About DeeReinhardt

Social media, marketing and community relations specialist aiming to help people build their on-line presence with as many social media tools with which they feel comfortable.

Find more about me on:

Here are my most recent posts

About DeeReinhardt

Social media, marketing and community relations specialist aiming to help people build their on-line presence with as many social media tools with which they feel comfortable.

Don’t get caught by a Hacker

Public Service Announcement – Hacker tried to access my computer files

As a home-based business, I have to be just as diligent as a company that has office space. Read my story and share it with those who might be caught unaware.

Last Friday both of my phone lines to the house rang at the exact same time. That in itself was odd, but what was even more odd was that there was a foreign voice at the other end telling me that someone had installed some malicious files. I said thanks, I will have my IT person look into it and hung up.Beware of the Hacker

Not being satisfied with that, the would-be hacker called back on Tuesday. This time I was prepared as I had already had a conversation about the potential threat with Trish from TG Consultants.

Again, both phones rang at the same time with the same number showing up with “Name Unavailable” showing on my caller ID. We have the Xfinity Triple Play with an extra phone line. I picked up one line, Rick picked up the other. This time I was a bit better prepared to “play”.

The guy on the phone said his name was “Michael” from Windows Technical Department. He had a thick accent and I had to have him repeat himself several times just to understand what he was saying. He asked if I was in front of my computer and was it on. He was going to tell me the steps to eliminate the infected files that had been downloaded without my knowledge.
I wanted “Michael” to tell me the steps, I would write them down and then have my IT person help me with the repair to my computer. I think I spooked him. He transferred me to the Sr. Technical guy named “Jake”. Again another thick foreign accent. He said I had malware and malicious files on my computer because I had been hacked by someone in Los Angeles CA. He started to try to tell me my computer ID number – I only had four on at the time… He got through the first four numbers and couldn’t tell me the rest.
I asked both guys to give me the directions, I would write them down and then have my IT person help me with them. They both said that only they could help me.
I finally had played cat and mouse with the guy long enough and said I don’t believe you are telling me the truth, and I hung up.
Today the same phone number dialed back. I was on my way to a meeting so I asked for a call back number which traced to a city in California – and the plot thickens! I wonder who might have installed the malware????
I scanned each computer with the anti-virus software that is on each device. I used a Malware detection software to eliminate a threat. AND I called the Sheriff’s Department and filed a report. Passwords have been changed. I think I feel confident that no files were lost or held for ransom!
Here are the lessons -
  1. Windows, Microsoft, Google, Facebook, Adobe, or any other big name company is not going to call you!
  2. Don’t answer “Name Unavailable” numbers from area codes that you don’t recognize or at all. They can go to voicemail if they want to talk with me.
  3. Make sure your anti-virus is current. Sometimes it can update more than once a day.
  4. Find a good malware screening program -Trish suggested malwarebytes.org
  5. Back up your data with an automatic back-up service. There are several – like Crashplan, Carbonite and other reputable ones. Check with an IT professional like TG Consultants or FutureLink or Bryant Crawford from FastTeks for a good recommendation.
  6. Change your passwords regularly and don’t use the same password for everything!
Please share this information with your friends and family so that they are not caught unaware and allow someone to enter their computer.

New Facebook Tweak to Use

Facebook Updates Tweek

Who manages a Facebook page? How often would you like to comment as yourself, or perhaps a different page that you admin?  Facebook has given you a simple option to accomplish just that!

Take a look at this video to see how to do it.

In case you don’t want to watch the video, here are some directions:Facebook Update Options

  1. Make the post as your company page however you make that post – schedule it, share someone else’s post, use a scheduling tool.
  2. Find the post in your personal feed.
  3. Look in the upper Right corner for the icon and the drop down arrow.
  4. Click the arrow and select which profile you would like to use to post.Facebook Update Options 2
  5. Select Like, Comment, Share
  6. Use this option for all pages that you Admin to share a post and perhaps even gain some likes from followers of other pages!

Let me know if you have any additional thoughts or things that you need to see demonstrated.

This might even help you with call to actions and events that you need to share in more than one place. Less duplication of effort and personalize the message to the page upon which you are sharing the post.

Using a Boolean Search

How can you take advantage of a Boolean Search?

All of the major search engines like Google, Yahoo and Bing let you enter keywords you select to find the topics you are researching. This works the same way in LinkedIn and many other platforms. If someone doesn’t know your name, but enters the words for things you provide, will they find you?

