Category: <span>Casey Design 2.0 Blog</span>

“She Who Would Be King” Episode 2: “Sasha”

Please Check out my new podcast “She Who Would Be King!”

In this second episode of “She Who Would Be King”, Annakah of Bananakah sails her mighty ships into the ocean, only to run into danger! Thunderstorms in the endless sea leave her and her crew lost. But, don’t worry. We know Annakah always defeats her fears, bad luck and trouble! Annakah never gives up! In “Sasha” she discovers mysteries, magic and maybe even meets some new friends and scary enemies! I think you’ll enjoy Episode 2: “Sasha”.

If your child, niece, little or big sister has a story of their own, I’d love to read it! Each month I would like to be able to make a listeners story into a full live podcast. Please email any stories to Until the website is up, that is my  contact email. I will read all submitted stories. I’d love to feature young listeners work as much as possible! I may take some liberties in grammar, etc. to get the work online.

Please review this podcast. It really helps it get off the ground. If you enjoy “She Who Would Be King” or your kids do, please share it as much as possible. On digital channels or just by telling other parents, people who like kids and believe in strong, empowered girls.

Only Secure As Our Weakest Link

A common topic among digital communications and the IT professionals lately has been the dangers we all face if our digital identity security is compromised. Today we all have our own individual digital identity. Our digital profile is created over time from everything we have ever done using digital channels.

It’s concerning that some people really don’t realize that they are only as safe as their weakest online account. Whether it’s a business or an individual, our security is only as strong as the weakest link. This “weakest link” in our least secure data access point on the Internet.

Most of us forget about some of our old accounts or emails we created. These are vulnerable access points into more valuable personal data. These insecure points can be old email accounts, unused online memberships, eBay or other old digital commerce accounts, emails left over from previous employers, etc.

These weak points can be weak links into our digital profile. Information from these weaker accounts can give hackers easier access to info needed to get at our valuable accounts.

These access points and accounts that may contain: Personal information, reused passwords, phone numbers, family members names, etc. All are potential ways into our existing digital channels.

The danger is far greater than just people using our credit cards. Many people think the problem isn’t that serious because it’s just “Visa replacing my money and sending me a new card”.

Some of these other concerns: Using your identity to access to your other accounts, opening new credit card accounts, gaining access to your social security number to work under your identity, approve major property purchases, open false loans, open online selling accounts for money laundering and reselling stolen goods, etc.

Some Recommendations to Protect Yourself

  1. Use an antivirus and malware application and leave it on at all times.
  2. Never use your debit card online. This gives out your bank account details and direct access to your money.
  3. Delete old social media and email accounts.
  4. Use a separate password for each website and complex passwords that contain numbers, symbols, capitals and lowercase characters.
  5. Keep a digital record of your passwords in an Excel or other spreadsheet. Be sure the spreadsheet has a master password to protect it.
  6. Turn on and use your computer’s firewall. Only allow access for software and sites you are sure you can trust.
  7. Consider adding security extensions to your browser such as: Ghostery to monitor and easily control the way websites track you. Click&Clean to delete your tracks online to minimize private info about you in your browser history.
  8. Use two-factor authentication. This is the service that sends you a text or a call when you log-in to your accounts as a secondary security check. This results in a huge increase in security, but many people skip it since it’s a bit annoying.
  9. Check and verify old employers have removed your profile and email from their systems. If they need to stay open, periodically check them to be sure they are still secure.
  10. Create and use only new and individual passwords on all websites. Retire old and reused passwords.
  11. Use passwords that don’t include info related to your personal information such as birth dates, children’s or spouses names, your address, phone numbers, your age or date of birth.
  12. Use a password manager such as LastPass, Dash Lane, Keeper or another with positive reviews. Many password managers are free or very inexpensive.
  13. Consider using a VPN (virtual private network) when accessing your financial accounts, paying bills or other sensitive business tasks online. Private Internet Access and TorGuard are a couple VPN developers that are proven to be secure. These mask your IP address, so anyone tracking you cannot reach your digital access point.

Hope this has some value to it’s readers. Approach the Internet in general with skepticism to be safer online.


Grandmasters Wing Chun Kung Fu

Grandmasters Wing Chun went live today!

Thank you to Mike Selner of for his web hosting, knowledge and technical expertise!

Be sure to check it out if you want to become like Bruce Lee and Ip Man!


Hotz Law Website Launched!

We just launched a new website for our fantastic client, Darrel Hotz Law Offices in Toronto, Canada at:


Long Hours = Casual

Well, not the most professional I’ve ever looked, but with this much going on, who has time to dress up just to do work?
Now my great customers can now see I am working on your projects by day and by night!

Mac’s Not Immune Anymore

Mac’s Not Immune Anymore

Hello fellow Mac users. We are moving into the PC world more every day. If you have antivirus, spyware and malware removal tools and use them regularly, you’re a smart person. Mac’s are no longer immune from these things just because they are Apple computers. Those days of being safe because you’re on a Macintosh are long gone.

