Tax Season: The Next Scam Season

I don’t know whether more money changes hands during the holiday shopping season or during tax season, but a lot is at stake between now and April 17 as people prepare tax returns. It’s a busy time of year for scammers, most of whom want to use fraudulent information to get your tax return money.

Probably one of the most common scams is someone calling from the IRS to say you owe back taxes. This happens every year and all year long, too. But there’s just one thing we want to remind you about, even if you know it: The IRS does not contact you by phone. Nor does the IRS contact you by email, a form of communications a scammer will use in a phishing expedition. The IRS sends you a letter.

The other scams you are likely to encounter are calls or emails from people or companies offering to prepare your tax returns and even provide you with an advance on your refund. The email scams are more insidious because if you click on a link, it could automatically trigger a breach of your computer that reveals sensitive information. If you follow through on a phone call or link, the scammer is going to request your Social Security number and other info that goes on a tax return. If the scammer is offering to advance you money from an expected refund, they’ll want your banking info, too. Once a scammer has this and other personal information, it’s easy to get credit cards and loans and commit crimes in your name.

From a computing point of view, we again remind you not to open emails from people you don’t know who offer help during the tax season. Delete them immediately. Do the same with an email from someone you know that seems out of context because it’s so easy to spoof an email address. For example, would you really expect Norman Rosenthal or Sterling Rose to prepare your taxes?

You can protect business and home networks and computers by making sure you have new, strong passwords for all networks and accounts. Strong passwords are long and contain a combination of upper- and lower-case letters, numerals and special characters. With the breach at Equifax, the risk of fraud is higher, and one of the problems it can lead to is that someone will file your tax return before you do.

With protection in place, you can use the internet for all of your tax-related activity, starting with IRS’s official website https://www.irs.gov/. In addition to being able to get tax forms and answers to questions, you’ll find links to help you find and verify information about tax preparers, including 10 tips for choosing one.

If you are preparing your own taxes, we recommend you use one of the established software providers to reduce your risk of a security breach, especially when you file online.

While we don’t prepare taxes, we can help you keep your networks and computers secure. Call us – 973-433-6676 – if you think your system may have been compromised. Call us or email us if you have any questions about system security or security settings for any software you use for tax preparation and filing.

Unsecure Security Cameras

As more businesses and homes add security cameras to monitor their premises, hackers are enjoying the view, too. While camera manufacturers can and should secure the backdoors to their systems, there are also steps you can take to protect your property.

We’re seeing an uptick in security camera systems being hacked, and one recent incident involved one of our retail clients and a newly installed system. Surveillance makes a lot of sense for retailers, especially if a camera image can help identify thieves. However, surveillance can also tip off potential thieves about the location of targeted goods to steal and camera blind spots, and sometimes your security system manufacturer leaves a back door open for Peeping Toms.

We discovered this possibility while working with a retail client. Both of us were surprised when a new system was hacked, and we had to pull a lot of information from our client when we responded to a call that the cameras weren’t working. We checked the system and found that not only had they lost their network, they also had some weird, out-of-character names for firmware and software upgrades.

We restored the network and the camera system, but it went out again the next day. We asked about changing camera-system names, and decided to call the manufacturer. In our conversations, we learned that the manufacturer had left a back door open, so they could work on various systems. From them, we learned how to close the back door so that our client’s system would be secure.

As disturbing as our experience was, it just reinforced our message to everyone with an IoT system, such as security cameras, to take these important steps:

  1. Change the default usernames and passwords that manufacturers supply with the equipment.
  2. Make sure you install all software and firmware updates for your IoT systems and your firewall.
  3. After you install any new or updated software or firmware, go back and check that there are no changes to any unique information you may be added.
  4. Recheck that information periodically to make sure nothing had changed.

If you see something that doesn’t look right, report it to us right away. Hacking is only going to become more problematic in 2018, and it only takes one intrusion point to open your entire system to cyberthieves. It can be devastating for you if it’s your home system, but it can much more devastating if it affects any client or customer information you’ve collected. Reach us by phone – 973-433-6676 – or email to close your back doors, side doors and trap doors.

Protecting Your Email Accounts

My dad wasn’t getting his personal email for a few days and thought it was because his service was down. We found otherwise, and he wasn’t the only victim. The message here is: Pay attention to oddities.

One of my dad’s symptoms of an email problem was that he wasn’t getting any messages. Unfortunately, that symptom doesn’t raise too many eyebrows these days because he figured a server was down – again.

