Blog
2017-11-16
Once you determine the keywords your target audience would search to find your type of business online, what next? Now, you need to understand the two ways your keywords will get your business found –...
2017-11-14
When thinking about the keywords that apply to your business, it might benefit you (and your budget) to take the “big fish in a little pond” versus the "little fish in a big pond” approach. What I mea...
2017-11-09
It’s more and more obvious that search engines are trying to show the most useful and relevant information to us, according to our online behavior. As I stated in my last article, when I searched “ele...
2017-11-07
Before you can go to work picking out your keywords, first you need to understand that a specific keyword search may produce different results for different people. Search engines have gotten very sma...
2017-11-02
People search the internet for information almost every single day. Equally important is the fact that small business owners use the internet to get in front of potential clients on a daily basis. Mor...
2017-10-31
Happy Halloween, everyone! Today, I want to wrap up my month-long discussion on cyber security with a scary story about a cyber crime that happened in real life. Hopefully, it tunes you into the dange...
2017-10-26
Most confidential data like your personal information is stored in a secure database when you submit it online, but the recent issue with Equifax shows even companies with multiple firewalls and secur...
2017-10-24
There are multiple points where a cyber security breach can take place – on your computer, through your email inbox, on your server, over email form submissions … no matter the technology, you must ta...
2017-10-19
In our last blog, we discussed the harm of social engineering and how hackers are getting the information they need for cyber crimes without programming a single line of code. As business owners, we h...
2017-10-17
There wouldn’t be internet crimes without humans involved. The human component is the source of cyber crimes, unfortunately, and many of those criminals use a technique called “social engineering.” Ac...