sites as a way to get private information. So be sure to educate the children in your life about the risks, as well.

Norton, a leader in antivirus and security software, offers the following information and recommendations:

  • Be wary of emails or texts asking for confidential information – especially information of a financial nature. Legitimate organizations will never request sensitive information via email, and most banks will tell you that they won’t ask for your information unless you’re the one contacting them.
  • Don’t get pressured into providing sensitive information. Phishers like to use scare tactics, and may threaten to disable an account or delay services until you update certain information.
  • Never submit confidential information via forms embedded within email messages. Senders are often able to track all information entered.

The best advice is to always call the vendor or financial institution directly, using a phone number that you have verified, before disclosing any information. You are your best defense against cyber crime.

By |2019-08-14T13:59:52-07:00July 17th, 2017|Current Affairs|