But when the problem continued, he called, and we logged in to discover that his email was being forwarded to a Gmail account. We were able to re-secure his account, and it was one of those “no harm, no foul” situations this time. Next time, he might not be lucky.

But my dad wasn’t the only victim of an email invasion. One of our clients with an international business discovered that for a couple of days, all of their email was going into the “deleted” folder. They were expecting to have money wired in, so the email problem put them on heightened alert.

When we investigated, we found that they had been hacked and that hackers had added a rule to their email system that sent messages to the “deleted” folder and also forwarded the messages to an email address they had set up.

Both instances point out the need to be vigilant – and to follow safety precautions we’ve mentioned many times before.

  1. Make sure you have a strong password.
  2. Use long passwords that include upper- and lower-case letters, numerals and special characters.
  3. Change your password periodically.
  4. Never put information such as Social Security and bank account numbers in emails. They’re so easy to get picked off by hackers.
  5. Avoid sending emails that have umpteen thousand addresses in the “To” and “Cc” lines. It’s very easy for hackers to insert their own email address into someone else’s name and start a phishing expedition that could reel in sensitive, private information.

If you notice something funky about your email, get in touch with us right away. Call us – 973-433-6676 – or email us to help secure your email.

Managing Assistants

Alexa, Google Home, Siri and Cortana are online assistants who can help you get information and even order products without you ever having to tap a screen or look at one. They are a convenience, but they also raise privacy and security issues.

Siri (Apple) and Cortana (Microsoft) are associated with devices, such as phones, tablets and computers. In that type of user environment, you need to activate them with the device in your hand or on your desk, and they’re typically used for getting information, such as the weather, restaurant info or the answer to which person played for both the New York Rangers and Brooklyn Dodgers.

Alexa and Google Home may present other issues. In addition to answering questions, Alexa is tied to Amazon and its online shopping capabilities. We hear that Google Home may tie in with Walmart. With shopping available, you have another layer of concern. Somewhere, they have access to your credit-card information, and it may be possible for any voice to make a purchase.

We’ll be going to CES, the huge annual trade show for consumer electronics, in Las Vegas this month, and we plan to talk to all the manufacturers about their security and privacy protection measures. Until we have more information, here are some things you should know and can do to minimize your risk of a privacy breach or unwanted purchase – especially with Alexa, whom I call Alex when I don’t want to wake her.

Alexa and her fellow assistants remain asleep until they hear their “wake” word, but their microphones are always on. Being on is how they stay ready for your commands, but they should not be active until you wake them. So, here are some ways to help you protect from someone turning them on without your knowledge:

  • Change your “wake” word. Like most things in the IoT world, these assistants come with a default “wake” word. Go into the setup menu on the app, which you can get for your cell phone, and change it.
  • Use the mute button. Yes, it’s a pain to physically walk over to Alexa and push a button (some of you will cringe at memories of getting up to change a television channel), but it is effective – and easier than trying to run through 80-something over-the-air TV channels.
  • Use a PIN to make purchases or disable the function to make purchases by voice commands. Again, it’s an inconvenience, but we’ve discussed the tradeoff between security and convenience many times before.
  • Keep them away from windows so that any activity outside doesn’t activate them.
  • Use your app to see what’s been recorded through your assistant and delete any or all of those recordings. You can also your app to configure and toggle sound notifications, even for multiple units in one home (or office).

You can also follow the IoT cybersecurity steps we’ve published over the past year or so:

  • Change default usernames and passwords immediately. Make your new passwords strong and unique.
  • Install upgrades and updates from your IoT manufacturers. They usually contain security patches and bug fixes.
  • Make sure your Wi-Fi systems and firewalls are secure. That’s your first line of defense. Install upgrades and updates for your gateways and anti-virus and anti-malware apps.
  • Only use secure Wi-Fi networks.

We can audit your Wi-Fi security and help you fine tune the settings for your virtual assistant. Just call us – 973-433-6676 – or email us for an appointment, and follow us on Twitter and Facebook for reports from CES.

‘Free’ Streaming

Not all streaming is meant to be shared – or least not shared with dozens of strangers around the world. Cable companies and content providers are concerned about lost fees as access credentials to programming are increasingly abused. They’re cracking down on piracy.

