Social Media – Creative Website Designs Creative for your online success! Wed, 03 Jan 2018 02:48:28 +0000 en-US hourly 1 Social Media – Creative Website Designs 32 32 How smart is my phone? Fri, 03 Jun 2016 05:36:03 +0000 These days it’s really hard to buy a cellular phone that just makes phone calls. Go on. Give it a go. Instead, phones are becoming mobile computers that access our social network sites, our e-mail, our personal banking, our family photos, videos of those dance moves at the club, and a myriad of other things we hold dear.

So. What happens if someone takes your phone ? Exactly what can they do ? I’ll let you think about that for a moment.

Instant access always open
Setting a simple lock code on your phone, and setting it to activate automatically, is the simplest and most basic solution. This means that all your e-mail accounts, social network accounts, pictures, and everything else have a basic first line of defense. It’s simple, and effective as a deterrent to all but a determined thief.

Don’t let an SMS ruin a good day
SMS Phishing is a technique that tries to get you to give information out to someone who appears to be a friend. Say for example your partner has their phone and wallet/purse  stolen and the thief sends you a message asking you to remind them of their PIN number. What do you do ? Is that something you would expect of your partner ? Another little known feature of many devices is the ability to “configure” them using an SMS message. Telephone providers use this method to help you configure a phone for their network. But, on many phones these messages are received and actioned automatically and silently. You may never even know you received the message! To help counter this is it possible on some devices to disable the automatic processing of these type of messages, meaning it does not actually action any change until you open the message. That allows you to decide whether or not open it or just delete it.

All that storage!
Many phones have a whole heap of storage available (way bigger than my first hard disk !!). Some phones have this as “internal” storage and other phones allow you to plug in additional memory cards to extra storage. The sheer amount of information you can carry around is amazing. Always remember that the “removable” storage in your phone is just that, removable. Often it can simply be plugged into another phone or a computer and all it’s contents can be read or copied. Some phones allow you to encrypt that removable storage. While it does impact the speed of the storage, I recommend you do it. Internal storage is far less susceptible to this and, as long as the phone itself has some sort of password and lock on it you really have to be determined (or a government spy) to get information out of it. More and more so these days smart phones are encrypted out-of-the-box so that is good news.

It’s SIMple really
Sorry about the pun. SIM cards are tiny bits of plastic and metal that allow your phone to connect to the world. Not many people actually store any information on SIM cards any more (sometimes contacts are kept there), but they do allow someone to pretend to be you. It’s effectively your phone number. To stop people pretending to be you, always try and put a PIN number of your SIM card. That will mean that if someone does take your SIM card and plug it into another phone, they won’t be able to use it unless they know the PIN.

Virus Alert
As phones become ubiquitous, the baddies are starting to seize the opportunity and are creating malware for smartphones that work in a similar way to those on computers. They steal data, send messages pretending to be you, run up large call or data costs, and send premium SMS messages. To help combat this some anti-virus vendors have versions of their software specifically for smartphones.

Now, not all phones are created equal and not all these tips are relevant for every phone so it’s important to seek advice if you need to. Additionally, judge for yourself the level of concern you have with your own phone and take appropriate action (or inaction) to suit your particular needs.

Social Media Security Tips Fri, 27 May 2016 06:52:11 +0000 Facebook, Foursquare, Google+, LinkedIn, Pinterest, Whirlpool, Twitter, MySpace, the list goes on and on. Many many people belong to one or more social media or sharing sites and they are, for the most part, a good thing. They help folks stay in touch and share common interests. They also can be misused and abused. So what are the golden rules for Social Media ? Allrighty, here we go.


Did you post a note in Facebook saying you are heading overseas for 3 weeks ? Did you “check in” somewhere in a different city on Foursquare ? Did you limit who could see that ? Well, you probably should have. Many social media sites allow you to control who can see your posts, which is a really good thing. There is a growing trend for ne’re-do-wells (and the merely curious) to monitor publicly posted updates featuring key words so that they can then use other publicly available information (the whitepages for example) to find out where you live and help themselves to your Barry White collection. There are some relatively humorous WEB sites out there right now that trawl public posts for key phrases such as “hangover” and “call in sick”.

So what do you do ? Well, many social media sites allow you to tackle this in a couple of different ways. Firstly, you can alter your sharing settings to limit your posts visibility by default. Others allow you to share each post with specific groups of people. Sure, it’s an extra step when posting but surely it’s worth it.

What do people know about you ?

Your social media profile. You know you are badgered every time you log in to finish filling it out. Your DOB, full name, address, phone number, likes, interests, status, mood, weight, favourite designer, good grief ! While the purpose is to improve your online experience, make sure you limit who can see that. Just your immediate friends, people you trust, and so forth. DOB can be useful if people are trying to find you, but maybe limit it to month and year only. The rule of thumb here is generally that if you wouldn’t give all that information to someone in the street, make sure you don’t give it to everyone on the Internet.

