Tellico Village Computer Users Club

Non-Profit Community Computer Interest Group

  • About TVCUC
    • Membership
    • Organization
    • Archive
    • Financials
    • History
    • Member Services
    • FAQ
    • Meetings
  • FLS
    • FLS Alerts
  • TAP
    • TAP History
  • Help Resources
    • Windows
    • Mac
    • iPhone
    • iPad
    • Android
    • Security
    • Smart Home
    • General
  • Mac SIG
    • Mac SIG Updates
    • Mac SIG Virtual Meetings
    • Mac Help Resources
    • Mac Security
  • Monthly Newsletters
  • Tours

June 2025 Newsletter

June 30, 2025 By TVCUC Admin

President’s Message

Digital Legacy: Managing Your Online Accounts for the Future

In today’s connected world, we leave behind more than just photo albums and handwritten letters—we also leave digital footprints. From email and social media to online banking and cloud storage, our online lives are filled with information, memories, and even financial assets. But what happens to all of this after we’re gone?

That’s where digital legacy planning comes in. It’s about organizing and preparing your digital presence so your loved ones can access, manage, or close your accounts when the time comes.

What Is a Digital Legacy?

Your digital legacy includes everything you’ve created or stored online. This might involve:

  • Email accounts (e.g., Gmail, Outlook)
  • Social media profiles (Facebook, Instagram, LinkedIn)
  • Cloud storage (Google Drive, Dropbox, iCloud)
  • Photo and video libraries
  • Online banking and bill-pay services
  • Financial accounts
  • Shopping and subscription accounts (Amazon, Netflix)
  • Password managers and digital wallets

While many people plan for physical assets in a will, digital assets often go unmentioned. Without clear instructions, families may struggle to access or even locate these important accounts.

Why Planning Matters

There are emotional, financial, and legal reasons to take your digital legacy seriously.

  • Emotional: Your photos, messages, and stories are part of your life’s story. Giving loved ones access can offer comfort and help preserve your memory.
  • Financial: Unmanaged accounts might result in lost funds, ongoing charges, or even identity theft.
  • Legal: Some platforms restrict access to accounts after death, even for next of kin. Others may require court orders.

Being proactive can ease the burden on your family during a difficult time.

Steps to Manage Your Digital Legacy

1. Make a List of Accounts

Start by listing your most important digital accounts. Group them by category: email, banking, social media, subscriptions, and so on. Note which accounts are most important and what actions you’d want taken—such as deletion, memorialization, or transfer.

2. Use a Password Manager

If you don’t already use one, consider a password manager like Bitwarden, 1Password, or Roboform.  Mac users have Apple’s Password app built in MacOS.  These tools store login details securely and often allow you to name an emergency contact. This can make it much easier for someone to access your accounts if needed. Password managers allow access to all your devices so that they are all in sync. Some have free versions that may or may not limit access across devices or may do so for a trial period. The paid versions remove those limits and may allow multiple users thereby giving flexibility of use for a nominal annual cost. Browsers like Chrome or Edge offer password saving login username and password storage for free, but a down side is that if you save a password for example in Chrome, it is not available in another like Edge. Additionally saving it using one device, like your computer, may not transfer to your tablet or phone even using the same browser. If saved on your phone it may not transfer to your computer and tablet – bottom line is that your passwords saved for free in browsers can be scattered making things harder for you now and for someone else later on.

3. Assign a Digital Executor

Just as you might name an executor for your will, it’s smart to assign a “digital executor” to manage your online affairs. This can be formalized in a will or simply discussed with someone you trust. Make sure they know where your digital information is stored and how to access it.

4. Use Legacy Tools Offered by Platforms

Some major platforms offer tools specifically for this purpose:

  • Google: The “Inactive Account Manager” lets you decide what happens to your Google data if your account becomes inactive.
  • Apple: The Digital Legacy program lets you name contacts who can access your iCloud account and data.
  • Facebook: You can designate a legacy contact to manage your memorialized profile or request deletion.
  • Instagram: Offers options for account memorialization.

