SlideShare una empresa de Scribd logo
1 de 29
Joint Webinar: Online Security & Website Optimization




Presented by: Reid Johnston, Tim Karlberg, Bryant Crock
           & your host - Aleksandr Yershov
Today’s Agenda
•Introduction
•Online Security- presented by Reid Johnston,
president/founder of TechGen Consulting Inc.
•Q & A session with Reid
•Website Optimization & 10 Characteristics of
Super-Achieving Sites- presented by Tim
Karlberg & Bryant Crock, internet marketing
team at August Ash Incorporated.
•Q & A session with Tim and Bryant
Online Security
TechGen| Quick Background

•Located in Minneapolis, MN
•10 full-time employees; providing IT support since 2000
Core Services:
•Unlimited Remote/Help-Desk Support
•Cloud Services Management
•Data Security Solution
•Disaster Recovery Solution
•Mobile Device Management
•Anti-Spam & Antivirus Mgmt.

Core Solutions: Unlimited StressFree IT™ &
                 Customized StresssFree IT™
Protect Yourself Online – Use Strong Passwords


Examples of Recent Breaches where passwords were exposed:

•Yahoo! – July, 2012
•Formspring – July, 2012
•Nvidia – July, 2012
•LinkedIn – June, 2012
•Last.fm – June, 2012
•eHarmony.com – June, 2012
•Twitter – May, 2012
Protect Yourself Online – Use Strong Passwords

Commonly used passwords:

•123456
•password
•Welcome
•abc123
•123456789
•12345678
•Ninja
•Sunshine
•Princess
•qwerty
Protect Yourself Online – Use Strong Passwords

What Makes a Strong Password?

A combination of uppercase, lowercase, numbers & symbols: !
@#$%^&*()

NOT: “password”, your name, your birth date, or other easily
guessable information (including common words): jessica1 or
summer2012

Consider At Least 8 Characters

Consider using a passphrase “1Fish2FishredFishblueFish2012!”
Protect Yourself Online – Use Strong Passwords


Important Password Recommendations:

•Change your passwords periodically
•Never use the same password for multiple online services

How Do I Keep Track of Everything?

Roboform.com - $20/year. (1st year $9.99)
Lastpass.com - $12/year.
Protect Yourself Online – Use Strong Passwords


What does a Password Manager Do?

•Automatically enters passwords into sites you visit
•Encrypt all of your passwords – protected by a strong “master”
password
•Synchronize passwords between multiple computers (mobile
devices too)
•Store other types of data in encrypted format (account #’s, etc.)
Protect Yourself Online – Keep an eye out for Phishing Sites


   What is Phishing?


   •Fake emails designed to look legitimate

   •Fake sites that look legitimate (Bank, Insurance, etc.)

   •Harvesting confidential information
Protect Yourself Online – Keep an eye out for Phishing Sites

   Ways to Protect Yourself:
   •Legitimate companies will never ask for your personal information via email:
   Username/Password/Bank Information

   •Never click a link on an email and sign in to a website, instead open your
   browser and visit the site directly

   •Report phishing emails to your email provider

   •Keep your browser up to date

   •Using Firefox, Safari, and Chrome will leverage Google’s Safe Browsing
   Service
            - Google locates hundreds of thousands of phishing pages
   annually and blocks them
Protect Yourself Online – Keep an eye out for Phishing Sites

   Example:
Protect Yourself Online – Keep an eye out for Phishing Sites

   Example:
Protect Yourself Online – Personal Mobile Devices in the Workplace

     BYOD (Bring Your Own Device)
     Employees are using their own tablets and phones to access
     company information


     The Pros:
     •Lower up-front cost than providing mobile devices to everyone
     •Many tasks are completed sooner / more efficiently
     •More attention is paid to metrics – easier access
     •Employees use the devices they like - Android vs. Apple
     •Equipment is often more “current” than company issued
     equipment
Protect Yourself Online – Personal Mobile Devices in the Workplace

     BYOD (Bring Your Own Device)

     The Cons:
     •Difficulty in applying acceptable use policies to personal devices
     •Protecting company data can be difficult
     •Regaining access & protecting data stored on devices during
     employee termination
Questions & Answers
Poll Question: Do you use your personal mobile device to access
company systems? (Email, files, etc.)




