Tuesday, June 19, 2018

About Google adwords

This comes right from Google about using the right keywords  when using your AdWords campaigns:

Keywords are words or phrases you choose when you set up your AdWords campaign. These are terms you think your potential customers are likely to use when searching for products or services like yours.
By matching your keywords with the ads you create, you make it possible for your ad to show when someone searches for similar terms or visits a website with related content.
For example, if you deliver fresh flowers, you could use fresh flower delivery as one keyword paired with an ad promoting fresh flower delivery. When someone searches Google using the phrase fresh flower delivery or a similar term, your ad might appear above or below Google search results, or on other websites related to fresh flower delivery.
Did you know that you can:
reach people who have visited your website or used your app. Previous visitors or users can see your ads as they browse websites that are part of the Google Display Network, or as they search for terms related to your products or services on Google.
Touch base with me if you have an interest in getting more leads!

Talk more soon.

Joe

Monday, June 18, 2018

Free webinar presented by WERC and Siggins


A free WERC webinar presented by Siggins on Wednesday, June 20, 2018
2:00 PM ET / 1:00 PM CT / 11:00 AM PT
The webinar will talk about Better Solutions for the New World of Technology-Driven Distribution. Presented by Steve Wilson, Systems Engineer, Analyst and Warehouse Design Consultant, Siggins. ...
See More

Cyber security


The Time for Cybersecurity is Now.  

Cybersecurity threats are more prevalent than ever. Has your organization taken the necessary steps to ensure it is protected from the next malware or ransomware attack? Emerson has put together a comprehensive Cybersecurity Guidebook for Process Control aimed at providing practical solutions to help you assess and reduce your organization’s risk level.

  Adopt a Risk-based Approach to Cybersecurity
A risk-based approach to cybersecurity can help you make strategic decisions based on the likelihood and impact of each vulnerability.
 
  Tighten System Access
Building a culture of security by creating and enforcing security best practices will help your employees realize they are a crucial part of keeping your operations safe and secure.
 
  Go Beyond Perimeter Protection
Hackers count on organizations forgetting the backdoors they’ve left open. Using the tools at your disposal, you can shut those doors and lock them tight.
 Attack after attack be prepared!

HIDDEN COBRA, virus from Korea this is important

This report is provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. The DHS does not endorse any commercial product or service, referenced in this bulletin or otherwise.
This document is marked TLP:WHITE. Disclosure is not limited. Sources may use TLP:WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release. Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see http://www.us-cert.gov/tlp.

Summary


Description
This Malware Analysis Report (MAR) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). Working with U.S. Government partners, DHS and FBI identified Trojan malware variants used by the North Korean government. This malware variant is known as TYPEFRAME. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA. For more information on HIDDEN COBRA activity, visit https://www.us-cert.gov/hiddencobra.

DHS and FBI are distributing this MAR to enable network defense and reduce exposure to North Korean government malicious cyber activity.

This MAR includes malware descriptions related to HIDDEN COBRA, suggested response actions and recommended mitigation techniques. Users and administrators should flag activity associated with the malware, report the activity to the DHS National Cybersecurity and Communications Integration Center (NCCIC) or the FBI Cyber Watch (CyWatch), and give the activity the highest priority for enhanced mitigation.

This malware report contains analysis of 11 malware samples consisting of 32-bit and 64-bit Windows executable files and a malicious Microsoft Word document that contains Visual Basic for Applications (VBA) macros. These files have the capability to download and install malware, install proxy and Remote Access Trojans (RATs), connect to command and control (C2) servers to receive additional instructions, and modify the victim's firewall to allow incoming connections.
For a downloadable copy of IOCs, see:

A cheap SEO company may not be your best choice

This is a great article:

https://www.searchenginejournal.com/avoid-cheap-seo-packages/245687/?utm_source=email&utm_medium=daily-newsletter&utm_campaign=daily-newsletter