Product Review: CleanMyMac

Periodically, we all need to clean out the crap that collects in any OS. OS X (in my case Lion) is no exception. I noticed a lot of left-behind files and daemons from software I thought I had deleted, as well as various caches and leftover files. So, I went looking for ways to go through and clean up the detritus and came across about five hundred different pieces of software that claim they can do it.

Being the cynical type, I didn’t take any of the claims at face value, and did a bit of research to find a tool that could do what it said without destroying my Mac in the process. Many tools that provide automatic cleaning can remove things you may actually want to keep, causing more problems than they fix. I have had that particular problem with Windows-based “speed up” tools, and didn’t want to get bitten by that bug again. Others are thinly-veiled malware, looking to take advantage of desperate users trying to clean up their systems by serving up ads and solicitations for services you don’t want, don’t need, or can’t use.

In my searching, I found CleanMyMac by MacPaw. The software received generally good reviews from folks across the web, and so I felt secure in at least installing it and trying it out. What I found was a great piece of software that was flexible enough to let me do what I wanted, without forcing me to do *everything* at once.

The interface is pretty simple, you install the software from the DMG file, then run the app and are presented with a one-time dialog box asking what languages you routinely use on your Mac. I selected a few, and then was taken to the main screen with the ability to run scans, delete apps, shred files, etc. I clicked “Scan My Mac” and let it roll.

About 7 minutes later, the scan was done, and CleanMyMac had found a ton of different things I could get rid of. The problem is that I might have a bunch of things that CleanMyMac thinks are worthless that I really want to keep. Thankfully, the software doesn’t just go and automatically remove things by default.

Clicking on each category (Caches, Logs, Language Files, etc.) brings up a list of what the tool found in a right-hand pane. You can check/uncheck items to either confirm you want to get rid of them, or keep them. There is also a setting to permanently ignore anything you don’t want CleanMyMac to even check for in future. So I unchecked what I wanted to keep (or those things I wasn’t even sure about, just to be safe) and watched as the system efficiently cleaned up everything that I told it to.

While that alone is a great help, what I needed was to pick through the system to find left-behind preferences and extensions from apps I had deleted before I learned that you really need to use something like AppDelete and not just drag apps to the Trash. There were quite a few, and they all showed up on the various tabs of the Manage Extensions section. I was able to pick just those I had definitely tried to uninstall in earlier days, and let the software then go through and remove them for me. This section works the opposite of the main scan, with files being de-selected until you manually check the boxes of those you want to trash. That’s a huge thing, as you’re talking about the guts of your applications here, and don’t want to accidentally rip out a preference file for something that’s still installed.

Right below Manage Extensions are sections for *properly* deleting applications and securely or quickly erasing unwanted files. This keeps you from getting stuck with the left-behind preferences and extensions in future. Yes, there are many tools (some free, some paid) that can also do this, but it’s nice to see them included in once tool with the rest of the cleanup functions I’d want to run.

Overall, I give CleanMyMac 4 out of 5 stars. The one-star ding is for very sparse information on the info panel that slides out to the right when you select and item and click the “i” icon in the lower-right. Native and built-in plug-ins, for example, are not listed with any detail. This required me to do some web searching to find out what the preference or extension was, to determine if it was safe to delete or not. I can completely understand that info not being available for 3rd-Party tools, but those tools that are part of OS X should have some details there.

There are – as I mentioned – free or lower-cost apps that can individually do all these things (including removing unused languages and cache files). For me, having all these tools and controls for handling them in one piece of software is worth shelling out a few bucks.

CleanMyMac is well worth the price (US$14-25, depending on options) and a good bet if you have pesky files hanging around way past their welcome. Just remember not to delete anything unless you know what it is – which will usually take some web searching to figure out. When in doubt, leave it alone, but otherwise this software can help clean out the crap in your Mac.

Oh, are the Olympics Going on? (Curiosity killed the peacock)

A funny thing happened earlier this week. NASA blew NBC off the social media map, without even trying.

