Linux bug infecting Android users

August 24th, 2016

2016August25_AndroidPhone_ABugs have come a long way, and they’re not just creepy-crawlies anymore. So we have to worry not only about the bugs that we contract and make us physically ill, but also the bugs that threaten the security of our beloved smartphones. Most people overlook bugs since they’re so tiny, but what they lack in size they make up for in their capacity to wreak havoc on innocent devices. What are the consequences of failing to address these security matters? Read on and find out.

Recently, researchers from the mobile security firm Lookout confirmed that “an estimated 80 percent of Android phones contain a recently discovered vulnerability that allows attackers to terminate connections and, if the connections aren't encrypted, inject malicious code or content into the parties' communications.” The statement itself might be new, but many have already suspected a flaw in version 3.6 of Linux, dating as far back as 2012. It’s thought that the flaw itself was introduced into Android version 4.4 (aka KitKat) and is still present today, including in the latest developer preview, Android Nougat.

As numerically backed up by the Android install base and quoted by statistic provider Statista, over 1.4 billion Android devices (about 80 percent of users) are currently vulnerable. What Android users can do is to ensure that their communications are encrypted by using VPNs (virtual private networks) or by making sure that whatever sites they visit are encrypted. Encryption allows you to travel without being tracked; if the predator can’t see you, you’re no longer a target.

If you’re vulnerable, you welcome anyone with an Internet connection to determine whether or not two parties have been communicating via a long-lived transport protocol connection. This includes Webmail, news feeds as well as direct messages. Unencrypted connections allow attackers to utilize malicious code or inject content into the traffic. This doesn’t mean that encrypted connections are safe; attackers are still be able to determine and terminate the existence of channels as well. This vulnerability has been dubbed as CVE-2016-5696.

One of the more likely methods used to compromise Android users is the the insertion of JavaScript into legitimate Internet traffic that isn’t HTTPS cryptographic scheme-protected. This may display messages claiming that users have been logged out of their accounts and prompting them to re-enter their usernames and passwords. Having sent the login credentials to the attacker, similar exploits may also be used to target unpatched browsers, emails or chat apps the Android users use.

To initiate the attack, the attacker must spend about 10 seconds to establish whether two specific parties are connected, then another 45 seconds to flood their traffic with malicious content. Because it takes a certain amount of time for the attack to fully commence, these attacks aren’t suited for opportunistic attacks that affect more than one individual. Instead, this technique is ideal for the infection or surveillance of one specific target, especially if the hacker knows some of the sites the target frequently visits.

We can breathe a sigh of relief with a Google representative’s statement that company engineers are aware of the situation and are “taking appropriate actions.” He also noted that among the various vulnerabilities on Google’s patches, the Android security team has officially rated the risk as “moderate” as opposed to “high” or “critical.” Maintainers of the Linux kernel have successfully patched CVE-2016-5696. They are working toward incorporating a fix into a new Android release in the coming months.

Matters of security should never be taken lightly, especially when it comes to your personal device. For more information on this sensitive and intricate matter, please feel free to contact us anytime. We are more than happy to answer your questions. The more you know, the better.

Published with permission from TechAdvisory.org. Source.

Topic android
August 20th, 2016

2016August19__MicrosoftWindowsNewsAndTips_ATechnology addicts and workaholics have one thing in common: a constant quest to reduce barriers between themselves and their technology. If being interrupted by a buzzing phone is the bane of your desk-based existence, the Windows 10’s anniversary update contains an exciting feature that just might put a smile on your face. By simply installing an app from Microsoft, you can receive and respond to Android notifications from your computer. Let’s see how it works.

The first thing you need to do is to wirelessly pair your Android phone with your Microsoft desktop. From the Google Play store, download and install the Cortana app and sign into the Microsoft account you use on your computer. Once you’ve signed in, select the Menu button in the upper-left-hand corner and select Settings. After that, select the option for ‘sync notifications’ and toggle which you would like to see on your desktop.

