Michael Johnson

Connect with Businesses on LinkedIn

LinkedIn is the most popular business and employment-focused social networking site around. Whether you’re happily employed at a fantastic company or you’re still searching for your dream job, it’s simply a must-join site for your professional future.

Business on Linkedin

LinkedIn users not only have the ability to connect with people in an effort to grow their networks, but users can also connect with companies through the following feature. When you follow companies, you’re able to see:

  • Status updates and important news
  • People who work for the company
  • Available positions waiting to be filled
  • And much more

As you can imagine, this is handy if you’re looking to fill your sales pipeline or find a new job. Prior to connecting with companies, it’s important to consider that there are more than 300 million people worldwide using the social networking site, which means you need to put your best foot forward! If you’re starting a brand new profile, remember the first few lines are the most important – name, title, and most recent positions.

Those first few lines will show up in any search, so you want them to be accurate and informative while giving you a good first impression. Your photo will also show up in any search, so you want to make sure you’re using an updated, clear shot. Another great tip before you start connecting with companies: customize your URL! How do you do this? That’s simple:

  1. Click the “me” icon at the top of your homepage
  2. Click view profile
  3. Click edit your public profile and URL on the right rail
  4. Under edit, public profile URL in the right rail, click the edit icon

When you first join, you’ll have a very long, impersonal URL. This is the time to change it to something more personal and professional. Aim for http://linkedin.com/in/firstnamelastname. If that’s not available, include something like a middle initial or even something alluding to your industry or expertise. This is great for searchability.

Next, write your summary. LinkedIn’s summary section is fantastic for showing off your personality and skills. You can include high-resolution photos, videos, and infographics as needed. Or you can keep it simple with text only – just be sure to stand out. Think of the summary section as your elevator pitch and keep it interesting.

Once you’ve set up your profile, you’re ready to start connecting with companies! So what’s the best way to get started? If you know the niche you want to work or find leads in, look for companies using the search engine. You can either search for a company name directly or use keywords having to do with your niche. Once you’ve found what you’re looking for, click “follow company” to connect.

You’ve Connected with a Few Companies… What Next?

First and foremost, connect with us! Our team is your trusted source for the latest information when it comes to business technology. We have extensive expertise and knowledge of the small to mid-size market; and we’re always sharing tons of great news, tips, and more. What’s next? Well, after you’ve connected with us and a few companies of your choice, follow these tips:

  • Start interacting with recent posts: Make sure you’re liking and commenting on posts, especially if you have some good insight to share on the topic. Always ensure you’re using proper spelling and grammar, of course!
  • Check out the leadership team: You should be able to find those who work for the company, including CEOs and Presidents, on the right side of the company page. Feel free to send invitations to connect.
  • Keep on the lookout for positions: If you’re looking for a job, make sure you keep an eye out for opportunities. If you’re looking to provide services, positions available can give you an opening to offer your services instead of hiring a full-time person.

LinkedIn groups are also useful for finding companies. Just search for groups relevant to the industry you’re looking for a job or leads in. You’ll easily find members of groups that are working at relevant companies.

What About Connecting with the Competition?

If you’re connecting with companies for the purpose of building your sales pipeline, should you connect with the competition? This can be a great tactic to help you gain a better understanding of your target market. How so? Once you’re connected, you’re able to view who they’re connected with – from prospects to clients.

Aside from being able to keep an eye on their prospects and clients, you’re also able to get a great view of their marketing strategies, including:

  • The content they’re sharing
  • The webinars they’re hosting
  • The events they’re holding
  • And much more

Keep in mind that you’re giving your competitor’s access to all of the same information. For some, it’s worth the risk, especially if you’re able to form a partnership of sorts – trading leads back and forth when they’re not suited to you.

 

Connect with Businesses on LinkedIn Read More »

Meltdown and Spectre Spawn New Round of Phishing Scams

The recent announcement of the vulnerabilities found in the Intel, ARM, and AMD processors has sparked a new phishing campaign and not the good kind of fishing with bait and largemouth bass. Although, these hackers are using a particular kind of bait.