When the Mars Rover Curiosity made an absolutely flawless landing on the surface of the red planet, Twitter, Facebook and many other social media networks went berserk with the news, blowing the concurrent media frenzy of the London Olympiad out of the spotlight – much to the chagrin of NBC, I’m sure.

There were three distinct phases to the blowout, and we can learn from all of them when talking about how to manage social media messaging:

1 – Time delays should only be caused by actual distance.
Curiosity’s landing was broadcast in near real-time by various parts of NASA, with photos taken by the Rover being transmitted out to the world almost as soon as they were taken (there is a 14-minute delay for the transmissions to reach Earth from Mars). This is a big difference when you compare NBC’s six hour delay for events happening on the same planet. There is no such thing as Prime Time online, and NASA knows how to leverage that always-on mentality to the fullest.

2 – NASA lets the information be free.
While it’s understandable that NBC wants to keep a tight rein on information and news coming out of London, NASA has no commercial reason to restrict information. Therefore, there was simply more available news and imagery from Curiosity than from the Olympics flowing at any given time. More info means more blog posts, tweets, posts and broadcasts. If NBC and the International Olympic Committee had allowed a small portion of the information to be freely available, it would get a better spread and more play.

3 – NASA has a surprising sense of humor, and appreciates it in others too.
Funny stuff gets more play, simple fact of Internet Life these days. NASA was quick to crack jokes, and to encourage others to do the same. Because people felt more free about posting jokes and jibes about NASA, the landing was followed by a slew of sharp comments and posts about things like the NASA Flight Controller with the mohawk haircut, or the fact that they could have very well missed one of the most stunning images (the one at the top of this article) if the timing of the landing was off by just a tiny bit. The result? Everyone started talking about NASA and Curiosity. Satirical twitter accounts sprang up instantly, and got great play. When a video of the event got pulled from Youtube due to an apparent copyright issue, NASA shrugged it off as just one of those SNAFUs that happen. The whole internet erupted in support of NASA, mostly because NASA didn’t make a big deal out of it. By not taking themselves too seriously or chastising others who refused to do so, NASA ended up becoming the darlings of social media.

So, lessons learned.

1 – Move fast. Delaying data only means that someone else who you may not want to talk about it will get the story published first.

2 – Always get your message out there, even if that means losing control of some parts of it. You’ll quickly lose control of all of it in ways you do NOT want if you try to put a stranglehold on things.

3 – You catch more flies with honey than with vinegar. Poke fun of yourself, or laugh it off when others do. Laugh with the crowd, or they’ll just laugh at you instead.

Holding Off on Mountain Lion

With much fanfare, Apple released version 10.8 of the OS X platform, named Mountain Lion. While there are many features and functions in ML that are great, I’m holding off for a bit. Here’s why:

First, it’s brand new. Apple has become much like Microsoft in producing OS software that isn’t quite ready for prime time right out of the gate. There are generally a few highly annoying issues that launch with new OS X versions. Luckily, Apple does fix them quite quickly, and within 30-60 days after release there will be 10.8.1 to address them. So I’m waiting for that release.

Secondly, a large portion of ML was written to merge with iOS 6, which isn’t yet available outside of the Apple iOS Developer Program. So until I have what is seen as “the other half” of OS X 10.8, there’s no real reason for me to rush to upgrade.

I’m definitely looking forward to Mountain Lion. The Notifications system, next generation Messages client and a few other features are big for me, and I’ll happily upgrade in the very near future. I’m just not ready to leap on the bandwagon yet. When the first major patch is out, and iOS 6 is ready to roll, I’ll be downloading ML from the App Store and will be writing what is – I’m sure – the first of many blog posts on it for you then.

Olympic-Level Social Media Issues

I’m a huge fan of the Olympic Games. There’s two main reasons for this. First, I was in the US Junior Olympic Shooting Program (Indoor/Outdoor Running Game Target, for those interested) and secondly because the Games represent a triumph of the human will over everything that human beings can throw at it.

Social Media is one epic example of that latter idea.

There were two major issues that sprang up out of the 30th Olympiad that center around two immutable Laws of Social Media:

1 – Information always will be free.

