Peak SBC, LLC  

 

 

The SBC Small Business Newsletter

presented by the Peak Small Business Center

 

 

November 16, 2002

Table of Contents

 

Welcome

Quote of the Week

Administration

Featured Resource - THE INTERNET PUBLIC LIBRARY

Editorial

Staff Article - INTERNET SECURITY: MORE IMPORTANT NOW THAN EVER
Guest Article -  CASE IN POINT: DESIGNING A SITE THAT DEMANDS HIGH TRAFFIC
Parting Comments

Unsubscribe Information


Welcome

Thank you for subscribing to the Peak Small Business Center
Small Business Newsletter!

If you prefer to receive the html version, let us know by emailing us at:
mailto:cary@peakconsultinginc.com?subject=HTML

You can also view it online at:

http://www.peakconsultinginc.com/newsletters/sbnl_nov1602.htm
 


Quote of the Week

Never tell people how to do things. Tell them what to do and they will surprise you with their ingenuity.

- General George S. Patton, Jr.


Administration

INTERESTED IN THE HOME BUSINESS NEWSLETTER?

If you're interested in subscribing or switching, a simple blank email will do, as follows:

mailto:s2home@peakconsultinginc.com - to switch to the home
business version and unsubscribe from the small business version.

mailto:both@peakconsultinginc.com - to receive both versions of
the newsletter.
 


Featured Resource

THE INTERNET PUBLIC LIBRARY

This is a terrific reference source provided by the University of Michigan School of Information. There are links to every type of reference you can imagine, and a whole bunch you'd never think of! Check it out today!

http://www.ipl.org/


Staff Article

INTERNET SECURITY: MORE IMPORTANT NOW THAN EVER!
by: Cary Christian


Are you a pawn in a wider conspiracy to launch a cyber attack against the Internet infrastructure?

Would you know if you were?

Are you aware that you could be?

It is becoming ever more likely that the answer to the first question is "yes," and the general historical responses to questions 2 and 3 when asked of small and home business owners is a resounding "no."

Even the Bush administration's cyber security strategy begins with an appeal to small business and home computer users to place more emphasis on security. The typical small business and home user is not very security conscious and has a level of vulnerability they are not even aware of.

"It's my business," you might say. "I am the one who will be hurt if my systems are compromised."

The problem is, that disclaimer is only partly true. If your computer is not secure, it can, and possibly will, be used as part of a broader attack on other systems and you may never know what's going on inside that little box.

A recent article in the Washington Post spoke of the Honeynet Project, where servers and computers were taken out of the box and placed on the net with no additional configuration or security measures taken. They monitored these computers and found that the most common security holes were hacked within 3 to 5 days. Even secured computers were scanned for security vulnerabilities an average of 30 times per day!

The article goes on to point out that a hacker, using automated software tools that are available online, can set in motion a scan of a million computers before going to bed and have hundreds under his or her control by morning.

Once your machine is controlled, it could be used to store illegal information and images or for financial gain at your expense. But it could also be used to launch attacks against others, including government sites. Your domains and email addresses can be highjacked and used for God knows what.

Still think it doesn't affect you?

Internet attacks against public and private organizations around the world increased by 28% in the past six months. A study conducted by the Internet security firm Riptech Inc. found more than 180,000 successful attacks between January and June.

If cyber attacks haven't affected you yet, they will if you continue to run insecure systems. I can almost guarantee that! I've urged you to protect yourself before for your own good: to avoid identity theft, damage to your files, theft of private information, etc. Now I'm urging you to secure your system for the benefit of others. Don't be a pawn in a cyber attack that could affect hundreds of others using YOUR machine. Make it a little more difficult by keeping your computers off limits to hackers.

A hacker can cause you tons of grief on a personal level. Take it from someone who's been there and knows. But you now have a responsibility to others that you need to take seriously.

Here's what you can do.

1. GET A FIREWALL!

There are several free firewalls available that are simply outstanding and will work just fine. I recommend Tiny Personal Firewall from Tiny Software. You can download yours free RIGHT NOW at: http://www.tinysoftware.com  You can have it up and running and providing you with excellent protection in less than half an hour.

When configured properly, hackers will not even be aware your computer is online. If they do happen to find it, the firewall will control traffic into and out of your computer to prevent damage to your own system and to prevent it from being used to launch an attack against someone else.

If you use DSL or broadband service and your computer is online all the time, you cannot be without a firewall. Period! If you're using dial-up service, you should still have one even though your risk might not be as great.

2. TEST YOUR FIREWALL!

Once your firewall is up and running, take a few minutes from time to time to test it. Go to the Gibson Research site at http://grc.com/default.htm  and use "Shields Up" and "LeakTest" to make sure your firewall is running at maximum effectiveness.

You should also go to PC Flank at http://www.pcflank.com/  and run the tests listed in the left border of the page. This site also provides "rulesets" you can use in your firewall to easily customize the way your programs work with the firewall.

Don't ignore this testing! You want to make sure your computer is properly "stealthed" when you're online.

3. USE AN ANTIVIRUS PROGRAM!

Most of you are probably already using an antivirus program, but you'd be surprised how many people are not. A virus sent to your computer can not only create havoc on your machine, but it can allow a hacker to remotely control your machine. The firewall will normally protect you from hacking activity, but if you allow a virus to infect your machine, the particular virus might just be able to use your own firewall rulesets against you to give the hacker the control he or she wants.

Remember, your email is coming into your machine through a source, your email client, that your firewall allows to function rather freely. Therefore, your firewall is not going to stop email viruses.

You can get an outstanding antivirus program for free. I highly recommend AVG Antivirus which you can download from http://www.grisoft.com  It's the one I use and I couldn't be happier with it.

