Swimming With the Cyber Sharks

By Carl Weiss

It is said that the only sure things in life are death and taxes. While this pearl of wisdom has stood the test of time, in the not too distant future there could be an addition to that list: Cyberattack. That's because cyberattacks on businesses and individuals are up nearly 50% in the past year alone. Where cybercriminals used to almost exclusively target big businesses with deep pockets, now that ransomware has become so prolific, small businesses and even individuals are finding their online assets and machines being hijacked. And why not, since most individuals and small businesses offer little in the way of resistance.

Enter the Cyber Sharks
Image courtesy of worth1000.com

Who can forget the opening music to the movie Jaws.  In it’s day, the novel and subsequent blockbuster motion picture was enough to keep people on the beaches and out of the surf.  But as paranoid as many moms became about letting their kids frolic in the waves back in 1975, forty years later we should all be hearing the strains of da-da-dum-dum every time we surf the web.  That’s because while Jaws was a work of fiction, the arrival of schools of Cyber Sharks is all too real.

Just like the real deal, there is no 100% reliable cyber shark repellent that can keep someone from putting the byte on your computer, tablet and/or smartphone.  Even worse is the fact that while individuals are woefully unprepared to be hacked, what’s even worse is the fact that many of the devices connected to the Internet of Everything have absolutely no protection whatsoever.

Literally everything from appliances to medical devices to automobiles are rapidly becoming web-enabled.  While this provides the public with even more interactivity, it also provides hackers with more ways to get to consumers and business owners. Just as most people make the mistake of thinking their smartphone is a phone instead of a computer that you can talk on, nearly everyone doesn’t realize that the average automobile being built today have 100 lines of code onboard.  Many are now Wi-Fi enabled as well. You don’t have a car with q computer onboard. You have a computer that drives.  Soon, these computer cars will do most of if not all of the driving.  So if a hacker can take control of your car, what does that mean for the passengers and driver?  (On a recent 60-Minutes telecast, hackers gained access to the car in which Leslie Stahl was driving, turning on the lights and windshield wipers.  So this is not a hypothetical possibility.)

Who’s Watching Who?

Courtesy of Samsung.com
Smart Houses and appliances are also becoming more and more commonplace.  They’re also becoming easy pickings for hackers.  If a hacker can crack your home’s security system, this makes breaking and entering child’s play.  Don’t even get me started on what a hacker can do to your web-enabled Nanny Cam.  The same smart TV that you just installed in your living room can be hacked with ease, since most contain little or no security.   

A February 24, 2015 blog by CNN reported: Earlier this week, we learned that Samsung televisions are eavesdropping on their owners. If you have one of their Internet-connected smart TVs, you can turn on a voice command feature that saves you the trouble of finding the remote, pushing buttons and scrolling through menus. But making that feature work requires the television to listen to everything you say. And what you say isn't just processed by the television; it may be forwarded over the Internet for remote processing. It's literally Orwellian.

What’s really scary is the fact that last year alone more than 10,000 smart appliances were hacked, according to leading US security firm Proofpoint.  Once inside your smart TV or refrigerator, hackers can then gain access to other web-enabled devices.  Believe it or not, your refrigerator can spam your smartphone, laptop or tablet once infected.  Even if your device does come with some semblance of security, unless the protection is updated on a regular basis, it’s only a matter of time before a hacker will prevail.

How Do I Hack Thee?  Let Me Count the Ways.

So many smart devices…So little time.  Everything from wearables to medical devices are becoming vulnerable to hacking.  Symantec reported on March 12 that: “All of the devices failed to check whether they were communicating with an authorized server, leaving them open to man-in-the-middle attacks. One out of five devices did not encrypt communications and many did not lock out attackers after a certain number of password attempts, further weakening their security. All of the potential weaknesses that could afflict Internet of things systems, such as authentication and traffic encryption, are already well known to the security industry, but despite this, known mitigation techniques are often neglected on these devices”

Image by culturedigitally.org
While Symantec’s report was referring to smart appliances, in October of 2014, the US government told the FDA to start taking medical device security seriously while citing the same problems that smart appliances were facing.  The next time you go to the hospital for a dialysis treatment or to get your pacemaker checked out, you might like to ask your physician about the inherent hacking vulnerabilities of these systems.