Take a few minutes to activate these settings where available.

5. Include Digital Wishes in Your Will

Although not all digital assets are legally treated the same as physical ones, it’s still a good idea to include digital instructions in your estate planning. Be specific about what you want done with your accounts and who should be responsible. 

Consider making a video for your “significant other” and tell them everything they need to know in case something happens to you.  Plus, the video will serve as a wonderful keepsake and a cherished memory.

6. Keep Everything Up to Date

Review your digital legacy every year or so, especially after major life changes like retirement, moving, or changing passwords (Password Manager apps make this easy.)  Keeping your instructions and access details up to date will make things easier for your loved ones.

Checklist Planning Guide:

  1. Make sure your family knows how to access your smartphone (PIN)
  2. Make sure you have your usernames/passwords updated and stored somewhere safe that your family knows about
  3. Make sure your important documents (including pictures and videos!) are saved in the cloud so they are preserved for your family
  4. Make sure you have a recently updated Estate Plan 
  5. Make sure you provide a list of all the important contacts that your family will need (your advisor, accountant, lawyer, doctor, etc.)
  6. Make sure that you have a complete inventory of any digital assets (crypto, etc.)

A Quick note about Windows 10

Microsoft makes Windows 10 extended security updates free, but there’s a catch:
Consumers will have to turn on Windows Backup if they want a year of free Windows 10
security updates.
Click here to read article

Members helping members,

Buddy Holt, President
Tellico Village Computer Users Club

Filed Under: Monthly Bulletin

May 2025 Newsletter

June 1, 2025 By TVCUC Admin

President’s Message

Passwords.  Here are several real-life examples of everyday people using weak and not unique passwords, leading to serious consequences such as financial loss, identity theft, and emotional distress.

1. The “123456” Nightmare – Personal Email Hacked

What happened:
A woman in the U.S. used the password “123456” for her email, which was also linked to her online banking and social media. Her email got hacked via a simple brute-force attack.

Consequence:
The hacker gained access to her banking information, initiated a password reset, and transferred several thousand dollars from her checking account before the fraud was detected.

Cost:

  • Financial loss (~$5,000, some recovered)
  • Time spent with banks and law enforcement
  • Emotional stress and paranoia about future attacks

2. Social Media Hijack – Weak Password, No 2FA

What happened:
A small business owner used “password1” for her business Instagram account and didn’t enable two-factor authentication.

Consequence:
Her account was hijacked, and the attacker began posting phishing links and scams. Customers lost trust, and she lost hundreds of followers and potential business.

Cost:

  • Loss of online presence and credibility
  • Revenue drop for the month (estimated $1,200+)
  • Time spent regaining access (took 3 weeks)

3. Work-from-Home Employee – Reused Password Disaster

What happened:
A remote worker reused the same password across work and personal sites. One of the sites suffered a data breach.

Consequence:
The attacker gained access to the worker’s company account using the leaked credentials and exfiltrated sensitive customer data.

Cost:

  • Employee was held partially responsible and was fired
  • Employer faced PR damage and legal action
  • Personal embarrassment and difficulty finding new work

4. Medical Identity Theft via Weak Portal Password

What happened:
A man used “letmein” for his online health insurance account.

Consequence:
A criminal accessed his account, changed the mailing address, and used his insurance benefits to get $20,000 worth of fraudulent medical procedures.

Cost:

  • Months spent clearing fraudulent medical records
  • Legal fees
  • Difficulty getting new insurance

These cases underline the real-world risks of weak passwords. 

Using password managers, enabling two-factor authentication, and not reusing passwords can greatly reduce the chances of similar consequences. 

Here is a Link to a 3 minute Youtube video on how password managers work:  Click here. 