                            Reid Johnston
                            612.279.2400
                    clientrelations@techgen.com
10 Characteristics of Super-Achieving Sites
August Ash | Quick Background

•Located in Bloomington, MN
•25 full-time employees; now in our 14th year of business
•Top 25 Web Development & Design Firms of Minneapolis-St.
Paul (MPLS-StP Business Journal)


Core Services:
•Web design
•Ecommerce
•Search engine optimization (SEO)
•Pay-Per-Click (PPC) management
•Email marketing
•Social media guidance
1. Modern and Functioning

•First impression

•Does it feel dated?

•Does it work?

•These build trust
2. Understanding Target Keywords

   •Which bring in the most traffic?

   •Which bring in the most sales?

   •Where do these keywords rank?

   •On which pages are these keywords targeted?
3. Built on a Capable CMS

•Reduces dependence on your developer

•Allows for easier optimization of site

•Saves you money
4. Know your competitor’s SEO

 •As important as understanding your own

 •Target Keywords

 •Content & Navigation Strategy

 •Identify the “Low Hanging Fruit”
5. Effective Content

•Original

•Optimized for humans

•Optimized for Google
6. A Link Worthy Website

•Great content

•Great promotion

•Make it easy for visitors to link & share content
7. Frequently Updated

•The role of frequent updates

•Why blogging works

•What it says to new visitors
8. Analyze Every Detail

•Optimization - to take full advantage of

•Visitor patterns

•Search Engine Index

•Broken URLs – 404 Errors
9. Clear Calls to Action

•Even in 2012, web users still need guidance

•Don’t overlook the obvious

•Converting from the perspective of a new visitor

•Always include a next step
10. Gain Visitors and Keep Them

  •Balance between usability and SEO

  •Keep them coming back for more
Question & Answer
Poll Question: Have you ever reviewed (in detail) the stats for your
website’s performance?




                      Tim Karlberg & Bryant Crock
                             952.851.9400
                         sales@augustash.com

Más contenido relacionado

La actualidad más candente

The Office 365 Mobile Workplace - Putting your office in your pocket
The Office 365 Mobile Workplace - Putting your office in your pocketThe Office 365 Mobile Workplace - Putting your office in your pocket
The Office 365 Mobile Workplace - Putting your office in your pocketHaniel Croitoru
 
Hot tech-20160421 ep003-idera-performance-play-say_goodbye_to_latency-dez-slides
Hot tech-20160421 ep003-idera-performance-play-say_goodbye_to_latency-dez-slidesHot tech-20160421 ep003-idera-performance-play-say_goodbye_to_latency-dez-slides
Hot tech-20160421 ep003-idera-performance-play-say_goodbye_to_latency-dez-slidesDez Blanchfield
 
WordPress In the Enterprise - East Bay WordPress Meetup
WordPress In the Enterprise - East Bay WordPress MeetupWordPress In the Enterprise - East Bay WordPress Meetup
WordPress In the Enterprise - East Bay WordPress MeetupTech Liminal
 

La actualidad más candente (6)

The Office 365 Mobile Workplace - Putting your office in your pocket
The Office 365 Mobile Workplace - Putting your office in your pocketThe Office 365 Mobile Workplace - Putting your office in your pocket
The Office 365 Mobile Workplace - Putting your office in your pocket
 
Web development
Web developmentWeb development
Web development
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
Hot tech-20160421 ep003-idera-performance-play-say_goodbye_to_latency-dez-slides
Hot tech-20160421 ep003-idera-performance-play-say_goodbye_to_latency-dez-slidesHot tech-20160421 ep003-idera-performance-play-say_goodbye_to_latency-dez-slides
Hot tech-20160421 ep003-idera-performance-play-say_goodbye_to_latency-dez-slides
 
WordPress In the Enterprise - East Bay WordPress Meetup
WordPress In the Enterprise - East Bay WordPress MeetupWordPress In the Enterprise - East Bay WordPress Meetup
WordPress In the Enterprise - East Bay WordPress Meetup
 
(Webinar Slides) PDF basics for lawyers
(Webinar Slides) PDF basics for lawyers(Webinar Slides) PDF basics for lawyers
(Webinar Slides) PDF basics for lawyers
 

Similar a Online Security & Website Optimization

How to Optimize Your Business Website for the Holiday Season
How to Optimize Your Business Website for the Holiday SeasonHow to Optimize Your Business Website for the Holiday Season
How to Optimize Your Business Website for the Holiday SeasonKabbage
 
MSP Marketing Update: Tips to Turn Your Website Into Your Best Performing Sal...
MSP Marketing Update: Tips to Turn Your Website Into Your Best Performing Sal...MSP Marketing Update: Tips to Turn Your Website Into Your Best Performing Sal...
MSP Marketing Update: Tips to Turn Your Website Into Your Best Performing Sal...Kaseya
 