Meltdown Phishing Scam

While Meltdown and Spectre require access to your system, hackers have various ways to gain access. Already hackers are using phishing emails to trick users into giving them access. They send out an email claiming to contain a patch for Meltdown or Spectre. Instead, the email installs malware on your system. This malware gives the hacker access to your system, allowing them to exploit the bugs and take the unprotected data.

Be wary of social engineering scams like phishing emails. Hackers are all too eager to take advantage of problems like this, and unfortunately, some people are so eager to fix the problem that they might not realize that the “patch” they just clicked on is now allowing a hacker to steal all their data.

WHAT IS PHISHING?

Phishing is a hacking technique that “fishes” for victims by sending them deceptive emails. The “ph” replaces the “f” in homage to the first hackers, the “phone phreaks” from the 1960’s and 1970’s. Virtually anyone on the internet has seen a phishing attack. Phishing attacks are mass emails that request confidential information or credentials under pretenses, link to malicious websites or include malware as an attachment.

Many phishing sites look just like the sites that they are impersonating. Often, the only difference in many spoofed sites is slight, and easily missed the difference in the URLs. Visitors can easily be manipulated into disclosing confidential information or credentials to the hacker if they can be induced to click the link. Even blacklisted phishing sites can often get by standard filters through the technique of time-bombing the URLs. Then the URL will lead to an innocent URL initially to get past the filters but then redirect to a malicious site.

Although malware is harder to get past filters, recently discovered and zero-day malware stands an excellent chance of getting through standard filters and being clicked on, especially if malware hides in a non-executable file such as a PDF or Office document. This is how many of the recent ransomware attacks were pulled off.

Now with Meltdown and Spectre looming over us, the average person is more susceptible to “quick fixes” and solutions to this issue.

Despite the lack of personalization, an astonishing 20% of recipients will click on basically anything that makes it to their inbox.

SPEAR PHISHING

Spear phishing is an enhanced version of phishing that aims at specific employees of the targeted organization. The goal is usually to gain unauthorized access to networks, data, and applications. In contrast to the mass emailing of a phishing attack, which might see hundreds of attack messages sent out to random recipients within the space of a couple of hours, spear phishing is methodical and focused on a single recipient. Often the initial email will contain no URL or attachment. Instead, it will simply try to invoke the recipient into thinking that the sender is who they say they are. Only later on will the hacker request confidential credentials or information, or send a booby-trapped URL or attachment.

The additional customization and targeting of a spear phishing email, along with the lack of easily recognized blacklisted URLs or malware customization results in click-rates more than 50%!

Meltdown and Spectre Spawn New Round of Phishing Scams Read More »

10 Ways to Maximize Amazon’s Alexa for Business

We all wish that we had a personal assistant who would manage all aspects of our lives. Wouldn’t it be great to have someone who would order your Uber rides while telling you about the newest and greatest restaurant in your area? And wouldn’t it be even better if that assistant didn’t require breaks, a salary or awkward ‘how was your weekend’ conversations? All of this is now possible with the creation of Alexa. Alexa is an intelligent personal assistant, developed by Amazon. This device is capable of voice interaction, music playback, and so much more.

Amazon Alexa

The only requirement of Alexa is a wake-word. A wake-word is a multi-syllabic word or phrase that Alexa listens for and prompts your device to take action. The wake-word can be “Alexa, Amazon, or even Computer”, so you will have to talk to her at times- though this is nothing when compared to the long-winded conversations your assistant may be roping you into. Since Alexa has become a much-desired tech device, an increasing number of individuals are turning to Alexa to take care of everyday tasks. Alexa’s capabilities mean less work for you, and more time that you can spend enjoying the various gifts, Alexa has to offer.

Alexa can do things like:

Give Short Answer Information

Some would consider Alexa, a cousin to Siri. With their similar abilities and robot-humanoid voices, it’s easy to see why- thus lumping Alexa into a category that it far exceeds. Alexa can access information ranging from Wikipedia to spell-check, and grouping it with Siri is discrediting its abilities.

