2019 Essential Technical Evaluations

2019 Essential Technical Evaluations

Review your goals, target audiences, messaging, social media, SEO, website, email marketing campaigns Auditing Your Online Presence is Essential in order to support your Goals. As 2019 is here, it is an ideal time to revisit your technical solutions (Website, Data Applications, IT/Network, Hosting) and Strategies (SEO, SEM, Social Media, Digital, etc.) to ensure they still align with your Goals. The good news is that Webhead can offer assistance in evaluating all of your tools and strategies. Here is a quick list that we recommend you look at:
  1. Goals – Evaluate which goals you met in 2018. What worked/what didn’t? How should those goals be changed for your 2019? How should your strategies be tweaked to support your Business and Marketing Goals?
  2. Target Audience – Reevaluate if your Clients have changed and research what their needs are. Dig deeper and identify the best way to reach them via technical solutions and social media platforms. Your strategies should be a result of this research.
  3. Website – It is good practice to review your website traffic and analytics routinely every month- but at the end of the year – do a deep dive to analyze your audience behavior. Your analytics will tell you what content to focus on and what you should modify, add and edit. The numbers will assist you to tailor your content in order to be more effective and convert views to sales.
  4. Security/IT – Review your current security, hosting, domains and overall network. Look for security vulnerabilities and how these should be addressed. These assessments should go further and look at your online tools (website, blogs, social media) to ensure you have the proper security checks and authentication best practices in place.
  5. Social Media – As you review the analytics for your website, also take a look at your social media strategies. Each platform typically offers their own set of analytics, but you should evaluate if your Social Media goals are still relevant. Tweak your strategy accordingly. The algorithms for most all of the relevant Social Media Platforms have changed, so be sure to be aware of how they work and how that can affect your posts, engagement and results. You should also ensure that your strategy for Social Media includes scheduling time to regularly engage with your audience addressing comments, inquires and comments. You should also ensure you are consistently posting content that is in sync with your messaging and organizational goals.
  6. Search Engine Optimization –  Just like Social Media, there are plenty of changes to SEO. You want to be sure you aware of the changes and how they affects your results and budget. Presently, most strategies require you to pay to play, but there are still some organic tactics you can implement to be sure you are maximizing your efforts.
  7. WCAG Compliance – It is becoming increasingly important to ensure your tech tools are WCAG compliant. You want to be sure that you are considering all audiences when you are publishing content onto a website, online application system or Social Media.
This is just a quick list of items, but the good news is that Webhead can help you with any or all of these assessments. If you would like to discuss or need additional information; please feel free to reach out us. Thank you and Happy 2019! We hope you have a wonderful and productive year! Call us for your technical needs. We are always an inquiry away.

Don’t Let Cyber Criminals Feast on Your Data

Don’t Let Cyber Criminals Feast on Your Data

The holiday shopping season excites online shoppers and cyber criminals alike. Unsuspecting shoppers see the opportunity to get crazy good deals on gifts while cyber predators prepare phishing scams and malware releases to infiltrate your devices and steal information. With online sales predicted to grow 15% through the end of 2018, let’s refresh our memory on tips to avoid having cyber criminals feast on our personal data!  
  1. Update web-connected devices, security software, web browsers & operating system. Do you close out of update messages with the intention to “Update Later” because it’s always inconvenient? While they can be inconvenient, updates are beneficial. Updates can improve performance, enhance security measures and introduce new functionality. Make a conscious effort to free yourself of technology momentarily to allow your devices to update.
  2. Utilize the strongest authentication tools available for your personal accounts. Most companies offer additional authentication options for extra security. Two factor authentication (aka two step verification) is the most common and most widely offered by banks, social media channels and email services.
  3. Steer clear of emails, texts and social posts from unknown senders or which include strange links. Cyber predators take advantage of your busy lives and increase phishing emails, mass texts and social posts to attempt to infect your devices to steal information.
  4. Use PayPal or a similar trusted payment gateway solutions when applicable. Using payment solutions, such as PayPal, provide a more secure way to send payment online. Through these methods, the recipient won’t receive sensitive details such as bank account number or credit card details.
Don’t let the tryptophan go to your head this season. Share these tips with your friends and family over the dinner table to ensure a more enjoyable time for all!

Indicators of Phishing/Whaling Attempts

Indicators of Phishing/Whaling Attempts

Some of you may already be familiar with the information I am about to share so this will serve as a refresh if you consider yourself savvy in these matters.

I want to send out a screenshot of a phishing email received by our CEO to inform you of some key indicators of phishing attempts when reading your email messages.

The screenshot in this article is a snapshot of a typical phishing email message. In it you will find the following indicators. You should become familiar with these types of indicators when reading your daily email messages.

  1. The To: address is to an old domain that is no longer in active use. Webhead no longer actively uses the web-hed.com domain.
  2. The email introduction indicates software as a service (Saas) that we use which is Office 365.
  3. The email introduction indicates a technical problem which many see as an immediate issue and denotes urgency: “You are out of storage space.”
  4. The content of the email contains a plausible threat, one that could affect productivity: “stopped from sending or receiving emails”.
  5. The content of the email contains a solution and a call to action to prevent that threat: “avoid your email being compromised” and “Enable More Storage”.
  6. The content of the email contains an authoritative message: “This is a mandatory communication”
  7. Lastly, the email contains a nefarious link. It is important that you do not click on the link immediately or at all if you have any suspicions. If you mouse over the link you will notice a link that is not legitimate. The link contains a base URL that is
    • Foreign: .ke (Kenya)
    • Unrelated: bobbypallphotography
    • Script launching: dundun.php (php is programming language and although you will come across legitimate links ending in php, the file name “dundun” is an onomatopoeia for a computer sound indicating an error. This is a less obvious indicator.)

    I hope you find this information useful and, please, practice care when reading through your email messages. Webhead actively employs spam and phishing controls to stem the flow of these types of emails, however they can still get through.