2 – In any instance where those who own the information desperately do not want it to be free, see rule 1.

The International Olympic Committee (IOC) decreed that – in effect – Social Media was banned from the games. No one was permitted to tweet, post, or blog about what was going on. The presiding factor for this was overall security – something that was proven to be a concern when Olympic Athletes began posting photos (with close-up detail) of their security ID badges online. The decree was fiercely criticized as being more about economics (NBC wanted to time delay the games for US consumption, thereby making tweeting live problematic) than security.

However, even the massively edited footage NBC aired of the Opening Ceremonies showed hundreds of people with mobile phones happily snapping photos and taking videos, so the ban was not quite successful. Athletes and attendees have been tweeting non-stop, even getting themselves into very public battles over negative tweets that had been thrown at them.

In the second example of these rules, NBC ran afoul of most of the world due to an ill-edited time-delayed version of the Opening Ceremonies themselves.

In a widely publicized gaff, NBC chose not to show a tribute portion of the Ceremonies in their US telecast. The tribute was – outwardly – for all those who the Olympic Family lost in the past 4 years, but was widely viewed as a tribute to the victims of the 7/7 attack against the UK the day after London won the right to hold the Games. Instead, NBC chose to show an interview segment between Ryan Seacrest and Michael Phelps.

Immediately, Social Media erupted with tweets and postings about the missing segment. The outcry was swift and vicious, with people from dozens of countries lambasting NBC for insensitivity, misjudgment and – in several cases – outright stupidity. What followed was three days of criticism against NBC for time-delaying key events, clueless commentators, horrible editing of segments, and the overall lackluster coverage of the Games in general.

What can we learn from this? First, no information is safe from Social Media. Try as you might, the info will get out there, and the more you try to restrict it, the further it will spread. Secondly, NBC has attempted to ignore the outcry, issuing semi-meaningless public statements (NOT via Social Media) that did nothing to placate the social mob. Your company needs to be ready to address these outbursts with a solid plan of responses and information to plead your side of the case. The age of the press release is definitely over.

Enjoy the Games, celebrate your country’s victories and cheer with other countries in theirs. Also, always remember that when the eyes of the world are watching, these days those eyes come in the form of cell phone cameras and instant communication.

On the Road Again…

Yup, I’m on a train again.

As many of you already know, I prefer the trains to the airlines these days because I can get much more done, and it’s much more comfortable to boot. Strip-searches at the TSA Checkpoints aside, the seats are roomier, the view is better and the cafe car is open nearly the whole trip.

But, back to the blog, there are a few things that you should be thinking about when traveling with your Mac that revolve around security. Today, let’s talk about digital security while you’re on the road with OS X or iOS.

Specifically, let’s talk connectivity. When you’re traveling, there is a huge temptation to use all those free wifi hotspots you come across. If it is at all possible for you to avoid them, do so.

Let me repeat that – never connect to a free wifi hotspot unless you know for absolute certain who owns it, who’s on it, and what the vendor is doing with the data you send across it.

Public wifi sounds like a great idea, but the current state of our technology – at least here in the US – doesn’t allow you to be sure that “ATTWiFi001″ is actually a hotspot created and maintained by ATT until you’re already connected to it. Even when you know it’s a free carrier hotspot, you have no idea who else is on that same connection with you, and how much control they’ve carved out for themselves.

What that means is that an attacker can already be connected to your device before you know that they’re there. They’ve got the ability to start introducing malware and doing all forms of nasty stuff. Added to that, if you send or receive information across the network (which is, of course, the whole point), then the attacker can see all of that traffic “in the clear” and gain personal information from you as you surf. While SSL (secured) connections can remove some of this risk, if you’re on a hostile wifi hotspot then this tech cannot completely protect you.

A much safer bet is to use your own personal hotspot. Most iPhones can perform that function (for an extra fee to your carrier), and most wireless carriers also have stand-alone devices that can provide connectivity over their networks when you’re out and about. This gives you direct connectivity via a wifi access point (the device) that you know is connected to your carrier, and not an unknown access point.

