Pages

Sunday, April 28, 2013

4 Ways To Increase Password Security for SMB's

4 ways to increase password security for SMB's
gigaom.com

Passwords are the weak link for companies of all sizes, but many small and midsize businesses (SMBs) rely on their workers to make the right choice in selecting strong passwords.
While establishing a password policy and educating workers are good first steps, they are not sufficient to convince users to select good passwords.
SMBs frequently inherit their employees' selection of passwords, and while three-quarters of workers choose passwords for security, they also compromise to more efficiently gain access to their accounts.
"A business is only as strong as its weakest link, or weakest password connected to that business, whether belonging to a customer, partner or employee," CSID stated in the report.
Here are 4 Ways for businesses to increase password security
Create Visibility
Mozakdesign.com
1. Create visibility
SMBs generally have no idea the strength of the passwords that their employees are using on internal systems, whether they are reusing the passwords on external services or how many different passwords they have. The first step for businesses to gain visibility should be to adopt a central system for managing employees credentials, whether a password-management service in the cloud or full identity and access management (IAM) solution.
Without such a system, companies will be blind as to the degree of risk they have, LastPass's Siegrist says.
"The scary thing is that most people don't know any better, so if you don't have any tools or procedures in place, you just have no shot of getting to a safe place," he says.
LastPass for instance, gives each employee's account a security score based on their currently stored passwords. While company administrators cannot access the passwords themselves, they can discover when a worker is not following policy.
2. Centralize password management
Even for companies that do not need a full IAM system, the centralized management of employees' passwords goes beyond just gaining insight into workers' password habits. Companies that have administrative control over their employees' accounts can add new workers and delete old ones who no longer work at the firm, heading off the risk from disgruntled employees.
"As companies grow, even to 50 or 100 users, tracking where they've added users have added accounts into different applications not only becomes a burdensome process, but can also become expensive," says Patrick Harding, chief technology officer of Ping Identity, a cloud identity provider.
Ping's product eliminates passwords for many cloud applications by using a single sign-on approach that replaces passwords with Security Assertion Markup Language (SAML) to securely access online accounts.
Single Entry Point
Liebsoft.com
3. Pick a single entry point
In addition to centralizing the administration of the identity storage, companies can benefit from simplifying a user's need to enter in a credential to a single login event. By limiting the number of times a user has to enter in a password, companies can make their workers more efficient and focus on a single channel to secure, Harding says.
"If you only have to authenticate once a day, make that authentication stronger than a password, even a strong password," he says.
Using two-factor authentication for an e-mail account can double as the log-in credentials for the single sign-on system.
4. Change employee behavior
Finally, companies should use any improvements in their management of passwords to educate them about good passwords selection, LastPass's Siegrist says. When employees reuse a password, remind them of company policy against reuse. If workers have not updated old passwords, then remind them to do so, he says.
"You can set policies to perfectly customize how safe you want your employees to be, and know that they are doing it,"Siegrist says.

Thursday, April 18, 2013

Top 6 BYOD Risks

In my last post I discussed the top Benefits of BYOD and ended with the promise to discuss the main risks or concerns associated with BYOD.  Before I do; it is important to understand that new technologies such as the enterprise cloud, cloud-based apps, social media, and high-powered mobile devices offer more ways to access corporate data.


1. Data Management, segregation for compliance reasons
Many financial regulators or auditors require certain sensitive data to be adequately protected and stored with documented evidence to prove. With Cloud and Mobility this can prove a challenging equation. Key Challenge will remain the assurance and evidence although IT/Security Departments should be provided with a clear guideline on data management policies or devices (3rd party included) on which data is stored



2. (Unknown) 3rd Party Access via Mobile Apps
When employees download and install their personal apps on their personal device, they allow unregulated third-party access to other sensitive, corporate information stored on their devices. Additionally Wi-Fi Access points could potentially access corporate data. 

3. Data Tracking (Nightmare)
The ability to track and manage corporate data has become more difficult with the adoption of new technologies like Cloud and Mobile Storage Services in the Enterprise. Organization are often not equipped to track data effectively and need to rely on 3rd party providers and rely on employees to follow the guidelines.

