2010-08-31

What You Need to Know About Google

If you are not already familiar with ‘Google’, you can go ahead and navigate away from this blog right now.  However, if you’re looking to get the most exposure on (by far) the most widely used search engine, there are a few things that you should know. 

Google Acquired YouTube in 2006

That’s right, two of the most widely used websites on the web are owned by the same organization.  If you don’t currently have a YouTube Channel – I would STRONGLY recommend that you set one up immediately if not sooner.  If you’re wondering how YouTube can be used for business, check out our past blog:  YouTube as a Business Tool.

What’s important to consider is that the same algorithms (i.e. search logic ‘instructions’) that are used by Google are used by YouTube.  For this reason, you should use care in adding keywords and descriptions to every video that you post on your channel.  This will help you get the most exposure when web users search Google.

Take the following instance: 

Go to Google and search:  ‘Guaranteed AutoMotive Supersale’ or simply CLICK HERE.

googlescreen

What we are looking at here is the fact that just below the second link, there are two videos from YouTube that appear in the result set – both relevant to the search terms.

Also, please make note that the results for G&A Marketing dominate the page – showing the user that this company is active and progressive with regards to the Internet.  Think what impressions you draw when a single company has multiple listings appear on a Google search.

 

listing

Google Maps will list your business location(s) for Free 

If you have ever searched for a business address on Google Maps then you will see there are multiple businesses listed where the building houses multiple tenants.  Getting listed is as simple as signing up for Google Places (a free service) and submitting your information. 

Signing up for this service allows you to not only submit your address, but also a photo icon, web and email links, video (via YouTube) links and services/products offered by your organization. 

By doing so, you are making sure your business is indexed in a map search as well as in the Google Directory.  In addition, you are increasing your chances of being found by random web surfers as well as creating a better impression with the additional information that you submit.

Google Owns Blogger.com (AKA Blogspot.com)

If you have a blog or are considering a blog for your organization, you should use Blogger.com.  This is a free service and the look/feel can be customized to match your organization.  A blog can be an effective tool to touch and communicate with your customers.  Because Google owns Blogger.com – this service will be indexed more effectively by Google.  Start a blog today using Blogger.com to expand your online reach.

Google Offers Free Analytics (i.e. tracking traffic on your website)

If you are not already utilizing Google Analytics, you should contact your web developer (or AI Software) to find out about the benefits of tracking your web traffic.  Google Analytics offers a very deep stat tracking system that will allow you to review hits, unique users, key terms, traffic sources and much, much more.  This will help evaluate your overall web strategy as well as give you insight on where traffic is coming from.  CLICK HERE to explore the features and benefits – and, let us know if you need help setting this service up.

What’s All This Mean?

If you are not already utilizing some or all of these services, then you should waste no time in setting up an account on Google to start taking advantage of such an effective (and free) suite of services.  If you are ever in need of assistance, please contact me and we can help you out. 

Terry
terry@aisoftwareinc.com
32x3232x32 32x32 32x32 32x32

2010-08-12

10 Misconceptions of Safe Web Browsing

10 misconceptions of safe web browsing

Many web users today are suffering from misconceptions about safe web browsing.

You might think you’re being safe, however, a newly infected web page is discovered online every couple seconds. It is nearly impossible to stay up to date on infected sites—no matter your competency levels and experience with the World Wide Web.

To start this assessment, ask yourself the following:

  • Do you practice ‘safe’ web browsing?
  • Do you avoid ‘risky’ sites?
  • Do you limit the time spent online during work hours?
  • Do you use a secure web browser?
  • Do you know what a ‘risky’ site looks like when you visit it?

If you answered “Yes” to any of these questions, then you MUST read this article!

Misconception 1: The web is safe. I know this because I’ve never been infected.

You may not even know you’re infected. Most malware attacks are designed to steal personal information and/or passwords. Some will use your machine for distributing spam, or other inappropriate content without your knowledge. Most users have no idea when they have been affected by malware and/or a viral attack.

Misconception 2: Users in my organization don’t waste time surfing inappropriate content.

If your organization does not have web filtering in place, then you would have no idea what users are doing on their machine(s). Nearly 50% of corporate Internet use is going unchecked today. That is an average of 2 hours per day (per user). More importantly, if employees are exposing their machine(s) to inappropriate content, there can be serious legal ramifications.

Misconception 3: My organization controls web usage through an established policy.

If an employee is smart enough, they can circumvent filtering policies by anonymizing their proxy and visiting any web site they wish to visit. Anonymizing proxies are widely used by students – and now are finding their way into the work force as these children graduate and become gainfully employed. If you do not think this in an issue, you can Google the term: ‘bypass web filter’ – you will find approximately 1.8 million ways to accomplish this task.

Misconception 4: Only sites containing pornography, gambling and other ‘questionable’ content are dangerous.

Trusted sites that have been hijacked represent more than 80% of malware hosting sites. Most of these infected sites are those that you may trust and visit on a daily basis. The reason for this is that popular sites with high traffic are bigger targets for those who wish to distribute malware and viruses.

Misconception 5: Naïve users are the only ones to get malware and viruses on their computer.

Malware from drive-by downloads happens automatically without any user action, other than visiting the site. Therefore, it doesn’t matter what level of computer expertise you have. The fact is, if you are visiting sites on the internet, you are at risk for viruses and malware.