One last thing: we all dislike having to use passwords and now 2FA (2 factor authorization which is simply something you know – your password – and something you have – your phone for text confirmation – that a hacker wouldn’t have). But we lock our homes often including a deadbolt for our physical protection, so really it is the same to do for our online digital protection. Our cars we lock and set the alarm, it is just part of life.

Web resource of the month recommendation: 

The 1440 Daily Digest is a free, daily email newsletter and online platform that delivers a curated summary of the most important news stories across a wide range of topics—including culture, science, sports, politics, business, and more. The goal is to provide a comprehensive, fact-driven overview of the day’s news in a format that can be read in about five minutes.

Key Features

  • Concise, Curated News: Each edition distills news from over 100 sources, offering readers a quick, broad overview of current events without overwhelming detail.
  • Fact-Based and Nonpartisan: 1440 emphasizes impartiality, aiming to avoid political bias and agenda-driven narratives. The editorial team selects stories and summarizes them with minimal editorializing, allowing readers to form their own conclusions.
  • Wide Topic Coverage: In addition to major headlines, the digest includes sections on science, technology, business, culture, and general interest stories.
  • Human Editors, Not Algorithms: The content is curated and written by a team of human editors, not generated by automated algorithms.
  • Free Subscription: Readers can sign up to receive the newsletter in their inbox each morning at no cost.

How It Works

Format: Each newsletter typically includes:

  • “Need to Know”: Summaries of the day’s biggest stories.
  • “In the Know”: Brief updates across various topics.
  • “In-Depth”: Links to longer analysis pieces.
  • “Etcetera”: General interest and lighter stories.
  • Access: The digest can be read via email or on the 1440 website, with additional topic sections available for deeper exploration.

In summary, the 1440 Daily Digest is designed for intellectually curious readers seeking a quick, unbiased, and comprehensive news overview, curated by humans and delivered in a concise, accessible format. 

Check it out:  Click here.

Members helping members,

Buddy Holt, President
Tellico Village Computer Users Club

Filed Under: Monthly Bulletin

April 2025 Newsletter

June 1, 2025 By TVCUC Admin

President’s Message

This month I thought I would share with you the results of an internet search I conducted using an AI powered app.  I entered the following search:

“Create a 600 word newsletter article for seniors describing the difference between standard internet searches and ones with AI apps such as ChatGPT and Perplexity.” Here is the result:

Understanding the New World of Internet Search: Standard Search Engines vs. AI Apps Like ChatGPT and Perplexity

The internet has become our go-to resource for everything from health tips to travel advice. But in recent years, the way we search for information online has changed dramatically. If you’ve heard about new AI-powered tools like ChatGPT and Perplexity and wondered how they differ from traditional search engines like Google or Bing, you’re not alone. Here’s a clear, senior-friendly guide to help you understand these changes and what they mean for your online experience.

How Traditional Search Engines Work

Traditional search engines-think Google, Bing, or Yahoo-have been around for decades. Their main job is to help you find websites that match the words you type into the search box. Here’s how they work:

  • Keyword Matching: You type in a phrase (like “best walking shoes for seniors”), and the search engine looks for web pages that contain those words.
  • List of Links: The results are shown as a list of website links, often with a short summary underneath each one. You then click through these links to find the information you need.
  • Limited Understanding: Traditional search engines don’t truly “understand” your question-they match your keywords to words on web pages. This can sometimes mean you have to try different search terms or sift through several pages to get your answer.

How AI-Powered Apps Like ChatGPT and Perplexity Are Different

AI-powered apps represent a new generation of search technology. Instead of just matching keywords, they use advanced artificial intelligence to understand your question and provide direct, conversational answers. Here’s what makes them unique:

  • Conversational Answers: Ask a question in plain English, and these tools respond in a way that feels like you’re chatting with a knowledgeable friend or librarian.
  • Direct Responses: Instead of a list of links, you get a clear, summarized answer-often with sources or citations included, so you can check where the information comes from.
  • Context Awareness: AI apps remember your previous questions in a conversation. You can ask follow-up questions without repeating yourself, making it easier to dig deeper into a topic.
  • Personalization: Over time, these tools can learn your preferences and tailor their answers to your needs, making your experience more relevant and helpful.
  • Information Synthesis: AI can pull together information from multiple sources, giving you a more complete answer than you might get from a single website.

