Online Security & Website Optimization


Published on

In this webinar, Reid Johnston provides helpful tips and information on the subject of Online Security where he discusses the preventive strategies against online fraud and what you can do to improve your online security. Then Tim Karlberg and Bryant Crock will share some secrets on how to improve and optimize your website to achieve better rankings in the search engines, as well as ways to increase the lead generation from your website.
To learn more about TechGen, please visit Thanks for tuning in!

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Online Security & Website Optimization

  1. 1. Joint Webinar: Online Security & Website OptimizationPresented by: Reid Johnston, Tim Karlberg, Bryant Crock & your host - Aleksandr Yershov
  2. 2. Today’s Agenda•Introduction•Online Security- presented by Reid Johnston,president/founder of TechGen Consulting Inc.•Q & A session with Reid•Website Optimization & 10 Characteristics ofSuper-Achieving Sites- presented by TimKarlberg & Bryant Crock, internet marketingteam at August Ash Incorporated.•Q & A session with Tim and Bryant
  3. 3. Online Security
  4. 4. TechGen| Quick Background•Located in Minneapolis, MN•10 full-time employees; providing IT support since 2000Core Services:•Unlimited Remote/Help-Desk Support•Cloud Services Management•Data Security Solution•Disaster Recovery Solution•Mobile Device Management•Anti-Spam & Antivirus Mgmt.Core Solutions: Unlimited StressFree IT™ & Customized StresssFree IT™
  5. 5. Protect Yourself Online – Use Strong PasswordsExamples of Recent Breaches where passwords were exposed:•Yahoo! – July, 2012•Formspring – July, 2012•Nvidia – July, 2012•LinkedIn – June, 2012• – June, 2012• – June, 2012•Twitter – May, 2012
  6. 6. Protect Yourself Online – Use Strong PasswordsCommonly used passwords:•123456•password•Welcome•abc123•123456789•12345678•Ninja•Sunshine•Princess•qwerty
  7. 7. Protect Yourself Online – Use Strong PasswordsWhat Makes a Strong Password?A combination of uppercase, lowercase, numbers & symbols: !@#$%^&*()NOT: “password”, your name, your birth date, or other easilyguessable information (including common words): jessica1 orsummer2012Consider At Least 8 CharactersConsider using a passphrase “1Fish2FishredFishblueFish2012!”
  8. 8. Protect Yourself Online – Use Strong PasswordsImportant Password Recommendations:•Change your passwords periodically•Never use the same password for multiple online servicesHow Do I Keep Track of Everything? - $20/year. (1st year $9.99) - $12/year.
  9. 9. Protect Yourself Online – Use Strong PasswordsWhat does a Password Manager Do?•Automatically enters passwords into sites you visit•Encrypt all of your passwords – protected by a strong “master”password•Synchronize passwords between multiple computers (mobiledevices too)•Store other types of data in encrypted format (account #’s, etc.)
  10. 10. Protect Yourself Online – Keep an eye out for Phishing Sites What is Phishing? •Fake emails designed to look legitimate •Fake sites that look legitimate (Bank, Insurance, etc.) •Harvesting confidential information
  11. 11. Protect Yourself Online – Keep an eye out for Phishing Sites Ways to Protect Yourself: •Legitimate companies will never ask for your personal information via email: Username/Password/Bank Information •Never click a link on an email and sign in to a website, instead open your browser and visit the site directly •Report phishing emails to your email provider •Keep your browser up to date •Using Firefox, Safari, and Chrome will leverage Google’s Safe Browsing Service - Google locates hundreds of thousands of phishing pages annually and blocks them
  12. 12. Protect Yourself Online – Keep an eye out for Phishing Sites Example:
  13. 13. Protect Yourself Online – Keep an eye out for Phishing Sites Example:
  14. 14. Protect Yourself Online – Personal Mobile Devices in the Workplace BYOD (Bring Your Own Device) Employees are using their own tablets and phones to access company information The Pros: •Lower up-front cost than providing mobile devices to everyone •Many tasks are completed sooner / more efficiently •More attention is paid to metrics – easier access •Employees use the devices they like - Android vs. Apple •Equipment is often more “current” than company issued equipment
  15. 15. Protect Yourself Online – Personal Mobile Devices in the Workplace BYOD (Bring Your Own Device) The Cons: •Difficulty in applying acceptable use policies to personal devices •Protecting company data can be difficult •Regaining access & protecting data stored on devices during employee termination
  16. 16. Questions & AnswersPoll Question: Do you use your personal mobile device to accesscompany systems? (Email, files, etc.) Reid Johnston 612.279.2400
  17. 17. 10 Characteristics of Super-Achieving Sites
  18. 18. August Ash | Quick Background•Located in Bloomington, MN•25 full-time employees; now in our 14th year of business•Top 25 Web Development & Design Firms of Minneapolis-St.Paul (MPLS-StP Business Journal)Core Services:•Web design•Ecommerce•Search engine optimization (SEO)•Pay-Per-Click (PPC) management•Email marketing•Social media guidance
  19. 19. 1. Modern and Functioning•First impression•Does it feel dated?•Does it work?•These build trust
  20. 20. 2. Understanding Target Keywords •Which bring in the most traffic? •Which bring in the most sales? •Where do these keywords rank? •On which pages are these keywords targeted?
  21. 21. 3. Built on a Capable CMS•Reduces dependence on your developer•Allows for easier optimization of site•Saves you money
  22. 22. 4. Know your competitor’s SEO •As important as understanding your own •Target Keywords •Content & Navigation Strategy •Identify the “Low Hanging Fruit”
  23. 23. 5. Effective Content•Original•Optimized for humans•Optimized for Google
  24. 24. 6. A Link Worthy Website•Great content•Great promotion•Make it easy for visitors to link & share content
  25. 25. 7. Frequently Updated•The role of frequent updates•Why blogging works•What it says to new visitors
  26. 26. 8. Analyze Every Detail•Optimization - to take full advantage of•Visitor patterns•Search Engine Index•Broken URLs – 404 Errors
  27. 27. 9. Clear Calls to Action•Even in 2012, web users still need guidance•Don’t overlook the obvious•Converting from the perspective of a new visitor•Always include a next step
  28. 28. 10. Gain Visitors and Keep Them •Balance between usability and SEO •Keep them coming back for more
  29. 29. Question & AnswerPoll Question: Have you ever reviewed (in detail) the stats for yourwebsite’s performance? Tim Karlberg & Bryant Crock 952.851.9400