Recently one of our clients in SE Kansas was attacked by a hacker, and it appears that his system was accessed remotely and some of his key tools were gutted. Truth be known, we don’t know yet how much damage was done, but we do know he lost his Facebook account and his Google account was re-directed to another user, meaning he is permantely locked out.

Although losing your Facebook Business Page is an inconvenience, just think of what you stand to loose if you become locked out of your Google account:

Not only will you loose access to these important accounts, but now someone else – likely your worst enemy – will be in total control of your online business identity.

Protecting your online accounts and home computer requires a multi-layered approach. Let’s break down some crucial steps:

The following advice was authored by David K. – located in SE Kansas

Table of Contents

How Can I Make My Google Account Very Secure?

Employ Strong, Unique Passwords: At the very least, use extremely long and random passwords containing a mix of uppercase and lowercase letters, numbers, and symbols. Avoid using personal information like family names, birth dates, or anniversary dates, as well as short, predictable phrases often generated by basic password tools. A long, randomly generated password with diverse characters significantly increases its strength.

Should I Enable 2FA On Gmail?

Yes. You Defintely Should Enable Robust Two-Factor Authentication (2FA): Couple your strong password with two-factor authentication for an extra layer of security. While SMS-based 2FA is better than nothing, an authenticator app like Google Authenticator or Authy is the ideal choice.

How Do You Choose The Strongest Password?

Avoid Reusing Usernames and Passwords: Reusing usernames and passwords across multiple accounts is a significant risk. If one account is compromised, others can fall like dominoes. Additionally, avoid using usernames that personally identify you.

What Is The Best Security Against Hackers?

Protecting Your Home Computer and Network: Implement a Strong Firewall: Run a reputable and robust firewall on your home computer. This acts as a barrier, diligently monitoring and controlling incoming and outgoing network traffic. While not impenetrable, a strong firewall requires substantial computing power and expertise to bypass.

Does Using A VPN Really Protect You?

Yes, you should consider a Virtual Private Network (VPN): If your budget allows, using a VPN can add another layer of security. While its effectiveness depends on the provider’s trustworthiness and it’s not a foolproof solution, a VPN makes it considerably harder for attackers to access your system and data. Furthermore, it enhances your online privacy by obscuring your internet traffic from companies and other entities. VPNs are available for both computers and mobile devices.

How Can I tell If My Computer Needs An Update?

Keep Your Systems Updated: It’s crucial to keep your operating systems, browsers, and applications updated regularly. These updates frequently include vital security patches that address known vulnerabilities.
The Ultimate Firewall (When Not in Use): For maximum security when you’re not actively using your computer, physically disconnecting the power to your router or removing the ethernet cable truly creates a very hard, impenetrable barrier.

Is Email A Source Of Computer Viruses?

Exercise Caution with Links and Attachments: One of the primary ways accounts and devices are compromised is through unwise user actions. Be extremely wary of clicking on links or opening files in emails and texts from unknown senders. Even if a message appears to be from someone you know, proceed with caution. These are often phishing attempts designed to deliver viruses and malware that can bypass your other protections by being directed specifically at you. Pay close attention to messages that create a sense of urgency or threaten negative consequences.

How Secure Are Gmail Emails?

Gmail is fairly secure, but not entirely. Avoid using standard SMS text messages, regular email services like Gmail, or common messaging platforms like Facebook Messenger for transmitting sensitive or private information. For secure messaging, Signal is currently considered the gold standard. Secure email options like Protonmail also exist. Prioritize communication through systems specifically designed for privacy and security.

Remember that while no security measure is absolute, implementing these practices significantly elevates the security of your online accounts and home computer, making it substantially more challenging for malicious actors to succeed. Be mindful that increased security can sometimes involve trade-offs in terms of convenience and full functionality.

#1 Google Asset For Local Business

Hands down, the top asset in a Google Account for your local business is your Google Business Profile. This is a free webpage that Google has put in place for you, and done correctly it will send customers your way day in and day out.

Claiming, verifying and properly managing your Google Business Profile is top priority for any local business that wants to be found online. 

In a recent article from Forbes Magazine entitled “How Small Businesses Can Survive The Massive Change In Google Search” this important point was made:

Own Your Real Estate—Especially Local

“Start with your Google Business Profile. This is prime digital real estate, especially for local search. It’s the first thing people see when they’re hunting for your services in the neighborhood.”

Learn More About Google Business Profile

Learning to correctly set up and manage your Google Business is so important for local business owners to understand that we have created a special training page to learn more about it.

Staying ahead in local SEO means doubling down on what works and staying alert to where Google’s heading next. Businesses must adapt quickly and take action before their competitors do. DesignRush

Ken Heistand KBWS

Ken Heistand – KB Web Solutions

Scroll to Top