In this webinar, Reid Johnston provides helpful tips and information on the subject of Online Security where he discusses the preventive strategies against online fraud and what you can do to improve your online security. Then Tim Karlberg and Bryant Crock will share some secrets on how to improve and optimize your website to achieve better rankings in the search engines, as well as ways to increase the lead generation from your website.
To learn more about TechGen, please visit www.techgen.com Thanks for tuning in!
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Online Security & Website Optimization
1. Joint Webinar: Online Security & Website Optimization
Presented by: Reid Johnston, Tim Karlberg, Bryant Crock
& your host - Aleksandr Yershov
2. Today’s Agenda
•Introduction
•Online Security- presented by Reid Johnston,
president/founder of TechGen Consulting Inc.
•Q & A session with Reid
•Website Optimization & 10 Characteristics of
Super-Achieving Sites- presented by Tim
Karlberg & Bryant Crock, internet marketing
team at August Ash Incorporated.
•Q & A session with Tim and Bryant
7. Protect Yourself Online – Use Strong Passwords
What Makes a Strong Password?
A combination of uppercase, lowercase, numbers & symbols: !
@#$%^&*()
NOT: “password”, your name, your birth date, or other easily
guessable information (including common words): jessica1 or
summer2012
Consider At Least 8 Characters
Consider using a passphrase “1Fish2FishredFishblueFish2012!”
8. Protect Yourself Online – Use Strong Passwords
Important Password Recommendations:
•Change your passwords periodically
•Never use the same password for multiple online services
How Do I Keep Track of Everything?
Roboform.com - $20/year. (1st year $9.99)
Lastpass.com - $12/year.
9. Protect Yourself Online – Use Strong Passwords
What does a Password Manager Do?
•Automatically enters passwords into sites you visit
•Encrypt all of your passwords – protected by a strong “master”
password
•Synchronize passwords between multiple computers (mobile
devices too)
•Store other types of data in encrypted format (account #’s, etc.)
10. Protect Yourself Online – Keep an eye out for Phishing Sites
What is Phishing?
•Fake emails designed to look legitimate
•Fake sites that look legitimate (Bank, Insurance, etc.)
•Harvesting confidential information
11. Protect Yourself Online – Keep an eye out for Phishing Sites
Ways to Protect Yourself:
•Legitimate companies will never ask for your personal information via email:
Username/Password/Bank Information
•Never click a link on an email and sign in to a website, instead open your
browser and visit the site directly
•Report phishing emails to your email provider
•Keep your browser up to date
•Using Firefox, Safari, and Chrome will leverage Google’s Safe Browsing
Service
- Google locates hundreds of thousands of phishing pages
annually and blocks them
14. Protect Yourself Online – Personal Mobile Devices in the Workplace
BYOD (Bring Your Own Device)
Employees are using their own tablets and phones to access
company information
The Pros:
•Lower up-front cost than providing mobile devices to everyone
•Many tasks are completed sooner / more efficiently
•More attention is paid to metrics – easier access
•Employees use the devices they like - Android vs. Apple
•Equipment is often more “current” than company issued
equipment
15. Protect Yourself Online – Personal Mobile Devices in the Workplace
BYOD (Bring Your Own Device)
The Cons:
•Difficulty in applying acceptable use policies to personal devices
•Protecting company data can be difficult
•Regaining access & protecting data stored on devices during
employee termination
16. Questions & Answers
Poll Question: Do you use your personal mobile device to access
company systems? (Email, files, etc.)
Reid Johnston
612.279.2400
clientrelations@techgen.com
18. August Ash | Quick Background
•Located in Bloomington, MN
•25 full-time employees; now in our 14th year of business
•Top 25 Web Development & Design Firms of Minneapolis-St.
Paul (MPLS-StP Business Journal)
Core Services:
•Web design
•Ecommerce
•Search engine optimization (SEO)
•Pay-Per-Click (PPC) management
•Email marketing
•Social media guidance
19. 1. Modern and Functioning
•First impression
•Does it feel dated?
•Does it work?
•These build trust
20. 2. Understanding Target Keywords
•Which bring in the most traffic?
•Which bring in the most sales?
•Where do these keywords rank?
•On which pages are these keywords targeted?
21. 3. Built on a Capable CMS
•Reduces dependence on your developer
•Allows for easier optimization of site
•Saves you money
22. 4. Know your competitor’s SEO
•As important as understanding your own
•Target Keywords
•Content & Navigation Strategy
•Identify the “Low Hanging Fruit”
26. 8. Analyze Every Detail
•Optimization - to take full advantage of
•Visitor patterns
•Search Engine Index
•Broken URLs – 404 Errors
27. 9. Clear Calls to Action
•Even in 2012, web users still need guidance
•Don’t overlook the obvious
•Converting from the perspective of a new visitor
•Always include a next step
28. 10. Gain Visitors and Keep Them
•Balance between usability and SEO
•Keep them coming back for more
29. Question & Answer
Poll Question: Have you ever reviewed (in detail) the stats for your
website’s performance?
Tim Karlberg & Bryant Crock
952.851.9400
sales@augustash.com