Misconception 6: You cannot get infected unless you download files.

Most malware infections now occur through a “drive-by” download. Hackers inject the malicious code into the actual web page content, then it downloads and executes automatically within the browser as a by-product of simply viewing the web page. The malware is typically part of a professional exploit kit marketed and sold to hackers that leverages known exploits in the browser, operating system or plug-ins to infect the computer and download more malware. Again, it does all of this without a user having to do anything other than visit a hijacked web site.

Misconception 7: Firefox is more secure than Internet Explorer

All browsers are equally at risk because all browsers are essentially an execution environment for JavaScript, which is the programming language of the web and therefore used by all malware authors to initiate an attack. In addition, many exploits leverage plug-ins such as Adobe Acrobat reader software, which runs across all browsers. Although the more popular browsers may get more publicity about unpatched exploits, it’s the unpublicized exploits you should be most concerned about. The fact is, there is no safe browser; when security research firm Secunia tabulated the number of browser exploits reported in 2008, Firefox was actually the least secure.

Misconception 8: When the lock icon appears in the browser, it’s secure.

The lock icon indicates there is an SSL encrypted connection between the browser and the server to protect the interception of personal sensitive information. It does not provide any security from malware. In fact, it’s the opposite because most web security products are completely blind to encrypted connections: it’s the perfect vehicle for malware to infiltrate a machine.

Furthermore, some malware can exploit vulnerabilities to spoof SSL certificates to make users feel more secure or enable devious connections to fake banking sites. There are numerous recent examples of hackers creating elaborate phishing schemes that emulate bank, credit card, or PayPal sites complete with spoofed SSL certificates that are extremely difficult for the average user to identify as fraudulent.

Misconception 9: Web security requires a trade-off between security and freedom

While the internet has become a mission critical tool for many job functions, whether it’s Facebook for HR or Twitter for PR, it’s completely unnecessary to create a trade-off between access and security. A suitable web security solution provides the freedom to grant access to sites that your users need while keeping your organization secure. Policy settings for groups or individuals don’t need to be complex—a few quick steps through a wizard are all a user needs to secure and enable your organization.

When evaluating a web security solution, be sure to focus on the administration tasks you will use most often, such as establishing special policies for users or groups. How easy are these tasks? How much time do they take? How many steps are involved? Is documentation required to navigate through the process? These are all important security questions when managing a network or user group.

Myth #10: Endpoint security solutions can’t protect against web threats

Typically, this has been the case because the web browser is essentially its own execution environment: it downloads content, renders it, and executes scripts all without any visibility outside the browser to endpoint security products. However, this is changing. As a result, it’s opening up a whole new approach to web security, particularly for mobile workers who are operating beyond the traditional boundaries of the corporate network. Live Protection enables real-time malicious site filtering at the endpoint to protect mobile or remote workers who may be operating off a corporate network.

What does all this mean?

In a nutshell, this means that if you do not have a trusted IT partner that is managing security – FIND ONE!

AI Software can help you with this. Contact us today to learn how to keep up-to-date with the most recent security now . . . and in the future.

Terry
terry@aisoftwareinc.com

2010-08-03

How Do I Show Up On Google?

In 1995, the Internet had 16 million users.
In 2000, the Internet had 361 million users.
This Year, the Internet has 1.8 billion users.

This means that if you do not have a solid web strategy, then you are missing out on the most powerful advertising vehicle in the history of mankind.

This begs the question . . . how do I show up on Google?

It's safe to say that any legitimate organization realizes the importance of a professional web site, but a surprising number of organizations are still in the dark when it comes to Search engine optimization (or SEO).

Search engine optimization (SEO) is the process of improving the volume or quality of traffic to a web site or a web page (such as a blog) from search engines via "natural" or un-paid ("organic" or "algorithmic") search results as opposed to other forms of search engine marketing (SEM) which may deal with paid inclusion.

In other words, if you want to show up effectively on Google, you would need to run a SEO campaign.

You may have asked yourself, "Why do I need to hire a SEO (Search Engine Optimization) company? Can't I do the same thing myself?"

Let's explore the correct answer to that question. While it is true that anyone can submit their site to a search engine, there is a lot of knowledge and technique that is required to rank well in them.

SEO Company Benefits

There are many benefits to hiring a professional SEO company. A SEO company knows what search engines are looking for. Each search engine has their own set of rules, algorithms, regulations, etc., that they apply to web sites that become part of their indices or databases.

One of the keys of ranking well in any particular search is knowing exactly what they are looking for and making sure your web pages are designed properly. This is called "optimization" and unfortunately the vast majority of web sites on the Internet are not properly optimized for keywords or phrases related to their subject matter.

A professional SEO company will ensure that your site is optimized properly and not just for search terms that are the most popular but also the most relevant to your business.

A good SEO company will keep up on the latest trends in the search engine industry. They will make necessary adjustments to your web pages or your campaign to accommodate these changes so you do not lose rankings. This is an ongoing process that never seems to end. It is a full time occupation just keeping up with all the change and transition that goes on.

If you want to reach the top of search engine results, it is imparitive that. It is well worth the money you will spend as well the peace of mind knowing that someone else is worrying about your rankings for you.

A good SEO company such as AI Software will actually not cost you anything in the long run because it will amount to increased exposure and increased traffic which in turn will bring increase revenues.

Terry
terry@aisoftwareinc.com