Notifications are broken down into four categories: calls, texts, battery alerts, and third-party apps. Although an option to answer the phone from your computer hasn’t been added yet, you can read and respond to text messages. When deciding on third-party app settings, remember the goal is to manage your interactions, not create more. Make sure to disable any notifications that will create annoying redundancies like doubled-up Facebook alerts between your Android pairing and previously-enabled desktop notifications.

And just like that, you’re all set. As long as you have Cortana enabled on your desktop, all your Android alerts will automatically display in your Windows 10 Action Center. There is no need to interact with the app on your mobile device, and we recommend removing the shortcuts from the clutter of your homescreen. Gone are the days of needlessly checking your phone every time it vibrates, just to find out it’s another telemarketer or unimportant Instagram notification.

As technology reaches the hands of more and more people, and hardware and software options increase exponentially, there are few problems that can’t be fixed with a little ingenuity. Our staff has that ingenuity, and they’re waiting to impart it on you and your business. Call us from your phone or text us from your desktop. Regardless of how you reach us, don’t wait for more problems to sneak up on you.

Published with permission from TechAdvisory.org. Source.

Topic Windows
August 19th, 2016

2016August18_Security_AEvery time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. But spectators aren’t the only victims. Without knowing the most common social engineering exploits, your business’s data is also at risk. That’s why we have compiled four of the most frequently used social engineering scams to help protect you and your business.

Phishing Phishing scams are perhaps the most common type of social engineering attack. Usually seen as links embedded in email messages, these scams lead potential victims into seemingly trustworthy web pages, where they are prompted to fill in their name, address, login information, social security number, and credit card number.

Phishing emails often appear to come from reputable sources, which makes the embedded link even more compelling to click on. Sometimes phishing emails masquerade as government agencies urging you to fill up a personal survey, and other times phishing scams pose as false banking sites. In fact earlier this year, fraudulent Olympics-themed emails redirected potential victims to fake ticketing services, where they would eventually input their personal and financial information. This led to several cases of stolen identities.

Tailgating

What’s the best way to infiltrate your business? Through your office’s front door, of course! Scam artists can simply befriend an employee near the entrance of the building and ask them to hold the door, thereby gaining access into a restricted area. From here, they can steal valuable company secrets and wreak havoc on your IT infrastructure. Though larger enterprises with sophisticated surveillance systems are prepared for these attacks, small- to mid-sized companies are less so.

Quid pro quo

Similar to phishing, quid pro quo attacks offer appealing services or goods in exchange for highly sensitive information. For example, an attacker may offer potential targets free tickets to attend the Olympic games in exchange for their login credentials. Chances are if the offer sounds too good to be true, it probably is.

Pretexting

Pretexting is another form of social engineering whereby an attacker fabricates a scenario to convince a potential victim into providing access to sensitive data and systems. These types of attacks involve scammers who request personal information from their targets in order to verify their identity. Attackers will usually impersonate co-workers, police, tax authorities, or IT auditors in order to gain their targets’ trust and trick them into divulging company secrets.

The unfortunate reality is that fraudsters and their social engineering tactics are becoming more sophisticated. And with the Olympics underway, individuals and businesses alike should prepare for the oncoming wave of social engineering attacks that threaten our sensitive information. Nevertheless, the best way to avoid these scams is knowing what they are and being critical of every email, pop-up ad, and embedded link that you encounter in the internet.

To find out how you can further protect your business from social engineering attacks, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Security
August 18th, 2016

2016August17_Hardware_ALike new cars and smartphones, new keyboards are also initially alluring enough to elicit everyone’s oohs and ahs. But as their novelty fades, it’s easy to start taking them for granted. Is typing on them slower than before? Is the gaming experience they deliver no longer up to par? Whether for leisure or business purposes, good keyboards really make a difference. Next time you're shopping for one, take these four factors into consideration as well.

