Ad blocker has come to Chrome
Pop-up ads and videos can easily turn people away from a website. Google knows this and has come up with a solution set to launch early this year. With that in mind, here’s everything you need to know about Chrome’s ad blocker.
What is it?
Ad blocker from Chrome actually works like an ad filter, meaning it won’t block all ads from the website, only ones that are determined to be too intrusive, like video autoplay with sound as well as interstitials that take up the entire screen.
A group called the Coalition for Better Ads, which consists of Google, Facebook, News Corp, The Washington Post, and other members will decide whether or not the ads are to be blocked. According to Sridhar Ramaswamy, the executive in charge of Google’s ads, even ads owned or served by Google will be blocked if they don’t meet the new guidelines.
How will it work?
From a consumer’s end, you won’t have to do anything except for updating your Chrome browser. For publishers, Google will provide a tool that you can run to find out if your site’s ads are violating the guidelines. The blocker will apply to both desktop and mobile experiences.
What are the benefits of Chrome ad blocker?
Bad ads slow down the web, make it annoying to browse, and drive consumers to install ad blockers that remove all advertisements. If that continues, publishers will face major obstacles since nearly all websites rely on ads to stay alive.
With Chrome’s ad blocker, wholesale ad blocking can be controlled to please both consumers and publishers. Users get a better web browsing experience and publishers can continue to make profits through online ad sales.
But isn’t Google already using third-party ad-blocking extensions?
Yes, but this means they have to pay third-party ad blockers -- like Adblock Plus -- a certain amount of fee to whitelist ads for the privilege of working around their filters. With their own ad blocker, this can be eliminated once and for all.
Are there potential drawbacks?
It’s undeniable that Chrome’s ad blocker gives Google lots of power to determine ad standards for everyone. It comes to no surprise that there are skeptics who don’t trust one company to act in everyone’s interest.
And while Google assures that even its own ads will be removed if they violate the rules, the fact that Google itself is an ad company with nearly 89 percent of its revenues coming from online ads doesn’t boost its credibility to industry peers.
Publishers will have fewer options to monetize their sites once Chrome’s ad blocker is implemented. To help, Google will include an option for visitors to pay websites that they’re blocking ads on called Funding Choices. However, a similar feature called Google Contributor has been tested a couple years ago with no signs of catching on so we doubt that Funding Choices will differ.
Despite expected criticism, Chrome’s ad blocker will likely result in a better web browsing experience. And as always, if you have any questions about the web, or IT in general, just give Multi IT a call on 011 435 0450 and we’ll be happy to help.
VIEW MORE
Four Facebook features for your business
Facebook has numerous built-in features to help small- and medium-sized businesses thrive. But chances are that most business owners are taking advantage of only just a few. With Facebook’s audience reaching 1.8 billion users monthly, it’s vital for your business to leverage the right tools to enhance growth. Here are four features you should start using right away:
Audience Insights tool
This free tool is designed to help businesses learn more about their target audience. Audience Insights takes the guesswork out of identifying your customers by providing data such as geography, purchasing patterns, and even the Facebook pages they like. You can also use your existing customer database, Facebook page, or email list to learn more about your clients. Audience Insights help save a lot of time and money by determining whom you should advertise to.
Facebook Product Shops
This allows you to sell your products directly from your Facebook page. After following these instructions, you can set up your product shop in just a few clicks. You can choose whether you want buyers to purchase directly on Facebook or whether you want buyers to complete checkout on your website. Consider running ads using the data gathered from the Audience Insights tool to target ideal customers and increase sales.
New Facebook Ads
Facebook’s advertising platform offers endless combinations to create the perfect ad. It features numerous placement options that go beyond the traditional newsfeed. There are two new ad destinations that could help you reach new audiences:
Facebook Messenger ads - deliver a highly personalized experience by providing an opportunity for you to chat with prospective customers. You can answer questions or schedule appointments from the Messenger app.
In-stream video ads - despite being relatively new, this prime advertising space allows businesses to deliver 5-15 second mid-roll video ads within live and non-live videos on Facebook.
Facebook Live marketing
Due to its rising popularity, businesses are looking for ways to incorporate Facebook Live into their social media marketing strategies. Here are a couple of tips to optimize Facebook Live usage:
Livestream pre-scheduling - this tool creates and pre-schedules Facebook Live streams, thereby boosting anticipation for your videos and prompting viewers to mark their calendars if they want to tune in.
Merge it with your Product Shop - this feature can be used on your Facebook page only if you’ve set up your Product Shop. When you mention your products in a livestream, you’ll be able to tag your products in the video, allowing viewers to access your Product Shop directly from the video.