4. Lost or Stolen Devices:
A simple truth is that PC's or even Laptops do not go missing that easily as a smartphone or tablet, due to the sheer size. The risk is in the fact that Mobile Devices in general are either not password protected or lack a robust protection. An additional factor of risk is corporate espionage via deliberate targeting of device. 




5. Employees leaving 
Employees leaving a company "forget" to inform HR of their own device containing corporate information. Unhappy employees can leak information to competitors. 
Most of this can be mitigated fairly easy by reminding HR teams and employees that any corporate data either stored on mobile devices or cloud service remains owned by the company. Termination or Exit Policies are almost in all companies common practice

6. Additional Cost instead of Savings
Many CEO's view BYOD Policy as an easy cost-saver, however to manage and monitor points 1,2,3 and 5 (point 4 is ambiguous) new IT policies, hardware and employees need to brought into place which is likely to be more costly as the graph indicates. 
The picture here is not as black and white though as the graphs below will demonstrate


After spending a lot of time on BYOD researching it I am still not sure whether the benefits  (at this time) outweigh the risks involved. I can see the immense potential and benefits for both employers and employees but am still uncomfortable with the complexity and possible security and policy gaps. 





Thursday, April 11, 2013

Top 5 Benefits of BYOD


The latest trend in a lot of public and private organizations is the allow employees to use their personal devices for work purposes. 
In this blog I am going to list the 5 main benefits.



Here we go! 

1.  EMPLOYEE REQUESTS: 
Employee Satisfaction
The most obvious benefit to embracing BYOD is employee engagement and retention. If you are in an industry full of creatives, Gen-Y or tech savvy employees, it's a no brainer and you probably had BYOD before we all came up with the catchy label. Giving employees choice and respecting different preferences can demonstrate progressive workplace culture and nurture employee loyalty. 
On the other hand, if you are in a necessarily conservative industry such as the military equipment manufacturing industry, it is likely also a no brainer that security issues may outweigh any potential benefits. For the many companies in between these two extremes, employee engagement and retention may be one of a number of benefits to consider.

2.  CLIENT ENGAGEMENT: 

Certain clients in certain industries may have a preference for one type of device over another. If you are visiting a Blackberry dependent tech client in Waterloo, whipping out your iPhone is both rude and stupid. Allowing BYOD flexibility to support various platforms may be essential to reflecting business reality.


3. INCREASED PRODUCTIVITY: 
BYOD may positively impact employee productivity. Letting people connect their tablet to the company email and document system may facilitate convenient and more frequent after hours work. Rather than lugging a cumbersome laptop home, employees can use their tablet to finish up a document or clear out their email after the kids go to bed. Business travellers, trade show attendees and salespeople on the road all may find BYOD a critical piece to maintaining productivity out of the office.

Wednesday, April 10, 2013

Top 5 Trends that Impact E-Commerce in 2013


2013 is according to many going to be the year of Mobile commerce, so what does that mean for Online retailers?Let’s take a look at the top 5 trends that will be shaping E-commerce for 2013, and let us see what actions web designers and developers can take to stay on the top of these trends.

1. Localization – Big Opportunities For Small Businesses

Online retailers no more shy away from creating indigenous e-commerce websites. Here we are not referring to merely offering your website in different languages. With going local, we are referring to a totally localized user experience. Thus, expect to see more websites based on traditional design
aesthetics including the use of local color preferences, local language, local offers and essentially local products and services. For small businesses the move is indeed welcomed especially if they cater for niche markets. Ours is a curious generation which loves to explore. The local stuff which is marketed across as traditional and exotic easily attracts customers and generates revenue.
Localization will also pave the way for more personalization whereby users will continue to enjoy an even more one-to-one customer experience. Websites will automatically adapt to show user preferences and tastes. However, personalization will not be only based on past purchases or browsing habits (such as the recommendations offered by Amazon). Instead, we will see more intelligent algorithms that are able to predict which products or service may appeal to you based on advanced segmentation and user profiling.