Connectivity

If the internet and computer mouse possess wireless capabilities, why should your keyboard be any different? This is debatable, depending on what exactly you use the keyboard for. Keyboards are normally plug-and-play devices that don’t require additional software installation (excluding certain gaming models); wired models draw power from the USB,eliminating the use of batteries altogether. Gamers tend to prefer wired over wireless because they won’t have to deal with lag and interference issues.

Looking to declutter? Wireless is the way to go. With wireless keyboards, data is transmitted to your PC via one of two primary means: either through an RF connection to a USB receiver or via Bluetooth. They might have their pros and cons, but they significantly reduce the number of cables on your desk while allowing you more flexibility to work -- lie down on the couch and type from across the room. Also, most wireless keyboards connect to the PC via a 2.4-GHz wireless dongle that are also used for cordless phones and Wi-Fi internet. Providing connectivity to multiple devices at once.

Type of Key Switches

This aspect of keyboard design is widely mentioned in reviews, yet many people overlook the importance of the type of switches used for individual keys. Although the intricate mechanisms that hide beneath the keys might not excite you, the difference you feel from each type will. The three main types of key switches include silicone dome, scissor switches, and mechanical switches. For example, keyboards that come with a new desktop PC generally use silicone-dome switches, whereby two dimpled layers of silicone membrane form a grid of rubber bubbles that acts as the switch for each key. This type also requires you to press the key right to the bottom in order for a letter to be typed, gradually diminishing its springiness and responsiveness over time.

Why have the newer laptops and ultrabooks ditched silicone domes for scissor switches instead? Scissor switches add a mechanical stabilizer that provides uniformity. Moreover, under each keycap is a plunger that allows for shorter key travel. This causes scissor-switch keyboards to have a shallow typing feel with enhanced durability when compared with silicone dome switches.

What keyboard enthusiasts can’t get enough of are the mechanical switch keyboards. Their intricacy lies in the spring-loaded sliding keypost beneath each key. Several variations are available, and each provides slightly different sensations or sounds. Mechanical switches generally provide enhanced tactile feedback, having more of the “clickety-clack” sound. Thanks to the sturdy switch mechanisms and durable springs, they last longer and are also easily repairable. Furthermore, each keystroke registers shorter travel, making them ideal for touch typists.

Ergonomics

In order to keep carpal tunnel syndrome and repetitive stress injury at bay, keyboards are designed to allow your hands to remain in a neutral position while typing. Not only do ergonomic keyboards provide greater comfort, they also reduce joint and tendon stress, sparing you from relentless inflammation as well as pricey surgical procedures. Ergonomic features range from simple padded wrist-rests to elaborate curved and sloped keyboards.

Standard vs. Gaming Usage

Keyboard usage isn’t limited only to typing. That’s why gaming keyboards are designed for competitive usage, which allows for maximum specialization and control. Some are even customized to fit specific styles of game play, considering exact standards of durability as well as responsiveness. Others may also incorporate pulsing backlight and vibrant color schemes that cater to the gamer aesthetic. Certain premium models utilize high-grade mechanical key switches, sculpted keycaps, and numerous customizable features such as programmable macro commands and tweakable backlight intensity. Gaming keyboards are also equipped with the anti-ghosting feature that allows multiple keystrokes to be registered simultaneously -- something regular keyboards can’t do. Other goodies range from pass-through USB ports to audio connections on the keyboard. This simplifies the process of connecting peripherals to a desktop PC.

It won’t hurt to take some time to see if your current keyboard is delivering. Do not settle for anything but the best. If you need any help or have questions regarding the intricacies of finding the right keyboard, don’t hesitate to mail us or drop us a line. We’re more than happy to help.

Published with permission from TechAdvisory.org. Source.

