Sucuri Webinar Transcript

Size: px
Start display at page:

Download "Sucuri Webinar Transcript"

Transcription

1 Sucuri Webinar Transcript STEPS TOWARD SECURING YOUR ONLINE STORE Victor Santoyo - Account Executive 1

2 Victor Santoyo Thank you, Val, as always. Well my name is Victor. As Val mentioned, I m an account executive for Sucuri. We re going to talk on a number of things today and one of the few takeaways that I m hoping everyone has an opportunity to absorb is first, the ability reduce your attack surface for your E-commerce site, best practices for protecting the cardholder data that you re likely taking in, as well as making sure that you have a proper disaster recovery plan set up for your website. Now in terms of who these types of topics are for, well, for the most part this webinar will be catering to self-hosted stores. So if you re deploying some type of content management system such as Magento or WooCommerce or WordPress as an example, you re going to probably take a lot of takeaways from this at every stage of webinar, but having said that, if you are also utilizing an online presence through other means like a closed platform for example, there are probably good practices as well that will be good for your entire organization as a whole. Now typically when we do these webinars, we always like to provide some insight into who we are before we talk about what we do. So one thing to note is if you ve seen a couple of our webinars before, I ve done some in the past so just to give you more additional insight into sort of my day-to-day life. My last webinar, I touched on the fact that I had brought in two new kittens. That s who they were back in April. To give you insight who they are now, they are there on the left hand side. For those cat lovers, that I m pleasantly surprised how big they re getting. Any insight that you have to share with me on that, by all means hit me on Twitter for that. Pulled pork sandwiches are an auto order for me at any restaurants. If you re a restaurateur, by all means hit me up as well. Would love to taste whatever you have. And this is my fifth Sucuri webinar. It took me by surprise when I got that nugget the other day. I think I m the first to hit five. Ideally, hopefully I m the first to hit ten, too. We ll see about that. So, why we re here. A lot of what we ve seen in terms of emphasis going into now the later part of 2018, it s more about addressing a lot of risk when it comes to your online presence, and in specific a lot of online stores that are collecting all kinds of data. With GDPR coming into place into the later part of May and June earlier this year, that became a higher priority of a topic, and I thought maybe addressing data and E-commerce as whole might be of benefit, and especially as we go into 2019 where 2

3 a lot of these attacks are targeting E-commerce shops are definitely growing in scale. Now, one of the first things you sort of have to do when it comes to evaluating what type of security measures one should take, is first analyzing and essentially reducing your attack surface. What does that mean? Well, it s essentially evaluating your exposure. What do you have? And how available is it? And what type of upkeep are you keeping with the kind of components and software you re using to run your online store? So, first things first, when you talk about any extensions or plugins that you re using, do you absolutely need it? I think sometimes we get a little bit click-happy in terms of going and seeing new features or new forms or integrations, and we start installing things left and right. But when it comes to basically owning up to the responsibility of making sure that all of our visitors and consumers and clients are safe when visiting our site, we have to be a bit more hard line in understanding, are we using what we absolutely need? Beyond that, we have to also understand what happens if a vulnerability is disclosed. So, what happens when something does happen with an open-sourced platform? Whether it s a Magento specific disclosure or a plugin against WordPress that s been recently found with some new tactic that s being exploited. What are we doing? What actions are we taking? Are we even aware? Do we have some type of insight into let s say, a feed or blog that provides that type of information? Note, we do provide some updates on our blog about important security disclosures. So just having this ability into that is going to be another thing upon understanding your attack surface as a whole and making sure you can help reduce that risk. The next thing to understand is of course what developers are doing in terms of prioritizing security measures. When we do understand what components we absolutely need, are we seeing that the developers are updating it frequently? Or are we installing something that hasn t been updated or touched in about eight months? So understanding of course the quality of the component or the extension or plugin that you re using is just as crucial, because we want to make sure that the people that essentially we re working with, you know, as we install new themes and plugins, we re depending on these authors to continue to upkeep the software so that our sites are running not only functionally, but safely. So making sure that they are keeping up-todate with at least recent updates and auditing their own code, seeing of course that 3

4 there are a lot of downloads to begin with meaning of course it s trusted among a large base. I d rather have the plugin that s downloaded 20,000 times versus the one that s only been downloaded 20 times. So, just a bit of a nugget there for you as well. And mentioning of course, do you have a plan when these updates are released? This sort of touches on the second question, what happens if vulnerability is disclosed? So you have insight into knowing, okay, great, there is a new security disclosure, and great, developer has pushed out a new update. Well, do we have a plan in place to either automate or delegate the task to someone internally to ensure that those updates are applied? And not just applied, but of course you also want to ensure those updates, when made, don t cause any disruption in the operation of the site, so you want to look after bugs or anything like that. So even from just a security standpoint, you also want to make sure the tools you re using are working properly. Now, those are some of the key aspects. So, sort of the notes I hit on with theories about making sure you re leveraging a lot of core functionality, you know, things that are made for WordPress or for Magento or anything like that, versus some weird third-party tool that s on some website that might have been torrented somewhere just because maybe you were trying to cut costs. If the third-party is an option make sure that whatever you do download, as I mentioned, has a reputable source, so, a lot of downloads, high ratings, recently updated, those are the kinds of things you want to look for. And as well, making sure you that the ones you do end up keeping and using on an ongoing basis continue to be reliable, secure and supported. Now, that s just of course maintaining visibility over that, but from a proactive standpoint, those measures aren t going to necessarily block threats or minimize risk or exposure. They help give you insight, doesn t necessarily help you from defending against those threats. So, what should one do when protecting your online store? Well, first things first of course is just establishing importance of having secure payments processed through your site. The last thing we want is our clients complaining that they think that their credit card information was stolen through our website. That gets into a lot of other things, so to ensure the integrity and the trust of your consumers, we want to sort of go through this checklist of things so that we know that we re doing our best and more importantly, if you ve probably caught on by now, is making sure that you re also compliant with all the regulations that are out there to make sure that data is safe. PCI DSS, GDPR. 4