10 Minute Powerpoint
10 Minute Powerpoint10 Minute Powerpoint
10 Minute Powerpointkyrieelayne
 
10 Digital Marketing Trends for 2017
10 Digital Marketing Trends for 201710 Digital Marketing Trends for 2017
10 Digital Marketing Trends for 2017DragonSearch
 
Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)KR_Barker
 
Website Security, Maintenance and Optimisation - Conetix
Website Security, Maintenance and Optimisation - ConetixWebsite Security, Maintenance and Optimisation - Conetix
Website Security, Maintenance and Optimisation - ConetixTim Butler
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
Technology and Business Growth! - What Companies Need To Know
Technology and Business Growth! -  What Companies Need To KnowTechnology and Business Growth! -  What Companies Need To Know
Technology and Business Growth! - What Companies Need To KnowBrian Bluff
 
Introduction to Digital Life
Introduction to Digital LifeIntroduction to Digital Life
Introduction to Digital LifeKR_Barker
 
Introduction to Digital Life june 2016
Introduction to Digital Life june 2016Introduction to Digital Life june 2016
Introduction to Digital Life june 2016CMHSL
 
Superfast Business - Winning and keeping customers online (Dorset)
Superfast Business - Winning and keeping customers online (Dorset)Superfast Business - Winning and keeping customers online (Dorset)
Superfast Business - Winning and keeping customers online (Dorset)Superfast Business
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Concept Searching, Inc
 
Introduction to iPhone App Development - midVentures DESIGN+DEVELOP
Introduction to iPhone App Development - midVentures DESIGN+DEVELOPIntroduction to iPhone App Development - midVentures DESIGN+DEVELOP
Introduction to iPhone App Development - midVentures DESIGN+DEVELOPKeyLimeTie
 
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013Netwoven Inc.
 
Inside eCommerce - Micksgarage Masterclass - April 15th 2014.
Inside eCommerce - Micksgarage Masterclass - April 15th 2014.Inside eCommerce - Micksgarage Masterclass - April 15th 2014.
Inside eCommerce - Micksgarage Masterclass - April 15th 2014.John Walsh
 
SME Cleveland SEO Workshop March 2012
SME Cleveland SEO Workshop March 2012SME Cleveland SEO Workshop March 2012
SME Cleveland SEO Workshop March 2012Scott Mowery
 
Introduction to Digital Life (October 2016)
Introduction to Digital Life (October 2016)Introduction to Digital Life (October 2016)
Introduction to Digital Life (October 2016)KR_Barker
 
Internet Marketing, EO Accelerator Presentation
Internet Marketing, EO Accelerator PresentationInternet Marketing, EO Accelerator Presentation
Internet Marketing, EO Accelerator PresentationTop Draw Inc.
 
1&1 DIY Web Builder: Apps & Social Media
1&1 DIY Web Builder: Apps & Social Media1&1 DIY Web Builder: Apps & Social Media
1&1 DIY Web Builder: Apps & Social Media1and1 Internet, Inc.
 
Positive People - Self Employment - Website Design (Plymouth, 07/02/2019)
Positive People - Self Employment - Website Design (Plymouth, 07/02/2019)Positive People - Self Employment - Website Design (Plymouth, 07/02/2019)
Positive People - Self Employment - Website Design (Plymouth, 07/02/2019)Cosmic
 

Similar a Online Security & Website Optimization (20)

How to Optimize Your Business Website for the Holiday Season
How to Optimize Your Business Website for the Holiday SeasonHow to Optimize Your Business Website for the Holiday Season
How to Optimize Your Business Website for the Holiday Season
 
MSP Marketing Update: Tips to Turn Your Website Into Your Best Performing Sal...
MSP Marketing Update: Tips to Turn Your Website Into Your Best Performing Sal...MSP Marketing Update: Tips to Turn Your Website Into Your Best Performing Sal...
MSP Marketing Update: Tips to Turn Your Website Into Your Best Performing Sal...
 
