Sean Twomey, Author at Posmay Media - Page 3 of 3

All Posts by Sean Twomey

Staying Safe Online: A 10 Step Guide To Personal Internet Security

This is a short guide to help you improve your online security. As our lives are becoming more and more dependent on technology, the internet and online services so our responsibility increases to stay safe and protect ourselves and our assets. Take the time to review your personal security setup and make sure that you don’t become the next victim.

Disclaimer: The advice in this guide are recommendations based on my personal experience. I cannot however make any guarantees and I cannot be held responsible for your online security. Always do independent research and use this information at your own risk.

 

1. Use A Reliable Email Service Provider

Your email account is your unique personal identifier for online accounts. Make sure to use a reliable email service provider to host the email account that you use to create additional account online. I recommend Gmail (free for personal use) or GSuite (premium for business use – previously called Google Apps for Business), but these are not the only options.

2. Always Use Strong, Secure & Unique Passwords

It’s crucial to always use strong and secure passwords for all your online accounts. You can use an app like 1Password or a website like strongpasswordgenerator.com to generate strong passwords. Both these options have password strength indicator to help you craft a strong password. A strong password has 6 to 10 (or even more) characters and includes capital letters, lowercase letters, numbers and symbols. Adding more characters makes the password stronger.

Avoid using names, birth years, brand names or any word in the dictionary. Ideally randomly generate a strong password or create your own using a memory trick. For example use the first letter of each word of your favourite song title and then replace certain letters with numbers and symbols.

Avoid using the same password for multiple accounts. Generate a new password for each account you own.

3. Use A Password Managed App

Use a premium password manager app like 1Password to save, manage and backup your passwords. Do not use free apps and do not save your passwords in your browser (Chrome or Apple Keychain).

After installing a premium password manager app on your devices, make sure to set up the sync and backup features that regularly create encrypted backups of your passwords and saves them to the cloud (for example 1Password syncs your encrypted data to their secure servers.)

1Password also lets you save other sensitive information including credit card details, passport information, and secure notes and files. This app is available on Android, iOS, Windows and Mac OS and syncs across devices for convenience. It also works with fingerprint scanners for convenient access.

Q: What is a password manager app?

An app that lets you save, protect, manage and backup your passwords and sensitive information in an encrypted vault that you access using one single master password. Using an app makes it simple to use strong and complex passwords without needing to remember them all.

4. Activate & Use Two Factor Authorization

Where available make sure to activate and use Two Factor Authorization (TFA). This lets you add an extra layer of security to your accounts. When logging in, in addition to your username and password, you will need to provide a one time pin or password.

Depending on the system you are using this might be sent to your mobile phone or to a TFA app like Google’s Authenticator app.

Google, Dropbox, Dreamhost and Stripe are some examples of online services that currently offer Two Factor Authorization.

Take some time to learn more and activate TFA on your Google account and thank me later. When activating TFA, make sure to save any secret backup codes to your premium password manager app, in case you loose access to your phone and need to unlock an account.

5. Avoid Using Public Computers

Avoid using public computers (found in Internet cafes, backpacking hostels, libraries and airport lounges) to login to your accounts, make purchases or do online banking.

Public machines may contain keyword logging software. This software secretly records your activity including any text and passwords that you type into the keyboard and sends this stolen information to a hacker.

Instead (when possible) rather use your devices.

6. Use A VPN On Public Wifi Networks

Make sure to use a premium virtual private network (VPN) when using your device on public wifi networks including hotels, hostels, airports and malls.

A VPN encrypts and protects your information as it is sent and received from your device to the network. A VPN will also let you connect to the web using your preferred location specific server. If you are travelling for example and you’d like to access a website that is only available in the US, then you can simply connect through a US server to bypass this restriction.

There are many VPN options to choose from. Avoid using a free VPN as these may collect and sell your personal information. I’m currently using VyprVPN by Goldenfrog.

7. Never Click Untrusted Links

Never click on untrusted links in an email, on social media or inside other apps like Skype or Facebook messenger – even if you really really want to.

If you don’t know the sender or if the message seems out of place, then delete it. Instead contact the person using another method/channel and ask them about the link they sent. 9 out of 10 times you’ll find out that their account was compromised and that the email (with the link) was automatically sent out to all their contacts, including you. These automated spam emails are sent out by spam bots, not humans.

8. Only Use Trusted Websites And Apps

When doing your online banking make sure to use the official websites and apps. Also make sure that the website you’re using is encrypted and is using a valid SSL certificate. Make sure the URL is showing https:// instead of http://.

Never access your financial websites (banking, PayPal, Stripe, etc.) by clicking through a link in your email. Always type in the URL or search for the official website on google to make sure you land on the correct site.

Phishing scams can easily link you to a website that on first glance looks identical to the official site.

Also if you are using 1Password, then you can use the browser extensions, which let you login to your favourite websites with a single click after unlocking your vault. Using the browser extensions to login adds an extra security check, because the 1Password app will only automatically fill in your details and login if you are on the website that your access details are linked to.