A Practical Example

Let’s say you want to know, “What are the best exercises for seniors with arthritis?”

  • Traditional Search: You’d get a list of websites-some helpful, some not. You might have to click several links, read through ads, and piece together the information yourself.
  • AI App (like Perplexity): You’d get a direct answer summarizing the best exercises, with links to medical sources for more detail. If you have a follow-up question (“Are there exercises I should avoid?”), just ask, and you’ll get another clear answer-no need to start a new search.

When to Use Each Tool

  • Traditional Search Engines: Best when you know exactly what website you want to visit, need a wide range of sources, or are looking for a specific page (like your bank’s login or a favorite recipe site).
  • AI Apps: Ideal for quick answers, complex or open-ended questions, summaries, or when you want to avoid the hassle of clicking through multiple links.

Why This Matters for Seniors

AI-powered search tools can make the internet more accessible and less overwhelming. They’re especially helpful if you want straightforward answers, have trouble sifting through lots of web pages, or prefer to “ask” questions as you would in a conversation. And with features like source citations and the ability to clarify or expand on answers, you remain in control of the information you receive.

The Bottom Line

Both traditional search engines and AI apps have their place. As these technologies evolve, you’ll have more options than ever to find the information you need-quickly, accurately, and in a way that suits your style. Don’t be afraid to try out these new tools; you might find they make your online life a little easier and a lot more enjoyable.

Members helping members,

Buddy Holt, President
Tellico Village Computer Users Club

Filed Under: Monthly Bulletin

March 2025 Newsletter

June 1, 2025 By TVCUC Admin

President’s Message

This month’s newsletter will focus on two important aspects of our club’s service to our members and our community:

FLS (First Level Support)

The FLS team remains dedicated to providing exceptional support to our members. We need volunteers for our FLS team, the primary support group at the TVCUC. Several years ago, we received approximately 45 calls for assistance each month; however, the number has surged to over 100. These requests typically involve tasks such as reconnecting printers and routers, transferring files between computers, and providing reassurance during scam incidents. These activities are not particularly technical and can be learned by most individuals who are willing. Volunteering for a few hours each month offers immense satisfaction to our FLS team members, as they get to assist others while keeping their minds active.  Helping others not only benefits the volunteers by keeping them mentally engaged and part of a great team, but it is also greatly appreciated by our members.  If you are interested in learning more about this opportunity to help your fellow club members, please email us at admin@tvcuc.org.  

TAP (Technology Access Program)

TAP continues to donate an average 50 computer systems a month to deserving organizations.  Additionally, we’re seeking volunteers for TAP. We’ll train anyone interested in assisting us with the refurbishing of donated computers. Volunteers do not need to be computer experts; our comprehensive written procedures provide excellent guidance through the processes. If you’re proficient in using a computer, we’d love to have you join our team. The hours are highly flexible, and the number of hours you choose to volunteer is entirely up to you. Recently, TAP was showcased in a documentary produced by the Tellico Village Network and provides an in depth look into TAP’s incredible work. Click here to watch TVN Video. 

If you’re interested in learning more about helping us provide this invaluable service to our community, please email us at admin@tvcuc.org.

Guess who might be listening to you:

Posted: March 18, 2025 by Pieter Arntz

Amazon has announced its Echo devices will no longer have the option to store and process requests on the device itself, meaning your voice recordings will now be sent to the cloud for processing.

In an email sent to customers, Amazon explained that the feature “Do Not Send Voice Recordings” will no longer be available beginning March 28, 2025.

The reason for this change? AI.

