SlideShare a Scribd company logo
1 of 37
Download to read offline
Don’t Get
Caught With
Your
DIGITAL ASSETS
Hanging Out
Rich@therichestweb.com
(865) 242-1700
Important Points Of Discussion
• Domain – Registration Who REALLY OWNS… Your Company Name?
• Websites – Know your back up plan, Who, What, When, Where, & WHY!
• Social Media - Who is Admin, Are you an assigned Admin?
• Digital Media Assets – Do you have hard copy, tangible/ high resolution
copies of all files?
• Future of Web – Where is the Future of Web headed and Why?
• Office Computers – Do you have a recovery plan, have you discussed
with your IT person? Good managers know and practice fire drills with
staff.. A Recovery plan is your Digital Fire drill.
• Reservations Servers – Is your customers data backed up and Secure,
remember breaches in security could leave you Liable.
Outline
How BIG Is The Internet?
Domain
September 2014 total
number of websites
Exceeded 1 billion.
As of January 2015:
There are over 876
million websites - 284
million registered
domains…
Source = tekeye.biz/
A Reduction of
224 Million Websites
Internet Corporation for
Assigned Names and Numbers
 Much of its work is the Internet's global Domain
Name System, including policy development for
internationalization of the DNS system.
 They are the GLOBAL Record-Keeper of URLs,
they keep track of who is the registered owner of
each website.
 If ICANN send you an E-mail verification, please
answer them. If you don’t answer them, your site
will get shut down in about 45 days.
ICANN
Who Really Owns Your Domain?
 Registrar – He
Who is the
Owner of
Record.
 Only the
designated
registrar may
modify or delete
information about
domain names in
a central registry
database.
Domain
Worst E-mail You Will Ever Receive
A Bad Day!
Updates R Crucial
Attacks In Progress
What is Malware?
 Malware, short for malicious software, is
any software used to
1. Disrupt computer operation
2. Gather sensitive information
3. Gain access to private computer
systems.
Know The Terms
• Your Computer Allows Hackers To Launch Attacks
• Your Server Allows Hackers Spread Their Virus
Hacking Is It Really A Big Deal?
10,000 x 31 = 310,000 NEW Hacked
Websites Per Month
Internet ETV
How Do I Know If My Website
Has Been Hacked?
 Google Safe Browsing
 www.google.com/safebrowsing/diagnostic?site=
Safe
How Do I Know If My Website Has
Been Hacked?
Hacked
Ways Hackers Can Get In?
Operating System
Browsers
Update Update Update
Anti Virus
Updates Are Crucial
Organize Social Media Assets
Social Media
Make Owner of Company’s E-mail, the
admin account of record for all Social
Accounts
Assign – Roles
• FB allows Admins and Editors.
• Twitter allows Contributors.
Organize Your Social Media Assets
• Keep a Logbook
• Google Doc Spreadsheet
• Excel Spreadsheet
 These should include all E-mails
associated with social accounts. Be sure
to include current Logins and Passwords,
and any Answers to security questions.
Top 5 Questions
Asked of CIA On Twitter
Funny But NOT
Top 5 Questions
Asked of CIA On Twitter
Gaining access to Twitter Account once you have
misplaced your Login & Password is so difficult, people will
reach out to the CIA for help.!
An up to date account of ALL Company passwords for social
accounts is CRUCIAL step in not getting caught with your digital
assets hanging out!
Question 1
Top 5 Questions
Asked of CIA On Twitter
Question 2
Top 5 Questions
Asked of CIA On Twitter
Question 3
Question 4
Question 5
What Are Digital Assets?
 Hi Res Logo,
 All Hi Res Photos form Photo Shoots
 Backups of your E-mail Database
 Copies / Database Files of Website
 Copies of Videos Raw & Finished
Save Your Work
The Present & Future Of Websites
Great Content Race
Interesting Facts About WordPress
 48% of Technorati’s Top 100 Blogs Are
Managed With WordPress
 74.6 Million Sites Depend on WordPress
WordPress-Related Keywords Score 37
Million Searches Per Month
 40 Translations of WordPress
 22% of New U.S. Registered Domains Run
on WordPress
Why We Use Word Press
https://managewp.com/14-surprising-statistics-about-wordpress-usage
 WordPress.com Gets More Unique Visitors
Than Amazon (Us)
 6 New WordPress.com Posts Every Second
 29,000 WordPress Plugins and Growing
Daily
 WordPress Is Most Popular With Business
Websites
Why We Use Word Press
https://managewp.com/14-surprising-statistics-about-wordpress-usage
Source http://trends.builtwith.com/cms#
Why We Use Word Press
Source http://trends.builtwith.com/cms#
Source http://trends.builtwith.com/cms#
Pros Of Open Source CMS
Ease of Use
Community Support
Plugins for Almost any Function
The common person can now take control of
their own digital destiny. These factors can be
attributed for much of the rise/ increase we’ve
seen in the growth of websites until 2014.
**Just be sure to have a host and admin that
knows how to update and backup everything.**
Cons Of Open Source CMS
 Hackers Love Open Source CMS Sites
Ease of use, has prompted a lot of
“Novice” web development. Users who can
blog, but fail to be detail oriented and leave
holes of opportunity in their digital assets, their
content management systems. They fail to
update Plugins, Operating Systems, Browsers
& Anti-Virus, leaving their servers & systems
vulnerable.
**Just be sure to have a host and
admin that knows how to update
and backup everything.**
What Happens
When
Everything
Goes Wrong
Develop Backup Scheduled
 This can be Monthly Weekly
or Daily depending on type
of business.
 Copy all files to external
hard drives, USB flash drives
or DVD’s, or Utilize Cloud
 Assign task to only most
trusted employee or staff
PC & Web Backup Plan
A Safe Place for all Backup's
 Sentrysafe has just released their
waterproof and fireproof safe in
Japan. The safe has a USB cord/slot
which allows you to safely store
your hard drive inside the safe but
still have access to the data. So, as
long as your data is properly
password protected The safe will
retail for about $1800 US.
Sentry Fire-Safe SFW123GDC Media storage safe
$229 The SentrySafe Electronic Safe is designed to
protect documents, digital media and other
valuables from fire, water and theft.
Reservation Systems
• Update Servers on a Regular basis
• Anti Virus Must Be kept unto date
• Property Management System
• Point of Sale System and /or
• Reservation System
• Contingency Plan
• Who You Gonna Call?
• Hard Copies of Contact Info
THANK YOU
To obtain a copy of this presentation, or contact Rich Benjamin for
additional Public Speaking or Marketing / Consultation Services
Call (865) 242-1700
E-Mail Rich@therichestweb.com
Website www.therichestweb.com