Topic Hardware
August 13th, 2016

2016August12_Productivity_AWhile an impressive arsenal of weapons can help you win a battle, you need diligence, perseverance and sacrifice to win the war. But when that war is waged in the arena of calendar management, you’re dealing with a whole other monster. When scheduling meetings, uncontrollable factors like varying schedules and department-specific time constraints mean that the same war strategy won’t yield the same successful results. Allow Microsoft FindTime to lead your organization to victory in the battle of cross-organization meeting arrangement.

Before any meetings take place, you’ll need to download Microsoft FindTime first. Fear not, because this Microsoft Outlook add-in is easily downloadable and is 100 percent free. FindTime was developed to help you and your guests do just that -- find time! Coordinating all attendees’ schedules, FindTime will iron out a time that works for everyone.

Just the thought of having to organize a meeting across your organization can stir up anxiety and elicit a huge sigh... Sigh! Why? On top of handling your own hectic schedule, you’re expected to juggle your attendees’ schedules as well. This would be the moment when telephone calls start to flood in and emails start to go back and forth, rarely heading toward a unified decision.

Bid adieu to all of that with Microsoft FindTime. Simply compose a new email or reply to an existing one and click the New Messaging Poll at the upper right hand corner. From there, choose the attendees, propose a couple tentative meeting times, and let the voting begin! Once a consensus is reached, a confirmation email is automatically sent to everyone attending.

What makes it even easier is that attendees can take a look at the visual summary that tallies all the votes, and who voted for what times. This lets you see what times the majority of people have chosen, giving you a chance to rework your schedule in advance if and when necessary.

Another plus is that to receive a Microsoft FindTime invitation, your friends and family don’t need an email address or even an Internet connection! Participants aren’t required to have Office 365 either; only the organizers need to access Office 365. This means that you can reach out to your friends, loved ones, and colleagues to organize your meetings, set up playdates, and even plan surprise birthday parties -- the possibilities are endless.

For more info about Microsoft FindTime, feel free to send us an email or give us a call! Our experts will gladly answer your questions. We believe that time is money, and money is the last thing you’d want to jeopardize. Allow us to help safeguard your assets by ensuring that all the time you spend on the clock doesn’t go to waste. Every minute counts.

Published with permission from TechAdvisory.org. Source.

Topic business
August 12th, 2016

2016August11_Web_AIn today’s tech-centric world, the demand for new apps is overwhelming the supply. Whether due to simple curiosity or just plain excitement, people are usually drawn to chatbots. In time, however, novelty wears thin and people lose interest. This may be partially due to the fact that bots aren’t as engaging as we initially imagined them to be. Fortunately, the silver lining here is that necessity -- or in this case, boredom -- is the mother of invention, so people customize these chatbots to create a better experience.Here are 5 tips to get you started:

Emulate the WeChat Model

This Chinese cross-platform instant messaging app has housed chatbots since 2011 and shows no signs of letting up. When compared with other countries, China’s bot market is at a further development stage, meaning there are many things to learn from WeChat’s chatbots. Here a few of them:
  • Two types of bot accounts: WeChat offers Subscription and Service accounts. Subscription accounts mainly gather news and blogs, whereas Service accounts are fully-functional bots that offer features like speech recognition as well.
  • News: News bots make up over 34 percent of the Top 500 Bots in China. This means that WeChat is the main news source for Chinese citizens.
  • Top five categories: Current Affairs, Culture, Entertainment & Sports, Humor, and Emotions — these five categories compose almost 50 percent of the top 500 bots on WeChat in July 2016.

Focus on chatbot-only use cases

With every new technology comes new ways of doing things that weren’t possible before. So this begs the question: “What problems can you solve with chatbots that you couldn’t otherwise solve without them?” Take Uber, for example. The reason behind its success is the implementation of this strategy -- leveraging smartphones with GPS and payment capabilities to get cabs (something that couldn’t have been done before). Currently, bots face the same challenge. Here are some examples of chatbot-only use cases:
  • Legal Help: DoNotPay, the world’s first robotic lawyer, managed to overturn 160,000 tickets in London and NYC, saving over $3 million for customers. And since the bot takes 25 percent of the savings, the company made nearly one million dollars.
  • Customer Service: Calling an 800 number is usually not the most pleasant experience, and so few people even bother. . Moreover, many companies struggle with improving customer service. Bots will change that.