If that’s just not possible, then protect yourself. Use a personal VPN service like WiTopia to shield your connection and the data going over it. While not totally foolproof, the idea of this kind of tool is to encrypt your data traffic from your laptop to one of their data centers. Once there, the traffic is allowed to enter the internet just like normal, but anyone listening in on the wifi hotspot you’re connected to will see gibberish.

These services are not free, but WiTopia is reasonably priced (US$50/year) for personal use. They’re great for that extra level of protection when you’re stuck using a network you just don’t have a good feeling about.

Note that WiTopia is just one of several providers of these services. I have used them for about a year now, and haven’t had any issues, but they’re not the only game in town. Ask around to see who the best fit is for you in your geographic region and for the type of things you do online.

Have fun on the road. Stay safe, think smart, and always suspect that “free” wifi hotspot you just picked up.

What’s in a Frame?

So you’ve been reading along on this and other blogs, and you’ve begun crafting your image in Social Media. What about your literal *image* in Social Media – your icon, avatar, profile picture, etc.?

One of the very first things people see when they look at your tweets, posts, and pages is your picture. And they can often tell more than you want them to from just that one small icon. So what image will you choose to represent yourself?

First things first, you MUST change this from the default image for Twitter, Facebook, Pinterest, etc. Do not go with the default egg, shadow, outline, etc. no matter what. Using the default brands you instantly as someone who’s either fake (a spammer, temp account, etc.) or else someone who just has no clue at all how Social Media works. Neither of those images will help you build your brand or your business, and getting tagged as a probable spammer will actually hurt your cause.

Let’s look at a couple of the ins and outs of the more common methods out there:

Photos:

Photos can work quite well for professional use of Social Media. Your customers can see you for you! Remember to go for something that reflects the industry you’re in, however. I have seem Twitter icons that were supposed to be for very high-end legal partners who were hanging off the back of a “party boat” – probably not the image they want to be most closely associated with for business use. If it is, great, but if it’s not then you need to get a picture of you at work or a headshot of you in a suit.

Caricatures:

This one is very popular, and the method I use myself. Having a drawing or cartoon made from your photos can be a great way to allow you to put your face online without actually putting your real face online. As with photos, you want to ensure that the drawing lines up with the image you’re trying to portray for your business, but with the cartoonish caricatures, you have quite a lot of leeway there.

Images/Artwork:

If you prefer not to use yourself, you can always find a picture or photo of something that works well to represent your business. Maybe a picture of a green meadow if you’re an environmental firm, or a gavel for a legal firm. Maybe just some abstract image if you’re not sure which way you want to go.

Two things to watch out for: First, make sure you have the rights to use that image. It either needs to be something you paid for, or something you can license under Creative Commons or the Public Domain laws for your country. Using an image that’s copyright to someone else can get you in trouble fast, and in debt in some cases. Secondly, ensure that you can get a copy of the image downloaded to your hard drive. You do not want to only have a copy of the image on a web server if you can avoid that, as web servers can change or go offline without warning – especially if they’re not your own web servers.

Logos:

Using a business logo is a pretty straight-forward way to get your brand across before anyone even reads your tweets and posts. The only drawback here is that – unless you own the company – you may not have permission to use that logo for your own icon/picture. Make sure you check with the powers that be, lest you become an employee who was.

If you do get permission, then your can use the logo itself, or better yet you can incorporate your logo into one of the other types of icons/photos mentioned here. For some of my accounts, I use a simple graphics editor to place a small version of the company logo in the lower-right corner of my cartoon-y picture.

Another note specific to logos, not every logo works well here. The preferred logos for use as your picture are square or very nearly so. Wide logos will get cropped by Twitter and other services, making you look much less professional by showing a blob of unidentifiable text/graphics instead of what you’d hope they’d see.

So put your best face – or something other than your face – forward. Remember to make your icon reflect who you are, and who you want people to see you as. Also remember to always get the appropriate permission before using copyright or trademark images, and make sure they’ll fit in the space allotted for your photo/icon.

FYI, if you want a great artist who can make a caricature or image for you, check out Woody at GUComics.com – he’s the guy that did my profile image, and I can recommend him personally without hesitation.