The number of ways that hackers can get into your devices is staggering. Below are some of the most popular tools of the hacker’s trade:

  1.    Sniffers are programs or device that monitors all data passing through a computer network. It sniffs the data and determines where the data is going, where it's coming from, and what it is. In addition to these basic functions, sniffers might have extra features that enable them to filter certain types of data, capture passwords, and more. 
  2.     The Hex Dump (aka Voodoo) - When an electronic device is manufactured, it is programmed with firmware.  Hacking firmware is simply a matter of buying a programmer that can receive the memory dump and transmit it to a computer where the code can be altered.  Then transmit the modified code back to the device.
  3.    Attacking Defaults – Virtually every piece of hardware on the market comes with a set of standard defaults, including username and password that provide access to the system.  Since most people do not change these default settings, this is the easiest way to exploit a system.
  4.    SQL Injection – While it sounds like a medical procedure, what an SQL Injection attack are conducted by entering unexpected entries into a database and then probing the returned error messages to reveal information that can be used to hack the system.  For instance, by entering metacharacters like #$%^ into a field that processes only alphanumeric information, the database could be tricked into revealing the contents of the database, or in some other way compromise an SQL server. 
5. DDoS Attacks - Directed Denial of Service Attacks occur when hackers flood a targeted website with so much bogus traffic that it brings the victim's server to a halt.  This is usually followed by a demand for payment in order to restore service.
6. Data Extortion - Most people aren't aware that their data can be hijacked and held for ransom.  This can take a number of different forms, including threatening to release sensitive information stolen from a machine, to locking a legitimate user out of their own website or machine by changing the password.  Just as with DDos attacks, all too many extorted users don't realize they've been hacked until a ransom note appears demanding payment.  Even worse than DDos attacks, non-payment in this case can result in your website or data being erased.  (Lately, online extortion has also extended to threats of having one's reputation smeared online unless payment is rendered.)
7. Ratting - Remote Administration Tools are an increasingly popular and insidious means of hacking everything from laptops to tablets and smartphones.  Once successfully deployed, a ratted machine is literally under the control of the hacker.  Ratted machines can not only be rifled for information, but their webcams and built-in microphones can be surreptitiously turned on, allowing the rat to become the equivalent of a cyber peeping Tom.  (There have been a number of high profile celebrities who have been ratted, resulting in compromising photos and videos making the rounds online.

Courtesy itunes.apple.com
While all of the abovementioned tactics require a bit of technical knowhow, there are many other hacking programs and devices that can be bought online.  There are also online forums, hacking blogs and clubs that teach hackers the tools of the trade.  There are also annual hacker conventions and hackathons such as the one held yearly in Las Vegas.  If you don’t believe me, simply google, Hacking devices available online.”

The real danger is that the Cyber Sharks have the upper hand since detection, much less prosecution is hit and miss at best.  Meanwhile hacking continues to proliferate nearly unchecked.  CNN recently reported that in 2014 hackers exposed the personal information of 110 million Americans, roughly half of the nation’s adults.

 So the next time you turn on your Smart TV or start your web-enabled car, don’t be surprised if the sound you hear emanating from your surround speakers is something like, “Da-da, dum-dum.”

 Carl Weiss is president of Working the Web to Win, an award-winning digital marketing agency based in Jacksonville, Florida.  You can listen to Carl live every Tuesday at 4 p.m. Eastern on BlogTalkRadio   



The DIY Online Marketing Solution

By Carl Weiss

“We’re Number ONE!”
Image from engineerofknowledge.wordpress.com

That’s what everyone strives for in this country. Whether you’re talking sports, business, academics, or keeping up with the Jones’, Americans are extraordinarily competitive.  This especially holds true online, where ever since the first search engines appeared more than 20 years ago, website owners vied for the top spot on every keyword combination imaginable.

Back in the early to mid-1990’s achieving a page one result wasn’t all that difficult.  That’s because everything you needed to feed the search engines was on page one of your website.  Back then, there were no blogs.  Social networks hadn’t yet been invented.  Video was not even possible, since most web surfers used a dial-up connection.  Heck, most web designers had to be careful not to use hi-res images, since these could cause a site to load at a glacial pace.