More Related Content

What's hot

Keane Organization
Keane OrganizationKeane Organization
Keane Organizationguest3f05ef
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016Gareth Davies
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber WorldEmil Tan
 

What's hot (7)

Keane Organization
Keane OrganizationKeane Organization
Keane Organization
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016Web Application Security - DevFest + GDay George Town 2016
Web Application Security - DevFest + GDay George Town 2016
 
Carver IT Security for Librarians
Carver IT Security for LibrariansCarver IT Security for Librarians
Carver IT Security for Librarians
 
Securing Yourself in the Cyber World
Securing Yourself in the Cyber WorldSecuring Yourself in the Cyber World
Securing Yourself in the Cyber World
 

Viewers also liked

2015 transitioning into a mobile world mpi
2015 transitioning into a mobile world mpi2015 transitioning into a mobile world mpi
2015 transitioning into a mobile world mpiRich Benjamin
 
Time management in a digital world
Time management in a digital worldTime management in a digital world
Time management in a digital worldRich Benjamin
 
Move over old website
Move over old websiteMove over old website
Move over old websiteRich Benjamin
 
Move Over Old Website
Move Over Old WebsiteMove Over Old Website
Move Over Old WebsiteRich Benjamin
 
The Millennial Shift
The Millennial ShiftThe Millennial Shift
The Millennial ShiftRich Benjamin
 

Viewers also liked (6)

2015 transitioning into a mobile world mpi
2015 transitioning into a mobile world mpi2015 transitioning into a mobile world mpi
2015 transitioning into a mobile world mpi
 
Time management in a digital world
Time management in a digital worldTime management in a digital world
Time management in a digital world
 
Move over old website
Move over old websiteMove over old website
Move over old website
 
Move Over Old Website
Move Over Old WebsiteMove Over Old Website
Move Over Old Website
 
The Millennial Shift
The Millennial ShiftThe Millennial Shift
The Millennial Shift
 
30 60 90 day plan
30 60 90 day plan30 60 90 day plan
30 60 90 day plan
 

Similar to Don’t Get Caught With Your Digital Assets Hanging Out!

Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesAll Covered
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnTony DeGonia (LION)
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?BCS ProSoft
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechTechSoup
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004Mike Spaulding
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Tina Jordan
 
After The Crash Minimize Your Downtime
After The Crash Minimize Your DowntimeAfter The Crash Minimize Your Downtime
After The Crash Minimize Your DowntimeTechSoup
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planningAureusIT
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web serversTemok IT Services
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your BusinessAll Covered
 
Securing your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupSecuring your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupOyster Bay Marauders LLC
 
Time Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today'sTime Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today'sInside Analysis
 
Kentico hosting brochure - By Seventyeight Digital
Kentico hosting brochure - By Seventyeight DigitalKentico hosting brochure - By Seventyeight Digital
Kentico hosting brochure - By Seventyeight DigitalSeventyeight Disgital
 
The Foc Is Group 2010
The Foc Is Group 2010The Foc Is Group 2010
The Foc Is Group 2010dshadrak
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 

Similar to Don’t Get Caught With Your Digital Assets Hanging Out! (20)

Protecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security ServicesProtecting Your Business - All Covered Security Services
Protecting Your Business - All Covered Security Services
 
Lenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and LearnLenovo Presentation for Sys Logic Lunch and Learn
Lenovo Presentation for Sys Logic Lunch and Learn
 
The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?The Notorious 9: Is Your Data Secure in the Cloud?
The Notorious 9: Is Your Data Secure in the Cloud?
 
Disaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their TechDisaster Planning What Organizations Need To Know To Protect Their Tech
Disaster Planning What Organizations Need To Know To Protect Their Tech
 
Top issue faced by SME
Top issue faced by SMETop issue faced by SME
Top issue faced by SME
 
Web Application Hacking 2004
Web Application Hacking 2004Web Application Hacking 2004
Web Application Hacking 2004
 
Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )Ign ( 2016 ) ( 2015 )
Ign ( 2016 ) ( 2015 )
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
After The Crash Minimize Your Downtime
After The Crash Minimize Your DowntimeAfter The Crash Minimize Your Downtime
After The Crash Minimize Your Downtime
 
Aureus disaster planning
Aureus   disaster planningAureus   disaster planning
Aureus disaster planning
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
Protecting Your Business
Protecting Your BusinessProtecting Your Business
Protecting Your Business
 
Securing your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP MeetupSecuring your WordPress website - New Port Richey WP Meetup
Securing your WordPress website - New Port Richey WP Meetup
 
Disaster Proof
Disaster ProofDisaster Proof
Disaster Proof
 
Time Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today'sTime Difference: How Tomorrow's Companies Will Outpace Today's
Time Difference: How Tomorrow's Companies Will Outpace Today's
 
Kentico hosting brochure - By Seventyeight Digital
Kentico hosting brochure - By Seventyeight DigitalKentico hosting brochure - By Seventyeight Digital
Kentico hosting brochure - By Seventyeight Digital
 
The Foc Is Group 2010
The Foc Is Group 2010The Foc Is Group 2010
The Foc Is Group 2010
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Real Business Threats!
Real Business Threats!Real Business Threats!
Real Business Threats!
 