Alexa can also perform calculations, conversions, and measurements. Since Alexa has not been around for long, the fact that it offers so many useful features including advanced mathematics capabilities along with the ability to answer questions is worth mentioning. Alexa can answer questions regarding anything ranging from the founding date of your favorite partner company to where you can get a cleaning service for your office; it is exciting to think about what possible future advancements Alexa might have.

Set Timers, Alarms and Reminders

You can use your voice to set and cancel alarms, timers or reminders with Alexa. To use, just tell Alexa to set the alarm, timer or reminder. When setting up an alarm say, ‘Alexa, create an alarm.’ Alexa will then ask what time you would like the alarm. When the alarm goes off, you can say ‘stop’ to stop the alarm or say ‘snooze’ for an additional 10 minutes.

If you are creating a timer, say, ‘Alexa create a timer for 10 minutes’ or however long you would like the timer to be. After setting the timer, you can inquire about how much time is left before the allotted amount of time has passed, or stop, cancel or resume the timer.

To set up a reminder through Alexa, begin by saying ‘Alexa, create a reminder.’ You can then tell Alexa what you need reminding of and when you would like the reminder. For example, ‘Alexa, create a reminder for a 9:00am business meeting Monday’. You can also ask Alexa about what reminders you have for tomorrow or the upcoming week, to keep track of events and stay organized.

Purchase Supplies

Since Alexa is part of the Amazon family, this device can order whatever you need from the website at the slightest mention. You can make purchases, add items to your cart and even search for new items you may want to buy. Alexa can even tell you about deals that are going on.

The have Alexa make a purchase or add an item to your cart, say, “Alexa, order printing paper,” or “Alexa, add printing paper to my cart.” Alexa can reorder items you have previously purchased, to ensure you are receiving the product you require.

Make Lists

To make a list, you just need to say, ‘Alexa, create a list.’ Your device will then prompt you to name the list, which helps keep things organized in the long run. The ability to name your lists means that you can have shopping lists for specific stores or to-do lists for businesses or locations.

The lists will also be available for review in the Alexa companion app. In the hectic lives many of us live, this feature provides some stability. Since Alexa is not most peoples first choice for list-making, users also have the option of syncing to third-party apps that are more frequent.

Keep Your Calendar

The Alexa calendar can help you keep track of upcoming events, or add events as needed. It is also compatible with Office 365 Cloud or Outlook calendars. However, you can only link one calendar per device.

To review events you may have coming up, ask Alexa ‘What’s on my calendar’? You can make this specific by adding a time and date to the question. You can also schedule events with other people. To do this, tell your device to ‘Schedule a meeting with Joe Smith.’ There are options besides scheduling a meeting of course. It can be lunch, a phone call, or any event you might need.

Provide News and Traffic Updates

It is important to stay up-to-date on events happening in your community or around the world. Not many of us set aside time during the day to catch up on the news, and with Alexa, you don’t have to. Alexa can give you updates on news, weather, traffic, sports and more. Just ask.

Say, ‘Alexa, what’s in the news’ to receive headlines. Say, ‘What does the traffic look like,’ to get information regarding the roads and any alternate routes you might want to consider taking. Alexa helps you out in various ways, and this is just one of them. Your device wants you to make it work on time, and it is prepared to help you do so.

Do Your Banking

Most banks now offer a mobile app which helps you manage your money on the go. It makes sense that this process would get even easier with the help of Alexa. Several banks are now offering Alexa enabled skills including Capital One and American Express. To use the banking features on your device simply enable actions by saying ‘Enable Capitol One skill.’

You can then check your account balance or even pay bills through your Alexa. You must first set up your financial account information with Alexa using the companion app. Selects ‘skills’ from the list and search for your bank. Then, enable the skill and enter your bank information. You also have the option of setting up a personal key to keeping your information secure. After following these steps, you can access your information via the Alexa device.