“As we continue to expand Alexa’s capabilities with generative AI features that rely on the processing power of Amazon’s secure cloud, we have decided to no longer support this feature.”

Reportedly, the change specifically affects the fourth generation Echo Dot (4th Gen), Echo Show 10, and Echo Show 15 devices, for customers in the US with devices set to English.

Best advice: mute these devices when not using them.

Note: Information on this, and many other day to day questions, can be quickly found by going to our Website, click here.

Members helping members,

Buddy Holt, President
Tellico Village Computer Users Club

Filed Under: Monthly Bulletin

February 2025 Newsletter

March 1, 2025 By TVCUC Admin

President’s Message

As we step into February, it is an ideal opportunity to review and enhance our digital security practices to safeguard our online presence. This month, we will highlight the significance of implementing multi-factor authentication as a crucial component of our security measures.

Now for some club updates:

First Level Support

The FLS team remains dedicated to providing exceptional support to our members. In January alone, your team responded to an impressive 120 calls from members seeking assistance. This remarkable achievement surpasses the previous monthly record set in July 2024, which was 110 calls.

TAP

TAP donated 36 computer systems to deserving organizations in January, Twenty-one of these systems were specifically donated to SOLS Write House in Knoxville. For more information, please visit their website: https://www.solswritehouse.com.

Tours

Bob Kutschera conducted tours of Mastercraft and Proton Therapy this month. However, the tour of the 911 Dispatch Center was postponed to March 3rd due to inclement weather.  Keep an eye out for future tours of these excellent organizations.

Membership

We had two club members volunteer to serve as Trustees and assist the Treasurer in our annual financial review. They are currently undergoing an orientation to familiarize themselves with the club’s functions, which will help them prepare for the review in March.

I thought it may be interesting to share our membership numbers with you (based on January 2025 data):

The Jan 31, 2025 Numbers are:Total
Households: 550
Members: 932
PC Only Users:611
MAC Only Users: 231
Both PC and Mac Users:90

Security

Multi-Factor Authentication (MFA, also known as 2FA) adds an extra layer of security by requiring multiple forms of verification before granting access to an account. Instead of relying solely on a password, MFA combines two or more authentication factors:

  1. Something You Know – A password or PIN.
  2. Something You Have – A mobile device, security key, or authentication app.
  3. Something You Are – Biometric verification like a fingerprint or facial recognition.

Importance of MFA:

  • Protects Against Weak Passwords – Even if a password is compromised, an attacker cannot access the account without the second factor.
  • Defends Against Phishing & Social Engineering – Even if a user unknowingly shares their credentials, hackers still need the additional factor.
  • Reduces Risk of Unauthorized Access – Even if attackers steal login credentials through data breaches, MFA blocks them from logging in.
  • Enhances Security for Sensitive Accounts – Essential for banking, work emails, and personal accounts containing critical information.

By requiring multiple verification steps, MFA significantly strengthens account security and minimizes the risk of cyber threats. This may seem to be a “pain in the rear”, but think of it as being a dead bolt added to your front door lock, we add it for our protection.

Note: Information on this, and many other day to day questions, can be quickly found by going to our Website, click here.

Members helping members,

Buddy Holt, President
Tellico Village Computer Users Club

Filed Under: Monthly Bulletin

  • 1
  • 2
  • 3
  • …
  • 10
  • Next Page »

Join TVCUC Now!

To Join or Renew your membership with the Tellico Village Computer Users Club utilize the form on the TellicoLife website: JOIN TVCUC

For help signing up or logging in to TellicoLife, view the TellicoLife How-To Videos

Search our Site

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors

Donate to TVCUC!

TVCUC welcomes donations of both used computer equipment and cash:

Make an Equipment Donation to TAP
Make a Cash Donation to TVCUC

  • Home
  • FLS
  • Technology Access Program
  • Mac SIG
  • Help Resources

Copyright © 2025 Tellico Village Computer Club • Webmaster webmaster@tvcuc.org