Today, the game has changed.  The Internet has become the mac daddy of interactive, multimedia marketing.  If you want to wind up on page 1 of major search engines, you need to do more than just create a properly optimized website.  There are a lot of moving parts to take into consideration.  Not only do you need to be concerned with site architecture, but you also need to add and feed everything from daily social posts and weekly blogs, but you should also create videos on a monthly basis. 

The Web is run by the Golden Rule – He Who Has the Gold, Makes the Rules

Image courtesy of andhoraa.com
The multimedia approach isn’t just a great way to build and engage a targeted audience, it’s also a way to generate Google Juice. The world’s most popular search engine takes into account everything from how many followers you have on Twitter, Facebook and Google+, to how many people are reading, commenting and reposting your blogs.  Since Google also owns the world’s most watched video portal: YouTube, creating a growing following who watches your videos is another way to move your site and your videos onto page 1.

The problem is that unless you have the time or a dedicated online marketing staff to continually feed content day in and day out to the Internet, most business owners usually take one of three tacks:
1.      They outsource their online marketing
2.      They start off with the best of intentions only to run out of steam
3.      They throw in the towel

Having spoken to thousands of business owners over the past few years, what I always ask is the obvious question, “If your competition is on page one of the search engines and you are not, is this good or bad for your business?”  While every business owner agrees that the last thing they want to do is provide their competition with any competitive edge, some of them have either tried to outsource their online marketing with horrible results, while others simply can’t afford to spend $1,000 or more per month to get the job done.

While I sympathize with both these situations, while I can educate the public on the ways to select a reputable online marketing firm, what I haven’t been able to do is show them how to get the job done cheaply.  That’s due to the fact that it takes a considerable amount of time to feed a minimum of 3 social nets daily.  Not to mention that writing and distributing weekly blogs that engage and grow readership doesn’t come cheaply.  So if you think that paying someone a couple hundred dollars a month is going to magically move your website onto page 1 of Google, you are in for a rude awakening.

    Is Scalable Online Marketing Possible?

Being the CEO of one of the last online marketing agencies around that still offers written guarantees for organic results, I can tell you that until recently, all I could do was shake my head and wish business owners who wanted the results but couldn’t afford the price good luck.  That’s because there is no longer any shortcut to long term online results.  While you can sometimes get an optimized blog or video to pop up on Google page 1, when it comes to getting your website to move up the rankings, someone has to be willing to do the work.

That’s also the main reason we’ve been producing a weekly Working the Web to Win blog and radio show for the past three years.  Hector and I weren’t trying to be blogging or online radio superstars.  We just wanted to keep the public up to speed on the ever changing Internet.  While this provided business owners with tidbits of knowledge, there was no way to pull this material together into a multimedia training course that would teach them what they needed to do in order to become a scalable DIY online marketing system.  Until Now!

Introducing WWW University

Starting on May 1, WWWU was introduced to bridge the gap by allowing website owners to decide how much of the task they want to take on and how much they want to outsource.  That’s because we have launched the first of our DIY Online Marketing Training Courses that are guaranteed to show people the same techniques that we have been using to generate page 1 results for clients.


Our first e-course, SEO Made Easy, consists of twenty chapters that take students step-by-step through the process of optimizing websites.  The course material covers everything from the proper use of page and image tags, to maximizing your Google Juice and leveraging local SEO.  Better still, the course includes a half-dozen videos that show you what it takes to generate page 1 results.  We also include everything from contact information with the instructor, to a weekly WWWU Newsletter that is designed to keep you up to speed with regards to the ever changing World Wide Web.  Not bad for a one-time tuition of only $97.



Check out our Free Preview at http://wwwu.patience.io/catalog/4385

During the course of the next few months we are going to add more courses including Business Blogging, Viral Video Magic, Social Media on Steroids and more.  Even better is the fact that we will provide special pricing for alumni for additional training modules and optional online marketing via Working the Web to Win that will allow graduates to create a scalable online marketing system that lets them decide how much time and money they want to spend to get the job done. 
To put this system into perspective, imagine what it would be like if you could go to your local Mercedes Benz dealer and pick out any car on the lot, knowing that by helping out around the dealership you could get the car of your dreams at a price you can afford. If the prospect of creating a scalable, affordable system of online marketing is something that you would like to learn more about, take our SEO Made Easy course for a test drive at http://wwwu.patience.io/catalog/4385 

 Carl Weiss is president of Working the Web to Win, an award-winning digital marketing agency based in Jacksonville, Florida.  You can listen to Carl live every Tuesday at 4 p.m. Eastern on BlogTalkRadio   



Can You Say Mobilegeddon?