EPEAT and Apple

Earlier this week, the media in general erupted with news that Apple was no longer going to register their company or products with the Environmental Product Evaluation and Assessment Tool (EPEAT). On the surface, this might sound like Apple is taking another step to say “screw you” to the environment, but it’s really not.

Now, before people start flaming me to death, I’ll be the first to admit that Apple has some non-eco-friendly policies. Their sourcing and manufacturing leaves a lot to be desired when it comes to that point, however this particular announcement does not add to that score at all.

EPEAT – for those who’ve never heard of them – is a non-governmental-organization that was started with funding from the US Environmental Protection Agency. The goal of the organization is to allow buyers, sellers, resellers, and consumers of electronics some way to register and track the ecological impact of the products they make and use. That’s great, and a wonderful way to show the community that your company has an eye on their eco-bottom-line as well as their monetary bottom line.

Apple, however, has policies which exceed those required by EPEAT, and in some cases do so in ways that don’t fit into the certification. I’ll let you read up on EPEAT as much as you want at their website, but wanted to point out a few things Apple is already doing which impact electronics recycling and the environment in general:

1 – Apple has taken many steps in recent years to make their business more eco-friendly. Smaller packaging, more efficient manufacturing and better energy efficiency are just the tip of the iceberg. Read more about that here. They’re still far from a stellar player in environment-friendly manufacturing, but they’re working on it.

2 – Any Apple Store will take in Apple computers for recycling – free of charge. As a matter of fact, if you bring an Apple computer (no matter how old) into a store that still has some monetary value, they’ll give you a gift certificate to use toward the purchase of new gear. The same goes for iPhones, iPods and iPads – and with phones they’re promising at least a 10% discount on new gear, even if the device is too old to be resold.

3 – Apple also allows you to bring in ANY PC or mobile phone and get at least a 10% discount, with them recycling the old gear for you. So they’ll recycle your old gear even if they didn’t sell it to you originally.

4 – All of these offers also work by mail. For larger gear (PC’s, Mac desktops and Mac Laptops) you’ll have to pay postage. For smaller items like phones and iPod’s, Apple will pay the postage.

You can get details on all of these recycling programs from the Apple Recycling Program page.

So, while Apple still has a way to go before anyone starts calling them an “eco-friendly” corporation; this particular issue is not something they should be faulted on. They already offer manufacturing and recycling options in excess of the EPEAT guidelines, so it didn’t make a lot of sense to spend a large amount of money for the re-certifications. They can, and do, make the information freely available on their website.

This was just one case where the perceived benefit of renewing the certifications far outweighed the expense in time and money that Apple would need to put out to do so. As long as they keep publicly and freely showing how they exceed the requirements, I can’t find fault here.

FYI: You can read Apple’s statement to TheLoop about the EPEAT issue here.

Twitter is Circling The Wagons

With two recent news stories (both encapsulated in this article), a trend is beginning to take shape in how Twitter is planning on dealing with users viewing, creating and managing tweets outside the Twitter-native clients and website.

Twitter wants to end that.

This is a rather short-sighted plan, and will no doubt hurt Twitter in the long term, but what does that actually mean to the average user?

First, it means that automatic cross-posting of tweets to LinkedIn is coming to an end. There are still third-party ways to perform this kind of action, but the officially-sanctioned methods are being shut down. Generally, since Twitter and LinkedIn are used for two very different audiences, that’s not a problem. However, for Information Workers using both services, it could be a bit of a hassle.

Secondly, Twitter looks as though they are trying to curtail the ability of third-party developers who want to create Twitter clients on various platforms. Instead, Twitter would prefer if everyone used their official clients for Windows, Mac, iDevices, Android, etc. or else used the Twitter website.

Why would they do that? Simple, they want money. Advertising and sharing of bulk data from their network are how Twitter makes their cash, and third party applications can skew those funding sources a bit. A non-Twitter client may not properly report all the information Twitter wants to sell to people, and may not show all the ads and sponsored tweets that Twitter wants advertisers to buy into.