Take a look in the mirror (metaphorically speaking)?

Have you ever NOT logged on to your social media site(s) of choice and searched for yourself ? If you haven’t checked out your profile settings it can be interesting, and sometimes a little alarming. Check it out sometime. If it worries you, log on and check your settings. Facebook, specifically, have historically had a habit of changing the options, and the defaults for those options, on a regular basis.

Getting in the door ?

Passwords. Sigh. Yes, I know. As with mobile phones, your social media login is an important bit of information you should protect. Have a strong password and enable two factor or strong authentication if your provider of choice supports it. Don’t use the same password for multiple sites, bank account, or e-mail accounts. Using these things it is very simple to steal your identity, and it’s not as funny as the recent movie would have you believe. Identity theft can potentially leave you penniless, with a bad reputation, and with no recourse. I’ll leave that one right there.

Thanks for reading and have a great day.

Facebook Pages | Facebook Groups | Twitter| Social Media Tools Mon, 01 Jun 2015 04:54:36 +0000 Facebook

This tool has become a huge marketing platform for those that use it effectively; however Facebook can also negate a company’s hard work in brand enhancement if it is not done correctly.  From a business perspective there are two options on Facebook, a page or a group.

Facebook pages

The Facebook page allows one to create a specific profile (in this case this would be the business page), providing one with an Identity that members and other users can become fans of. By a user becoming a fan they will be able to follow updates made by a business on their profile page. Added to this is that friends of these fans will see that they have become fans which may encourage them to become fans and so on and so forth.

A website could use Facebook pages to one promote their organizations branding, and try to differentiate it from other similar businesses, by disseminating important information quickly.

Facebook groups

Facebook Groups, carry a similarity to Facebook Pages, the difference is they are built around a group of people rather than your business or your brand. You must be a member of Facebook to create a Facebook Group.

You can use Facebook Groups to create awareness, but they do not have the feature that allows users to become fans, they only become members. The downfall of this is it will not share as much information with friends of “group” members as they interact with the group. However this may not be that big an issue if the group is being used to communicate specific issues to users.


Twitter is a free service that allows anyone to say almost anything to anybody in 140 characters or less – it’s what you doing right now, kind of micro-blogging that permeates online social communication. From a business perspective it can be used for the following:

  • A way to connect and network with others in the industry or others who share similar views.
  • A way to get instant access to what’s being said, this minute about, people, products, or online brands.
  • A steady stream of ideas, content, links, resources, and tips focused on a specific area of expertise or interest.
  • Monitor what’s being said about customers to help protect brand identity.
  • Extend the reach of business leadership – blog posts and other content.

However maintaining a twitter account can be a time consuming process and ideally one would not respond to every tweet, also a Twitter account should be accessible to multiple staff  members so that more than one user can respond. The big risk is ensuring the tone, and language is consistent with every tweet. Also there are many tools out there to simplify and assist with the tweeting process.

Some organisations are using twitter for supportive purposes.There are many sites out there that provide more in-depth details on how to effectively use twitter for business purposes.

Other social media solutions

OpenText, as do many other vendors, provide their own Social Media tools to accommodate many of the features mentioned above including Blogs, Wiki’s, forums, videos podcast sharing, Micro blogging, and Social bookmarking. All of this can be moderated and analyzed to ascertain the effectiveness and trends when using Web 2.0 (Social media) tools. A business needs to understand what drives the users and what they see as important to them so that content and services can be tailored to suit these requirements.

How to improve Twitter engagement Tue, 10 Mar 2015 03:32:45 +0000 twitter engagement

Twitter is the second largest social media website alongside Facebook, so ensuring that your tweets on Twitter engage the followers is important. Today I will discuss some tips on improving Twitter engagement which in turn, will also improve social commitment and followers.

Avoid overuse of hashtags

I am sure we all have seen the overuse of hashtags on Twitter. Twitter hastags are important for being acknowledged for that keyword (hashtag), but just like overdoing keywords on a website hastags makes your tweets look spammy.

Use of images equal more re-tweets

That old saying, “A picture tells 1000 words” is true in the artistic word; it’s also relevant within the SEO/Social word. The use of images within tweets increases social interaction and hence, equal more re-tweets.

Use of humour in Tweets

Everyone loves to have a good laugh. Brighten up someone’s day buy using humour within your Twitter tweets. There is nothing better than using humour!

Tweet something valuable and educational

Don’t we all hate tweets about what someone has had for breakfast or what type of clothes they are wearing today, I know I do. Tweet something valuable and educational, this could be anything; a business concept, tutorial website etc.

Twitter Analytics

Twitter just like Google has Twitter Analytics which shows which tweets which have performed better overtime. It displays engagement statistics like Link Clicks, Retweets, Favourites, and Replies.