Home
About
Contact Us

Home>blog
Tue, 01 Oct 2019/

How do I create an effective Facebook ad?

Facebook has uses that go way beyond posting cat photos, complaining about restaurants, or stalking your ex — it’s also an incredibly effective advertising platform. From small businesses to big corporations, anyone can benefit from Facebook’s marketing tools. Read on to leverage Facebook to your advantage. Why advertise on Facebook? Above all else, the cost-effectiveness of Facebook advertising sets it apart from other marketing channels. The starting cost is minimal, which is ideal for SMBs that want to test small campaigns before investing more. Beyond its affordability, Facebook advertising is also extremely effective. With 6 billion monthly active advertisers and the ability to nail down your audience to the most specific details — including their interests and online behavior — it’s no surprise that Facebook advertising has the best return on investment (ROI) compared with other social media platforms. Before you get started As with other traditional marketing campaigns, you need to determine your marketing objectives, audience, budget, and how you want your ads to look like. Once you have the answers to all those questions, you’re ready to create your first ad. Follow this step-by-step guide: 1. Choose your marketing objective From your business profile page, click Ad Center from the top menu. Then, click Create Ad on the page that appears. Choose your “marketing objective.” This is what you want people to do when they see your ads. You can pick only one from three options: brand awareness, lead generation, or store visits. Then, set up your advert account by selecting your account country, currency, and time zone. 2. Nail down your audience You can tailor your audience based on location, age, gender, language, interest and behavior, and the kind of relationship they already have with your page, app, or website. It’s best to be as specific as possible when selecting your audience. 3. Set up your budget and posting schedule Facebook allows you to set up a daily or lifetime budget. The latter is the maximum amount you plan to spend for an entire ad campaign. Then choose the frequency or the start and end dates in which your ads will appear. 4. Design how your ads will look Choose how your ad posts will look like to your audience, such as whether they will appear as an image carousel, a single image, a video, a slideshow, or a “canvas” (a new format for mobile users that combines video, carousels, images, and text into one interactive ad). Note that your ad will consist of five parts: an image, a headline, a block of text, a link description, and a call to action button such as “Buy now,” “Sign up today,” and the like. Tips on designing Facebook ads that grab people’s attention Your ads will appear in people’s newsfeeds, so make sure your content is interesting and succinct enough to grab their attention as they scroll past it. Each component of your ad — the image, headline, link description, and call to action — must stand out when surrounded by vacation photos that rarely receive more than a few seconds of attention. Creating a Facebook ad is simple, yet the beauty of it is that Facebook also allows for more advanced targeted advertising if you know how to take advantage of what the platform has to offer. Contact Multi IT today or give us a call on 011 435 0400 to talk to our specialists; they’ll be happy to share a few pointers on how to achieve the best results from your campaigns.
VIEW MORE
Wed, 25 Sep 2019/

Cyberthreats and the Finance Sector

The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of Cyberthreats and attacks that involved extortion, social engineering, and credential-stealing malware has surged rapidly. This means that financial institutions should strive to familiarise themselves with the threats and the agents behind them. Here are seven new threats and tactics, techniques, and procedures that security professionals should know about. Extortion Distributed denial of service (DDoS) attacks, which are typically delivered from massive botnets of zombie computers or internet of things (IoT) devices, have been used to bring down banking networks. This occurs when a targeted server or system is overwhelmed by multiple compromised networks. It’s essentially like a traffic jam clogging up the highway, preventing regular traffic from arriving at its intended destination. Some cybercriminals are relentless with DDoS attacks and follow them up with cyberextortion, demanding payment in return for release from costly downtime. Banks cannot defend against these attacks alone, so they rapidly share information among themselves through organisations such as FS-ISAC4 and rely upon the ability of their internet service provider to handle and redirect massive quantities of traffic. Social media attacks This happens when fraudsters use fake profiles to gather information for social engineering purposes. Thankfully, with new regulations such as the General Data Protection Regulation (GDPR), big companies like Facebook and Twitter have significantly enhanced their security and privacy policy with regards to their data handling practices. The unprecedented reach of social media is something companies cannot afford to ignore because of the possible implications a data breach can have on businesses. Cybercriminals and Spear phishing Spear phishing is an attack where cybercriminals send out targeted emails ostensibly from a known or trusted sender in order to trick the recipient into giving out confidential information. Over the years, hackers have upped their game and cast a bigger net, targeting unwitting employees to wire money. This attack is called business email compromise (BEC), where a fraudster will purport to be a CEO or CFO and request for large money transfers to bogus accounts. Point-of-sale (PoS) malware PoS malware targets PoS terminals to steal customer payment (especially credit card) data from retail checkout systems. Cybercriminals use a memory scraper that operates by instantly detecting unencrypted type 2 credit card data, which is then sent to the attacker’s computer to be sold on underground sites. ATM malware GreenDispenser is an ATM-specific malware that infects ATMs and allows criminals to extract large sums of money while avoiding detection. Recently, reverse ATM attacks have also emerged. Here, PoS terminals are compromised and money mules reverse transactions after money is withdrawn or sent to another bank account. In October 2015, issuers were mandated to shift to EMV or Chip-and-PIN system to address the weakness of the previous payment system. Credential theft malware Dridex, a well-known credential-stealing software, is a banking Trojan that is generally distributed through phishing emails. It infects computers, steal credentials, and obtain money from victims’ bank accounts. Other sophisticated threats Various data breach methods can be combined to extract data on a bigger scale. Targeting multiple geographies and sectors at once, this method normally involves an organised crime syndicate or someone with a highly sophisticated setup. For example, the group Carbanak primarily targeted financial institutions by infiltrating internal networks and installing software that would drain ATMs of cash. Additionally, with the rise of cryptocurrency, cybercriminals are utilising cryptojacking, a method that involves the secret use of devices to mine cryptocurrency. The creation of defensive measures requires extensive knowledge of the lurking threats, and our team of experts is up to date on the latest security information. If you have any questions, feel free to contact Multi IT today or give us a call on 011 435 0400 to find out more about TTPs and other weapons in the hacker’s toolbox.
VIEW MORE
Tue, 17 Sep 2019/