Stealing service has been a problem since the first electrical wires and meters were installed more than 100 years ago. For cable and content providers, it became an issue when the first cable wires were strung up. The problem has grown as technology has developed more content and more ways to get it. Putting aside the issue of whether it’s all overpriced, it costs money to develop and deliver the content we love to watch, and too much of it is “falling off the back of an electronic truck.”

We can watch content for free on our TVs when they receive broadcast signals. But for the most part, the only people who watch broadcast TV are those who have cut the cord and stream through their TVs on their internal Wi-Fi or wired networks. For them, a TV is a device, just like a tablet, wireless phone or computer.

Cable providers have relationships with content providers that enable subscribers to stream cable-delivered content or simply stream it from the content providers. You get a username and password, and you’re good to go. You can even share your account with others, and almost all of us have done it at one time or another, especially with Netflix or Amazon Prime. Some providers encourage it.

Unfortunately, some people have taken sharing too far. The content industry has been OK with sharing info with a few friends or family members, but the problems arise when those friends and family members start sharing access with their friends and family. It’s all gone viral, and it hasn’t gone unnoticed.

Every provider who issues usernames and passwords also has the means to track who is accessing content and where they’re watching it. They expect that subscribers will stream their programming when they’re traveling, and they can usually verify access privileges are being properly used. Most vacations are a week or two, and even if you move around a bit, you’re generally not in locations a world apart within the space of two days – or on the same day.

The industry can track possible abuse, and there are steps they can take – if they haven’t done so already – to limit access without alienating honest, rule-abiding subscribers. They can require all subscribers to re-enter or change passwords more frequently. It’s a risk for them because some subscribers may find this an inconvenience and drop their service. However, it’s one way to shut off access to a large number of pirates in one fell swoop.

They can also limit the number of shares they’ll allow. While Netflix, for example allows up to four shares for its most expensive plan, and providers such as HBO and DirecTV allow limited sharing. ESPN may have limits on how many streams are allowed, but that could be independent of limits placed by cable or satellite carriers.

The industry can threaten to cut off subscribers – or actually cut their cords – but that gets into all sorts of sticky legal and customer-service issues. For example, do you take action against the parents who gave their college-age kids access? Do you go after their kids? Do you go after the users of devices they believe are “invalid users?”

This problem will become more prominent on the industry’s radar screen because a lot of money is at stake. Content producers need to be paid for their product, and that payment depends on how many subscribers watch it. Cable and satellite companies pay fees to producers and collect fees from advertisers and subscribers based on the number of valid users. Nobody wants money taken off the table because of a discrepancy between subscribers and viewers.

Finally, all this sharing raises a nagging question in the back of our mind: If someone has access to an account that you pay for, how can they use this access for their own gain at your expense? Call us – 973-433-6676 – or email us for help in tightening up your access controls.

We’re Not Neutral on Net Neutrality

The intended repeal of net neutrality by the FCC will affect all of us. We’re likely to see the first changes as they affect the cost and availability of streamed programming and premium content; less is likely to cost more. We don’t know, yet, how it will affect search engines and your ability to find local businesses or anything else on the internet.

 Let’s start with a quick review of the history of the internet. It began as a level playing field for exchanging information worldwide, and it led to a communications revolution. It mightily disrupted the communications industry’s business models in every way imaginable.

Telephone calls, for example, are free or cost just pennies per minute to almost anywhere in the world. We can even make video calls for free. The internet, in this case, took away a revenue stream from traditional telephone carriers – and added a business capability for the cable TV industry.

Telephone service – or voice communication – became essentially a throw-in for telephone carriers and cable providers. Even if they were restricted in some markets in certain ways, at least one of each plus a satellite carrier could compete for your business. That led to service tiers and bundles of programming that customers were likely to buy.

Cable or satellite TV, in turn, was impacted by the internet. You don’t need a cable connection – or a satellite dish – to get all manner of visual content: TV shows, movies, etc. All you had to do was buy and install a good Wi-Fi system in your home and pay for fast enough internet service, and you could pick and choose what you wanted to watch.

This setup, which has continued until now, has allowed a number of smaller, innovative companies to get into the content business, either as producers or carriers. Companies that have innovated in some way, shape or form have become big-time players in the internet. Google, Amazon, Netflix, Microsoft and the like are relatively new companies that grew rapidly by exploiting technology.

But those companies are not ISPs (Internet Service Providers). The ISP business is essentially comprised of telephone and cable carriers, and that business has been commoditized. How many of us have switched ISPs at the drop of a hat to save a few bucks on basic services or add new features for very little additional cost? How many of us have simply dropped cable or satellite TV?

