As you begin implementing your 2021 marketing plans, one big consideration should be “How do my clients WANT me to communicate?” If a prospect contacts you via Facebook then it’s reasonable to assume they want a Facebook response. Don’t demand that they call you because you like talking on the phone better. Start with “They’re a FB person” and respond. Then you can move them to a phone call or in person meeting as needed. First you want to meet them where they are. One client I work with never responds to an email no matter how urgent the subject. But they answer to every call. So why frustrate both of us by sending emails? I’m not a big text person. When I have a client who is, I respond by text then forward their text and my answer to my email so I have the continuity that I like. But I don’t expect them to change to fit my preferences!! Communication is definitely a case where the client is always right. Here are some more suggestions.
Smart Phone Use
Here is an excellent article about steps YOU can take to control your phone usage. It cites studies about improved relationships, mood, mental health.
Videos
If you are considering adding videos to your marketing tool kit, here is a good article describing the process.
Social Media and Customer Service
How To Use Social Media for customer service – Good explanation with examples of how you can offer customer service on social media platforms. Many people expect customer service at their finger tips so it can be worth your time to offer it.
Common Ways Attackers Are Stealing Your Password
Today passwords are a part of our everyday life. It is critical to protect our information from getting into the wrong hands. Unfortunately, a weak password is a weak defense against hackers. Here are a few ways hackers are trying to get a hold of your information and how you can help stop them.
1: Credential Stuffing
This happens when an attacker already has your login info – typically from a data breach at a large company like Target, Bank of America, etc. who store credit card and login info for their clients. They will log in as you and impersonate you to make changes on your account. If you have used the same password on different accounts, they now have access to all of them. Your best defense is to make sure you have strong passwords and different passwords for every site.
Read how to use a password pattern.
2: Password Cracking Techniques
These are techniques that attackers use to “guess” passwords to accounts. They have algorithms that can crack a weak password. The best way to prevent this is to make sure you have strong passwords that aren’t repeated for logins to other sites. Use a mixture of upper case letters, lower case letters, numbers and characters. Never use names or real words. Not even your favorite cat’s name!
3: Shoulder Surfing
Shoulder surfing is when someone around you watches to see the private information you type on your keyboard or on your screen from over your shoulder. It can happen at the grocery store or the ATM. We have to be aware of our surroundings whenever we are typing in sensitive information in a public place.
4: Social Engineering
This is when someone tries to get you to reveal sensitive information by pretending to have clearance for it. If a customer service agent is calling you and wanting to verify your credentials, make sure you verify them first! Never give passwords or private info to strangers no matter who they claim to be.
Microsoft, Google, the IRS, Dell will never call you. Never.
5: Phishing
Phishing is similar to social engineering but it’s more specific to email. Hackers will create an email looking like it’s from a legitimate source prompting you to type in information. If you are ever questioning the legitimacy of an email, call the person sending the email. If it’s a large corporation, open a new browser window and log in directly from their website. Never click the links in the email to log in.
6: Wireless Sniffing
This happens when a hacker collects data that is being sent between your computer and someone’s server. If a site isn’t using a TLS/SSL Certificate, the information being sent isn’t secure. You should see a closed padlock symbol on the left end of the site’s address telling you it is a secure site. If the padlock isn’t there, don’t give them any information! Not even your email.
7: Man-in-the-Middle Attack
This is similar to wireless sniffing but the information continues on to the server and back to your computer while the “man in the middle” is observing it. Once again, your best protection is to make sure the sites you visit have an updated TLS/SSL certificate. If you are using the Chrome browser, Google will alert you as to when a site’s certificate is bad and if it does you shouldn’t input any information.
Your Computer Lady recommends Last Pass as a storage vault for passwords and private data. Visit their website.
The information for this article was found here.
Zoom Apnea
It’s a real thing! Zoom apnea. Read about it and STOP it!
Zoom Room Exhaustion is Real
I have felt it myself and talked to several people experiencing total exhaustion after a day of sitting in front of the computer in a series of Zoom meetings. How can sitting be soooo hard?! Here is a good explanation of what is happening and some tips to prevent it.
Clean House
Decluttr.com
|
Phones, gaming consoles, video games, tablets, Apple and Samsung wearables, MacBooks, CDs, DVDs
|
Gazelle.com
|
Phones, tablets, iPods, Apple computers
|
Amazon.com
|
In-store credit for phones, Kindles, gaming consoles, smart speakers, media players, tablets
|
BestBuy.com
|
In-store credit for phones, tablets, MP3 players, video games, gaming consoles, Apple computers, PC computers, cameras, wearables, TVs
|
Target.com
|
Phones, tablets, gaming consoles, wearables, smart speakers
|
Walmart.com
|
Phones, tablets, all types eReaders, gaming consoles, smart speakers, MP3 players
|
PayPal
Let’s Meet Remotely!
Business Can Continue With Online Meetings!
Your Computer Lady was an early adopter of online meetings. It’s often my preferred method of meeting for its simplicity and time-savings.
But with COVID-19, online becomes more important. You can keep your business functioning in many ways with online meetings.
Yes, you can email but using video calls or online meetings allows easier, more clear communications.
What’s App
This is an app for iPhone or Android that allows chat as well as video calls. I work with a programmer in Germany and we meet 2-3 times a week via video. After you download the app, you place a video call just like you would a phone call. Apple provides a similar service called FaceTime. (What’s App is free!)
Zoom or GoToMeeting
Online meetings give you video, chat, screen sharing with 1 or 1000 people. There are free accounts with limited features and more robust plans that have monthly fees.
Your Computer Lady can help.
- You can use my account for a one time meeting.
- I’ll help you set up your own account.
- I’ll be your tech support during a meeting.
- I’ll train you to use the meeting service.
We are all going to need to make changes and adjustments during this crisis. But there’s no need to panic. We can do business! We can find work-arounds and hacks to make it happen.
Call me if you have questions or need assistance.
PS – You can use the same online meetings to stay in touch with family and friends. If you can’t do an in-person visit, jump online. Share those smiles!