How to minimise Wi-Fi hiccups

Today, you simply can’t survive without a Wi-Fi connection. Businesses need fast, secure, and reliable internet to get work done and satisfy customers. But what about when you experience Wi-Fi issues? These fixes ought to do the trick! Range constraints (Wi-Fi) Wi-Fi works via radio waves that are broadcast from a central hub, usually a piece of hardware known as a router. To avoid a weak signal in your office, make sure: Your router is placed in a centralised location and not tucked away in the corner.Your Wi-Fi antennae are either in a fully horizontal or vertical position for optimal signal distribution. Note that Wi-Fi range constraints can also occur from interference, so if your office is situated in a highly populated area, try changing your router’s channel. Slow speeds (Wi-Fi) Despite a high-speed or fiber optic internet connection, slow load times can still occur for a number of reasons. To optimise speeds, try the following: Make sure your router is located in the same room as the devices connecting to it.Install more routers to better accommodate a high number of connected devices.Close bandwidth-intensive applications such as Skype, Dropbox, YouTube, and Facebook.Disable your router’s power-saving mode.Create a new router channel to avoid network bottlenecks. Connection issues We understand how frustrating it can be when the Wi-Fi network shows up on your device but still won’t connect. Before you give up, these solutions might help: Determine whether your Wi-Fi connection is the problem or if your internet is down by plugging your laptop directly into the router via an Ethernet cable. If you can’t get a connection, then Wi-Fi isn’t the culprit.Factory reset your router with a paperclip or a pen and hold down that tiny button for about 30 seconds.Try rebooting your device. Unstable connections Random hiccups in your Wi-Fi connection are normal from time to time. However, if they become a constant nuisance in your office, try the following quick fixes: Move your router to a different spot or even a different room.Avoid having too many routers in the same location, as that can confuse your device. Network not found Router glitches can result in your Wi-Fi network not appearing at all. Two solutions that can resolve this problem are: Disconnecting the router from the power source and waiting at least 30 seconds before reconnecting it.Replacing an old router; if it’s over three years old, you’re probably due for a replacement. When you experience Wi-Fi issues, these tips will help you avoid serious downtime. But if you’d rather have a dedicated technology provider take care of your hardware needs, contact Multi IT today or give us a call on 011 435 0400.
VIEW MORE
Fri, 13 Sep 2019/

Why is HTTPS (Hypertext transfer protocol secure) important?

Many internet users still do not understand what the padlock icon in their web browser’s address bar is for. It represents HTTPS ( Hypertext transfer protocol secure ), a security feature that authenticates websites and protects the information users submit to them. This is an important feature that lets users know whether the website they are visiting is secure or not. HTTPS Encryption When you visit a website that doesn’t use HTTPS, which is common with older websites that have been left on its domain with minimal intervention, everything you type or click on that website is sent across the network in plain text. So, if your bank’s website doesn’t use the latest protocols, your login information can be decrypted by anyone with even the most basic tools. HTTPS Certificates The other thing outdated web browsing lacks is publisher certificates. When you enter a web address into your browser, your computer uses an online directory to translate that text into numerical addresses then saves that information on your computer so it doesn’t need to check the online directory every time you visit a known website. The problem is that if your computer is hacked, it could be tricked into directing www.google.com to the address 8.8.8.255, for example, even if that’s a malicious website. Oftentimes, this strategy is implemented to send users to sites that look exactly like what they expected, but are actually false-front sites designed to trick you into providing your credentials. HTTPS (Hypertext transfer protocol secure) creates a new ecosystem of certificates that are issued by the online directories mentioned earlier. These certificates make it impossible for you to be redirected to a fraudulent website. What this means for daily browsing Most people hop from site to site too quickly to check each one for padlocks and certificates. Unfortunately, HTTPS (Hypertext transfer protocol secure) is way too important to ignore. Here are a few things to consider when browsing: If your browser marks a website as “unsafe”, it is always best to err on the side of caution; do not click “proceed anyway” unless you are absolutely certain nothing private will be transmitted.There are web browser extensions that create encrypted connections to unencrypted websites (HTTPS Everywhere is a reliable Firefox, Chrome, and Opera extension that encrypts your communications with websites).HTTPS certificates don’t mean anything if you don’t recognise the company’s name. For example, goog1e.com (with the “l” replaced with a one) could have a certificate, but that doesn’t mean it’s a trustworthy site. Many unscrupulous cyber-criminals utilise similar spellings of legitimate websites to fool people into thinking that they are in a secure site. Always be vigilant.Avoid sites that don’t use the HTTPS protocol — it can be as simple as that. When you’re ready for IT support that handles the finer points of cyber security like safe web browsing, contact Multi IT today or give us a call on 011 435 0400.
VIEW MORE
Wed, 04 Sep 2019/