Give You a Weather Update

To get weather updates, you must first enter your location in the companion app. You can get a seven-day forecast for your location through the companion app, or just ask your device ‘What’s the weather?’ Alexa can also give you weather updates for other locations, just make sure to include the day and location in your request.

You can configure your device to give you updates in either Celsius or Fahrenheit by changing your ecobee4 settings. These settings are in the settings portion of the Alexa app. You can select ‘device’ from here and then select your ecobee4.

Make Calls

Perhaps one of the most useful tools is Alexa’s ability to make and receive calls. Alexa offers free calls to any landline or mobile number in the U.S, Mexico, and Canada. Alexa offers hands-free calling and text. Alexa even works with emergency numbers like 911.

When you are placing or receiving a call the Alexa light ring will turn green. If you have a message waiting, the light will be yellow. To use this feature, you need to make sure you grant Alexa access to your contacts via the companion app. From here you can ask Alexa to make calls, the same way you would ask a personal assistant.

Tell You What’s Nearby

If you’re looking for information on nearby restaurants or businesses Alexa has all the answers. You just need to ask Alexa, ‘What restaurants are nearby,’ for information about local places to grab a bite with clients or potential business partners. Furthermore, Alexa can give you information about operating hours and menu listings, in case any of your clients have allergies.

Just make sure your device is set up with your location to ensure you are receiving accurate information. You can also view information about local businesses on the app, which will also link you to Yelp to ensure your satisfaction.

10 Ways to Maximize Amazon’s Alexa for Business Read More »

Major Security Flaw Discovered In Intel Processors

Potentially every Intel processor sold in the last 10 years could have a critical security vulnerability that puts users at severe risk.

Meltdown Intel Processors

It’s often these days that poor IT security comes down to something like human error, and lack of awareness on the users’ part. It’s less often that there’s a widespread design flaw discovered in the technology itself, which is exactly what happened with Intel this week.

The Register published an article this week detailing how every Intel processor produced over the course of the last decade is affected by a design flaw that would allow malicious programs to access and read what should otherwise be protected areas of a device’s kernel memory. Kernel memory is dedicated to essential core components of an operating system and how they interact with the hardware.

What does this mean for Intel users? This flaw could allow cybercriminals to access valuable and sensitive information like passwords. It’s possible that something as simple as JavaScript on a webpage, or cloud-hosted malware could penetrate the most interior levels of an Intel-based device.

Even worse, a foundational flaw like this can’t be patched with a simple, everyday update – the problem is in the hardware, which means it needs an OS-level overwrite for every single operating system (Windows, Linux, and macOS).

In a statement released January 3rd, Intel claimed that this flaw isn’t necessarily unique to their processers.

“Recent reports that these exploits are caused by a “bug” or a “flaw” and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices — with many different vendors’ processors and operating systems — are susceptible to these exploits.”

According to Intel CEO Brian Krzanich, Intel was informed about the security flaw by Google a few months ago. Although the extent of this flaw isn’t fully known to the public right now, it appears that developers are working hard to patch systems over the course of the next few weeks.

That said, the patching process won’t be easy, given that it will involve severing kernel memory from user processes. In a nutshell, that means users will face major performance lags, anywhere from 5 – 30%, depending on the specifics of the device.

The fix works by moving the kernel to a totally separate address space, making it nonexistent — and therefore, inaccessible — to a running process. Unfortunately, this separation process takes a lot of time to perform, as it forces the processor to dump cached data and reload from memory every time it switches between two separate addresses. The end result is an increase in the kernel’s overhead and a slower computer.

While it may not be noticeable for the average user on their home PC, this kind of lag will likely affect businesses using enterprise-grade cloud configurations the most. Be sure to keep an eye on this developing issue in order to ensure your Intel-based devices are properly patched.

As always, the best way to stay aware of threats like this, as well as protect against them, is to work with an expert partner. Our team of cybersecurity professionals will help you stay ahead of exposed vulnerabilities like these so that you can remain safe and focus on the work your business does.