Granted, if there’s one lesson that a decade of DVR’s and years of non-ad-supported pay-for-download content services have taught, it’s that users hate ads. The “digital generation” would rather spend hundreds of bucks on Tivos or rent/buy media through iTunes than watch it on ad-supported networks. This hasn’t, however, stopped advertisers from trying to load shows with more ads in some kind of futile game of cat-and-mouse for our eyeballs.

Twitter knows they need to sell ads to make money, and anything that can reduce that ability must be ended, quickly. Cross posting to and from LinkedIn was the first thing to get stopped – an opening salvo in the ad war over social media. Reduction of functionality for third-party clients appears to be the next step, even though that hasn’t been brought to bear just yet.

So what can you do? You could get used to using the native Twitter applications. They’re not horrible, and they may do what you need. If not, you can vote by letting Twitter know you’d be willing to pay for a premium service offering that lets you use any client that you want. If enough folks say they’d pay for that option, Twitter might find that appealing and make it happen.

Make no mistake, Twitter *will* reduce the functionality of third-party software. It’s the only way they can make money, and like any other business in the world; their goal is to make money. You can vote with your wallet, or you can get used to using the service for free in only the ways they say you’re allowed to. Your choice.

I, for one, would be willing to pay for an open Twitter platform. I could cough up US$3-5/month for a service without restrictions. But that’s just me. What do you think? Sound off in the discussion section!

Hardware Hiccup? Try Resetting the SMC

Today I ran into an interesting issue. I booted up my Mac this AM as I had needed to shut it down last night since it was going to be quite warm in the room where I keep the computer with the air conditioner off. After letting the AC cool the room down, I turned it back on as normal. On boot, it was ok, but within about 5 minutes the fans went into ballistic overdrive mode and began to sound like a small airplane was about to take off.

I immediately checked the internal temperature sensors (I have the iStat Pro widget installed, but there are many ways to do this) and saw that everything was within normal ranges for my late 2010 iMac. The fans, however, were going at full tilt still. Quickly checking my system processes and open apps, nothing was driving the CPU or graphics card to extremes, so I was at a total loss as to what could be causing the iMac to think I was sitting in a sauna all of a sudden.

Next up, web searches to find out if this was any kind of known issue, and what do you know, it is. Apple even has a KB article that details excessive fan speed as a symptom of an unusual, but known, situation.

NOTE: You’ll be resetting some pretty critical components of your Mac, so the author takes no responsibility if you don’t read that KB article and/or don’t follow the full instructions on that page.

The System Management Controller (SMC) is a set of hardware monitoring and control operations that are in charge of very low-level components like fans, hard drive speeds, etc. They exist to handle things that OS X may not be able to deal with, such as making sure the system doesn’t overheat when the processor goes off the charts. Something inside the OS itself would be just as frozen, but the SMC can shut down the Mac to save the hardware until you can figure out what’s wrong.

In my case, the SMC got confused and though the system was overheating even when it clearly was not. Other symptoms of the SMC needing to be reset can be odd lights on the keyboard (e.g. the CapsLock light won’t ever shut off) or just general hardware flakiness that seems unrelated to system settings or operations within OS X. Luckily, resetting the SMC doesn’t cause any data or preferences loss, and is pretty painless.

First, go read the KB article. There are a few steps you should really take to rule out OS X or application issues that could just as easily be causing the problem you’re seeing. In my case, I shut down all apps and rebooted to rule out that something might be running the CPU or GPU at full tilt by accident.

After that, gracefully shut down your Mac. If you cannot gracefully shut it down (Apple menu, Shut Down…) then the problem is most likely not SMC related. If you shut down cleanly, leave the Mac alone for about 30 seconds.

Then, for Intel-based Mac desktops:

Unplug the power cable from the desktop. You must then wait at least 15 seconds before you plug it back in. This step basically forces the SMC to reset when you plug the power back in – the desktop recognizes that there was a total power loss at some point, but now it’s back, triggering the event.

After plugging the power back in, wait at least 5 seconds to allow the hardware to figure out that it’s come back from a power loss, then press the power button. The machine should now boot up just like normal.