By Carl Weiss

I’m sure you’re familiar with the term Armageddon, which is the biblical prediction for the end of the world.  However, Google introduced the Internet version of the phenomenon which has been deemed Mobilegeddon.  While it might not represent the end of the World Wide Web, what Google has indicated is that if your website is not deemed “mobile-friendly,” your listing could soon be relegated to the backwaters of the world’s most popular search engine.  While this could be cause for many website owners to panic, they should take some comfort in the fact that when a major web portal tested the top 25,000 websites in the world, more than 10,000 of them failed, including the site of Homeland Security.

That’s the bad news.  The good news is that before you throw yourself under the Google bus, there is a way to test your site to see if it is mobile-friendly.  https://www.google.com/webmasters/tools/mobile-friendly/



If your site is deemed search engine unfriendly, you are in good company.  According to searchengineland.com you are hardly alone:

Losers: Popular news sharing site Reddit topped the list of losers, followed by NBC Sports, Vogue,SongLyrics and Bloomberg Business. I suspect a bunch of people at Reddit are about to lose their minds over this. But the Reddit home page doesn’t test as mobile friendly, and that could be true of many other pages inside the site, as well.
The home pages of NBC Sports and SongLyrics didn’t test friendly either; I couldn’t even get Google’s mobile friendly testing tool to process SongLyrics. Vogue’s home page did test as friendly, but potentially it has problems with internal pages. http://searchengineland.com/winners-losers-google-mobilegeddon-219786
Knowing this, I spent the next three hours manually entering every one of the 173 websites we created and hosted for us and our clients.  With the exception of one companyowned website and 7 client-owned sites we created before the advent of html5, all our clients came up as search engine friendly. (I am working with our webmaster to see why the one site created in html 5 has failed.)

What’s It All About, Google?

From Google’s perspective the answer is clear: Mobile is the future.  Cellphone providers in the past five years have put a web-capable smartphone in the hands of 75% of the citizens in this country.  (Nearly 80 million smartphone users do their social networking on the device as well.) As the price of smartphones continues to fall and desktop and laptops continue to shrink, will there come a time when ALL computers are quasi-mobile? 


Image courtesy of statista.com

The popularity of phablets is also another way in which the lines between laptops, tablets and smartphones continues to blur.  While phablets were merely smartphones on steroids two years ago, as solid state memory chips continue to get more powerful and ever more affordable, we are already starting to see phablets that can do nearly everything that a laptop can do. 


Image courtesy of concept-phones.com

While cutting edge phablets, tablets, micro-pcs and mini-laptops give computer users an ever-expanding range of choices, from a website owner’s perspective, trying to create a 1-size-fits-all site can prove to be a challenge.  That’s one of the reasons that dynamic programming languages such as html5 are all the rage.  Below are the three most popular perspectives viewed via html5.




With the pick-a-size web surfing world, using a platform or code that can dynamically adapt your websites to whatever platform they might be viewed doesn’t just make sense from a Google-centric perspective.  It also makes sense from a visibility issue, since the secret to online success is to make it easy for people to do business with you.  Today that means different online strokes for different folks.  If you aren’t ready, willing and able to allow people to view your sites on the platform of your choice, then Mobilegeddon will be the least of your worries.

Carl Weiss is president of Working the Web to Win, an award-winning digital marketing agency based in Jacksonville, Florida.  You can listen to Carl live every Tuesday at 4 p.m. Eastern on BlogTalkRadio  

Does Cloud Computing Have a Silver Lining?