Make it special

Chatbots are an extension of what we do practically every day: talk. An average person has between 50,000 to 70,000 thoughts per day; we constantly think in words and are constantly conversing with ourselves. A.I. isn’t quite at our level yet. We aren’t capable of schmoozing with our bots or telling them how bad our day went. But through speech, bots can take the first step toward that reality by helping us rationally solve problems.

What do we really need?

It’s undeniable that in today’s modern world, increasingly more people feel lonely and disconnected, so they look for ways to connect with the outside world. A recent survey of over 12,000 Assistant.ai users reveals that over 40 percent can picture a relationship with their A.I., and that 25 percent are actually open to the idea. Human beings tend to anthropomorphize and assume relationships since we’re constantly seeking to relate. If poorly-made chatbots can offer us an anthropomorphous opportunity, imagine what properly engineered ones can do.

Strike a nerve

For people to really care, you have to truly touch them on an emotional level -- or as the expression goes, hit a nerve. An ideal way in to do this is by calling them to action via personality. This allows us to easily connect and establish a relationship, and that’s why bots are considered to be the ideal vehicle to a personalized marketing relationship. They allow for an intimately unique experience that meets both physical and emotional needs.

So what makes a good chatbot? Sufficient problem solving capacities while being fun, positive and engaging. If you are unsure about anything written in the article, don’t hesitate to give us a call! We’ll be more than happy to answer any chatbot-related questions you have.

Published with permission from TechAdvisory.org. Source.

Topic Web & Cloud
August 11th, 2016

2016August10_Virtualization_AWith virtualization yet to make its way into the lexicon of common tech phrases, many business owners are still trying to decipher the full extent of its value. Various aspects of the service have evolved over time, and we can probably expect more to come. For now, however, one of its existing functions is getting a boost from the likes of AT&T and Verizon. Virtualized network services are complex and often difficult to understand, but their value is unquestionable. Let’s delve a little deeper.

The overarching theme of virtualization is combining hardware and software resources into one large, communal pool where individual servers and workstations can pull as much as they need, rather than allocating them inefficient individual puddles that either go dry, or unused. In a workstation model, this is realized in the form of minimally equipped endpoints that access much more powerful software and hardware resource pools via web browser.

When it comes to network virtualization, it’s quite similar to virtual private networks, or VPNs. Developments in cloud and software functionalities allow administrators to eliminate time-consuming and micromanaged VPNs while achieving the same swift and secure connections between servers, workstations, and other network-enabled devices residing in physically separate networks. VPNs are like pumps between each of your network ‘puddles,’ individual pieces that require individual maintenance. Network virtualization is like installing one pump with on/off switches on each outbound pipe.

This means that setting up a VPN for the addition of a satellite office is as simple as inputting a few simple pieces of information to gain a world of seemingly local network possibilities. In another example, rather than recabling your office when one department becomes too cumbersome to fit on one switch or hub, connections and protocols can be expanded and redefined by a software client.

With the increasing popularity of any service with the word ‘virtualized’ in it, telecom carriers Verizon and AT&T have begun offering this service to clients. Whether it's because your business has a growing list of locations, or because your local network needs the flexibility to grow swiftly without waiting for costly hardware and software expansions, these services have you covered.

Both Verizon and AT&T will offer three ways to manage your virtualized network: locally, from the cloud, or a hybrid combination of the two. Once you’ve decided on a framework and deployment strategy, make sure to take time with the transition. Established networks are complex and messy ordeals, and it’s better to start migrating those puddles over time rather than all at once. Instead, move them one-by-one so any problems that arise can also be dealt with one-by-one.