2. M-Commerce Is The New Buzzword

Online businesses have realized the need for deeper mobile integration. Witness to this is the increased use of responsive web design that dominated 2012. From a user interface perspective, online businesses will continue to adapt to and make the most use of the available screen real estate of the device from which they are being accessed. As such, there will not be one e-commerce site for the desktop and another for the mobile device. Instead, thanks to Responsive Web Design, there will just

Sunday, March 31, 2013

Why FacePhone and FaceDroid will fail


The latest rumours to surface is Facebook releasing its own smartphone..  
According to various different reports Facebook will introduce its own version of Android running on a phone with a ton of Facebook features. HTC is on board with Facebook and most likely offer "FaceDroid" on its phones. Facebook is reportidly looking for other manufacturers to join. As for further technical specifications not much is known.


Is this the latest sign of innovation?  
Nope, all Android and iOS phones come with Facebook baked into it. Whether it is chat, call, photo, poke or "Like It" it is available. 
The last time Facebook tried to enter the Smartphone market (with HTC ChaCha) it was not an experience to remember. The smartphone developed and manufactured by HTC flopped badly.


The Facebook name or brand alone simply is not going to drive people to buy a device based on its brand (Unlike Apple), especially Facebooks' trackrecord with its users privacy is doing the company not any favors. 

I just don't see the "FacePhone" on "FaceDroid" being any different from any other current smartphone. Only if Facebook is able to offer something completely new and innovative their FacePhone has a chance to succeed, so a powerfull camera is not going to cut it. 

Let me know what you think

Sunday, March 24, 2013

Why IPhone will survive the S4, N4, Z10 and others to come


Mcommerce Explorer Blog
With the launch of the Samsung Galaxy S4, HTC One, LG Nexus 4 and Blackberry Z10 a war against Apple's IPhone 5 seems to be declared. But is it really? On the surface it might seem this way, but the real motivation could be seen in a different light. That is what I am going to discuss today.

MCommerce Explorer Blog
A review of recently released smartphones showed that the Samsung Galaxy S4 indeed seems to fullfil its promise followed by HTC One. 
The Blackberry Z10 has a relatively low score, but is basically on par with IPhone 5. 
Interestingly enough the Galaxy S3 marginally outperforms the IPhone 5 and the Z10. 




Does the IPhone have a future?
The IPhone 5 is far from dead. The results published in the review by Primatelabs need to be looked at with a bit of nuance. The IPhone 5 has been on the market since 6 going 7 months, therefore the comparison with the Galaxy S4, HTC One and LG Nexus 4 are not reflecting its actual capabilities.  The S4, One and Nexus 4 all operate on 4 core hardware whilste the 5 is operating on 2 cores (with an operating 2,5 times faster than the IPhone 4S). If you take the release date of the IPhone 5 and benchmark it with phones released in a simular period it suddenly jumps  in ranking to #2 behind the Samsung Galaxy S3. 

What has the Galaxy S4 to offer that the IPhone 5 has not?

Thursday, March 14, 2013

5 Reasons Why Chrome OS fusing with Android is Good!

My previous posts were mostly about security concern and the rise of wearable devices. 
In this post I discuss a "minor" staff change at Google and how it relates to the Android OS and why it can be seen as sign of strategic change in Google's approach

This week saw Google reveals its future mobile ambitions by replacing long serving Andy Rubin (head of Google Mobile Android Division since 2004) by Sundar Pinchai, who is currently head of Google Chrome's department and has been responsible for the browsers' meteoric rise in the last 4 years. 
In practice this means that Mr. Pinchai will be heading both Google Chrome and Google Apps. Losely translating this means that Chrome will is preparing for the moment that Android (Mobile Devices) and Chrome (PC/Desktop) will become one. 

1. What is Google aiming for? 

At current Google is not charging any of the companies deploying Andriod in Mobile Devices. Instead Google is earning on the applications that run on Andriod via its Play Store. Google is making money with the Advertising campaigns targeting Andriod.  By merging Andriod OS and Chrome OS Google creates a potentially massive new revenue base.