Dark Web

Since the web and Internet are my business, I feel it’s my responsibility to know as much as possible about the Internet. The more I know the better. I recently spent a little time learning about the Dark Web. I feel if I don’t know something, I’m more likely to fall prey to it.

Staying Safe

I thought my Mac based system was secure. I use a VPN, regularly run malware detection software, delete suspicious cookies, use an Ad Blocker, etc. Reading about the Dark Web was disturbing. I decided to run a deep scan of my whole system with Mac versions of Bitdefender’s Antivirus and cross check with AVG Antivirus, as well as running MalwareBytes malware removal tool, CCleaner and PrivacyScan. I checked all my drives and compressed archives from my years in business. That meant deep scanning nine drives and partitions. The process took about 24 hours in total!

Was I Protected?

Well, I wish I could say it was 100% clean, but despite my efforts I located and removed adware, malware and a few viruses engineered for the Mac. Without running complete and deep scans with excellent software, not all these threats showed up. It shows how diligent we need to be to protect our data and privacy.


New Updates at Dynamic Family Chiropractic

Check out the new website changes at our customer’s website at Dynamic Family Chiropractic!


Cut & Paste Files on a Mac!

Yes Virginia! There Is A Copy-Paste Function To Move Files In The Mac OS!

I’d love to take credit for this one, but the source is another website. My Adam the computer science major and I debated this one. I have to admit Adam, you were correct!

The Short Answer

If you want the short answer and are a seasoned Mac user:

  1. Select files you want to move in the Finder.
  2. Select “copy” or use the key commands “Command-C”
  3. Open the place where you wish to move the files to in the Finder.
  4. When you wish to move them, instead of the standard copy command “Command-V” instead use”Command-Option-“V””
  5. The files will be moved to the new location.

For more instructions on how this works, here is a link to the source website:

Fix Apple Keyboard Function Keys

Ever have one important key go out on a keyboard and don’t want to buy a new keyboard over one key? Here is a way to work around a broken command, control or option key by remapping another key to do it’s job. This is on a Mac using Mavericks 10.9.5 OS:

Go to the System Preferences located in the Dock:

Locate the Keyboard setting

At the bottom of the dialog box, select “Modifier Keys”

After clicking on “Modifier Keys’ you’ll see the default settings for the command, control, option and cap lock modifier keys. By default they all match their original name, but they can also be remapped to do the same thing when other keys are pressed.

Remap the key of your choice to the new modifier key by changing the function the key applies. In my case I changed the control key’s function to “option key”

Exit the settings by clicking “ok”

Now the key you remapped will apply that broken keys function. In my case now my control key acts as the option key.

Where are the basic business practices?

Common complaints from customers about their experiences working with website designers:
The following are the most common complaints I hear and my responses about how we do business:

  • The designer doesn’t call us back or respond to emails.

We check texts, messages and email daily and respond directly and quickly.

  • They said they were a website designer, but they don’t know what they’re doing.

We have been designing websites, digital media and marketing for over 20 years and I have taught digital media and design at a college level for six years. Unfortunately there are “website designers” out there who just install WordPress or buy some software and call themselves a “website designer”

  • They don’t care if the website has problems, even when they are told about it!

We care very much about everything we create and our customers. We are primarily are a word-of-mouth business and your opinion means very much to us.

  • They did a poor quality job for a fairly low price, but the website isn’t presentable and they won’t fix it or refund our money.

We take pride in our work. That would be unethical and something we don’t do. I’m always sorry to hear a customer had that experience.

  • They did a basic job, but now want significant amounts of money to finish it.

Our estimates are very clear, we define our work, the project and hourly rates, etc. There are no surprises at the end of the project. Some web designers will underbid on projects to get the project, then later add on expensive fees to finish the work and hold the client’s website hostage.

  • They have another full time job which is their priority and don’t keep up on our website.

We have multiple clients, but I am committed to my customers. Casey Digital Design which is my only full time business. I understand the need for a full time job, but their employer deserves their attention and commitment.  The customer also deserves the complete commitment of the website designer to devote quality effort and attention to their project.

  • They designed our website the way they wanted and didn’t listen to what we needed.

When we design a website with our client, their goals define the “function” or the core concept that is our guide for designing the “form” or website. We work together with our customers and I assist them in creating the digital communications and website design that works for them.

  • They can’t be reached and we can’t gain access to anything!

We share and communicate everything we’re working on with our customers. I never liked the idea of the “webmaster” that keeps control of everything.

  • We want to leave, but the designer won’t give us the passwords or basic website files.

When we complete a project, we provide all passwords, usernames and a database/file backup of the entire website to our client on DVD disk.  If all fees have been paid for the website, the client should have access to all relevant usernames, passwords and files. * Check your original agreement on ownership of the website design itself. In some cases it is the intellectual property of the designer by default.