More from Rich Benjamin

2020 Foresight vs 2020 Hindsight
2020 Foresight vs 2020 Hindsight 2020 Foresight vs 2020 Hindsight
2020 Foresight vs 2020 Hindsight Rich Benjamin
 
How video online makes you money
How video online makes you moneyHow video online makes you money
How video online makes you moneyRich Benjamin
 
Gha. 2017 hot tips and tactics
Gha. 2017 hot tips and tacticsGha. 2017 hot tips and tactics
Gha. 2017 hot tips and tacticsRich Benjamin
 
What is going on in web 2016
What is going on in web 2016What is going on in web 2016
What is going on in web 2016Rich Benjamin
 
Google Analytics, Your Online P&L Statment
Google Analytics, Your Online P&L StatmentGoogle Analytics, Your Online P&L Statment
Google Analytics, Your Online P&L StatmentRich Benjamin
 
Online reputation management
Online reputation managementOnline reputation management
Online reputation managementRich Benjamin
 
Its all about ROI - Measuring your Social Media & Online Efforts
Its all about ROI - Measuring your Social Media & Online EffortsIts all about ROI - Measuring your Social Media & Online Efforts
Its all about ROI - Measuring your Social Media & Online EffortsRich Benjamin
 
Plan the Work & Work the Plan
Plan the Work & Work the PlanPlan the Work & Work the Plan
Plan the Work & Work the PlanRich Benjamin
 
Best practices for Online Marketing
Best practices for Online MarketingBest practices for Online Marketing
Best practices for Online MarketingRich Benjamin
 
Being relevant in an irrelevant world mpi
Being relevant in an irrelevant world mpiBeing relevant in an irrelevant world mpi
Being relevant in an irrelevant world mpiRich Benjamin
 
Traditional vs- online marketing roi - memphis.1
Traditional   vs- online marketing roi - memphis.1Traditional   vs- online marketing roi - memphis.1
Traditional vs- online marketing roi - memphis.1Rich Benjamin
 
Protecting Your Web Presence
Protecting Your Web PresenceProtecting Your Web Presence
Protecting Your Web PresenceRich Benjamin
 
Social Media it's not Sex but it Sure Does Sell
Social Media it's not Sex but it Sure Does SellSocial Media it's not Sex but it Sure Does Sell
Social Media it's not Sex but it Sure Does SellRich Benjamin
 
Web site social media check list1
Web site social media check list1Web site social media check list1
Web site social media check list1Rich Benjamin
 
Becoming E- fficient.
Becoming E- fficient.Becoming E- fficient.
Becoming E- fficient.Rich Benjamin
 
Maximizing your internet marketing.2.pot
Maximizing your internet marketing.2.potMaximizing your internet marketing.2.pot
Maximizing your internet marketing.2.potRich Benjamin
 

More from Rich Benjamin (16)

2020 Foresight vs 2020 Hindsight
2020 Foresight vs 2020 Hindsight 2020 Foresight vs 2020 Hindsight
2020 Foresight vs 2020 Hindsight
 
How video online makes you money
How video online makes you moneyHow video online makes you money
How video online makes you money
 
Gha. 2017 hot tips and tactics
Gha. 2017 hot tips and tacticsGha. 2017 hot tips and tactics
Gha. 2017 hot tips and tactics
 
What is going on in web 2016
What is going on in web 2016What is going on in web 2016
What is going on in web 2016
 
Google Analytics, Your Online P&L Statment
Google Analytics, Your Online P&L StatmentGoogle Analytics, Your Online P&L Statment
Google Analytics, Your Online P&L Statment
 
Online reputation management
Online reputation managementOnline reputation management
Online reputation management
 
Its all about ROI - Measuring your Social Media & Online Efforts
Its all about ROI - Measuring your Social Media & Online EffortsIts all about ROI - Measuring your Social Media & Online Efforts
Its all about ROI - Measuring your Social Media & Online Efforts
 
Plan the Work & Work the Plan
Plan the Work & Work the PlanPlan the Work & Work the Plan
Plan the Work & Work the Plan
 
Best practices for Online Marketing
Best practices for Online MarketingBest practices for Online Marketing
Best practices for Online Marketing
 
Being relevant in an irrelevant world mpi
Being relevant in an irrelevant world mpiBeing relevant in an irrelevant world mpi
Being relevant in an irrelevant world mpi
 
Traditional vs- online marketing roi - memphis.1
Traditional   vs- online marketing roi - memphis.1Traditional   vs- online marketing roi - memphis.1
Traditional vs- online marketing roi - memphis.1
 
Protecting Your Web Presence
Protecting Your Web PresenceProtecting Your Web Presence
Protecting Your Web Presence
 
Social Media it's not Sex but it Sure Does Sell
Social Media it's not Sex but it Sure Does SellSocial Media it's not Sex but it Sure Does Sell
Social Media it's not Sex but it Sure Does Sell
 
Web site social media check list1
Web site social media check list1Web site social media check list1
Web site social media check list1
 
Becoming E- fficient.
Becoming E- fficient.Becoming E- fficient.
Becoming E- fficient.
 