In order to surpass your competitors, you’ll need to not only establish a strong online presence but also know how to leverage Facebook features to your business’s advantage. If you’re interested in adopting a social media marketing strategy, feel free to give Mult IT a call on 011 435 0450 or visit our website!
VIEW MORE
Automate mundane emails to get more done
Everyone wishes there were more minutes in a day. Between repetitive emails and seemingly endless meetings, it’s hard to find time for important tasks. Thanks to the increasing affordability of enterprise-level IT however, SMBs can start getting at least half of those problems under control with email automation.
What is email automation?
Usually included in customer relationship management (CRM) software, email automation centers around the idea of combining your business data into emails to customers and prospects. This allows you to draft templates with placeholders for names, addresses, and other variables that the platform will match with individuals from your email list.
Even better however, is personalizing how and when your emails go out to clients. Automatically inserting customer data into an email is great, but it still requires that you draft the content that surrounds it and hit Send. Email automation grants you the ability to create templated emails that are automatically merged with client data and sent when certain conditions are met.
Examples of email automation
To really get an idea of how valuable this solution is, it’s important to see what it looks like in action. Say you own an eCommerce site that sells complementary goods, like golf clubs and golf balls. You could create a campaign wherein anytime someone buys a set of clubs, pre-written emails automatically go out one month later on how high-quality golf balls improve your handicap.
You’re not limited to two-step workflows either. Take a look at this example:
Step 1: Send a personalized email with a special offer on golf balls for existing customers.
Step 2: Send a follow-up based on how customers interacted with the offer email:
If a customer cashed in the offer, send a thank you email.
Step 3: Follow it up with a similar offer three months later.
If a customer visited the promo page but didn’t convert, send a promo email for another type of product, like golf bags.
Step 3: Follow it up with either a thank you email or another promo for golf clothes.
If a customer didn’t even open the email, send a survey email asking about their interests.
Step 3: Follow it up with email campaigns based on what they selected.
Email automation means there’s no need to micromanage your customer relationships. As long as you define the path to purchase for high-volume products, you can program workflows to nurture customers and prospects automatically.
For as little as a couple hundred bucks a month, your customer outreach campaigns can compete on the same level as your corporate counterparts with little effort from your team. Add in an expert IT provider and you have the ability to blow the competition out of the water. To learn more, contact Multi IT on 011 435 0450 today!
VIEW MORE
Why Nyetya is more threatening than WannaCry
The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers believe it to be stealthier and more sophisticated than WannaCry.
Worse than WannaCry
Nyetya is deemed worse than WannaCry mainly because it spreads laterally, meaning it targets computers within networks and affects even systems that have been patched. Because it also spreads internally, it needs to infect only one device to affect several others within a single network.
Cyber researchers trace its origins to a tax accounting software called MEDoc, which infected 12,500 systems in Ukraine. Since the initial infections in June, it has spread to thousands of networks in 64 countries. And although it hasn’t spread as fast as WannaCry, it might have a wider reach soon because it uses three attack pathways to infect a system. It hasn’t made as much money as WannaCry, which is why cyber researchers are concluding that the attacks are not economically motivated.
Don’t pay the ransom
Cyber security firms and researchers strongly recommend affected businesses to avoid paying the ransom. According to them, paying the ransom would be a waste since the infected user won’t be able to receive a decryption key to unlock their files or systems. This is because the email provider has blocked the email address on the ransomware message.
Although it operates like a ransomware -- locking hard drives and files and demands a $300 ransom in Bitcoin -- it functions more as a wiperware that aims to permanently wipe out data and/or destroy systems. So far, it has affected big-name multinationals in various industries, including Merck, Mondelez International, and AP Moller-Maersk, among others.
Perform backups and update outdated security patches
The only way businesses can be protected is by performing backups and staying on top of patch updates.
It’s safe to say that in case of a Nyetya attack, there’s no chance of getting back your data. In such a scenario, you would have only your backup files -- whether on an external storage or in the cloud -- to fall back on. But backing up is not enough; you should also ensure that your backups are working, which you can do by testing them regularly. Given the nature of Nyetya, you should also make sure that your backups are stored off-site and disconnected from your network.
Like its predecessor, Nyetya exploited vulnerabilities in unpatched Microsoft-run computers. As a business owner, make it a part of your cyber security routine to update your systems with the latest security patches, or risk having your files or systems permanently corrupted.
As a business owner whose operations’ lifeline depends on critical files, your backups are your insurance. If your systems’ network security needs another layer of protection, get in touch with Multi IT today on 011 435 0450.