2. What did the "Chromebook Pixel" do? 

The release of Google's "Chromebook Pixel" laptop, which provides a superb browsing experience and native intergration with Google's Cloud Service, demonstrated its inability too rival both the Windows and MAC Operating Systems. Basically all that you expect from a cheap laptop
As reviews showed: it was not a greatly celebrated success and that is an understatement. But not to fear, Google is here. Turning a bad experience into a usefull one!

3. What makes Android so interesting?

Saturday, March 9, 2013

6 Smart Watches to keep your eye on!


MCommerce Explorer Blog
Analysts forecast that the market for wearable computing devices will near half a billionunits sales per annum within the next 5 years

Both link in well with their end-users and operate on sophisticated technology to operate and synchronize with your mobile devices. 

The future  has more in store for us, with the highly anticipated releases of Apple's 

I-Watch and Google's Project Glass. 
In this blog I want to do something else. Listed are 6 wearable (why do I want say portable) devices and I would like you to rate them! Simple, fun and not too exhausting. 
I am not affiliated to any of the producers of these products, so I don't make any money out of it. 
The best known wearable computing devices at the moment are:

1.Lark Watch: This device awakens sleepers quietly and gently. It measures and analyzes the user’s sleep, evaluates sleep patterns with assessments, and coaches users about how to improve their sleep experience based on their sleep type. 




2.WIMM Watch: WIMM One is the world’s first Android watch capable of running lots of custom apps, synchronizing with a user’s smartphone, and gathering the latest news and headlines from the web using its Wi-Fi connection. It has a small form factor, a color touch screen, Internet connectivity, and a custom app store. 




3.I’m Watch: The first smartwatch — has everything your smartphone has. The I’M Watch has a 1.55-inch touch screen, Bluetooth tethering, and a 4GB memory card. The graphical user interface is minimal, clean, user friendly, and iPhone (plus other smartphones) compatible. High-resolution display has water resistant surface and screen similar to the iPod nano.






Tuesday, March 5, 2013

Marketeers wake up! MMS/SMS campaign is the most effective way!

www.MCommerce-Explorer.com
image: besttextmarketing.com
Download PC Games Now @ OnePlay.com!
Most marketing people try to convince me that SMS marketing is dead, not done, to complicated, to many regulations. I don't agree.  
Where SMS Messaging is becoming pretty much the 1980's typewriter vs Commador 64, MMS offers exactly the same service only it is empowered by the Graphical User Interface on almost all mobile devices and increasing volumes of mobile user. This makes MMS perfect to market anything! It actually makes a marketeer's job easier! MMS enables you to add pictures and videos of products and services. 


A 2009 study on marketings techniques concluded that:
"Mobile text messaging, the same 160-character dispatches first popularized by nimble-fingered teenagers, may be the closest thing in the information-overloaded digital marketing world to a guaranteed read." 
Some simple stats prove the point:
1. 97% of all marketing messages are opened (email marketing dreams of that rate)
2. 83% of all marketing messages are opened within 60 minutes of receiving
3. 95% of opted into a text message opened and read within 3 minutes

I am no super marketeer, nor a wizz kid, but 95% is fantastic rate, if only 95% of my page hits would read my blog... I would be bathing in internet sunshine.



MMS is basically created the likes of Instagram and Pinterest, where would they be without graphics uploaded directly from mobile devices? 

When it comes to SMS and MMS marketing we all have experience with these dreaded messages making us think our phones are infected with "Mobile Herpes", but those are bad industry practices. In fact SMS/MMS Marketing is highly regulated (especially in the US). 
As long as you stay within the rules of the law MMS offers M-Commerce an unbelievable platform. 

Want to know more?  Go to this section of my blog to download it or get "The 2013 Guide to TXT messaging regulations & best practices" here by Mogreet 

Thanks for reading again, PLEASE LEAVE YOUR COMMENTS! I really like to hear what you have to say about it!

Monday, March 4, 2013

5 Basics Principles To Enter M-Commerce

If you have been reading my blog, you know of the fast learning curve I was and still am going through. From "E-Commerce Virgin" to M-Commerce Fan in 90 days. 
All jokes aside. I have now aquired my own webdomains, going through SEO, affiliate marketing (what a lot of garbage in that section), Analysis etc. 
Suddenly I realized that by doing so I almost overlooked my check-list of basics I put together a couple of weeks ago. 