By Carl Weiss

Image courtesy of recent-ecl.blogspot.com
Unless you've been living under a rock for the past couple years, you have either heard of or are now using cloud computing. Users looking to save money are embracing it. IT pros and investors are looking to make money are plowing money into it. What you have to ask yourself is how can you use the cloud to line your pockets with silver? In today’s blog, we will look at the emergence of cloud computing as a way of both making and saving money.  We will also point out some of the movers and shakers in the industry, as well as identifying some well-heeled interlopers who are trying to rain on everybody’s parade.

Most people think that cloud computing is a relatively new technology.  The truth of the matter is that it has been around since the 1960’s. A blog on computerweekly.com points out that,

“The idea of an "intergalactic computer network" was introduced in the sixties by J.C.R. Licklider, who was responsible for enabling the development of ARPANET (Advanced Research Projects Agency Network) in 1969. His vision was for everyone on the globe to be interconnected and accessing programs and data at any site, from anywhere, explained Margaret Lewis, product marketing director at AMD. "It is a vision that sounds a lot like what we are calling cloud computing."
Courtesy of sysnet.uscd.edu
While other experts in the field even back then thought that computing would inevitably be rendered as a kind of public utility, it wasn’t until 1999 that the bandwidth required was broad enough to accomplish the task.  That was the year that Salesforce.com began pioneering the concept of delivering enterprise solutions via the web.  This was followed by amazon.com that in 2002 started vending cloud storage and computing.  By 2006, this service morphed into a commercial service called Elastic Compute Cloud, that permitted small businesses to run their applications remotely.  By 2009 Google and Microsoft jumped into cloud computing in a big way, which legitimized and promoted the cloud computing concept as a user-friendly resource.
Other criteria that took the concept away from early adopters and made it more mainstream were the obvious financial benefits that the technology offered in terms of backing up data, as well as increased storage capacity without having to invest in new hardware.  The downside was that those wishing to store sensitive data on the cloud had to deal with worrisome the question of online security.
Andreas Asander, vice-principal of product management at virtualisation security specialist Clavister, said that once the security issues are resolved, cloud computing services "can enable an enterprise to expand its infrastructure, add capacity on demand, or outsource the whole infrastructure, resulting in greater flexibility, a wider choice of computing resources and significant cost savings."
What Color is Your Cloud?
While the cloud offers a number of opportunities to users, currently there are three operating models:
1.      Infrastructure as a Service (IaaS) –IaaS provide physical or virtual machines, image libraries, block storage, firewalls, IP addresses, Virtual Local Area Networks and software bundles to users.
2.      Platform as a Service (PaaS) – The Paas model provides a computing platform such as a web server where programmers and developers can run their software solutions on a platform without having to buy and manage the hardware.
3.      Software as a Service (SaaS) – SaaS users are provided access tp databases and/or applications for a flat or monthly fee.  In a SaaS model, users access the software from the cloud client. 
While users can access all of the abovementioned services using a variety of devices, some users rely on the cloud to run nearly all their applications.  The cloud services can be mixed and matched depending upon the user’s needs.  Generally, there are six service models from which to choose:
1.      Private Cloud is an infrastructure designed and managed for the users of a single entity or organization.  Corporate data centers are examples of private clouds. The infrastructure for these data centers can be either managed internally or by a third-party. 
2.      Public Cloud renders services to the general public.  Providers such as Amazon, Google and Microsoft provide public access to their managed data centers via the Internet.
3.      Hybrid Clouds are created when two or more cloud services from different providers are offered to users.  They can pull together some combination of public, private, and community cloud services under one umbrella.
4.      Community Clouds serve several organizations with a common interest.  This way costs can be shared between two or more organizations wishing to avail themselves of a Private Cloud.
5.      Distributed Cloud – Where a Community Cloud allows organizations to share cloud resources, a Distributed Cloud shares machines located at different locations by a single network or hub service.
6.      Multicloud uses multiple services to reduce the risk of a single vendor going down and thus leaving the user with no service. 