9. Never Share Your Sensitive Information With Untrusted Individuals or Websites

There are numerous ways hackers try and get your sensitive information – via email phishing attempts, via key logging software and even via the phone.

If someone calls you claiming to be from a financial institution that you’re a client of, make sure that they are in fact who they claim to be. If you are unsure, hang up the phone and contact the company using the official contact channel/phone number to make sure you reach the correct person.

10. Don’t Be Scammed

If it’s too good to be true, it usually is – and it’s most likely a scam.
If you receive an email from a wealthy Nigerian prince that wants to wire you USD $800 000, delete the email and don’t reply.

If someone you know contacts you claiming to need financial help due to an overseas emergency. Contact them directly through a separate channel. You’ll most likely find out that they’re not even travelling.

If a handsome man on a dating site charms you into a cyber relationship and asks you for financial support so he can fly to you to live happily ever after. The man is probably not who he claims to be and he will happily take your donations and never come visit. Don’t get mislead.

In Conclusion

As we go deeper down the rabbit hole by integrating our lives with technology and connected services, so it is our responsibility to educate and protect ourselves. Take the time to review your personal security setup and make sure that you don’t become the next victim.

If you have any questions, please don’t hesitate to contact me. If you’d like to be notified when this guide gets expanded/updated, make sure to join our notifications list. Thanks for reading, please take a moment to vote this post up or down – we value your feedback.

Get the Posmay Media Newsletter

Weekly insights & the latest content straight to your inbox. 

Using Twitter To Learn, Share & Connect

Twitter is not just a social network. It’s an amazing tool that let’s each and every one of us (assuming you have a smart phone or laptop connected to the Internet) join a global conversation based on what we are interested in.

I joined Twitter in 2009. At first, like many others, I too did not understand what it was all about, but I eventually got the hang of it, learnt how to use Twitter and have since realised that it’s an extremely powerful network and tool that I use on a daily basis.

In this post I’d like to help you understand what I use Twitter for and how you too can tap into the value that this network has to offer.

1. Research & Learning 

Twitter has become an extremely busy conversation and unfortunately like any online channel there is a lot of rubbish and spam to filter through, however once you understand how to best avoid all the junk you will quickly realise that there is a lot of value at your finger tips. Follow reputable accounts and hashtags and you will soon be learning about the latest trends, developments and best practices. I use twitter to stay up to date in a wide selection of interests including Online Marketing, Digital Media, Digital Nomadism, Entrepreneurship and Technology.

2. Connecting & Building Relationships

I’ve met some amazing people through the Internet. Some of them I’ve been fortunate enough to have met in person at events or while travelling and other remain online friends that I hope to meet in person some day in the future. Over the past years Twitter has gives me the opportunity to reach out, connect, keep in touch and interact with those that I have a connection with. This opportunity to connect, interact and have proper conversations online is what makes Twitter so powerful. Instead of browsing an endless feed of noisy tweets, take time to reach out to individual users, start a conversation and build a relationship – you might just make some amazing connections.

3. Sharing Valuable Content

Twitter let’s you send out public updates to the network. These updates may be seen by your followers or if you include topical hashtags, then your updates might be seen by someone searching for that specific hashtag. Either way you have an opportunity to share valuable content with the world. Maybe it’s an amazing article you’ve read or an inspirational quote that uplifted your day.  Whatever it is that added value to your life, pass it on and share it on Twitter. The sharing economy is here and Twitter makes it easy to share your own valuable content – there is quite a high chance that there is someone out there looking for that something that you have to share. I like to share useful and interesting articles, graphics, quotes, courses, tips and ideas. Whenever you share, make sure to use hashtags so that other users can discover your tweets even if they’re are not yet following you.

4. Interacting & Networking at Live Events

While watching or attending live events I use Twitter to follow the event specific hashtag to filter down to the tweets relating to the event. Tweeting out questions, comments or valuable take aways at conferences, workshops and meetups is a great way of interacting with other attendees and showing up in the event feed. Following and tweeting at fellow attendees is also a great way of making contact and possibility planning an in person meet up. Always make sure to include the event hangtag(s) with all your tweets to make sure that other participants will see your tweets in the events’ feed.

Some examples of event hashtags: #TedxCT (TEDx Cape Town Talks), #ContentlySummit (Content Marketing Summit), #SMMW15 (Social Media Marketing World Conference 2015), #RWC2015 (Rugby World Cup 2015).

5. Following Breaking News

I don’t spend much time following the news, but when there is breaking news that affects me or that I am interested in, then I will jump onto Twitter to get the latest updates. A while back I was on a plane from Doha to Cape Town that got turned around while we were over Saudi Arabia due to airstrikes that had broken out on our flight path. When we got back to Doha Airport, I used Twitter to find out more about what was happening and how we were being affected.

