Online Security & Website Optimization
-
Upload
techgenstaffer -
Category
Technology
-
view
116 -
download
2
description
Transcript of Online Security & Website Optimization
![Page 1: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/1.jpg)
Joint Webinar: Online Security & Website Optimization
Presented by: Reid Johnston, Tim Karlberg, Bryant Crock & your host - Aleksandr Yershov
![Page 2: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/2.jpg)
Today’s Agenda•Introduction•Online Security- presented by Reid Johnston, president/founder of TechGen Consulting Inc.•Q & A session with Reid•Website Optimization & 10 Characteristics of Super-Achieving Sites- presented by Tim Karlberg & Bryant Crock, internet marketing team at August Ash Incorporated.•Q & A session with Tim and Bryant
![Page 3: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/3.jpg)
Online Security
![Page 4: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/4.jpg)
TechGen| Quick Background
•Located in Minneapolis, MN
•10 full-time employees; providing IT support since 2000
Core Services:
•Unlimited Remote/Help-Desk Support•Cloud Services Management•Data Security Solution•Disaster Recovery Solution•Mobile Device Management•Anti-Spam & Antivirus Mgmt.
Core Solutions: Unlimited StressFree IT™ & Customized StresssFree IT™
![Page 5: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/5.jpg)
Protect Yourself Online – Use Strong Passwords
Examples of Recent Breaches where passwords were exposed:
•Yahoo! – July, 2012
•Formspring – July, 2012
•Nvidia – July, 2012
•LinkedIn – June, 2012
•Last.fm – June, 2012
•eHarmony.com – June, 2012
•Twitter – May, 2012
![Page 6: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/6.jpg)
Protect Yourself Online – Use Strong Passwords
Commonly used passwords:
•123456
•password
•Welcome
•abc123
•123456789
•12345678
•Ninja
•Sunshine
•Princess
•qwerty
![Page 7: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/7.jpg)
Protect Yourself Online – Use Strong Passwords
What Makes a Strong Password?
A combination of uppercase, lowercase, numbers & symbols: !@#$%^&*()
NOT: “password”, your name, your birth date, or other easily guessable information (including common words): jessica1 or summer2012
Consider At Least 8 Characters
Consider using a passphrase “1Fish2FishredFishblueFish2012!”
![Page 8: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/8.jpg)
Protect Yourself Online – Use Strong Passwords
Important Password Recommendations:
•Change your passwords periodically
•Never use the same password for multiple online services
How Do I Keep Track of Everything?
Roboform.com - $20/year. (1st year $9.99)
Lastpass.com - $12/year.
![Page 9: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/9.jpg)
Protect Yourself Online – Use Strong Passwords
What does a Password Manager Do?
•Automatically enters passwords into sites you visit
•Encrypt all of your passwords – protected by a strong “master” password
•Synchronize passwords between multiple computers (mobile devices too)
•Store other types of data in encrypted format (account #’s, etc.)
![Page 10: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/10.jpg)
Protect Yourself Online – Keep an eye out for Phishing Sites
What is Phishing?
•Fake emails designed to look legitimate
•Fake sites that look legitimate (Bank, Insurance, etc.)
•Harvesting confidential information
![Page 11: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/11.jpg)
Protect Yourself Online – Keep an eye out for Phishing Sites
Ways to Protect Yourself:•Legitimate companies will never ask for your personal information via email: Username/Password/Bank Information
•Never click a link on an email and sign in to a website, instead open your browser and visit the site directly
•Report phishing emails to your email provider
•Keep your browser up to date
•Using Firefox, Safari, and Chrome will leverage Google’s Safe Browsing Service
- Google locates hundreds of thousands of phishing pages annually and blocks them
![Page 12: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/12.jpg)
Protect Yourself Online – Keep an eye out for Phishing Sites
Example:
![Page 13: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/13.jpg)
Protect Yourself Online – Keep an eye out for Phishing Sites
Example:
![Page 14: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/14.jpg)
Protect Yourself Online – Personal Mobile Devices in the Workplace
BYOD (Bring Your Own Device)
Employees are using their own tablets and phones to access company information
The Pros:
•Lower up-front cost than providing mobile devices to everyone
•Many tasks are completed sooner / more efficiently
•More attention is paid to metrics – easier access
•Employees use the devices they like - Android vs. Apple
•Equipment is often more “current” than company issued equipment
![Page 15: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/15.jpg)
Protect Yourself Online – Personal Mobile Devices in the Workplace
BYOD (Bring Your Own Device)
The Cons:
•Difficulty in applying acceptable use policies to personal devices
•Protecting company data can be difficult
•Regaining access & protecting data stored on devices during employee termination
![Page 16: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/16.jpg)
Questions & Answers
Reid Johnston612.279.2400
Poll Question: Do you use your personal mobile device to access company systems? (Email, files, etc.)
![Page 17: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/17.jpg)
10 Characteristics of Super-Achieving Sites
![Page 18: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/18.jpg)
August Ash | Quick Background
•Located in Bloomington, MN
•25 full-time employees; now in our 14th year of business
•Top 25 Web Development & Design Firms of Minneapolis-St. Paul (MPLS-StP Business Journal)
Core Services:
•Web design•Ecommerce•Search engine optimization (SEO)•Pay-Per-Click (PPC) management•Email marketing•Social media guidance
![Page 19: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/19.jpg)
1. Modern and Functioning
•First impression
•Does it feel dated?
•Does it work?
•These build trust
![Page 20: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/20.jpg)
2. Understanding Target Keywords
•Which bring in the most traffic?
•Which bring in the most sales?
•Where do these keywords rank?
•On which pages are these keywords targeted?
![Page 21: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/21.jpg)
3. Built on a Capable CMS
•Reduces dependence on your developer
•Allows for easier optimization of site
•Saves you money
![Page 22: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/22.jpg)
4. Know your competitor’s SEO
•As important as understanding your own
•Target Keywords
•Content & Navigation Strategy
•Identify the “Low Hanging Fruit”
![Page 23: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/23.jpg)
5. Effective Content
•Original
•Optimized for humans
•Optimized for Google
![Page 24: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/24.jpg)
6. A Link Worthy Website
•Great content
•Great promotion
•Make it easy for visitors to link & share content
![Page 25: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/25.jpg)
7. Frequently Updated
•The role of frequent updates
•Why blogging works
•What it says to new visitors
![Page 26: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/26.jpg)
8. Analyze Every Detail
•Optimization - to take full advantage of
•Visitor patterns
•Search Engine Index
•Broken URLs – 404 Errors
![Page 27: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/27.jpg)
9. Clear Calls to Action
•Even in 2012, web users still need guidance
•Don’t overlook the obvious
•Converting from the perspective of a new visitor
•Always include a next step
![Page 28: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/28.jpg)
10. Gain Visitors and Keep Them
•Balance between usability and SEO
•Keep them coming back for more
![Page 29: Online Security & Website Optimization](https://reader035.fdocuments.us/reader035/viewer/2022062419/559a649d1a28ab12698b4718/html5/thumbnails/29.jpg)
Question & Answer
Tim Karlberg & Bryant Crock952.851.9400
Poll Question: Have you ever reviewed (in detail) the stats for your website’s performance?