Because you insist I'll share them with you


5 Basics to enter M-Commerce:

Saturday, March 2, 2013

StormFly: One to Watch or Not

In  a nutshell: StormFly is a super-fast storage device with an Open Source Operating System (bootable in most modern PC's and Macs and powered by our smart-boot technology) embedded in a cool wristband. Inserted into any computer and rebooted, the computer runs directly from the Operating System that is on StormFly, allowing you to take your Operating System and critical data with you wherever you go and use it in whatever PC or Mac is available.
The company recently launched a Kickstarter campaign hoping to raise $100,000 in crowd-funding to go from prototype to ship-worthy bracelet, and that goal was achieved.

You can watch the demonstration of the prototype here

What makes StormFly different from a USB stuck on a wristband? 
1. It is an encrypted storage device (USB 3.0) and operating system in one (PC/MAC)
2. It backs up automatically losing it would not be the end of the world
Even with the above stated it is not so much an innovative product, it will provide a unique feature to the mainstream public with it's encrypted, autobackup feature and it correctly targets the mainstream public.  
One other possible challenge it realized it has is the fact that StormFly is operating on a Linux Operating System. LOS will "take over" any MAC or PC hardware during the bootprocess. Technically whatever software a machine is running on. StormFly's challenge lays in the hardware, can it communicate with a wide range of different hardware (LAN, Graphic, Wifi, etc).
 Stormfly sets itself a target of usability of 90% of PC's and MAC's sold over the last three years and it recognizes the challenge to keep up with rapidly changing Software and Hardware developments
My opinion:
Stormfly is targeting a market of PC's and MAC's which is shrinking. Tablets sales are about to pass PC's and MAC's. Does StormFly expect to expand into those markets? If not, it could be a great add-on to Tablets and Smartphones, but unlike these devices Stormfly does not come with a screen..
All-in-All however much I like the buzz surrounding StormFly I am not sure it will be around for long. Given the rapid changing technology environment I have trouble seeing them in the future. 
Still great to see Kickstarter.com work its magic! 

10 Basic Security Steps for Smartphones and Tablets




My previous blog listed the 5 main Mobile security threats for 2013. In this blog I will provide you with 10 basic steps to assure your (new) smartphone or tablets meets the minimum security features. Some of these seem so simple and obvious, that I never paid attention them, makes sense right?! Some of the steps are human behaviour others relate to generic technical knowledge. 



1. Secure it: 
Many of us still don’t secure our devices, by not using a PIN or passcode. Simple, effective and at least it protects you from anyone who gets hold of it to access and use it. 

2. Create a Back Up:
Whether you lose your phone or it gets stolen we all know that it feels like you lost the most important thing in your life. It happened to me in Moscow. I had no backups and felt completely lost! Create a back up!

3. Note Your IMEI: 
IMEI is your unique 15-digit number that identifies your phone. You can find it beneath the battery or alongside a SIM card slot. The number provides Law Enforcement Agencies and sites like EBay.com a way to identify your phone (if it is put up for sale in an auction or brought into a Police station). The number will confirm your ownership! Note it down and store it somewhere safe too you!

4. Security software (Anti-Vius): 
We all know and most of us use Anti-Virus. Additionally such packages offer features like device tracking, remote lock and wipe, anti-phishing protection. Interested? CLICKHERE to go to the 2013 Top 10 Mobile Security Software review. Money well spend!! 

5. Tracking: 
Accurate to a number of metres, modern tracking software is included in the best mobile security offerings, but is also built in to certain mobile platforms. Windows Phone's 'Find My Phone' and iOS' 'Find My iPhone' options should always be activated on devices. It uses tracking software using the phone's built-in data connection. CLICK HERE for the TOP 10 TRACKING Mobile Software. Get Familiar with your phones' capabilities! 

6Verify Your Monthly Phone Bill: 
Make sure you verify your monthly statement, due to certain malware (read my previous blog) that will make use of your device. If you spot it any strange amounts on your statement immediately contact you service provider. It might take you a bit of time, but will save you money!

