There is a new Twitter worm that surfaced and is being spread via direct message on Twitter. To read more about the worm and how to protect yourself, click here.
Sorry it’s been a few days but there was some important security news yesterday so I needed to break from the online branding theme and talk about security for a day.
Although Twitter only allows you to input 140 characters, you can say a lot in that little space. Twitter is a great way to promote your website or your blog. If you post a new article on your website or write a new blog post, you can tweet a tag line and then link to your blog or site using a tinyurl. A tinyurl takes your website address or blog address and shortens it to take up less space on your tweet. By finding people in your industry or organizations that relate to your business on Twitter, you can get up to the minute news before you are able to receive it from traditional media outlets.
I hope you’ve enjoyed my mini series on online branding and promoting your company using new social media outlets. If you have anymore questions, feel free to comment or shoot me an e-mail.
It was recently released that the Russians used technology and personal information from the United States to attack Georgia last year before they invaded. They used the cyber attack to disrupt communication and disabled 20 websites including the president and defense ministers websites and the National Bank of Georgia’s website. They used social networking sites like Twitter and Facebook to steal most of the data.
To read the entire article, click here.
Blogs can be used for many purposes, humor, diaries, entertainment, news, or business. In this case, we’re only going to discuss how to use your blog to improve your business. By creating a blog and updating it with events you attend, new articles relevant to your customers, awards you win, or anything else you want your customers to know about, you create a central place for your customers and prospects to read your content. You can also start to establish yourself as an expert in your field by writing your own articles and distributing them via a blog. While blogging, it’s important to tag your blog and to link to any articles you quote. However, all of this is only worthwhile if people are reading your blog. In your overall online marketing strategy, you should plan on using e-mail, twitter and facebook to promote your blog. My next few blog posts will go into more depth about how to market your blog and website using facebook and twitter.
Coming Next: Using facebook to promote your brand
I’m going to stray away from the “protecting your data” theme and and talk about how a business can control it’s image online and protect your brand identity. Recently we’ve seen businesses like Spiral 16 become extremely busy as companies become more concerned about what their clients and prospects are saying online. There are many things that contribute to your online brand and online marketing strategy but the most important in my eyes are a website, facebook, twitter, and a blog. It is important to use all of these tools to push your users to content and articles that you want them to read. If you aren’t actively marketing yourself or your product online, you rely on what others say and write to be what your customers and prospects read when they search for you online. Over the next few days, I’ll spend a few minutes writing a post about each one of the previously mentioned avenues of distribution and how you can use them to promote your company.
Because Twitter is becoming as widely used as myspace and facebook, it’s also become as big of a target for hackers. The biggest thing you can do to protect yourself is to make sure you have a protected password to make it difficult for anyone to hack into your account. Once you are in twitter, be very careful of any shortened links you click on. Users use links like tinyurl to shorten a link so it will fit into their tweet. Anytime you click on these, be 100% sure they are legitimate as hackers are using these “mini links” to direct you to websites that may compromise the data on your computer.
To read the entire article, click here.