Although consumer-level companies like AT&T and Verizon are offering this service, not just anyone can hop on and start getting the most out of a virtualized network. It takes expert configuration, deployment, and most importantly maintenance. With 24/7 coverage of your network, we eat, sleep, and breathe cutting-edge technology. Call us today and we’ll bring your SMB into the age of virtualization.

Published with permission from TechAdvisory.org. Source.

August 10th, 2016

Stacy Moran

Diamond actively recruits and keeps the best ICT brains in the market. Our staff are recognised industry leaders, innovators and all round impressive people who all have great stories to share. We’d like you to meet our Service Coordinator – Stacy Moran

1. What is your role at Diamond?
I am the Service Coordinator (9 years).

2. What do you like most about working at Diamond?
The staff I have worked with over my time here at Diamond and especially 3pm which is cup of tea time with Steve.

3. Why did you choose to enter the field?
I have worked in Service roles for most of my working career mainly because you get to meet a variety of people.

4. If you could meet anyone, living or dead, who would you choose?
Kit Harrington ( Jon Snow ) from GOT

5. People would be surprised to know…….
That I have 3 of the best daughters that a Mum could ask for and a gorgeous granddaughter. I follow the West Tigers. And that while working at Diamond I have become known as the Diamond Mum of some of lovely staff we have here regardless what age they are.

Topic Articles
August 10th, 2016

2016August9_AndroidTablet_AYou don't need to be an economist to understand the issue of scarcity when it comes to the storage space on your Android device. This is even more true if you own a one that has lower space storage. With this in mind, we have come up with 6 ways to free up storage space so you can make the most out of what you already have.

1.Buy a microSD card

The easiest fix is to buy a microSD card, if your device is compatible that is. Do keep in mind that you cannot use the extra storage for apps or system files but only for music, videos, photos, and other media files.

2.Erase apps you don’t really use

Downloading apps are like snowballs, because before you know it there are too many of them and your device just freezes over. If that’s the case, simply delete the ones you don’t need. Deleting an app doesn’t mean it’s gone forever, you can always download it again. Normally, gaming apps take up a huge chunk of storage space. You can go to Settings > Storage and tap Apps to see how much space each app uses so that you can decide which apps to get rid of, for now.

3.Clear app cache

Apps that remain on your device will still have loads of cached files, so it might be a good time to do some spring cleaning. Don’t worry since clearing app cache will not delete important files on your device. Go to Settings > Apps then go through each app to clear its cache. Or if you want to erase all the cache in bulk, you need to go to Android’s recovery mode and choose to wipe the app cache. Since each Android device is different, you’d better google to see how to enter the recovery mode for your model.

4.Make use of the cloud

Dropbox, Microsoft OneDrive, Google Drive, iCloud and more. You name it. These are services that allow you to send your media and document files to the cloud and free up space on your device. Google Photos gives you unlimited storage for both photos and videos. The only limitation is that the size of the photos must be smaller than 16 megapixels and less than 1080p for videos. It also has an option that allows you to delete files that have been sent to the cloud. In order to do so, open Google Photos app and go to Menu > Setting, then hit Free up device storage and all the backed-up files will disappear from your device.

But for privacy’s sake, note that by using these services, you’ve granted the cloud service providers access to your files. Make sure you know which photos or videos you should sent to the cloud, since the cloud is essentially other people’s (or in this case, your cloud service provider's) computers. It’s best that you keep naughty photos to yourself.

5.Stop storing and start streaming

Unless you are heading somewhere with no internet connection, there’s no need to store all your music files on your device. Spotify, Apple Music, Google Play Music, Napster, Tidal are some examples of music streaming services you can use, at a certain price of course. So if you’re a fan of freebies, Plex might be another viable option. Plex is a media server software that runs media content from a personal library and streams them on your device.