5 So, I ll go through this list briefly, but a lot of it does seem common sense, but you would be surprised by how many times people neglect to answer one of these questions. First thing of course is what type of information are we collecting? So just understanding the inventory of the data that we re asking of people to enter into our website. Credit cards, passwords, names, addresses, ZIP codes. Anything that could identify someone personally are the type of information we need to know that we are collecting. Who has access to this information? And who should? Two different questions, right? Because we do have let s say, system admins should have access to this data, does not necessarily mean that the front clerk wouldn t just as easily be able to access that, when they realistically don t have any reason to. So, also understanding who has that access and establishing roles within your team as well is important. If someone does access the information, whether they were supposed to or not, are those events recorded? So that way if something happens you have some type of history that we can backtrack against, and then better understand what happened and when. Now, in terms of of course the active processing of payment, are ensuring that the data is protected in transit? Or in other words, are we using a valid SSL Certificate on the site. And one thing we want to make sure of is of course it s a valid certificate. Don t try to use self-signed certificates, browsers are likely not to trust them and of course you re not going to be entrusted with the green padlock there, which of course if it s not there and you re asking for payment or information, people are a bit more conscious these days and they ll -... information, people are a bit more conscious these days in knowing, well, Padlock s not there. It s asking for info. I don t know if I should really submit this info here. Are you monitoring that data probably, so knowing exactly where the data is, how long are you storing it for. These are just some of the questions. At what level does your business fall with specific to PCI Compliance. Are you level one, a level two provider? What specific things you have to do to ensure you maintain that compliance. That s a different conversation but just something to make sure that you have some insight into. And are any change at the site being logged as well? Now, this isn t data specific but any change at the site, i.e. to the files, database, your 5

6 DNS, anything that is a missed step along that workflow could potentially result in a data breach which is why it s important to know. So if there are change to the site that allow of open access, let s say global write access to all of your files, that s a pretty risky proposition. And then knowing when those changes were made and allows to revert back to either a backup of some sort, so it gives us time to fix the problem. Now, this is important because part of those requirements within and more specific to PCI is understanding the intent of the what, the who, where, and when of people accessing your data resources. It s really important. We re sharing a lot of information these days online. It s really easy for us to save our info through our mobile browser and it auto-fills and boom, it take a half a second process. Think about that we re sending information on the web. So it s really important that also we maintain a really good understanding of all access points when it comes to data. Now, what data are we talking about in specific? I mentioned what data are we... as a business are you taking care of but what data are you responsible for, period? Well, it does depend on what regulations you re expecting to follow. Now, this is a topic I approached via webinar and blog before. But under GDPR, the one thing to know is that personal data essentially means any bit of information that can identify me. So whether that s my location, whether that is my sex, whether that is my address, phone number, anything that can identify me is something that has a... as a business, I need to make sure that I m properly securing that data. Now, under PCI, a bit more specific. We re talking about cardholder data, so your account number and your expiration date, and the code on the back of your card, things of that nature. So that s a bit more specific in scope. But GDPR is a bit more broad. So if you are running a business and you do feel like you have to fall within GDPR guidelines, then let s be sure that you are making sure... that you are knowing what type of data is being accessed or submitted all across your online presence. How do we protect that cardholder data or payment data in general? Well, a couple ways to go about that. And again, I ll go briefly into sort of the things that you need to do. But I mentioned this just now, PCI is bit more specific in scope because it s just one piece of information that I have as an individual. But if the information that I have in terms of my account number is breached meaning I have a PCI breach, that does automatically mean I m in breach on your GDPR. And if you re aware about GDPR 6

7 breaches and those consequences, you know the fines are heavy. And so you don t want to be at risk of bottoming out the business just because you didn t properly essentially dot the I s and cross your T s. Here s a couple of guidelines in terms of protecting cardholder data. It s quite a bit so that s why it s a good thing we always like to share these presentations so you can sort of store it and read it through later. But I ll go through some of the key ones so you have a better understanding of what the intent here and what we re looking to accomplish. The second one I think is the one that s really important one I try to hammer home all the time which is providing access to the data only to those intended to access it. So it s something I touched on earlier, right? Sysadmins or data protection officers may have access to certain parts of the data that they need. Front clerks, marketing managers may not and so we want to make sure that the access to that data is only issued to those who absolutely need it. Talking to this again on monitoring your access to those systems and to the data itself, right? Who accesses what, when, and where? Making sure that you have permission changes audited and then so that if you can identify unauthorized personnel that made those changes, whether it s malicious in intent or accidental. Depending on how large the organization is, making sure you have a workflow that then alerts to a designated data protection officer. This is a new role this year that people are generating in response to a lot of the new security measures taken in terms of protecting data. So whether it is a DPO or another sysadmin or administrator of some type so that they are alerted in the event that there is a potential problem. Anything that does seem suspicious, they should know about. Wherever it is that you re keeping your data, should absolutely remain encrypted, okay. Meaning it shouldn t be readable to anyone that just goes and grabs it. Encryption is going to be a big key and encryption is one of the things you have to hit in terms of making sure you are compliant with both sets of regulations, right? From here, we also want to touch on in the event that something goes wrong. Now, I know. We re here, we think your business won t get touched. You re small, who would want to hurt you? Ultimately, those types of factors don t play in the security landscape now because a website that may have just gone deployed and gone live yesterday 7