VIEW MORE
New Microsoft Workplace Analytics
Workplace Analytics is a program that helps managers determine staff productivity levels using data gathered from their email, calendar, documents, and other applications within Office 365. Previously, Microsoft’s MyAnalytics allowed only employees to view their individual data, but with this updated version, managers now have access to this data, too.
How it works
Now available as an add-on to Office 365 enterprise plans, Workplace Analytics extracts behavioral insights from data gathered from Office 365 email, calendar, documents, and Skype. This means that any data an employee types into their email and calendar -- whether it’s on the subject line or the main content itself -- can be used to indicate their productivity status.
The program has an overview dashboard that provides specific information:
Week in the Life provides an overall view of how the entire organization spends time and how members collaborate
Meetings shows the amount of time spent in meetings
Management and Coaching gauges staff-manager one-on-one meetings
Network and Collaboration takes a look at how employees connect to colleagues
What does it aim to do?
Workplace Analytics aims to address what, according to Microsoft, are businesses’ most common challenges: complexity, productivity, and engagement.
Using Analytics data, managers and human resources departments can form productivity strategies for the entire company. If, based on Workplace Analytics data, a majority of your employees are spending 60% of their time attending meetings and not enough time doing creative work, they can come up with a strategy that reduces meeting time and focuses more on productive tasks.
It also identifies how employees collaborate with internal and external parties. Suppose one of your sales staff frequently communicates with certain contacts. By using Workplace Analytics data, the employee’s manager would be able to determine whether this particular collaboration pattern is helping the employee hit sales targets or whether he or she is missing out on other more critical contacts. Also, based on this info, managers would be able to determine which employees are most likely to meet or exceed their targets and set company-wide standards accordingly.
Data gathered by Workplace Analytics also allows managers to determine an employee’s level of engagement (i.e., whether the organization’s collaboration patterns are good for the company) and whether workloads are fairly distributed among workers and/or departments.
Is it useful for small businesses?
Large corporations have been using Workplace Analytics, but small businesses can also benefit from it. For one, the data used to provide the insights are all based on data generated by employees themselves -- how much time they spend on meetings, whom they frequently communicate with, and how much time they spend on productive tasks.
Aside from letting managers examine their staff’s working behavior, Workplace Analytics also provides an overall look into what happens at an organizational level. If you want your organization to harness the capabilities of Workplace Analytics and other Office 365 tools, give Multi IT a call on 011 435 0450 today!
VIEW MORE
How to secure your IoT devices
More firms are using the Internet of Things (IoT) to create new business opportunities. For instance, companies that install smart sensors can automate data entry and monitor their inventory. However, if left unsecured, IoT devices also give hackers an opportunity to breach your network. In order to keep attackers at bay, we advise you take the following precautions with your IoT devices.
Set passwords
Many often forget they can set passwords for IoT devices. When this happens, they tend to leave their gadgets with default passwords, essentially leaving the door open for hackers. Make sure to set new and strong passwords -- preferably with a combination of upper and lower case letters, numbers, and symbols -- for each device connected to your network. Then, use a password manager to securely keep track of all your passwords.
Disable Universal Plug and Play (UPnP)
UPnP is designed to help IoT gadgets discover other network devices. However, hackers can also exploit this feature to find and connect to your IoT devices. To prevent them from getting to your network, it’s best to disable this feature completely.
Create a separate network
When you’re dealing with IoT devices, it’s wise to quarantine them in a separate network unconnected to your main office network. By doing this, user gadgets will still have access to the internet but won’t be able to access mission-critical files.
You should also consider investing in device access management tools. These allow you to control which devices can access what data, and prevent unauthorized access.
Update your firmware
If you want to keep your devices secure against the latest attacks, then you need to keep your IoT software up to date. Security researchers are always releasing security patches for the most recent vulnerabilities, so make it a habit to regularly check for and install IoT firmware updates. If you have several gadgets to secure, use patch management software to automate patch distribution and set a schedule to check for updates monthly.
Unplug it
Disconnecting your IoT devices from the internet (or turning them off completely) whenever you don’t need them significantly reduces how vulnerable you are to an attack. Think about it, if there’s nothing to target, hackers won’t be able to make their move. Turning your IoT devices on and off again may not seem like the most convenient strategy, but it does deny unauthorized access to your router.
Unfortunately, as IoT devices become more commonplace in homes and offices, more hackers will develop more cunning ways to exploit them. Getting into the above mentioned security habits can protect you from a wide variety of IoT attacks, but if you really need to beef up your security, then contact Multi IT on 011 435 0450 today. We have robust security solutions that keep your hardware safe.
VIEW MORE