10 Minute Powerpoint
10 Minute Powerpoint10 Minute Powerpoint
10 Minute Powerpoint
 
10 Digital Marketing Trends for 2017
10 Digital Marketing Trends for 201710 Digital Marketing Trends for 2017
10 Digital Marketing Trends for 2017
 
Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)Introduction to Digital Life (March 2017)
Introduction to Digital Life (March 2017)
 
Website Security, Maintenance and Optimisation - Conetix
Website Security, Maintenance and Optimisation - ConetixWebsite Security, Maintenance and Optimisation - Conetix
Website Security, Maintenance and Optimisation - Conetix
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
Technology and Business Growth! - What Companies Need To Know
Technology and Business Growth! -  What Companies Need To KnowTechnology and Business Growth! -  What Companies Need To Know
Technology and Business Growth! - What Companies Need To Know
 
Introduction to Digital Life
Introduction to Digital LifeIntroduction to Digital Life
Introduction to Digital Life
 
Introduction to Digital Life june 2016
Introduction to Digital Life june 2016Introduction to Digital Life june 2016
Introduction to Digital Life june 2016
 
Superfast Business - Winning and keeping customers online (Dorset)
Superfast Business - Winning and keeping customers online (Dorset)Superfast Business - Winning and keeping customers online (Dorset)
Superfast Business - Winning and keeping customers online (Dorset)
 
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
Compliance, Security, Migration, Systems Management – All Fixed by Microsoft?
 
Introduction to iPhone App Development - midVentures DESIGN+DEVELOP
Introduction to iPhone App Development - midVentures DESIGN+DEVELOPIntroduction to iPhone App Development - midVentures DESIGN+DEVELOP
Introduction to iPhone App Development - midVentures DESIGN+DEVELOP
 
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
Nuts and Bolts of Building Compliance Process with Nintex and SharePoint 2013
 
Inside eCommerce - Micksgarage Masterclass - April 15th 2014.
Inside eCommerce - Micksgarage Masterclass - April 15th 2014.Inside eCommerce - Micksgarage Masterclass - April 15th 2014.
Inside eCommerce - Micksgarage Masterclass - April 15th 2014.
 
SME Cleveland SEO Workshop March 2012
SME Cleveland SEO Workshop March 2012SME Cleveland SEO Workshop March 2012
SME Cleveland SEO Workshop March 2012
 
Introduction to Digital Life (October 2016)
Introduction to Digital Life (October 2016)Introduction to Digital Life (October 2016)
Introduction to Digital Life (October 2016)
 
Internet Marketing, EO Accelerator Presentation
Internet Marketing, EO Accelerator PresentationInternet Marketing, EO Accelerator Presentation
Internet Marketing, EO Accelerator Presentation
 
1&1 DIY Web Builder: Apps & Social Media
1&1 DIY Web Builder: Apps & Social Media1&1 DIY Web Builder: Apps & Social Media
1&1 DIY Web Builder: Apps & Social Media
 
Positive People - Self Employment - Website Design (Plymouth, 07/02/2019)
Positive People - Self Employment - Website Design (Plymouth, 07/02/2019)Positive People - Self Employment - Website Design (Plymouth, 07/02/2019)
Positive People - Self Employment - Website Design (Plymouth, 07/02/2019)
 

Último

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Último (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Online Security & Website Optimization