Major Security Flaw Discovered In Intel Processors Read More »

Net Neutrality in Everyday Life

We’ve all heard the words “net neutrality” bouncing around for the past few months. Many of us have no idea what this term means, even though we benefit from them every day. Here is what you need to know about this important topic.

Net Neutrality

When you go on the internet you are first brought to your home page of your chosen search engine. For some people this home page is Bing, for others, Yahoo, for still others it is Google. From this starting point, you can go anywhere. If you are looking for a particular site, all you must do is type the address in and away you go. If you are looking for certain information, but don’t know exactly where to find it, all you must do is type in what you want to know more about and your search engine will bring you all results about that topic. Your internet service provider can’t decide which results to give you, so you end up being able to see all results available on the web. With the ending of net neutrality, this internet as we know it may come to an end.

What is Net Neutrality?

The phrase “net neutrality” basically means that all websites on the internet are treated the same by your internet service provider. They can’t discriminate against sites based on popularity, type, or any other factor. Meaning if you have CenturyLink as a provider, they are not allowed to block any sites from you or allowed to slow down services to certain sites. All websites get the same treatment across the board, regardless of their content or popularity.

For example, my internet service provider loads YouTube at the same speed that it loads Netflix. It doesn’t discriminate against the site in any way.

How does this affect me?

This is important because if internet service providers can change the way their service is provided to different sites this could mean your monthly billing would be set up similarly to a cable TV package. Certain packages could charge more for certain sites based on popularity (i.e. Facebook, Instagram, Snap Chat, YouTube).

Another possibility is packages could be set up based on the type of website. For example, one Internet service company in Portugal has packages for social media (Facebook, Instagram, LinkedIn, messenger, Tumblr, Pinterest, Snap Chat, and Twitter), for video (YouTube, Netflix), for music (Pandora, Sound Cloud) for email and cloud services (Gmail, google drive, yahoo, Hotmail, drop box), and for messaging (skype, kik, video messaging, and other internet based texting services). Each of these packages costs €4.99 or about $5.91.

This means that if I, an average internet user, wanted to access all the websites that I typically do every month I would have to pay for each of these packages because I use websites from all of them on a regular basis.

Why is This Only Now Becoming an Issue?

The Federal Communications Commission are the ones responsible for pushing the vote, which is set for December 14th of this year. Thus, the media is covering more and more of the story closer to the vote. It is very possible that the media would never have covered the story if it weren’t for the huge public outcry over the issue. A group of 28 senators headed by Senator Maggie Hanssen has written the FCC a letter asking for them to delay the vote until they can properly examine the document and gain a full understanding of the vote.

Who Benefits?

The short answer is internet service providers such as Comcast, Verizon, and CenturyLink stand to gain the most because under the new rules they would be permitted to charge their customers more for different internet packages.

What Other Countries Don’t Have Net Neutrality?

Many countries lack net neutrality. One example is Portugal. Their model could be like what would happen here in the U.S., with different packages and extra data costing more. If you want social media, it would cost a fee. If you want video streaming, that would cost another fee. This could happen with every type of application or website and end up costing quite a bit if you use multiple types of sites. Other countries without net neutrality include China, Turkey, Russia, Saudi Arabia, Pakistan, Uzbekistan, Iran, Syria, Kazakhstan, Sudan, Egypt, Venezuela, Ukraine, Ethiopia, Myanmar, Thailand, and Vietnam. The degree of restriction varies from country to country. Some places, like China, have government blocks on many popular websites such as YouTube, Gmail, Instagram, Pinterest, and more. China also has a very extensive government presence on what websites are not blocked to monitor public opinion current events. There are also many more countries that have partial net neutrality, or very minor regulations on their internet, Such as India.

Conclusion

The internet is hands-down humanity’s best invention. What makes it great is that all content and information is treated equally. It is the only source in the world that allows you to access any information from anywhere at any time. The ending of net neutrality would end the open internet as we know it. To mar the best invention humanity has ever created with more regulation and pay-for-services would be a great detriment to society.

Net Neutrality in Everyday Life Read More »

Call Now Button