Maximizing your internet marketing.2.pot
Maximizing your internet marketing.2.potMaximizing your internet marketing.2.pot
Maximizing your internet marketing.2.pot
 

Recently uploaded

Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrSapana Sha
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Nitya salvi
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)AshtonCains
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazinesamuelcoulson30
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for siteAshtonCains
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECall girl Jaipur
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSheikhSaifAli1
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...anilsa9823
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenSapana Sha
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageSocioCosmos
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Delhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖anilsa9823
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYdizinfo
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Delhi Call girls
 
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escortssonatiwari757
 

Recently uploaded (20)

Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazine
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
O9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking MenO9654467111 Call Girls In Dwarka Women Seeking Men
O9654467111 Call Girls In Dwarka Women Seeking Men
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
Night 7k Call Girls Atta Market Escorts Call Me: 8448380779
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
Delhi  99530 vip 56974  Genuine Escort Service Call Girls in MasudpurDelhi  99530 vip 56974  Genuine Escort Service Call Girls in Masudpur
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Masudpur
 
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
Russian Call Girls Rohini Sector 37 💓 Delhi 9999965857 @Sabina Modi VVIP MODE...
 
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service  👖
CALL ON ➥8923113531 🔝Call Girls Takrohi Lucknow best Female service 👖
 
SELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANYSELECTING A SOCIAL MEDIA MARKETING COMPANY
SELECTING A SOCIAL MEDIA MARKETING COMPANY
 
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
Night 7k Call Girls Noida Sector 121 Call Me: 8448380779
 
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our EscortsVIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
VIP Chandigarh Call Girls Service 7001035870 Enjoy Call Girls With Our Escorts
 

Don’t Get Caught With Your Digital Assets Hanging Out!

