LAN Systems
 
July/August 2011

Best of Gwinnett 2011

   
Please vote for us in the 2011 Best of Gwinnett. Use this link , enter your name and email, choose Business, Best IT Service, LAN Systems, submit. Thanks a million!
  

My best,

Mary

It's a jungle out there -  be smart online 

 

Recently, I posted a job on craigslist for a senior systems and networkIt's a Jungle engineer.  Although craigslist is a popular site, I have never used it and had some concerns about posting on a site that has received so much bad press. After researching, I decided to post our job and have been very happy with the response. But it's a jungle out there and I knew to expect some scam artists to use the ad to try an attack.

 

Then today, I received an email from updates-craigslist: Updates!New Terms - Accept: June 29, 2011 with the following message:

 

----------------------------------------------------------------------

craigslist

----------------------------------------------------------------------
 

Dear Customer,

We need your help resolving an issue with your account. To give us time to work together on this, we've temporarily limited what you can do with your account until the issue is resolved.

We noticed some unusual activity . 

How you can help?

You must reverify your account and take the time to accept and read our terms: log in here  

It's usually pretty easy to take care of things like this.

Ad: # 318-277-551-175

We understand it may be frustrating not to have full access to your account. We want to work with you to get your account back to normal as quickly as possible.

Thanks,

----------------------------------------------------------------------

Copyright 2011  Inc. All rights reserved. CL #73445897433\

 

It's a scam and has all the characteristics (without typos) of a phishing attempt.  It tries to get you to login with their fake link and get you to input your account information.  Once your username/password was obtained, the phishers would take over your account and get as much information as they could about you.  They can't do much on craigslist except make some inappropriate postings under your name, but they could use the username/password to break into other accounts like Twitter, Facebook or bank accounts.

 

So as a reminder, don't fall for email scams.  When in doubt - don't click, reply or forward.  Use strong passwords and make sure you have a good spam filter and malware protection.



Social Media Tactics: Part 2

By Katie Sewell, TAG  and Mary Hester, LAN Systems

social_media_tactics

 

The second part of our tactics for social media includes LinkedIn and blogging.  LinkedIn is widely used by business professionals to promote their business and to job search.  It's easy to set up  a personal and/or business LinkedIn page and you can keep it current using built in tools that won't take too much of your time.

 

Upon creation of your LinkedIn profile, be sure to craft a flattering position summary for your company to promote.

 

Deciding how you will accept connections is important, as well. LION (LinkedIn Open Network) members connect to almost anyone that requests whether they know them or not. More conservative members only link to people they personally know. This is your choice and you can adjust your settings to share or hide your connections. There are many security settings that control how much or how little of your information is shared. If you are concerned about sharing information, start with very secure settings and adjust as needed.

 

On to business promotion:

  1. Create a company page with your logo, overview, specialties and statistics. Make sure current employees link to the page and that you have included your website.
  2. Look for groups to join that are of interest to your customers. There are many groups on LinkedIn that you can easily reach the 50 limit set by LinkedIn. Of course, you can join groups that are of personal interest, but if you are promoting your company the best groups will be those of interest to your customers.
  3. Create a group based on your subject matter expertise and promote to your contacts. It is best to approve new members rather than have an open access.
  4. Start group discussions and keep the conversation going. Some groups will be very active and others will need prodding. Be sure to monitor messages for appropriate content and spam. You can remove abusers.
  5. Look at the open Q&A discussions. Even if you choose not to participate, take a glance at the types of questions and answers that are being posted. You may want to experiment in this open forum before starting your own group. If you are (or want to be) a subject matter expert for your company, search this forum for questions to answer.

Blogging  - Choose the type of blog and your voice.  Try to be consistent in your post frequency and blog personality.  Remember what's said on the Internet stays on the Internet!

  1. If you're not ready to start your own blog, contribute to others.  This is an easy way to get started and test if you really want to be a blogger.
  2. Pick a schedule and try to stick with it.  If you have lots of demands on your time that are not blog-related, you may want to start with a monthly or weekly blog.  Entries can be informal or traditional depending upon your style and your business.
  3. Use your blog to point readers to your web site, Facebook or Twitter account.
  4. Try to engage your readers in a dialogue by encouraging comments and feedback. Respond to comments and questions quickly.  Many readers will not post comments, but will correspond with you privately.  If it starts as a private conversation, keep it that way unless both parties want to go public.

Hope that you have enjoyed our short series on Social Media. Please share your experiences, ideas and comments!

  eNewsletter 
Join Our Mailing List
In This Issue
It's a Jungle Out There
Social Media Tactics: Part 2
Network Group

Solutions and Services to help you grow your business

System and Network
Design & Installation

Microsoft, Linux and Unix
Servers and desktops
vCIO Strategy
Architecture review
System installation
Network security
Storage solutions
Virtualization
 
Service and Support
Support  agreements
Onsite services
HelpDesk support
System maintenance
Emergency services
Data recovery
 
Managed Services
24/7 system monitoring
Real-time notification
Automatic updates
Quickly fix problems
Alarming for critical events
System health reports
Follow up action plan
 
Data Backup Plans
Online combined with local or offsite storage
Easy to manage
Restore individual files or entire system
Safe and affordable
 



 
Get into the Cloud