  • 1. Joint Webinar: Online Security & Website Optimization Presented by: Reid Johnston, Tim Karlberg, Bryant Crock & your host - Aleksandr Yershov
  • 2. Today’s Agenda •Introduction •Online Security- presented by Reid Johnston, president/founder of TechGen Consulting Inc. •Q & A session with Reid •Website Optimization & 10 Characteristics of Super-Achieving Sites- presented by Tim Karlberg & Bryant Crock, internet marketing team at August Ash Incorporated. •Q & A session with Tim and Bryant
  • 4. TechGen| Quick Background •Located in Minneapolis, MN •10 full-time employees; providing IT support since 2000 Core Services: •Unlimited Remote/Help-Desk Support •Cloud Services Management •Data Security Solution •Disaster Recovery Solution •Mobile Device Management •Anti-Spam & Antivirus Mgmt. Core Solutions: Unlimited StressFree IT™ & Customized StresssFree IT™
  • 5. Protect Yourself Online – Use Strong Passwords Examples of Recent Breaches where passwords were exposed: •Yahoo! – July, 2012 •Formspring – July, 2012 •Nvidia – July, 2012 •LinkedIn – June, 2012 •Last.fm – June, 2012 •eHarmony.com – June, 2012 •Twitter – May, 2012
  • 6. Protect Yourself Online – Use Strong Passwords Commonly used passwords: •123456 •password •Welcome •abc123 •123456789 •12345678 •Ninja •Sunshine •Princess •qwerty
  • 7. Protect Yourself Online – Use Strong Passwords What Makes a Strong Password? A combination of uppercase, lowercase, numbers & symbols: ! @#$%^&*() NOT: “password”, your name, your birth date, or other easily guessable information (including common words): jessica1 or summer2012 Consider At Least 8 Characters Consider using a passphrase “1Fish2FishredFishblueFish2012!”
  • 8. Protect Yourself Online – Use Strong Passwords Important Password Recommendations: •Change your passwords periodically •Never use the same password for multiple online services How Do I Keep Track of Everything? Roboform.com - $20/year. (1st year $9.99) Lastpass.com - $12/year.
  • 9. Protect Yourself Online – Use Strong Passwords What does a Password Manager Do? •Automatically enters passwords into sites you visit •Encrypt all of your passwords – protected by a strong “master” password •Synchronize passwords between multiple computers (mobile devices too) •Store other types of data in encrypted format (account #’s, etc.)
  • 10. Protect Yourself Online – Keep an eye out for Phishing Sites What is Phishing? •Fake emails designed to look legitimate •Fake sites that look legitimate (Bank, Insurance, etc.) •Harvesting confidential information
  • 11. Protect Yourself Online – Keep an eye out for Phishing Sites Ways to Protect Yourself: •Legitimate companies will never ask for your personal information via email: Username/Password/Bank Information •Never click a link on an email and sign in to a website, instead open your browser and visit the site directly •Report phishing emails to your email provider •Keep your browser up to date •Using Firefox, Safari, and Chrome will leverage Google’s Safe Browsing Service - Google locates hundreds of thousands of phishing pages annually and blocks them
  • 12. Protect Yourself Online – Keep an eye out for Phishing Sites Example:
  • 13. Protect Yourself Online – Keep an eye out for Phishing Sites Example:
  • 14. Protect Yourself Online – Personal Mobile Devices in the Workplace BYOD (Bring Your Own Device) Employees are using their own tablets and phones to access company information The Pros: •Lower up-front cost than providing mobile devices to everyone •Many tasks are completed sooner / more efficiently •More attention is paid to metrics – easier access •Employees use the devices they like - Android vs. Apple •Equipment is often more “current” than company issued equipment
  • 15. Protect Yourself Online – Personal Mobile Devices in the Workplace BYOD (Bring Your Own Device) The Cons: •Difficulty in applying acceptable use policies to personal devices •Protecting company data can be difficult •Regaining access & protecting data stored on devices during employee termination
  • 16. Questions & Answers Poll Question: Do you use your personal mobile device to access company systems? (Email, files, etc.) Reid Johnston 612.279.2400 clientrelations@techgen.com
  • 17. 10 Characteristics of Super-Achieving Sites
  • 18. August Ash | Quick Background •Located in Bloomington, MN •25 full-time employees; now in our 14th year of business •Top 25 Web Development & Design Firms of Minneapolis-St. Paul (MPLS-StP Business Journal) Core Services: •Web design •Ecommerce •Search engine optimization (SEO) •Pay-Per-Click (PPC) management •Email marketing •Social media guidance
  • 19. 1. Modern and Functioning •First impression •Does it feel dated? •Does it work? •These build trust
  • 20. 2. Understanding Target Keywords •Which bring in the most traffic? •Which bring in the most sales? •Where do these keywords rank? •On which pages are these keywords targeted?
  • 21. 3. Built on a Capable CMS •Reduces dependence on your developer •Allows for easier optimization of site •Saves you money
  • 22. 4. Know your competitor’s SEO •As important as understanding your own •Target Keywords •Content & Navigation Strategy •Identify the “Low Hanging Fruit”
  • 23. 5. Effective Content •Original •Optimized for humans •Optimized for Google
  • 24. 6. A Link Worthy Website •Great content •Great promotion •Make it easy for visitors to link & share content
  • 25. 7. Frequently Updated •The role of frequent updates •Why blogging works •What it says to new visitors
  • 26. 8. Analyze Every Detail •Optimization - to take full advantage of •Visitor patterns •Search Engine Index •Broken URLs – 404 Errors
  • 27. 9. Clear Calls to Action •Even in 2012, web users still need guidance •Don’t overlook the obvious •Converting from the perspective of a new visitor •Always include a next step
  • 28. 10. Gain Visitors and Keep Them •Balance between usability and SEO •Keep them coming back for more
  • 29. Question & Answer Poll Question: Have you ever reviewed (in detail) the stats for your website’s performance? Tim Karlberg & Bryant Crock 952.851.9400 sales@augustash.com