8 may get hacked today. Just as likely as a site that s been on for 20 years and never seen a problem and all of a sudden, boom, they get hacked. So who you are, how big you are, are not going to be things that you should weigh in terms of whether or not you should prepare for the worst. Very likely, you re going to face an incident at some point no matter how big or small you are. So what should we do? What type of plan do we come up with in the event that the worst occurs? It s not about if, it s more about when. This is a pinwheel that I sort of modified by looking online, that I really gravitated toward because I think it really does sort of simplify it for you as either the business owner or the webmaster in terms of making sure you do have the proper procedures in place to respond in the events of an incident. So first things first, response. The site s hacked, you re concerned about a breach. You have to make sure then in that case you re responding. What does that mean? Well, if you re hacked, that means you got to get it cleaned up. So whether that is you ve already generated steps to have someone internally taking care of the hack or whether you don t have a team or personnel for that, then you reach an outside vendor. You have their number, you have someone in contact that you reach out to and say, Hey, my site s been hacked. I need help. The sooner, of course, you can... the sooner you have a plan like this in place, the less time goes by when you need to discover this person in the event that you do need to lean on a third-party vendor. So responding to and making sure you get the immediate issue cleaned up and then making whatever analysis or audits are necessary to sort of making sure you get the information you need to know what happened. Recovery. Recovery here sort of is a byproduct of your response. But recovery as well means making sure that you are getting up and making clear transparency available to your base about an issue. If you re trying to comply with GDPR, you should know that you have to alert to a potential breach within 72 hours of notice. So making sure that part of that recovery process is brand recovery as well so being forthright and quick will pay a lot of dividends versus disguising a breach and uncovering that six months later. So you hear a lot of that in the news lately. Recovery as well, that could be understanding that you do have a response plan in place. Suppose the [inaudible 00:20:33] was clean but then it corrupted a lot of the 8

9 core files or custom modifications you made beyond repair. If you have a backup in place, then you can recover the files and database that way as well. Review. Review is a bit more post instance and making sure that we understand okay, what happened, what files are modified. Were all the proper touchpoints in place in terms of access? Whom had it? I touched on the idea of a plugin that may all of a sudden have incidentally generated global write access meaning anybody can just make modifications where they see fit, understanding where the issues lie or essentially where the improvements need to be are really important. Then the last step, of course, as part of that is mitigation. So okay, we understand what happened. We understand what we need to improve. So are these tasks that we handle internally? Do we need to reach out to someone else? Did we identify that we had really bad data visibility so there re a lot of companies out there that do a lot in terms of data analysis and auditing to alert you to issues? So these are the types of steps in place that you have. And it s a pinwheel because remember, this isn t a static state of things. These things are always changing. All the improvements you made yesterday in response and then pushing those improvements through won t necessarily mean that you won t get hacked again. And so when you do get hacked again, you continue this process all over again. You respond, you recover, review, and mitigate. So it s simple in nature and the more you sort of put this to practice across your team, it s going to be really easy for you to identify deficiencies even on a day to day basis. So I want to leave before I wrap up on this particular note. After a crisis, and this was something a director from North Bridge Financial wrote. After a crisis, one in four business will never reopen. And that s a pretty high percentage, right? 25% of business do not reopen. So having a proper business continuity and having a disaster plan in place can help small business avoid fate. It ultimately begins with asking yourself if I were to experience a loss tomorrow, what would I do. And you don t want to get caught answering that question with I don t know or I m not sure. That s really the principle behind having this disaster recovery plan. Because if at worst you do face a crisis or incident, you do know what to do. You know exactly who to talk to and who to reach out to and get it done. So just to sort of to hit it in more plain text, know whom to contact to remediate 9

10 immediately if you do face a compromise, recover by, of course, informing your customers in a timely fashion. If, of course, you have to be sure to do so, of course, that will pay a lot of dividend in your brand and customers feel like, okay, well, they re very forthcoming and that was a quick response out of them knowing how quickly I got that response out. Execute backups if need be. Review your existing strategy to identify improvements. And, of course, make those changes once you do identify them to continue to minimize your risk and minimize your exposure. Notice our word minimize, you re not eliminating it. Risk will never be zero in this space and the best you can do is always just have a plan in place that ensure that we re doing all we can to get that as close to zero as possible. Okay. So there s a lot more detail in which how to properly transcribe a disaster recovery plan with specific questions you ll be asked internally As a recovery plan with specific questions gonna be asked internally. I actually will be putting out a blog post soon in the coming weeks about exactly what you can do to provide a very thorough disaster recovery plan across the team so everyone s on the same page. And you can find that blog post on this link here, Of course if you do end up choosing to use us as a service to help facilitate these needs in terms of being proactive, and having the ability over your site, one thing we do want to make sure that we re clear about, of course is that we re also committed to the protection of your data as well. So when GDPR came into effect, something to make known of course is that we were compliant for those that don t know. We made several upgrades to our products, our workflows to make sure that, well, you know, we supported the proper data practices internally, and if you do need a data processing addendum to keep on record, just us at GDPR@sucuri.net as well for any questions or concerns you may have. 10