7. Smart Surfing: 
The most secure data connection you should use on a Mobile Device is provided by your Mobile Provider. Free WIFI-Hot Spots are pose an increased security risk, best is verify if the WIFI-Hotspot provides a secure channel. Be Aware but not affraid!

8. Be Aware of specific threats: 
Especially Andriod operated systems will be targeted in 2013 (as described in my previous blog, boy it gets boring), but if you own a mobile device operating on Windows or Apple's IOS the security risks are more or less the same as with an Android operated Mobile Device!!! Try to follow the latest developments for instance on twitter or via newsletters from your security or mobile provider!

9. Check BYOD Policies
If you use your device at work, over a company network, or for anything related to work, be sure to ask your IT department for any mobile use policies. It might be that your employer requires some control of the work data you have on your device, or may ask you to abide by certain practices. BYOD is basically a two-way relationship: it provides the employee and increased flexibility and mobility which benefits the employer. Verify how it impacts you as a user and how it impacts your employer or employees!

10. Treat your mobile device like you wallet, mind it carefully!
 Don't leave your device unattended whilst going to the bathroom or chatting to somebody at a conference! 

The 10 basic security steps for a new (or already operating) Mobile Device are shockingly easy, but how many of the above boxes can you tick as "Done"?

Link to this post: http://mcommerce-explorer.blogspot.com/2013/03/10-basic-security-steps-for-smartphones.html#links

Friday, March 1, 2013

Top 5 Mobile Security Threats 2013



Today I will expand further on Security threat for specifically mobile devices using Andriod's Operating System.

A quick refresher from my last blog where I discussed the most likely security threats for anybody using a mobile device (Smartphone or Tablet)
- Toll Fraud
- Ransomware
- Bring Your Own Devices (BYOD)
- "Drive-by Exploits"
- Mobile Payments via NFC

TOLL FRAUD:
(SMS Text)  Everybody with a mobile or smartphone receives txt message like "Text 3030 to get your daily weather forecast on your phone" you want it? You text back the number and you receive your daily weather forecast.
This is called PREMIUM SMS as in this figure >>>>>>






Toll Fraud occurs as displayed in the below graph. It is successfull and it happens to more and more users
1A customer downloads an app that sends out an SMS message to that same ringtone provider.
2. The ringtone provider sends the confirmation message, but instead of reaching the smartphone owner, the malware blocks and confirms the text message before the user ever knows.
3. The malware writers further jumps in between the wireless carrier and the ringtone provider, pretending to be an aggregator, and collects the money you just paid through your bill. 


Ransomware:

What is Ransomware? Ransomware traditionally would infect PC's (via a trojan) and demand a ransom to unlock.  For Hackers it is a proven business model on pc's and now has set its sights on Mobile Devices Users. 

Thursday, February 21, 2013

2013 Rising Mobile Security Threats


After my last blog I started to brainstorm about the level and what type of security risks M-Commerce and Social Commerce need to mitigate or assure. Given the rise of sales in Smartphones and Tablets and the immense volume of downloadable applications and increasing volume of apps being developed, (personal) data and the protection of it will be key for any business to succeed. 

In this blog I will provide a bit more background on the type of security issues M-Commerce & M-Users are exposed.
Furthermore I will try to provide some information on who are what creates those threats and what the key drivers are. To finalize a current overview of the business practices and which security gaps need to be closed fast.



Sunday, February 17, 2013

M-Commerce & Social Commerce: The New Frontier?





In my last blog I went into the Rise of M-Commerce and the huge potential it has. To support my believe, the below graphs support it and detail it!


Wednesday, February 13, 2013

The Rise of M-Commerce

Thank you for taking the time to read my blog! I really appreciate your interest and hope some of you will suggest a few things!
Since I started using Twitter (@Nessinuet) about a week ago I have discovered a new world, full of information and to be honest; too much to keep up with. It is turning out to be unexpected well of information!
After the Twitter week my focus is pretty much narrowing on the basics!

The first question I ask myself is the following:
What type of (niche) product will my business be offering? After I have determined that, the procurement side will have to developed, after that the below chart will serve as Blue Print



The rest of the blog, just warn you will be more of a statistical nature! Keep reading it won't be boring :)

TIME FOR SOME SOCIO-ECONOMICAL DATA!!!