Lessons from a disaster recovery plan audit

Why do some companies fail their disaster recovery plan Disaster Recovery Plan (DPR) audit? Perhaps because they did not get the right information for it. They say experience is the best teacher; thus, nothing beats what you can learn from real-world case studies. See what you can learn from the following case. Hosting certain types of data and managing a government network legally bind you to maintain Disaster Recovery Plans (DRPs). After an audit of the Michigan Department of Technology and Budget, several failures led to a trove of helpful tips for small- and medium-sized businesses attempting to create a bulletproof disaster recovery plan. Update and test your plan frequently What was one of the first and most obvious failures of the department’s Disaster Recovery Plan (DRP)? It didn’t include plans to restore an essential piece of their infrastructure — the department’s intranet. Without it, the employees are unable to complete even the most basic of tasks. The reason for the oversight? The last time the plan was updated was in 2011, leaving out more than six years of IT advancements. If annual revisions sound like too much work, just consider all of the IT upgrades and improvements you’ve made in this year alone. If they’re not accounted for in your plan, you’re destined to fail. Keep your DRP in an easy-to-find location It may seem a bit ironic that the best way to store your top-of-the-line business continuity solution is in a binder, but the Michigan Department of Technology and Budget learned the hard way that the alternatives don’t work. Auditors found the Disaster Recovery Plan (DRP) stored on the same network it was meant to restore. Which means if something had happened to the network, the plan would be totally inaccessible. Your company would do well to store electronic copies on more than one network in addition to physical copies around the office and off-site. Always prepare for a doomsday scenario The government office made suitable plans for restoring the local area network (LAN), but beyond that, there was no way for employees to get back to work within the 24-hour recovery time objective. Your organisation needs to be prepared for the possibility that there may not be a LAN to go back to. Cloud backups and software are the best way to keep everything up and running when your office is flooded or crushed beneath a pile of rubble. Your Disaster Recovery Plan (DRP) is more than just a pesky legal requirement. It’s the insurance plan that will keep you in business when disaster strikes. Our professionals know the importance of combining both academic and real-world resources to make your plan airtight when either auditors or blizzards strike. Contact Multi IT today or give us a call on 011 435 0400 about bringing that expertise to your business.
VIEW MORE
Tue, 27 Aug 2019/

Groups, Yammer, and Teams: What are they?

While most Office 365 apps serve a unique purpose, tools like Outlook, Teams and Groups and Yammer can all be used for office communication and collaboration. However, there are small differences in the way they can be used. Let us break it down for you. Outlook Groups With Outlook Groups, every member gets a shared inbox, calendar, project planner, notebook, and document library. You also get the ability to connect to third-party apps such as Twitter, Trello, and Mailchimp, so notifications are sent directly to your shared inbox. This means all relevant messages and information are contained in one place, so if a majority of your conversations occur via email, Outlook Groups is ideal. What’s more, HR and sales departments that communicate with external parties will also find plenty of uses for its email features. A big drawback with Outlook Groups, however, is email overload. Because all messages and notifications are sent to one inbox, users may become overwhelmed by the number of emails they have to sort through every day. Microsoft Teams Microsoft Teams, a chat-based collaboration platform similar to Slack, works with Skype for Business so you can text, call, video chat, and share files with colleagues. Thanks to its seamless integrations with other Office 365 programs, you can even work on shared files without having to leave the app. Unlike Groups, Microsoft Teams is designed for high-velocity collaboration, making it the best of the three for completing projects with tight deadlines or other tasks where employees need immediate feedback. Yammer Much like Groups and Teams, Yammer works well with other Office 365 tools like Outlook and OneDrive. However, Yammer is a professional social media app designed to foster open communication and break down barriers between teams. With Yammer, important files and announcements can be shared with the entire company like an office bulletin board. Users can see the most popular post on their feeds, follow it, and even provide their input by leaving a comment. Yammer also takes design elements and features from popular social media apps like Facebook, making it a popular choice for companies with millennials in their workforce. Although we’ve discussed the fundamental differences between Groups, Teams, and Yammer, we’ve barely scratched the surface of what each app can do. To figure out which apps you need, you must understand how your employees work, how they prefer to collaborate, and what you want to achieve. But there’s another way to find the right app for your business. Whether it be Teams and Groups or anything contact Multi IT today or give us a call on 011 435 0400 for an IT assessment!
VIEW MORE