6.Add external storage

This option might be a little bit bulky and might require prettiness to give way to functionality. External storage comes in two forms: a plug-in drive similar to USB flash drive, and a wireless media hub. The first one enables you to download files from your device to your PC so you can have some more space left on the device. Or you can just stick the plug-in drive to your device and play files from it directly. Wireless media hubs like Western Digital MyPassport Wireless or Ravpower Filehub can be used to backup your files and let you access them wirelessly. Noted that you cannot play DRM-protected music or videos with this external storage--only your own media files.

Dealing with limited storage is just one of the numerous issues regarding Android devices. Compared to its iOS counterpart, Android gives users a lot more flexibility, which means there are many more functions to be explored. Why not get in touch with us today? Our experts are ready to advise you on how to boost your overall productivity.

Published with permission from TechAdvisory.org. Source.

Topic android
August 9th, 2016

2016August8_SocialMedia_AFacebook’s most recent monthly active users numbered over 1.7 billion. Billion, with a ‘b.’ Since creating and managing a page for your business is free, there simply isn’t an excuse to put off doing so another day. Whether your page is being neglected because of low traffic or ROI on the time you invest in it, 1.7 billion is too large a number to ignore. Here are our six tricks for making your page a worthwhile endeavor.

Use video whenever possible

Recently, Mr. Zuckerberg himself was caught opining about the value of video in social media. And while there hasn’t yet been any news about newsfeed algorithms giving preference to video, it’s definitely a safe bet when compared to texts and graphics. Facebook Live is an excellent way to engage your subscribers, and there are several ways to leverage it for increased profitability. Whether it’s an Ask Me Anything segment or a promotional announcement, hit that record button more often for more engagement.

Facebook only promos

While we’re on the topic of promotions, make sure you’re creating some that are only available through Facebook. If you’re simply reposting those from your website or e-commerce store, it’s harder for followers to justify maintaining any interest in your page. Use Facebook Live or a pre-recorded video to introduce a better-than-usual discount on your products or services. The key here is getting customers to actually visit your page, so make sure it’s not a coupon code or a link they can just pass on to friends. Ask the first 100 viewers to post their email address in the comments section of the video. If their increased dwelling time doesn’t make a lasting impression on them, it probably will make an impression on their Facebook newsfeed algorithm.

Facebook CTAs: use them and update them

Unbeknownst to most, the ‘call to action’ button on your business page can be edited to display more than a dozen different messages. Experiment with the different messages and where they link to. You’ve probably stared at the CTAs on your .com page for hours, hoping to come up with a hard-hitting sell -- why wouldn’t you do the same on Facebook?

Don’t just link to yourself

The most insightful page will always be the most valuable one. If someone has already liked your page, they know you exist and they have a decent idea of what you sell. Make sure to take a break from posting links to your site, and include relevant news and information that relates to your field. If your merchandise is videogames, inventory updates aren’t going to provide much value to your followers. Post third-party reviews of items you stock or industry news that readers will find interesting.

Pin to top function

When you find the post that keeps followers coming back for more, why bury it beneath more recent and less popular posts? Click the arrow in the upper-right corner of the post and select Pin to Top. This will keep it above everything else and impossible to miss for anyone visiting your page. It could be anything we’ve already discussed in this article: promotions, videos, popular third-party content -- anything timely and relevant.

Be personal

Lastly, use your company’s Facebook page as a place where followers can engage you on a personal level. There are countless opportunities for stiff, formal business language and attitudes, but social media isn’t the place for that. Post fun, behind-the-scenes photos of your business, respond to comments in a conversational tone, make jokes -- anything that sets your page apart from your customer service accounts.

Facebook may be free, but that doesn’t mean a profitable page is a walk in the park. For all the latest tips, trends, and features, you’ll need an expert. Exploiting social media for your bottom line is a slippery game, but it’s one we play every day. For a partner who can turn your ‘Likes’ into dollars, contact us today.

Published with permission from TechAdvisory.org. Source.

Topic Social Media