11 Have questions or need help? Contact Us English sucuri.net Spanish sucuri.net/es Portuguese sucuri.net/pt SucuriSecurity SucuriSeguridad SucuriSeguranca

PAGE 1 THE PERFECT WORDPRESS DEVELOPMENT WORKFLOW

PAGE 1 THE PERFECT WORDPRESS DEVELOPMENT WORKFLOW PAGE 1 THE PERFECT WORDPRESS DEVELOPMENT WORKFLOW There are a lot of steps in the development process, so to help you jump exactly where you need to be, here are the different topics we ll cover in this

More information

Set Up Your Domain Here

Set Up Your Domain Here Roofing Business BLUEPRINT WordPress Plugin Installation & Video Walkthrough Version 1.0 Set Up Your Domain Here VIDEO 1 Introduction & Hosting Signup / Setup https://s3.amazonaws.com/rbbtraining/vid1/index.html

More information

LinkedIn Social Selling Linkedin Session 2 -Managing Your Settings Tagging And Groups

LinkedIn Social Selling Linkedin Session 2 -Managing Your Settings Tagging And Groups TRANSCRIPT Linkedin -Managing Your Settings Tagging And Groups Instructor: Brynne Tillman Copyright 2016 Social Media Marketing University MANAGING YOUR SETTINGS, TAGGING & GROUPS Welcome back to LinkedIn

More information

Traffic Conversion Secrets

Traffic Conversion Secrets Traffic Conversion Secrets How To Turn Your Visitors Into Subscribers And Customers For our latest special offers, free gifts and much more, Click here to visit us now You are granted full Master Distribution

More information

CLICK HERE TO SUBSCRIBE

CLICK HERE TO SUBSCRIBE Mike Morrison: What's up, everybody? Welcome to Episode 120 of The Membership Guys Podcast. I'm your host Mike Morrison, one half of the Membership Guys, and on today's show we're talking about five things

More information

Show notes at: engineeringcareercoach.com/mentoring

Show notes at: engineeringcareercoach.com/mentoring The ENGINEERING CAREER COACH PODCAST SESSION #45 TECC 45 The Engineering Career Coach Podcast How to Find or Become a Mentor in Your Engineering Career EYOS Part 3 of 7 Show notes at: engineeringcareercoach.com/mentoring

More information

Persuasive. How to Write Persuasive. SEO Proposals

Persuasive. How to Write Persuasive. SEO Proposals Persuasive SEO Proposals How to Write Persuasive SEO Proposals How to Write Persuasive SEO Proposals! You may love SEO, but you didn t get into it because you love writing and submitting proposals. You

More information

lead generation strategies for your real estate business

lead generation strategies for your real estate business 8 lead generation strategies for your real estate business www.pipelineroi.com 1-866-300-1550 8 LEAD GENERATION STRATEGIES for your real estate business Lead generation is simultaneously perhaps one of

More information

My Earnings from PeoplePerHour:

My Earnings from PeoplePerHour: Hey students and everyone reading this post, since most of the readers of this blog are students, that s why I may call students throughout this post. Hope you re doing well with your educational activities,

More information

English as a Second Language Podcast ESL Podcast 200 Meeting a Deadline

English as a Second Language Podcast  ESL Podcast 200 Meeting a Deadline GLOSSARY You wanted to see me? short for Did you want to see me? ; I m here as you wanted or requested * You wanted to see me? I ve been out to lunch for the past hour. to pull out (all) the stops to give

More information

Step 2, Lesson 2 The List Builders Lab Three Core Lead Magnet Strategies

Step 2, Lesson 2 The List Builders Lab Three Core Lead Magnet Strategies Step 2, Lesson 2 The List Builders Lab Three Core Lead Magnet Strategies Hey there, welcome back to one of my very favorite lessons. We are going to dive in to the Three Core Lead Magnet Strategies. I

More information

Understanding Objection Language

Understanding Objection Language Understanding Objection Language (What is the customer really saying is what matters because this is what objections really come down to.) 1. First of all, understand that 70% of in person sales come from

More information

ndash Customer Success Guide

ndash Customer Success Guide ndash Customer Success Guide Introduction (Page 3) Basic Setup (Page 3) o Completing Profile (info and payment) Groups o Adding your team members o Setting preferences Getting Started (Page 8) o Building

More information

SAMPLE SCRIPTS FOR INVITING

SAMPLE SCRIPTS FOR INVITING SAMPLE SCRIPTS FOR INVITING If you feel at a loss for words when you send an invite, or you want a simple go-to script ready so you don t miss out on an inviting opportunity, then review this script tool

More information

All Ears English Episode 190:

All Ears English Episode 190: All Ears English Episode 190: The 24-hour Challenge That Will Make Your English Awesome This is an All Ears English Podcast, Episode 190: The 24-hour Challenge That Will Make Your English Awesome. Welcome

More information

BUILDING A KILLER TRANSLATOR WEBSITE

BUILDING A KILLER TRANSLATOR WEBSITE BUILDING A KILLER TRANSLATOR WEBSITE YOUR STEP-BY-STEP GUIDE TO AWESOMENESS OK, so you want to be a translator. Or maybe you ve been working for a while and you re looking to up your game a little. You

More information

10 Questions to Ask When Hiring Your Marketing Communications Writer

10 Questions to Ask When Hiring Your Marketing Communications Writer 10 Questions to Ask When Hiring Your Marketing Communications Writer You ve got the writer on the phone. Now, what do you ask him? An e-book by John White ventaja Marketing Share this e-book 2010-2012

More information

Episode 6: Can You Give Away Too Much Free Content? Subscribe to the podcast here.