One of the factors that has contributed to our freedom of choice is Net Neutrality. Simply put, it is a governmental regulation that prohibits any ISP from blocking or slowing down virtually any content from virtually any provider. If you pay for 300-mbs internet service or 1-gigabit service, you can get it at that speed because the ISP can’t block it or slow it down.

That’s different from most cable or satellite TV services. Ever since their inception, they have sold blocks of programming in tiers. The more programming you want, the more you pay. If you want to pay less, you sacrifice choice – or you choose not to get high-definition service. That was OK because with Net Neutrality, you could get programming over the internet, and you could price your service more selectively.

The removal of Net Neutrality means that your internet service will now be bundled like cable/satellite TV programming. You want to stream Netflix or Amazon programming? There could be a premium charge for that. You want to stream sports or news programming? Your ISP can negotiate with the program providers to determine which ones they’ll carry and at what data speeds. No matter how it happens, your cost is likely to go up.

And there’s more. What about your favorite search engine? Why has Google fought so hard to become the dominant search engine? Why does Facebook keep trying to expand its user base? You know why: they can get more advertising dollars. Who doesn’t get any benefit from that now? Your ISP.

With the removal of Net Neutrality, search engines will need to strike deals with ISPs just like programmers have had to do, and then you’ll have to decide on an ISP based on a search engine you might want – as well as what websites you might want to access. Or, will some carriers show preferences for certain businesses? What’s to prevent one from favoring a shopping site over others in return for a higher access fee? What’s to prevent a consumer products company from being priced out of a website presence by bigger, well-financed conglomerates?

All of the innovation that we’ve seen? It’s going to be harder and harder for startups to get a foothold. We think the end of Net Neutrality will lead to higher prices and fewer choices for anything that we’ve become accustomed to finding on the internet. At least that will be the case until something new comes along. You can bet somebody’s hard at work developing the next alternative.

In the meantime, you can count on us to help you navigate the new world of the internet. We can help you select and install the networking equipment you’ll need to be compatible with your ISP and/or TV provider and make sure all interfaces and security systems function properly. Call us – 973-433-6676 – or email us with any questions you have as Net Neutrality events unfold.

New Browser War

Mozilla just launched Quantum, the fastest and most feature-laden version of its Firefox browser. Will it be the shot heard ‘round the internet? We think it’s overtaken Chrome and that it’s way ahead of Edge, which Microsoft launched to replace Internet Explorer.

When it was introduced in 2004, Firefox, an open-source darling, shot ahead of Microsoft’s Internet Explorer, but its star faded with the development of Google’s Chrome. By the time it launched Quantum, also known as Firefox 57, Mozilla saw its user base at 6 percent of the browser market. Chrome, which was my browser of choice, had 55 percent of the market, and Safari had 15 percent. In the desktop market, Chrome has had a 64 to 15 percent market advantage over Firefox. Clearly, Mozilla had to make some big changes.

The name Quantum may come from the quantum leap the browser made in speed. The 57th iteration of Firefox is reportedly twice as fast as Firefox 52. Mozilla claims it uses 30 percent less memory than Chrome, which will enable you to run other programs or apps faster on your computer, and it claims to have better privacy features than Chrome. Its new Tracking Protection is a default operation that blocks extensive requests for online user tracking and reportedly reduces the average page loading time by 44 percent.

The new browser supports WebVR, which enables websites to take full advantage of VR headsets, and Mozilla’s Pocket service is now more integrated in the browser and displays trending articles on the new tab page. Last but not least, for those of you who didn’t like being locked into Yahoo as the default search engine for Firefox, you get several choices after entering your search topic.

One drawback might be the loss of add-ons from the old Firefox engine. They allow a lot of customization. Most of the top extensions have been updated, but if you need to retain some of them, you could try Firefox ESR, which will give you the add-ons but at a slower speed. In the meantime, you get plenty of extension, theme and toolbar options to customize it.

Since I’ve installed it, I think Quantum – or Firefox 57 – will give Chrome a run for its money. Firefox says it will have several tweaks over the next year to make the browser even faster. If you want to check it out, download it directly from Mozilla.

If you have questions about Quantum/Firefox 57, call us – 973-433-6676 – or email us for help. We think you’re going to like it.

Automotive Electronics Systems are Flat Tires

In an article about the reliability of automotive brands, in-car electronics systems took the big hits for some big brands. Surprising? Not at all.

