Part 3: Content Websites & Social Media for Business

Part 3: Content websites & social media 


Content Websites & Social Media 

Last month, we discussed the basic tools needed to stand up a business website. Here’s a quick overview of what we covered: 

  • Small businesses often face a dilemma between moving business online and weighing business costs. 
  • Wix, SquareSpace and Shopify are three user-friendly web-hosting providers that offer both free and paid service options. 

This month, we’ll be focusing on websites and other online platforms ­– specifically social media – that can be leveraged by your business for marketing and informational purposes. Now that you have the basics, it’s time to start thinking about the goals you want your business website to achieve. 

Your business goals will ultimately determine if a content-based website is right for you. Stay tuned for Part 4 of this series if you believe your business would benefit more from an eCommerce website. 
Continue reading

Business Email Compromise: Infographic

Business Email Compromise 

It’s important that your employees know how to recognize phishing emails. However, business email compromise (BEC) scams are more sophisticated than traditional phishing attacks — and much harder to detect.

Unlike typical phishing emails that are characterized by unknown senders, grammar and spelling mistakes, and suspicious links and attachments, BEC emails appear to come from familiar entities. 

The most common BEC scams are ones that impersonate a company’s CEO or financial adviser to request fake wire transfers. Your business could suffer major financial losses if it fell victim to a BEC attack. Most often, BEC scams are not discovered until it’s too late. As a result, lost funds resulting from the scams are nearly impossible to recover.   Continue reading

Password Reuse Puts Your Business at Risk

In a world where data breaches and scams are a constant threat, one of your main priorities as a business owner is keeping your sensitive company and employee information safe. As we’ve seen in the recent data breaches of Myspace, LinkedIn and Tumblr, password reuse has allowed hackers to obtain personal data from various sites and accounts by only hacking into one site.  Continue reading