Episode 6: Can You Give Away Too Much Free Content? Subscribe to the podcast here. Episode 6: Can You Give Away Too Much Free Content? Subscribe to the podcast here. Hey everybody! Welcome to episode number 6 of my podcast. Today I m going to be talking about using the free strategy

More information

How to Turn Your WordPress Sidebar from Boring to Soaring Transcript

How to Turn Your WordPress Sidebar from Boring to Soaring Transcript How to Turn Your WordPress Sidebar from Boring to Soaring Transcript This is a transcript of the video webinar, edited slightly for easy reading! You can find the video recording at www.writershuddle.com/seminars/webinar-march2012

More information

HOW TO DESIGN & DELIVER YOUR NEWSLETTER

HOW TO DESIGN & DELIVER YOUR NEWSLETTER HOW TO DESIGN & DELIVER YOUR NEWSLETTER Transcript Welcome back. It s so nice to be here together and I m excited for this video because it s gonna be fun. We re gonna talk about how to design and deliver

More information

How to Electronically Spy

How to Electronically Spy How to Electronically Spy on Your Cheating Lover by Gregory Smith How to Electronically Spy on Your Cheating Lover, 3 rd Edition Copyright 2016 by Gregory Smith, www.been-cheated-on.com. All Rights Reserved.

More information

AFFILIATE ROCKET YOUR QUICK-START GUIDE TO AFFILIATE MARKETING

AFFILIATE ROCKET YOUR QUICK-START GUIDE TO AFFILIATE MARKETING AFFILIATE ROCKET YOUR QUICK-START GUIDE TO AFFILIATE MARKETING What You Need to Know I m not going to waste your time by filling page after page with theorybased strategies, or talk endlessly about the

More information

Module 5: How To Explain Your Coaching

Module 5: How To Explain Your Coaching Module 5: How To Explain Your Coaching This is where you explain your coaching, consulting, healing or whatever it is that you re going to do to help them. You want to explain it in a way that makes sense,

More information

Module 6: Coaching Them On The Decision Part 1

Module 6: Coaching Them On The Decision Part 1 Module 6: Coaching Them On The Decision Part 1 We ve covered building rapport, eliciting their desires, uncovering their challenges, explaining coaching, and now is where you get to coach them on their

More information

Terms and conditions APPROVED DOCUMENT. Clear design Simple language

Terms and conditions APPROVED DOCUMENT. Clear design Simple language Terms and conditions APPROVED DOCUMENT Clear design Simple language Terms and conditions 1. Welcome to Marcus by Goldman Sachs 2 2. How to contact us 2 3. How your Marcus account works 3 4. When we might

More information

EASY WEBSITE FOR MAKERS & UPCYCLERS

EASY WEBSITE FOR MAKERS & UPCYCLERS Providing Inspiration, Skills and Community for the modern creative. EASY WEBSITE FOR MAKERS & UPCYCLERS by Inma Goodhew on December, 16 EASY WEBSITE FOR MAKERS & UPCYCLERS 1 WHY YOU NEED A WEBSITE 3 WHO

More information

Hum, Michael, Michelle and Jeff, you can guess? I ll just guess anything, five I guess. One through infinity.

Hum, Michael, Michelle and Jeff, you can guess? I ll just guess anything, five I guess. One through infinity. Researcher: Robert B. Page: 1 of 7 s s is like [inaudible] I want to talk to the people, I want everyone to be quiet for a second and I want to talk just to the people who are sure, absolutely sure they

More information

Persuasive. Software Development. Proposals. How to Write Persuasive. Proposals

Persuasive. Software Development. Proposals. How to Write Persuasive. Proposals Persuasive Software Development Proposals How to Write Persuasive Software Development Proposals How to Write Persuasive Development Proposals You probably didn t get into software development because

More information

Session 12. MAKING DECISIONS Giving informed consent

Session 12. MAKING DECISIONS Giving informed consent Session 12 MAKING DECISIONS Giving informed consent WHOSE FUTURE GOAL 7: You will learn how to give informed consent. language right before you have to sign. I ll give you an example. In past lessons you

More information

How to get more quality clients to your law firm

How to get more quality clients to your law firm How to get more quality clients to your law firm Colin Ritchie, Business Coach for Law Firms Tory Ishigaki: Hi and welcome to the InfoTrack Podcast, I m your host Tory Ishigaki and today I m sitting down

More information

VIDEO 1: WHY SHOULD YOU USE THE MEETINGS TOOL?

