Yes! Let’s break the monotony! Your Computer Lady is available to help you organize, create and monetize your marketing so that neither you nor your prospects are bored! We create marketing solutions from chaos!
6 Small Business Lessons to Take Into 2021
Cornerstone Cabinet Company – Update!
YCL has been doing social media posting for Cornerstone since 2015. We coordinate their blog posts, with their email marketing campaign and with their social media posts on Facebook, Instagram, Pinterest and Google My Business. Owner, Chris Boulton, understands the value of photography so he has professional photos taken of projects that we can use with all aspects of the marketing campaign. The pictures with Chris’ explanation of the project builds confidence in prospects’ to help them choose to work with Cornerstone Cabinet Company. Using photos and information multiple ways in multiple places makes the marketing work effective as well as productive!
Common Ways Attackers Are Stealing Your Password
Today passwords are a part of our everyday life. It is critical to protect our information from getting into the wrong hands. Unfortunately, a weak password is a weak defense against hackers. Here are a few ways hackers are trying to get a hold of your information and how you can help stop them.
1: Credential Stuffing
This happens when an attacker already has your login info – typically from a data breach at a large company like Target, Bank of America, etc. who store credit card and login info for their clients. They will log in as you and impersonate you to make changes on your account. If you have used the same password on different accounts, they now have access to all of them. Your best defense is to make sure you have strong passwords and different passwords for every site.
Read how to use a password pattern.
2: Password Cracking Techniques
These are techniques that attackers use to “guess” passwords to accounts. They have algorithms that can crack a weak password. The best way to prevent this is to make sure you have strong passwords that aren’t repeated for logins to other sites. Use a mixture of upper case letters, lower case letters, numbers and characters. Never use names or real words. Not even your favorite cat’s name!
3: Shoulder Surfing
Shoulder surfing is when someone around you watches to see the private information you type on your keyboard or on your screen from over your shoulder. It can happen at the grocery store or the ATM. We have to be aware of our surroundings whenever we are typing in sensitive information in a public place.
4: Social Engineering
This is when someone tries to get you to reveal sensitive information by pretending to have clearance for it. If a customer service agent is calling you and wanting to verify your credentials, make sure you verify them first! Never give passwords or private info to strangers no matter who they claim to be.
Microsoft, Google, the IRS, Dell will never call you. Never.
5: Phishing
Phishing is similar to social engineering but it’s more specific to email. Hackers will create an email looking like it’s from a legitimate source prompting you to type in information. If you are ever questioning the legitimacy of an email, call the person sending the email. If it’s a large corporation, open a new browser window and log in directly from their website. Never click the links in the email to log in.
6: Wireless Sniffing
This happens when a hacker collects data that is being sent between your computer and someone’s server. If a site isn’t using a TLS/SSL Certificate, the information being sent isn’t secure. You should see a closed padlock symbol on the left end of the site’s address telling you it is a secure site. If the padlock isn’t there, don’t give them any information! Not even your email.
7: Man-in-the-Middle Attack
This is similar to wireless sniffing but the information continues on to the server and back to your computer while the “man in the middle” is observing it. Once again, your best protection is to make sure the sites you visit have an updated TLS/SSL certificate. If you are using the Chrome browser, Google will alert you as to when a site’s certificate is bad and if it does you shouldn’t input any information.
Your Computer Lady recommends Last Pass as a storage vault for passwords and private data. Visit their website.
The information for this article was found here.
Giving Reviews on Facebook
Best Option
This is the best method because reviews stay on the Reviews page forever.
Go to A’s Business Page
Click Reviews on the left side navigation
Click the Yes button under Do you recommend A?
A window will open to allow you to write a recommendation.
Confirm that the post is set to be Public.
Click the Post button when you are done.
You can only leave one Review per Business Page. If you want to change or update the Review, you have to delete the first review and re-do it.
Alternate Method
Go to A’s Business Page
At the top of the News Feed, click in the “Write a post…” field.
Write a recommendation.
You could add @person’s name so the post would show up on their personal profile
You can add hashtags, links to a blog post or website, etc. just as you would any post
This post will be sent out to the Business Page’s Likes as a normal post would be.
This post will work down the News Feed as new posts are added. It will only be seen for a short period of time.
Exchange Reviews
It’s a great idea to arrange mutual reviews with colleagues and business partners. They would follow the same steps on your business page. I recommend doing the posts 2-3 days apart in case you have shared Friends and/or Likes.
- « Previous Page
- 1
- …
- 65
- 66
- 67
- 68
- 69
- …
- 101
- Next Page »