Tuesday, November 24, 2020

Protecting Your Online Reputation

 Protecting your online reputation is one of the most important things you can do in the ever-evolving technological world we live in. If your online reputation is unfortunately tarnished it will take a lot of time and effort to repair the damage. I am going to give you some tips to help protect your online reputation.

When it comes to online reputation, one of the main ways people damage their online reputation is through social media. Protecting your personal reputation on social media is probably one of the most important things you can do in today’s world. Not only does your family and friends see what you post and comment on, but now most employers access social media of potential employees to see if they are a good fit for their companies.

Here are a few ways to protect your reputation on social media:

1.       Using Two-Factor Authentication- Two-Factor Authentication is not only a great way to secure your email account, but also a valuable tool to securing your social media. Having multiple authentication layers gives you the extra security needed to keep your mind at ease when using a multitude of social media platforms. The biggest complaint with 2FA is how time consuming it may be for users, but this time factor may be just one more element to deter hackers from accessing your account.     

 

2.       Set Your Account to Private - Setting your social media account to private limits who has access to your content. With a private social media account, you are in control, and you dictate who has access to your account, post, and pictures. Private settings enable you to deny fake and suspicious accounts, and people who wish to cause harm to your reputation.

 

3.       Be Careful What You Post- Posting funny pictures or Gifs may seem like a good idea at first, but it can easily cause irreparable damage to your reputation. It is especially important to try and look at things from all angles and ask yourself if this may cause harm or offend anyone before you post it. When posting articles, it is in your best interest to research the information beforehand. There are a plenty of articles that are posted with misinformation just to obtain a following. If you post articles with false information you not only are subject to steering other followers in the wrong direction, but you can also harm your reputation. Always do your own research to see if the articles are real or fake.

 

It is important to always stay on top of your online reputation to reduce the risk of something or someone damaging it. Always stay vigilant and continue to research new information on how to protect your online reputation.


Tuesday, November 10, 2020

Security Suite Review and Recommendation

 

Security Suite Review and Recommendation

Stephanie Johnson

 

Dell’s Fast Access, Face Recognition by iNFINITE Studio LLC>: While a firewall protects unauthorized use from internet intrusion, the face remembering technology reduces the need for passwords and pin codes which can easily be more hackable.

 

HTTPS (Hyper Text Transfer Protocol Secure): This is the secure version of HTTP. This technology is encrypted to increase security of data transfer.

 

HTTP (Hyper Text Transfer Protocol): This protocol allows resources such a HTML documents to be obtained. It is the foundation of exchanges on the web.

 

WPA2 (Wi-Fi Protected Access): This is the recommended password type for WIFI routers and allows for custom password setting.

 

Three Different Security Suite Software Programs

1.       Endpoint: Endpoint provides security services with MACS and PCs in mind. They make a good point that most antiviral software and protection software are geared toward PC users, with little regards to MACS and other apple products.

2.       Norton LifeLock: Offers a membership to secure devices and passwords with a specific emphasis on credit care and identity theft.

3.       Arctic Wolf: Offers a combination of technology, features and teams of people to provide the best security technology in the face of evolving threats and hacks.

 

If I were to choose one of these programs, I would select Endpoint. The main reason being I frequently use apple products on a regular basis. In fact much of my financial information and purchases are done through the apple music or apple pay app. Knowing there is  security suite out there desiring to keep up with protecting both non, and apple users, puts my mind more at ease. I also appreciate that endpoint looks to assure that each device connected to a company’s network or used by any employees, can be safely monitored, and protected as well. I feel that Endpoint Security truly has all of its bases and customers covered and looks to deliver the best in security and peace of mind for its users.

Tuesday, October 13, 2020

 

Identify five different companies that provide Business-to-Business (B2B).

https://www.bigcommerce.com/blog/b2b-ecommerce/

 

1.     Flexfire LED.

2.     Assurant.

3.     Atlanta Light Bulbs.

4.     Selini NY.

5.     Berlin Packaging

 

Monday, September 21, 2020

Uses of the Web

 

Communicating

§  Gmail- Gmail is the #1 website for free email accounts. Gmail generates their income through Ad sells. For every 1000 “clicks” an Ad gets Gmail earns more money.

§  Yahoo- Yahoo generates income in the same way that Gmail does. Yahoo utilizes the per click model of Ad sells.

§  Outlook- Outlook also utilizes the Ad selling market to generate income. Outlook is utilized most by companies and colleges due to the easy streamline process to create multiple email accounts in a short period of time.

 

Shopping

§  Amazon- Amazon has cornered the online shopping market, from their vast quantity of affordable items, to their quick delivery options. Amazon generates revenue through the sells of retail items, Ad sells, and subscriptions.

§  Ebay- Where Amazon has cornered the online shopping market, Ebay is the conquer of online auctions. Ebay generates revenue through Ad sells also, but the majority of their revenue comes from the seller’s fees from each of their auctions.

§  Walmart- Walmart is not only a giant in the Big Box Store battle, but that have also found themselves at the top of online sales. Walmart generates revenue through retail sales, Ads, and shipping fees.

 

Searching

§  Google- Google is the #1 search engine. Google utilizes Ad sells to earn their revenue.

§  Bing- Just like Google, Bing utilizes Ad sells to bring in their revenue.

§  Yahoo (powered by Bing)- Yahoo search is powered by Bing, and yet they are still the 3rd most used search engine. Yahoo also sells Ads to earn their money.

 

Education

§  University of Phoenix- University of Phoenix generates most of its revenue through the cost of tuition.

§  American Public University- American Public University also generates revenue utilizing the per credit hour charge for tuition.

§  Liberty University Online- Liberty University is a large school in Virginia, but a vast majority of their students attend the university online. They charge per credit hour to generate their revenue.

 

Entertainment

§  YouTube- Youtube is the go-to place for online entertainment. Youtube earns money through Ad sells and merchandising.

§  Netflix.com-  Netflix generates their income through payed monthly subscriptions. They have multiple subscription options available and varying prices.

§  Twitch.Tv- Twitch.TV is the top streaming site for online gamers. Twitch utilizes both Ads, and subscriptions to generate revenue.

Monday, September 7, 2020

ISP Providers

 

Provider

Transmission Speed

Price

AT&T Fiber

940 Mbps

$49.99/mo. For 12 mos.

Xfinity

Up to 1000 Mbps

$70/mo. For 24 mos.

Cox Internet

940 Mbps

$99.99/mo. For 12 mos.

 

 

 

*Actual speeds vary and are not guaranteed

Sunday, August 30, 2020

Personal QR Code




QR Codes:

       Companies are using QR code technology for many beneficial reasons. Some examples being directing customers to a landing page/website, sending a message or email,downloading apps, and directing customers to social media sites etc. A QR code is an input device because it is drawing in information from a site. One disadvantage to this technology is the dependability on a mobile device or smart phone. If a user does not have any of these devices, then the code is rendered useless to them.  Another disadvantage of the QR code is the the lack of familiarity of the code with people. Though they are becoming more common, there are still many social groups who do not know enough information about this technology. The problem comes from different businesses using the QR code for advertisement reasons and not reaching a certain group of people who may be interested in the product they are advertising for. 





Protecting Your Online Reputation

 Protecting your online reputation is one of the most important things you can do in the ever-evolving technological world we live in. If yo...