  • 1. Don’t Get Caught With Your DIGITAL ASSETS Hanging Out Rich@therichestweb.com (865) 242-1700
  • 2. Important Points Of Discussion • Domain – Registration Who REALLY OWNS… Your Company Name? • Websites – Know your back up plan, Who, What, When, Where, & WHY! • Social Media - Who is Admin, Are you an assigned Admin? • Digital Media Assets – Do you have hard copy, tangible/ high resolution copies of all files? • Future of Web – Where is the Future of Web headed and Why? • Office Computers – Do you have a recovery plan, have you discussed with your IT person? Good managers know and practice fire drills with staff.. A Recovery plan is your Digital Fire drill. • Reservations Servers – Is your customers data backed up and Secure, remember breaches in security could leave you Liable. Outline
  • 3.
  • 4. How BIG Is The Internet? Domain September 2014 total number of websites Exceeded 1 billion. As of January 2015: There are over 876 million websites - 284 million registered domains… Source = tekeye.biz/ A Reduction of 224 Million Websites
  • 5. Internet Corporation for Assigned Names and Numbers  Much of its work is the Internet's global Domain Name System, including policy development for internationalization of the DNS system.  They are the GLOBAL Record-Keeper of URLs, they keep track of who is the registered owner of each website.  If ICANN send you an E-mail verification, please answer them. If you don’t answer them, your site will get shut down in about 45 days. ICANN
  • 6. Who Really Owns Your Domain?  Registrar – He Who is the Owner of Record.  Only the designated registrar may modify or delete information about domain names in a central registry database. Domain
  • 7.
  • 8. Worst E-mail You Will Ever Receive A Bad Day!
  • 11. What is Malware?  Malware, short for malicious software, is any software used to 1. Disrupt computer operation 2. Gather sensitive information 3. Gain access to private computer systems. Know The Terms • Your Computer Allows Hackers To Launch Attacks • Your Server Allows Hackers Spread Their Virus
  • 12. Hacking Is It Really A Big Deal? 10,000 x 31 = 310,000 NEW Hacked Websites Per Month Internet ETV
  • 13. How Do I Know If My Website Has Been Hacked?  Google Safe Browsing  www.google.com/safebrowsing/diagnostic?site= Safe
  • 14. How Do I Know If My Website Has Been Hacked? Hacked
  • 15. Ways Hackers Can Get In? Operating System Browsers Update Update Update Anti Virus Updates Are Crucial
  • 16. Organize Social Media Assets Social Media Make Owner of Company’s E-mail, the admin account of record for all Social Accounts Assign – Roles • FB allows Admins and Editors. • Twitter allows Contributors. Organize Your Social Media Assets • Keep a Logbook • Google Doc Spreadsheet • Excel Spreadsheet  These should include all E-mails associated with social accounts. Be sure to include current Logins and Passwords, and any Answers to security questions.
  • 17. Top 5 Questions Asked of CIA On Twitter Funny But NOT
  • 18. Top 5 Questions Asked of CIA On Twitter Gaining access to Twitter Account once you have misplaced your Login & Password is so difficult, people will reach out to the CIA for help.! An up to date account of ALL Company passwords for social accounts is CRUCIAL step in not getting caught with your digital assets hanging out! Question 1
  • 19. Top 5 Questions Asked of CIA On Twitter Question 2
  • 20. Top 5 Questions Asked of CIA On Twitter Question 3
  • 23. What Are Digital Assets?  Hi Res Logo,  All Hi Res Photos form Photo Shoots  Backups of your E-mail Database  Copies / Database Files of Website  Copies of Videos Raw & Finished Save Your Work
  • 24. The Present & Future Of Websites Great Content Race
  • 25. Interesting Facts About WordPress  48% of Technorati’s Top 100 Blogs Are Managed With WordPress  74.6 Million Sites Depend on WordPress WordPress-Related Keywords Score 37 Million Searches Per Month  40 Translations of WordPress  22% of New U.S. Registered Domains Run on WordPress Why We Use Word Press https://managewp.com/14-surprising-statistics-about-wordpress-usage
  • 26.  WordPress.com Gets More Unique Visitors Than Amazon (Us)  6 New WordPress.com Posts Every Second  29,000 WordPress Plugins and Growing Daily  WordPress Is Most Popular With Business Websites Why We Use Word Press https://managewp.com/14-surprising-statistics-about-wordpress-usage
  • 28.
  • 31. Pros Of Open Source CMS Ease of Use Community Support Plugins for Almost any Function The common person can now take control of their own digital destiny. These factors can be attributed for much of the rise/ increase we’ve seen in the growth of websites until 2014. **Just be sure to have a host and admin that knows how to update and backup everything.**
  • 32. Cons Of Open Source CMS  Hackers Love Open Source CMS Sites Ease of use, has prompted a lot of “Novice” web development. Users who can blog, but fail to be detail oriented and leave holes of opportunity in their digital assets, their content management systems. They fail to update Plugins, Operating Systems, Browsers & Anti-Virus, leaving their servers & systems vulnerable. **Just be sure to have a host and admin that knows how to update and backup everything.**
  • 34. Develop Backup Scheduled  This can be Monthly Weekly or Daily depending on type of business.  Copy all files to external hard drives, USB flash drives or DVD’s, or Utilize Cloud  Assign task to only most trusted employee or staff PC & Web Backup Plan
  • 35. A Safe Place for all Backup's  Sentrysafe has just released their waterproof and fireproof safe in Japan. The safe has a USB cord/slot which allows you to safely store your hard drive inside the safe but still have access to the data. So, as long as your data is properly password protected The safe will retail for about $1800 US. Sentry Fire-Safe SFW123GDC Media storage safe $229 The SentrySafe Electronic Safe is designed to protect documents, digital media and other valuables from fire, water and theft.
  • 36. Reservation Systems • Update Servers on a Regular basis • Anti Virus Must Be kept unto date • Property Management System • Point of Sale System and /or • Reservation System • Contingency Plan • Who You Gonna Call? • Hard Copies of Contact Info
  • 37. THANK YOU To obtain a copy of this presentation, or contact Rich Benjamin for additional Public Speaking or Marketing / Consultation Services Call (865) 242-1700 E-Mail Rich@therichestweb.com Website www.therichestweb.com