VIDEO 1: WHY SHOULD YOU USE THE MEETINGS TOOL? HUBSPOT SALES SOFTWARE TRAINING CLASS TRANSCRIPT Meetings VIDEO 1: WHY SHOULD YOU USE THE MEETINGS TOOL? Hey, it s Kyle from HubSpot Academy. Let s talk about HubSpot Sales Meetings. Why should you use

More information

4 Don ts of Medical Practice Marketing

4 Don ts of Medical Practice Marketing Transcript Details This is a transcript of an educational program accessible on the ReachMD network. Details about the program and additional media formats for the program are accessible by visiting: https://reachmd.com/programs/optimize-business-finances-outreach/4-donts-medical-practicemarketing/10022/

More information

Twitter Secrets 7 Secrets To Mass Twitter Traffic Page 1

Twitter Secrets 7 Secrets To Mass Twitter Traffic Page 1 By Dave And Aaron www.mymarketinggoldmine.com Twitter Secrets 7 Secrets To Mass Twitter Traffic Page 1 Listen, We're Sick To Death of Seeing Money Hungry Border Line Criminals Who Want to Get Their Sticky

More information

Guaranteed Response Marketing, LLC All Rights Reserved

Guaranteed Response Marketing, LLC All Rights Reserved Guaranteed Response Marketing, LLC All Rights Reserved This is NOT a free Ebook and does NOT come with resell rights! If you purchased or received this from anyone other than directly from Jim Edwards

More information

by Christina Hills V24

by Christina Hills V24 V24 by Christina Hills The Essential Pages of a Successful Website You want to take control of your business. That's why you downloaded this PDF. Maybe you are getting started building your business and

More information

Use Your Business to Grow Your Income

Use Your Business to Grow Your Income Leigh Kirk & Megan Proctor Good morning to the future of PartyLite! YOU! You are going to take our company and your business to the next level when you leave LITE14! You will be the one to inspire and

More information

Term Definition Introduced in:

Term Definition Introduced in: 60 Minutes of Access Secrets Key Terms Term Definition Introduced in: Calculated Field A field that displays the results of a calculation. Introduced in Access 2010, this field allows you to make calculations

More information

The Theory of Constraints

The Theory of Constraints The Theory of Constraints Hello, this is Yaro Starak and welcome to a brand new mindset audio, today talking about the theory of constraints. I want to invite you to go and listen to the original Master

More information

Suggest holding off until next time you visit, so you can ask your parents first.

Suggest holding off until next time you visit, so you can ask your parents first. Quiz This Safer Internet Day the UK Safer Internet entre is focussing on how consent works in an online context. It will explore how young people ask for, give and receive consent online. This could be

More information

You re in! Welcome to the Power of Pinning the most efficient and effective way to put the power of Pinterest to work for your business.

You re in! Welcome to the Power of Pinning the most efficient and effective way to put the power of Pinterest to work for your business. P.O.P. Welcome Email Subject line: [POP] Congratulations & Welcome to the Program! Dear [FIRST NAME], You re in! Welcome to the Power of Pinning the most efficient and effective way to put the power of

More information

Class 3 - Getting Quality Clients

Class 3 - Getting Quality Clients Class 3 - Getting Quality Clients Hi! Welcome to Class Number Three of Bookkeeper Business Launch! I want to thank you for being here. I want to thank you for your comments and your questions for the first

More information

3 things you should be doing with your survey results. Get the most out of your survey data.

3 things you should be doing with your survey results. Get the most out of your survey data. 3 things you should be doing with your survey results Get the most out of your survey data. Your survey is done. Now what? Congratulations you finished running your survey! You ve analyzed all your data,

More information

I think I ve mentioned before that I don t dream,

I think I ve mentioned before that I don t dream, 147 Chapter 15 ANGELS AND DREAMS Dream experts tell us that everyone dreams. However, not everyone remembers their dreams. Why is that? And what about psychic experiences? Supposedly we re all capable

More information

How Minimalism Brought Me Freedom and Joy

How Minimalism Brought Me Freedom and Joy How Minimalism Brought Me Freedom and Joy I have one bag of clothes, one backpack with a computer, ipad, and phone. I have zero other possessions. Today I have no address. At this exact moment I am sitting

More information

Webinar Module Eight: Companion Guide Putting Referrals Into Action

Webinar Module Eight: Companion Guide Putting Referrals Into Action Webinar Putting Referrals Into Action Welcome back to No More Cold Calling OnDemand TM. Thank you for investing in yourself and building a referral business. This is the companion guide to Module #8. Take

More information

Module 5, Lesson 1 Webinars That Convert Automated Planning Phase: The Automated Webinar Funnel

Module 5, Lesson 1 Webinars That Convert Automated Planning Phase: The Automated Webinar Funnel Module 5, Lesson 1 Webinars That Convert Automated Planning Phase: The Automated Webinar Funnel Oh my goodness, get up and do a little happy dance right now because you have made it to Module 5, The Automated

More information

LOW CONTENT PUBLISHING MODULE # P age

LOW CONTENT PUBLISHING MODULE # P age LOW CONTENT PUBLISHING MODULE #10 1 P age Maximizing Exposure & Building Your Customer Base There are countless tools available to self-published authors that will help them maximize exposure, build their

More information

No Cost Online Marketing

No Cost Online Marketing No Cost Online Marketing No matter what type of Internet business you have, you need to be promoting it at all times. If you don t make the effort to tell the right people about it (i.e. those people who

More information

How To Pitch For New Clients (And Actually Get Responses)

How To Pitch For New Clients (And Actually Get Responses) 1 How To Pitch For New Clients (And Actually Get Responses) You ve probably read a lot about pitching, right? Hell, just a quick search of How To Pitch For SEO Clients brings up 373,000 different search