4. MANAGE YOUR PASSWORDS CAREFULLY

Don't make your passwords too easy to break. Change them every once in awhile. Resist the urge to use the same password everywhere you need one and never change it.

5. PATCH YOUR SYSTEM

If you've been batting a thousand so far, here's one you're probably not doing frequently enough. Companies, especially Microsoft, are releasing security patches at a rapid pace. When they are released, it is normally CRITICAL from a security standpoint that you apply the patch immediately. Yes, it's a pain, but get into the habit of checking for patches frequently, and when you find them, download and apply them.

None of the steps I am recommending here are that difficult, and they don't cost a cent. Take the little bit of time required to secure your systems for your own sake and to live up to the responsibility you have to others.


Copyright (c) 2002


Guest Article

CASE IN POINT: DESIGNING A SITE THAT DEMANDS HIGH TRAFFIC
by Karon Thackston 2002
http://www.ktamarketing.com


Marnie Pehrson may not be well known for driving traffic to Web sites, but she should be! Her ability to get literally hundreds of thousands of page views a month is simple astounding! (NOTE: I said "page views," not "hits." BIG difference!) I had to ask her to reveal her secrets so that we all could learn how to create a Web site that simply demands high traffic.

KARON: Hi Marnie. I really appreciate you taking the time to give us your insights on traffic building. You seem to have the Midas touch in this area : )

MARNIE: Oh sure, Karon. Anything for a friend.

KARON: I know from our email conversations that most of your Web sites get anywhere from 100,000 to 500,000 page views a month. How do you do it? Search engines? Ezine ads? What?

MARNIE: Well, those things do help, but normally the site itself drives the visitors to return over and over. It also encourages viral marketing with lots of referrals.

KARON: So tell me about your two biggest sites (in terms of traffic). Those would be http://www.ideamarketers.com  and http://www.shelovesgod.com , right?

MARNIE: Right. Both of these sites give the visitor a chance to shine - to contribute and be in the spotlight. They both accept article contributions, they both allow profiles of visitors, and they both have a place for me to give extra attention to visitors (the masthead).

KARON: So, because visitors are in the spotlight on these two sights, they recommend them to others, return repeatedly, and link back to you. Excellent!

MARNIE: Yes, I've built in automatic ways for visitors to forward pages to friends which brings even more traffic.  Basically, rather than having the focus on selling, I put it on the visitor. They are the primary focus with the products/services I sell taking a back seat (so to speak).

KARON: But you still make sales, right?

MARNIE: Oh yes! The sites wouldn't have been able to stay online since 1998 and 2000 if they weren't making money : )

KARON: Good point! What else can you tell us about your "magic formula?"

MARNIE: Well, both sites have *LOTS* of pages people can visit.  As you know, more pages = more doors for visitors to enter = more listings in search engines = more traffic!

KARON: Keep going. I'm all ears.

MARNIE: The masthead I told you about earlier helps drive traffic from my heavy-hitter sites to my newer sites. Among other things, it features articles and tips from site contributors. Then, in my newsletters, I encourage people to go to the site to read further. In other words, everything's not there in the email, they have to go to the site to get some of the content.

KARON: Well, you just have all kinds of tricks up your sleeve, don't you? Anything else?

MARNIE: Yes, actually : ) IdeaMarketers is also a "newsworthy" site that is used as a resource for many people. It tends to get a lot of mentions in articles simply because of its nature. And because of the quality of the site, IdeaMarketers has been recommended in a lot of high-traffic ezines.

KARON: So the combination of all these elements creates a Web site that people WANT to visit time and again, right? Marketing sites such as these is left more to the visitors than to your efforts, huh?

MARNIE: In a way. The visitors most certainly are the reason for my success. As I said before, search engines are not to be ignored, and I'm a firm believer in ezine advertising, but when you build a site designed around visitor interaction, traffic usually comes without a struggle.

KARON: Thanks so much, Marnie. This gives us some serious issues to think about.

MARNIE: My pleasure!

The two sites of Marnie's we mentioned in this interview are her article promotion site http://www.ideamarketers.com , and her women's spiritual growth site http://www.shelovesgod.com . Visit them today to see Marnie's traffic pulling designs in action.

------------------------

Most buying decisions are emotional. Your ad copy should be, too!  Karon is Owner and President of KT & Associates who offers targeted copywriting, copy editing & ezine article services.  Subscribe to Karon's Ezine "Business Essentials" at  

join-businessessentials@lyris1.listenvoy.com , visit her site at
http://www.ktamarketing.com  or learn to write your own powerful
copy at http://www.copywritingcourse.com .
 


Parting Comments

We hope you have enjoyed this issue of the Peak Small Business Newsletter and found it useful.  Please visit our website at http://www.peakconsultinginc.com to check out all the resources we provide. 

If you need to contact us, please use the following links:

Our CEO - cary@peakconsultinginc.com

Information - info@peakconsultinginc.com

Support - support@peakconsultinginc.com

Advertising Info - mailto:ads@peakconsultinginc.com or visit
http://www.peakconsultinginc.com/ad_rates.htm


To suggest content or ideas for articles, click this link to send an email.


 

Unsubscribe Information

 

You are receiving this newsletter because you requested it on our website or through an advertising link on the Internet.  If you want to cancel your subscription to this newsletter, simply click the following link - unsubscribe@peakconsultinginc.com

 

 
 

(c) 2003, 2004, 2013 Peak SBC, LLC.  Copyrights on all articles and books remain with the author.

Contact Information - Phone: (305) 799-3404

Email: webmaster@peakconsultinginc.com