The Dark Cloud

Image courtesy of pinterest.com
The biggest danger to cloud users has to do with privacy.  Since users are relying on a third-party to host their data, the primary concern is that the service provider and/or their employees can access this
data.  Anyone with access to the data could either accidentally or purposely alter or delete the data.  Since some cloud providers share access with this information with outside entities, this would mean that the only practical way to protect the data would be to encrypt it.
Anyone that uses cloud services such as social networks or blogging platforms (which are a kind of cloud service) knows that the information contained therein is not only shared with the hosting agency, but they actively profit from data mining this information.  What many people are unaware of is the fact that ALL of the information displayed on social nets and blogs is actually owned by the service provider and not the author.
There is also the real risk that a hacker can not only gain access to a user’s cloud service, but it is also possible for a hacker to not only alter the content contained in the cloud, but to lock out the legitimate user.  It is not uncommon for hackers to demand a ransom in order to have the legitimate user’s access restored.  (Failure to pay the ransom usually causes the hacker to delete the users information.)  It is also possible that hackers can use the information gleaned from a user’s social networks to hack their way into a user’s computer, tablet and/or smartphone.
In a recent article in usatoday.com. entitled, Hackers Ramp Up Computer Attacks That  Demand Ransom, writer Erin Coker points out that,
“Hackers operating on the Internet's "Dark Web" are spreading a new, more sophisticated generation of the malicious software known as "ransomware," anonymously shaking down anyone with an unprotected computer, from lawyers and cops to small businesses. Where small groups of anonymous hackers once hit individual consumers, the hackers have now organized into crime syndicates that boldly launch massive attacks against entire companies.”
She also pointed out that these attacks are usually initiated when someone boots up only to find an ominous warning with a ticking countdown clock informing them that they have a limited time to pay the ransom or risk the destruction of their data. This can result in one of three scenarios:
1.     The user pays up and their asset is unlocked.
2.     The user runs out of time and their data is destroyed or their machine is locked permanently.
3.     The user pays and the hacker takes the money only to renege on freeing the user’s data or machine.

From slideshare.net
Hackers operating on the Internet's "Dark Web" are spreading a new, more sophisticated generation of the malicious software known as "ransomware," anonymously shaking down anyone with an unprotected computer, from lawyers and cops to small businesses. Where small groups of anonymous hackers once hit individual consumers, the hackers have now organized into crime syndicates that boldly launch massive attacks against entire companies, computer experts and law enforcement authorities said.
When you take into consideration that some of these coordinated ransomware attacks were successfully delivered to hundreds of thousands of victims in ten days, this results in tens of millions of dollars in ransom.  The worst thing is the fact that ransomware is on the rise.  The FBI’s own website reads,
Ransomware has been around for several years, but there’s been a definite uptick lately in its use by cyber criminals. And the FBI, along with public and private sector partners, is targeting these offenders and their scams. . Recently, we’re seeing an increasing number of incidents involving so-called “drive-by” ransomware, where users can infect their computers simply by clicking on a compromised website, often lured there by a deceptive e-mail or pop-up window. Another new trend involves the ransom payment method. While some of the earlier ransomware scams involved having victims pay “ransom” with pre-paid cards, victims are now increasingly asked to pay with Bitcoin, a decentralized virtual currency network that attracts criminals because of the anonymity the system offers.

The bottom line is while cloud computing is a tremendous boon to the public in terms of saving time and money when it comes to accessing computing power, unless serious security issues are resolved, there could come a time when cloud computing disappears like a puff of smoke.

Carl Weiss is president of Working the Web to Win, an award-winning digital marketing agency based in Jacksonville, Florida.  You can listen to Carl live every Tuesday at 4 p.m. Eastern on BlogTalkRadio  

Is it Time for a Little Hi-Tech Spring Cleaning?

By Carl Weiss

Image courtesy of edibunya.com
Every year at this time we break out the rakes, the weed whacker and the lawn mower to do a little spring cleaning.  So why should we treat our technology any different.  After all, a year is a long time online.  A lot can happen to your technology in a year. You load new apps, write and save documents, browse the web thousands of times and save and delete files right? All of this activity effectively rearranges the information stored on your hard drive and begins to slow down our machines. Websites, free apps, adware and other programs can easily clog our tech with accumulated junk until they slow to a crawl. The number one complaint of any computing devices is ”my computer is really slow”  So I thought I’d take the time to show you how to shake out the bugs in order to clean up your computers, tablets and smartphones.