We’re putting a lot of pressure on electronics, and they, in turn, are putting pressure on our cars’ batteries and our overall perception of how well our cars are working. Batteries are becoming the most-replaced part in our cars, and it’s no wonder. With all the power accessories we depend on, such as our infotainment systems and power seats, and the increasing replacement of mechanical systems with electrical and electronic systems, we put a lot of strain on our batteries. That’s something those of us in the Northeast might want to note as we head into winter.

Strong batteries, however, won’t solve some inherent problems that I’ve noticed. Our electronic infotainment systems are slow to integrate with other systems, everything from climate control to navigation, radios and Bluetooth connections for phones or music playlists. When we’re driving and depending on our navigation system and the defroster, for example, we need speedy integration. We can’t afford to take our eyes off the road for more than a split second. We also can’t afford a glitch in the performance of either function. When a turn comes up in heavy traffic, we need to be in position to make the turn safely. And, at the same time, we need to be able to see where we’re going. If our system is slow, we get distracted from our driving, and that could cause an accident.

Distraction seems to be a major problem from reports we’ve seen. The big areas of concern are the size of the screens themselves and how the systems integrate with Apple CarPlay (which I have in my Volvo) and Android Auto. Some drivers can’t always be sure whether they’re using their phone’s system or their car’s. That confusion can be a distraction, especially if your car and your phone have you plugged into different navigation systems – and one of them may not be sending you where you want to go.

We should briefly note, too, that some in-car systems are compatible only with Apple or Android systems or can favor one system over the other. That’s something you should know when you set up your car system, your phone or both. For example, we love Waze, but it’s not available through CarPlay. Google Maps has some features that are not available on Apple Maps, and that reflects a larger problem of your car’s system telling you which apps you can or cannot use.

Just to note, there are some current topics related to in-car systems. First, Bluetooth is still an issue when setting it up in older cars or to work as an installed capability with Apple or Android systems. Second, Lexus has decided to develop its own in-car systems. They may or may not work with Apple and Android systems, but the cars will have apps that tie in with your mobile devices, giving you some control or monitoring the car and its operations while you’re not there. A few comments about kids and valet parking come to mind for that.

The other distraction is the visual distraction, and that has two parts.

Some displays are just too big, and one that comes to mind right away is Tesla’s 17-inch touchscreen. That’s bigger than many laptop computers, and there are two problems. First, it’s large area to scan when you need to change something, and that can take more of your attention when you’re driving. This may be less a consideration for a driverless car, but today, you need to drive. It also creates a large reflection or a large bright light that can be a distraction.

The flipside is that a smaller screen can take you too long to pinpoint the place you need to touch for the action you require. That can take up more of your attention, too, and lead to an accident.

Some systems don’t have a screen layout that may be good for you. And while you can overcome some of that by locking the locations of some functions in your memory, the pressure of all the decisions you need to make while driving may negate that.

With all their current problems or shortcomings, in-car electronics will play bigger roles in your car and how you drive – or don’t drive it. Many of the things we see, such as warnings, automatic braking and stopping systems, navigation and self-parking are precursors of automated or driverless cars.

But while we’re still in the present, we can help you set up and integrate Bluetooth, Apple CarPlay, Android Auto and your mobile devices and apps in new or older cars. There are lots of set-up options, and we can help your sort them through and make sure your setup is what you need. Call us -973-433-6676 – or email us to talk about it.

iPhone X is a 10

Naturally, we have our iPhone X, and it’s everything we hoped it would be. Getting it was almost as much fun as using it because the Apple hype machine adds so much more intrigue. I was one of 25 people who showed up at the UPS terminal in Parsippany to get our phones when the counter opened at 7:30 in the morning on a Friday, two weeks ago. The guy at the counter grumbled a bit, but they knew what to expect. We had all been waiting for our phones from the minute we placed our order.

That’s when the fun started. I was able to track my phone before Apple and UPS sent us any kind of information. Working the web, I learned when my phone left the factory in China, when it left Hong Kong for the US, and when it arrived in Anchorage – before going to Louisville and Newark and then on to Parsippany.

In reality, I can’t blame UPS and Apple for being so spare with information. A truck was robbed near San Francisco, and a number of phones were stolen. New iPhones are hot commodities in more ways than one.

So, was it worth all the excitement? Yes.