I do a great deal of work with job seekers. Since LinkedIn is my passion, it is only natural to spend time teaching job seekers how to make the most of their profile. One of the suggestions is to make sure that their profile is able to be found when the right string of keywords is entered into the search parameters.What are your keywords?

When teaching hands-on LinkedIn classes, I demonstrate how recruiters may enter six or seven keywords to limit the number of search results they obtain when seeking candidates. The goal the recruiter is seeking is 3-6 people who have all of recruiters keywords entered in their profile. You can use this same technique searching for a recruiter or a potential client.

I recently found this article from Beyond.com about using the various Boolean search patterns. While this article was written for job seekers, it is transferable to business owners to understand how someone may find them when doing a search. I don’t want to start an entire discussion on SEO, but understanding how Boolean search works will help you make sure that the right keywords are listed on your various webpages and social media profiles.

Please contact me if I can assist you with your LinkedIn personal or company profile. I am happy to consult with you in-person or through a webinar to help you optimize your LinkedIn or social media presence.

LinkedIn – Warm up Cold Calls

What is your process to warm up cold calls?

With 30% of the over 300 million users in the United States, isn’t giving LinkedIn worth a try? This 2013 Harvard Business review looked at some of the statistics with salespeople and LinkedIn.  With that many people at your disposal, you would be foolish not to at least give LinkedIn a look.Warm up your cold calls.

My suggestion is to make use of every part of LinkedIn to warm up cold calls. Back in the day when LinkedIn was just getting it’s legs, users were advised to have a minimum of 150 users. That minimum has now been boosted to 500 or more. The average salesperson has more people than that in the contacts on their phone!

Take a look at your connections connections. This will give you a good idea of who might be able to help you in your pursuit to warm up the cold call. There are two tactics you can use after you find the contact that you wish to reach:

  1. Ask your contact to make the introduction, either through LinkedIn or in an off-line method. This puts much of the work on the other person. With busy schedules, many people may balk at the thought of doing that much for someone else.
  2. Send your contact a message, either through LinkedIn or in an off-line method, asking them if it would be acceptable for you to mention their name in a communication you will be sending to the sought after contact. If there are a number of their contacts you would like to reach, you could send the list in one email. Using this method requires your contact to send you a yes or no response. Easy peasy!

Afterward, all you have to do is send a message or make the phone call to the desired communicant, mention the mutual connection, and give them a moment to recognize the name.  Share a LinkedIn profile

Another very useful method is to share a profile. I often do this when I want to make an introduction between my contacts. Use this as a “pay it forward” tactic. If users know this option, it is an easy way to share your skills and talents with the person to whom you want to connect. CAUTION: Make sure that your profile is something that you want shared!

Last but not least, you can follow the company that you need to reach. Check the people in the list of how you are connected. This is especially beneficial if you have an appointment scheduled. Find the people from the company and do a bit of research before you show up for your appointment.

If your profile leaves something to be desired, or you would like some one-on-one tutoring on how to use LinkedIn better so that you can warm up cold calls, I am available to help you. Just send me a message.

What is your social media strategy?

Social media strategy – do you have one?

Take a look at this article by Buffer. It has some great ideas about your social media strategy.

Did you get to the part of the article that said 12 hours per week and laugh out loud? So many people are so busy that they may not have 12 hours a week to sleep let alone manage their social media.

Remember that social media is marketing. How do you obtain new business? Through marketing, right? If you consider social media as part of your marketing plan, the time spent makes a bit more sense. It is sort of like making a recipe for success. You need to plan, implement and measure, repeating as necessary.planimplementmeasure

The Buffer article has very valid points:

Planning – if you plan your posts and your focus, you can work your plan. I think for the average business person spending an hour to plan your social media for the week is accurate. Within that hour, you may think of the topic for your blog article and what you want to include in an upcoming newsletter, advertisement or event.

Implementing – this is 10 hours of that magic 12 hour number. Writing a blog article and finding a great image might take an hour. That leaves 9 hours. If you don’t have 2 hours a day to spend, take advantage of some of the tools available like Buffer, Hootsuite, Scoop.it to help you with the curating and scheduling of your posts. You still need to check back for the engagement aspect, but doing that during the course of the day isn’t as cumbersome as thinking that you need to block out 2 hours at one time. Check on things in the morning, mid-day and near the end of your business day.

Measuring – this is one of the keys. Use that hour weekly to figure out what worked and what didn’t. Take a look at the upcoming schedule and see if there are special things you need to include in the next week. If something worked especially well, try replicating it.

If all else fails, give me a call and we can discuss your strategy and how to use some of the tools that I mentioned.