If all went well, the hardware hiccup you were experiencing should have disappeared. In my case, the fans sped up on boot, but returned to their default behavior within about 3 minutes. Since then, they’ve been operating as expected, only revving up into “airplane mode” if I do something that taxes the video card or CPU.

The KB article also has instructions for how to perform this operation on non-desktop Macs, such as MacBook Pro and Air devices, so it appears to be a universal control for all Intel-based Mac computers. Be sure to follow the instructions exactly, as not waiting for the correct length of time, or not hitting the right keyboard triggers at the right time can cause the SMC reset to be skipped.

Of course, if this doesn’t fix the problem, you may need to call into Apple Tech Support or stop by a Genius Bar to get more help. Gremlins like this do turn up from time to time – based on the descriptions in the KB article – so knowing how to do this can be handy.

I Shouldn’t Have to Say This, but DO NOT POST PICS OF YOUR CREDIT CARDS

Strangely enough, it would appear that a large number of people have – for reasons that defy logic and sanity – been posting pictures of credit and debit cards via Social Media. Don’t believe me? Check out the Twitter account of NeedADebitCard and see for yourself.

So, since it apparently *does* need to be said, I’ll say it: “Do not, under any circumstances at all, post a picture of your credit/debit cards, work ID’s, personal ID’s (like your driver’s license) or any other personally identifiable documents. Ever. For any reason. Seriously.

Now, here’s why:

We are not alone

Along with all the great folks, customers and colleagues you can meet on social networks, there are a large number of people who live in the dark alleys of the Internet.

As you can see from that Twitter account, anyone can see the pictures you post – sometimes even if your account is marked as “private.” That means an ID thief, using the same exact (legal) tools that the Twitter account creator used, can harvest tons of credit/debit card numbers, expiration dates, and account names. They can then use that information to purchase easily re-sellable objects and turn your card into quick cash.

It’s bad enough that folks are getting tricked into giving up their information by people who have tampered with ATMs and card scanners, we don’t need to make it any easier by purposely sharing information with these crooks.

Security isn’t always that secure

I’ve personally been to several websites that do not require the 3-4 digit security code from the back of the credit/debit card to make a purchase. Even very legitimate websites don’t always ask for the security codes, and that means when a thief has the number, your name, and expiration date; he or she can rob you blind without ever seeing the back of your card.

Let’s all use a little common sense here

I have a rule for what you should and should not post online. It’s very simple:

If you wouldn’t say it out loud in the middle of Times Square in NYC, or wouldn’t want the photo to be posted to a billboard in that same location, don’t put it on any social network, sharing site, or comment page.

Think about that for a second. “My client is squeezing me out of every penny” – probably wouldn’t mind saying it out loud if it was true, and no client was identified.

“My client BigCompany is a bunch of assbags.” – I would definitely hesitate to say that in front of a ton of strangers. After all, the CEO of BigCompany might be standing behind me.

“My client is sleeping with my boss.” – that’s not coming out of my mouth unless the only person I want to hear it is the ONLY person in the room. I might say it on a phone call, may say it personally to someone, but would never say that surrounded by a large group of people I don’t know.

Same goes for pictures. I wouldn’t mind a picture of me at a trade show or professional event up on a billboard. Mildly embarrassing, but that’s about it. However, a picture of my birth certificate is something I definitely would *not* put on a billboard anywhere, but especially not on one seen by millions of people a month.

Social Media is like Times Square. You cannot control who hears or sees what you post. Even direct messages will be broadcast to the world if you make one mistake while posting or attach a picture to the DM. Never say or show anything on any sharing site that you don’t want your neighbors, your boss, your family, and/or the local criminal element to see or hear. Not even in a DM or private message, not ever.

Stay safe, and think before you post. Your credit score, employment and mental stability could very well be on the line.

Editor’s Note: The card shown at the top of this page is a “dummy card” that doesn’t belong to anyone and has invalid numbers, insignia and dates. This means that you can try to use it all you want, it won’t work, and it doesn’t belong to the author.