News channels that I follow on Twitter include: @BBCBreaking@AJEnglish@ewnbreaking@TWCBreaking, @SkyNewsBreak and @ReutersLive

6. Promoting Your Personal Brand & Business

I have purposefully left the topic of promotion and selling for the end, because this is something many Twitter users get horribly wrong. They use Twitter predominantly as an advertising channel to try promote and sell their services and products. As you can imagine, this can be extremely off putting to other users and is therefore not recommended. What works well is finding a great balance of sharing valuable content and promoting what you have to offer. The 70/30 rule works well, where you spend 70 – 80% of your time sharing valuable content and interacting genuinely. The other 20 – 30% of your time you should spend on promoting your own brand and any valuable and useful services and products that you might be selling.

Time To Take Action

I encourage you to get more active on Twitter. – I’m waiting to read and reply to your tweet. You can follow and interact with me on my personal account @posmay or the agency account @posmaymedia. Thanks for reading and happy tweeting.

Do you have any questions about Twitter? Tweet us @PosmayMedia or email info@posmaymedia.com.

1Password – The Best Password Manager App

The Internet together with cloud based apps and online services has unlocked a world of opportunity. Be it email, social media, online publishing, project management, team collaboration, accounting, customer support, instant messaging or navigation – more and more applications and services are now housed in the cloud. And to access all of these services we constantly need to create new accounts and protect our accounts with strong passwords. But how do we remember and manage all these long complex passwords?

The answer is an app called 1Password by AgileBits.
Click the image below to watch a great video explaining how this app works.

posmay_media_1password_best_password_manager_app_featured

1Password is a premium app that we use on a daily bases and recommend to all our customers and friends. We strongly feel that this app is the best password manager out there. It let’s you store and manage all your private sensitive information in one secure app – think of it as your virtual online safe. This can include passwords, login credentials, credit card details, bank accounts, passport details, and secret notes. Take a look at the following screenshot of the backend of the app to see all the categories on the menu on the left.

posmay_media_1password_best_password_manager_app2

The app also integrates with useful browser extensions that make it super simple to login to the sites and create new strong passwords. I mostly use the Chrome extension, which I use daily and this functionality itself saves me hours each and every week.

posmay_media_1password_extension

1Password is available for Mac OS, iOS, Windows and Android and syncs seamlessly across devices. It also creates backups to services like Dropbox, which let’s you access your sensitive information through your Dropbox account in case you loose all your devices.

There are many other great features that you will discover, like vault sharing, which let’s you share passwords with your team or family members. If you don’t have a simple and reliable password management system in place, then I highly recommend that you try 1Password. You can download a free trial from their website.

Do you have any questions about 1Password or how to improve your online security?
Email us at info@posmaymedia.com.

What Content & Pages To Include On Your Website

There are no fixed rules when it comes to the content you should include on your website, as it depends on a number of factors. However based on my experience there are a few common recommendations. Find below my content framework with suggestions of what you should consider including. Use this well-researched setup to help your brand provide the value your customers are looking for and to achieve your brand’s marketing and website objectives.

An Effective Website Content Framework

1. Home Page

Introduce your visitors to your brand and feature the following aspects:

  • What your business does
  • What services or products your business offers
  • What your business stands for
  • How your business can help solve your client/readers problem
  • What sets your business apart from the competition

Also add links on this page that link through to pages that meet your various website and marketing objectives. For example “Learn More”, “Contact Us”, “Start Here”, “Free Download”, “Sign Up”, etc.

2. Start Here

The “Start Here” page is aimed at new visitors with the intention to help them understand what your business offers and how it can help them solve their problems. It is aimed at your customer personas, leading into marketing funnels and featuring your most helpful content.

3. Services/Products/Brands

This page is used to showcase what services, products and brands your business offers. Do this with short concise summaries that include graphics and links to the “Learn More” page where visitors to the website can find more information. Depending on your business, you might want to setup various pages for this content.

4. FAQ

Answering frequently asked questions helps your visitor understand your business and their own challenges better – positioning your business as the authority in the market that has the knowledge and experience.

5. Blog

Your “Blog” will list all posts and articles with valuable content that your business regularly publishes. Published content or articles can include industry news, trends, events, featured clients, new product releases, new offers, company news, how to tutorials, etc.

6. About

Provide your visitor with information about your business, brand and team. More importantly help the visitor do the following:

  • Understand why your business does what it does
  • How your business can add value
  • Who your business is targeted at
  • How you can help them solve a problem or pain point
  • Why your business is the right business to work with and buy from

7. Support

Explain what support your business offers your clients. Make sure to manage their expectations and provide important information and links so they can easily submit support requests.

8. Enquiries/Request A Quote/Bookings

This page facilitates the next step that you would like visitor to take and to do business with your brand. This page can contain a smart enquiry form helping visitors to the website to request what they require.

9. Resources

A resources page features a collection of helpful resources that your business recommends and endorses. This can link to anything that adds value to your customers journey including educational content, useful tools and services, and profiles of other thought leaders. It can also include complementing partners or brands in your industry. This can link to third party websites or to content on your own businesses website. This is also a great place to include affiliate links, but make sure to be open and transparent.

10. Contact

This page lists the contact information a visitor would need to do business with you. This can include a contact form, email addresses, map of where to find your offices and branch locations.

Get the Posmay Media Newsletter

Weekly insights & the latest content straight to your inbox. 

>