More information

CLICK HERE TO SUBSCRIBE

CLICK HERE TO SUBSCRIBE Mike Morrison: Welcome to episode 68 of the Membership Guys podcast with me, your host, Mike Morrison, one half of the Membership Guys. If you are planning on running a membership web site, this is the

More information

Converting Prospects on LinkedIn with Melonie Dodaro. Summary Handout

Converting Prospects on LinkedIn with Melonie Dodaro. Summary Handout Introduction Converting Prospects on LinkedIn with Melonie Dodaro Summary Handout LinkedIn is a powerful lead generation tool when used properly. In a study of more than 5,000 businesses, HubSpot found

More information

TRANSCRIPT CREATE YOUR WEBSITE

TRANSCRIPT CREATE YOUR WEBSITE TRANSCRIPT CREATE YOUR WEBSITE Business Express Create Your Website 1 How to Create A Website This module looks at fast easy ways to get your coaching website up and running as soon as possible. Your website

More information

Google SEO Optimization

Google SEO Optimization Google SEO Optimization Think about how you find information when you need it. Do you break out the yellow pages? Ask a friend? Wait for a news broadcast when you want to know the latest details of a breaking

More information

Tips, Tricks, and Pitfalls When Getting Started Outsourcing to the Philippines

Tips, Tricks, and Pitfalls When Getting Started Outsourcing to the Philippines Tips, Tricks, and Pitfalls When Getting Started Outsourcing to the Philippines Short Introduction Over the past year I ve seen a lot of people do their first outsourcing to the Philippines. I ve seen a

More information

PART 2 RESEARCH. supersimpl.com Start Here Workbook 40

PART 2 RESEARCH. supersimpl.com Start Here Workbook 40 PART 2 RESEARCH supersimpl.com Start Here Workbook 40 Research Welcome to the Research Phase! It s time to determine if your idea is going to work BEFORE you spend any money on a logo, website, business

More information

Do You Want To Know Why You Struggle With Your Health And Your Relationship With Food?

Do You Want To Know Why You Struggle With Your Health And Your Relationship With Food? Do You Want To Know Why You Struggle With Your Health And Your Relationship With Food? I was thinking the other day about the clients that I see and it really struck me. There are four things that they

More information

Alexander Patterson Interview Transcript

Alexander Patterson Interview Transcript Alexander Patterson Interview Transcript INTERVIEWER: Could you please state your name and affiliation with the Railway Mail Service? Alexander Patterson: Well, Alexander Patterson Jr., and I was with

More information

Free Home Valuation Report Lead Follow Up Tips & Phone Scripts and appointment eneral lead follow up conversion tips

Free Home Valuation Report Lead Follow Up Tips & Phone Scripts and appointment eneral lead follow up conversion tips G Free Home Valuation Report Lead Follow Up Tips & Phone Scripts and appointment eneral lead follow up conversion tips Prioritize your leads for the most efficient use of time The phone scripts included

More information

10 Kinds Of Blog Posts You Can Create In Just 10 Minutes

10 Kinds Of Blog Posts You Can Create In Just 10 Minutes 10 Kinds Of Blog Posts You Can Create In Just 10 Minutes Brought to you by Copyright Copyright EverythingRebrandable.com All rights are reserved. No part of this report may be reproduced or transmitted

More information

On the GED essay, you ll need to write a short essay, about four

On the GED essay, you ll need to write a short essay, about four Write Smart 373 What Is the GED Essay Like? On the GED essay, you ll need to write a short essay, about four or five paragraphs long. The GED essay gives you a prompt that asks you to talk about your beliefs

More information

Module 2, Lesson 3 Webinars That Convert The Pre-Webinar Phase Five Free Strategies To Boost Webinar Registration

Module 2, Lesson 3 Webinars That Convert The Pre-Webinar Phase Five Free Strategies To Boost Webinar Registration Module 2, Lesson 3 Webinars That Convert The Pre-Webinar Phase Five Free Strategies To Boost Webinar Registration Well hey good looking, welcome back to Module 2, the Pre-Webinar Phase. In this lesson

More information

Legal Disclaimers & Copyright Information

Legal Disclaimers & Copyright Information Legal Disclaimers & Copyright Information All contents copyright 2015 by GetStarted.Net. All rights reserved. No part of this document or accompanying files may be reproduced or transmitted in any form,

More information

1

1 http://www.songwriting-secrets.net/letter.html 1 Praise for How To Write Your Best Album In One Month Or Less I wrote and recorded my first album of 8 songs in about six weeks. Keep in mind I'm including

More information

for Your Indoctrination Series

for Your Indoctrination Series for Your Indoctrination Series A simple indoctrination series contains: A welcome email 2-3 bonding emails Optional survey Optional low-pressure offer In this guide, I share templates that you can use

More information

What s Your Performance Like Today? JasonWomack

What s Your Performance Like Today? JasonWomack Jason Womack: Hi, there. My name is Jason Womack, and I want to talk to you for a couple of minutes about something very serious. You know productivity, performance, time management; these kinds of things

More information

How to choose a marketing agency

How to choose a marketing agency Marketing for Technology Businesses How to choose a marketing agency The IT Marketing Agency Guide STRATEGY DESIGN EVENTS CONTENT SOCIAL The reason we ve entitled this guide How to choose a marketing agency

More information

WHAT TO DO IF YOUR NICHE DOESN T STACK UP?