The iPhone X’s facial recognition is top notch, and I love all the features and the speed. To a geek like me, this is one step closer to heaven. The only difficulty I’ve had is getting used to the absence of a Home button, which has been an iPhone hallmark. I’m still getting used to all the gestures and swipes, and switching back and forth with Danit’s older iPhone makes it harder to settle into a routine. But, hey, I’m not complaining.

If you’re in the market for the iPhone X, the waiting time to get one is three to four weeks. If you’re trying to decide whether to buy it at an Apple store or through your cellular carrier, I’d recommend the Apple store. One big reason is that you can buy the Apple Care insurance program that’s cheaper and better than what the carriers offer.

The coverage is recommended – along with the purchase of a good case for your new phone – because the units have glass fronts and backs and are extremely fragile. They can break very easily, and a replacement screen is $579.

The iPhone X has a lot of outstanding features, and most people will find a learning curve – while getting used to the gestures and no Home button. If you have any questions about the new phone or need any help in getting it set up and integrated into your life, we’re available to help. Just call us – 973-433-6676 – or email us.

Homeland Security’s New Website for Trusted Travelers

If you’re a world traveler for business or pleasure – or plan to be – Homeland Security’s new Trusted Traveler Programs (TTP) System website is your cyber destination for managing Global Entry, NEXUS, SENTRI and The Free and Secure Trade (FAST) programs. The four TTP programs are great time savers for frequent travelers who have been pre-approved and are considered low-risk. They also represent a process of security checks that make it extremely difficult for someone to steal personal identities.

Registering through the TTP site is your one-stop center for all of the programs, although it’s not likely most of you will use all of them. If you have used any of them before, you’ll need to re-register. If you’re not familiar with them, here are quick descriptions:

  • Global Entry is for travel back into the Unites States At selected airports, you go to a designated kiosk, present your machine-readable passport or U.S. permanent resident card, place your fingerprints on the scanner for fingerprint verification and complete a customs declaration. You get a transaction receipt and go to baggage claim and the exit. You must be pre-approved for the program. All applicants undergo a rigorous background check and in-person interview before enrollment.
  • NEXUS expedites processing when entering the United States and Canada. You use dedicated NEXUS kiosks when entering Canada by air and Global Entry kiosks when entering the United States via Canadian Preclearance airports. You also receive expedited processing at marine reporting locations.
  • SENTRI (Secure Electronic Network for Travelers Rapid Inspection) expedites clearance for pre-approved, low-risk travelers upon arrival in the United States. Participants may enter the United States by using dedicated primary lanes into the United States at southern land border ports. It’s primarily for travel from Mexico.
  • FAST (Free and Secure Trade) is a commercial clearance program for known low-risk shipments entering the United States from Canada and Mexico by truck. It expedites processing for commercial carriers who have completed background checks and fulfill certain eligibility requirements. The majority of dedicated FAST lanes are located in northern border ports in Michigan, New York and Washington and at southern border ports from California to Texas. Participation in FAST requires that every link in the supply chain, from manufacturer to carrier to driver to importer, is certified under the Customs-Trade Partnership Against Terrorism (C-TPAT) program.

If you already participate in one of the programs, you’ll have to go through a new registration process, which is an admitted ordeal, and you’ll need your PASSID number, which should be on any membership cards you have for the program or on any notification letters you might have received.

To start the re-registration process, go to https://ttp.cbp.dhs.gov/, log in, go to Manage My Membership and then Consent and Continue. Eventually, you’ll be redirected to a page where you’ll need to create an account. You’ll need to enter your email address, and then you’ll receive a confirmation. If all goes well, you’ll need to enter a password – a strong one – and you’ll need to provide a phone number (mobile is better) as part of the new website’s two-factor authentication process.

Through the process, you’ll be given a “personal key” that you should write down and keep with you. It’s your backup in case something goes wrong in your two-factor authentication scheme. After that, you’ll be redirected to the new TTP registration site, where you’ll need to enter personal information and your PASSID.

It’s a lot of work, but it’s a process that comes as close as anything I’ve seen to having both convenience and protection – once you go through all the gyrations to set it up. It has two-factor authentication and a secure back-up process, and the end result is convenience and time-saving at a place where it’s important for travelers and shippers.

We hope this helps you see the value of two-factor authentication. While secure borders are a top priority for our country, securing your personal data should be a top priority for you. Spending a few minutes early on can pay big dividends later. If you have questions about your security and setting up a two-factor authentication system, call us – 973-433-6676 – or email us for help.