It is estimated that by 2015 E-commerce will reach $1,5T in revenue globally (as graph below)

Wednesday, February 6, 2013

5 Criteria to Determine Which Free Website Template To Use.

MCommerce Explorer Blog
When I started this blog in January 2013 I really was and probably I am still a newby to E-Commerce and the Mobile Device & Platforms, having said so, a few months down the line and having digested about 6000 online blogs and articles and in addition publishing this little blog I think I can say that I get the basics. 
One of the first things I did two months ago was buy a domain name and use the offered template based website builder... That turned out to be a little bit of a drama as the templates were not meeting my needs, nor were they in anyway user friendly. Frustrated I contacted Customer Services, who oddly enough admitted the PageBuilder was indeed pretty useless and suggested alternatives (basically competitors) so I started trying various different online templates with different providers.  Some worked, some didn't, some partly. All-in-All I had the feeling I was running around like a headless chicken!
My best advice is not to do what I did: buy a domain and just take it as it comes, but to ask yourself 5 basic questions and really think what you want to do and achieve! That is all the advice I can give you. I just realised I sound just like my Grand Dad...

The below video (courtesy of Volusion) will walk you through those 5 steps!  Enjoy it!


Friday, February 1, 2013

The basics require more then just ideas!

It has been some time since my last post due to the fact that I have become a father, our daughter has priority over a blog that I like writing, as I am sure you can understand

Having said so in my last blog I referred to SEO which I have went into but have to read and try again before I can say or summarize anything useful about it.

Going over the ecommercefuel blog a couple of times, playing with Google Keyword & Google Analytics, reading various different articles and blogs I have learned a few things but more importantly it has made me think and guess what! I am going to share those thoughts.

I have become pretty much convinced that starting your own internet based business requires a bit more thinking, planning, execution and determination than your average in the street store. Why is that?

First of all you need to find a product that you are willing to sell that carries enough revenue potential and has a relatively high yield.
Secondly once you found your product you need to have a web domain which is uniquely registered to your business ensuring you do not use an already registered domain name. For this you will have to go via ICANN as this is (as far as I have been able to determine) and internationally recognized organization.

After the above you have to start generating traffic to your website, targeted marketing campaigns just to get noticed, you haven't sold anything just yet.
Once you got those basics started you will still need to be able to attract customers and increase your customer base. I think the way forward is to offer various products for specific target groups using various types of social media. That part is still under construction in my head. I did read an excellent article that provides a "behind the screens" view of ecommerce (in this case somebody trying to buy a webstore).

Last week I bumped into an old acquaintance who is a CEO for a SME production company, we started talking and touched on the subject I am currently investigating and trying to get my head around. His company is active in a dying market, revenue numbers are dropping (globally) for the last 10 years. He employs over 500 people and his main worry is that sooner or later he has to lay off parts of his staff.

We surfed to his website and to demonstrate my case I went to Google Keyword + Google PageRank and entered a few criteria. What we both discovered that we ended up in an internet arctic land. Very low statistics for his company and his competitors (A Brands globally known) both domestic and international. Basically nobody knows about it or nobody has an interest in it. Probably a bit of both.
That could be the niche I am looking for. Some of you will be saying: Leave it! It is dying! Probably true, but it doesn't mean you can't make money out it :) Remember the introduction of the quartz powered digital watches in the 80's? Back then everybody was convinced convention watches would be extinct in a few years...

After showing him an article arguing the "Next Big Thing" aka Social Commerce we suddenly found ourselves talking about strategy, targeted markets etc etc.
We agreed on the fact that niche + internet arctic land + SOE + marketing campaigns + social commerce could actually very well work for the products we have in mind. Remember the best products are prices between $100 - $ 200 with good margins. I will keep you posted on this one!

In the mean time my small little bulk purchases have arrived from China, so it is time to start testing the market again and see if I can make those products work for me

I will hopefully be able to blog a bit more frequently!


Thanks for taking the time to read me and please use the voting buttons!