Step #1: Clear out the Cobwebs

If you’re a Windows user, start off by opening the control panel and accessing Programs and Features.  This will bring up all the programs that are currently running on your desktop or laptop.  Presented in alphabetical order, the first thing I do is click on the “Installed On” tab at the top of the page.  This causes the programs to be listed by the date of install, which is a much better way to clear out the cobwebs.  You’d be amazed at the number of unused programs, add-on programs and all sorts of other digital detritus that can make its way onto your machines without your knowledge.   Many times when you install a program, other add-ons are installed as well.  By date sorting you can forensically trace when and where these programs made their way onto your system. Then it’s just a matter of weeding them out.

On Android tablets and smartphones, you need to peruse the apps that populate it and decide where to start trimming.  You’d be surprised at how much faster your smartphone or tablet will run once you have weeded out little used apps.  To edit and/or remove unwanted apps, hit the app icon and the “Edit” tab.  This will highlight your apps and allow you to uninstall them by clicking on the app.

Step #2: Beef Up Your Security

Courtesy of facebook.com
No matter the device, you can never have too much security.  Every week, millions of cyber attacks take place.  This results in the loss of data and dollars.  If your virus protection has expired, you need to renew it.  If you are only running one form of protection, you need to augment it by adding anti-malware software.  I personally have three layers of protection on all my devices, including my smartphone.  That’s because the hundred dollars or so that I pay in antivirus/anti malware software is a small price to pay to protect my business and financial data.

Some programs such as Advanced System Care 8.1 not only help you protect your system, it also clears out junk files, optimizes your hard drive, checks and fixes shortcuts.  Just make sure that you buy it direct from iobit.com. 

Another thing you should do at least twice a year is change your passwords.  Make your passwords at least ten characters long.  Eight character passwords are all too easy to crack. 

Step #3: Backup Your Data

You wouldn’t drive a car or own a home without insuring it, would you?  The reason you pay your premiums month in and month out is to protect two of the biggest investments you possess.  Then why don’t more people backup their data?  Especially when you consider the small cost of storing your data on an external drive or on the cloud, making a backup of your hard drive is one of the cheapest insurance policies around.  Or, you can wait until some hacker compromises your system or the hard drive crashes before you start backing up your drive.

Step #4: Break out the Rake

A couple of months ago my laptop started sounding like a Boeing 757 winding up for takeoff every time I started it up.  Then it simply stopped working one afternoon, leaving me with a “Cooling Fan Disabled” warning that I heeded immediately by shutting down the system and driving it over to a local computer repair shop.  An hour (and $100) later I got a call from their technician.

“I’ve got good news and I’ve got bad news,” he told me.

“What’s the good news?” I asked.

Courtesy of grooveshark.com
“Your laptop is running as good as new and I didn’t even have to replace the fan.  All I
did was pop open the case and blow out a warren of dust bunnies.  When I plugged it in, it fired up right away.  The dust had pilled in the cooling fan enough that it jammed.”

“Then what’s the bad news?” I wondered out loud.

“I still have to charge you the one hundred dollar laptop service fee.”

When I considered the fact that I not only didn’t have to sweat the cost of replacing the cooling fan, but the time it would take to ship the part, I considered the $100 cleaning a bargain.  As soon as I got back to the office I popped the case off my desktop as well and gave it a thorough dusting as well. (All it takes is a screwdriver and a can of compressed air.)

Step# 5: Time to Defrag

If it has been more than three months since you last defragged your hard drive, then spring cleaning is definitely time to perform this chore.  While it could take an hour or more to do, it will speed up your drive’s response time considerably.

Step# 6: Update Your Drivers

If you are using out of date drivers, especially those associated with your system’s operating system, then you are leaving the door wide open to hackers.  The reason that companies spend so much time and money tweaking their drivers is predominantly due to the fact that there are millions of hackers who spend billions of man hours searching for vulnerabilities in systems and software.  I have known users who intentionally disabled the automatic updates, or who don’t allow updates to take place when notified by their system.  Then they complain when their system gets hacked. 

While all these tasks could collectively take you the better part of a day to perform, when you consider the increase in speed and security that a little hi-tech spring cleaning can provide, you will more than make up for it in added productivity. 


Carl Weiss is president of Working the Web to Win, an award-winning digital marketing agency based in Jacksonville, Florida.  You can listen to Carl live every Tuesday at 4 p.m. Eastern on BlogTalkRadio