WHAT TO DO IF YOUR NICHE DOESN T STACK UP? WHAT TO DO IF YOUR NICHE DOESN T STACK UP? Yesterday, Ed went through some principles to help you decide whether your niche stacks up from the perspective of traffic and conversion to sales. Today, you

More information

Authority Site Build (Video 1)

Authority Site Build (Video 1) Authority Site Build (Video 1) Okay, let s get started. So what you re looking at here is WooDesigner.net and you can actually pull that up in your browser if you want to actually take a look at this website.

More information

Computer Consultant Questionnaire

Computer Consultant Questionnaire Please respond to these questions to assist me in deciding if you will be our next computer consultant. Thank you, Mary Jones Small Biz, Inc. Response from Rescue Marketing Q1: How is your company different

More information

BOOKED JOSH TURNER SUMMARY BY PAUL CLEGG

BOOKED JOSH TURNER SUMMARY BY PAUL CLEGG BOOKED JOSH TURNER SUMMARY BY PAUL CLEGG REVIEW Summary Notes by Paul Clegg The premise of Josh Turner s book, Booked, is simple. That we need to focus on what it takes to grow our business and that we

More information

Lesson 2: What is the Mary Kay Way?

Lesson 2: What is the Mary Kay Way? Lesson 2: What is the Mary Kay Way? This lesson focuses on the Mary Kay way of doing business, specifically: The way Mary Kay, the woman, might have worked her business today if she were an Independent

More information

It Can Wait By Megan Lebowitz. Scene One. (The scene opens with Diana sitting on a chair at the table, texting. There are four chairs at the table.

It Can Wait By Megan Lebowitz. Scene One. (The scene opens with Diana sitting on a chair at the table, texting. There are four chairs at the table. It Can Wait By Megan Lebowitz Scene One (The scene opens with Diana sitting on a chair at the table, texting. There are four chairs at the table.) (Mrs. Jones enters) Mrs. Jones: Diana, please get off

More information

PERISCOPE 5 DAY CHALLENGE. by Zach Spuckler

PERISCOPE 5 DAY CHALLENGE. by Zach Spuckler PERISCOPE 5 DAY CHALLENGE by Zach Spuckler PERISCOPE CHALLENGE DAY 1 WRITING YOUR LISTENER TO LEADS SCRIPT The biggest challenge I see when it comes to generating leads with Periscope is that people are

More information

Make Money Online Today With Affiliate Marketing How To Get Started Right Now

Make Money Online Today With Affiliate Marketing How To Get Started Right Now Page 1 Make Money Online Today With Affiliate Marketing How To Get Started Right Now These Are A Sample Of The Notes You Will Get In Our MarcusMentor.me Coaching program Learn More At MarcusMentor.me NOTE:

More information

Assembly Script. Give children 30 seconds to talk to the person next to them. Take a couple of examples.

Assembly Script. Give children 30 seconds to talk to the person next to them. Take a couple of examples. Target audience 7-11 year olds Slide 1 Today we are celebrating Safer Internet Day, with the theme Be the change: Unite for a better internet. When I change the screen you will see lots of logos, apps

More information

Conversation with Rebecca Rhodes

Conversation with Rebecca Rhodes Conversation with Rebecca Rhodes Hey there everybody, it s Cory with The Abundant Artist. Today I am here with Rebecca Rhodes from Pennsylvania in the US. Rebecca is a watercolor painter and teacher who

More information

Lesson 12: How to Handle Common Client Objections

Lesson 12: How to Handle Common Client Objections Lesson 12: How to Handle Common Client Objections [Aaron] Hello, everyone, and welcome to today s webinar, Don t Take No for an Answer How to Handle Common Client Objections. I m Aaron Joslow, host of

More information

WORDPRESS FOR ABSOLUTE BEGINNERS. By Kyle M. Brown

WORDPRESS FOR ABSOLUTE BEGINNERS. By Kyle M. Brown WORDPRESS FOR ABSOLUTE BEGINNERS By By Kyle M. Brown WORDPRESS FOR ABSOLUTE BEGINNERS Copyright 2014 by Kyle M. Brown www.kylembrown.com Editor, Loretta Parker-Brown www.potpourri101.com All rights reserved.

More information

Using Google Analytics to Make Better Decisions

Using Google Analytics to Make Better Decisions Using Google Analytics to Make Better Decisions This transcript was lightly edited for clarity. Hello everybody, I'm back at ACPLS 20 17, and now I'm talking with Jon Meck from LunaMetrics. Jon, welcome

More information

1. Get a website focused on conversion.

1. Get a website focused on conversion. Marketing is a crucial focus for any business to survive and flourish, especially in this day and age. As technology becomes more sophisticated, consumers are served more marketing and advertising than

More information

Goals are reached by making good choices. Bad choices make it harder to reach your goals.

Goals are reached by making good choices. Bad choices make it harder to reach your goals. DON T METH WITH US SCRIPT I am and I am with the San Juan Rotary Club. Does anyone know what Rotary is? Rotary is people who form a club and they are leaders in the community and they are business owners

More information

Free Templates. 10 s You Need To Close A Sale

Free Templates. 10  s You Need To Close A Sale Free Templates 10 Emails You Need Close A Sale Table of Contents Introduction 01 Initial contact 03 1. Solution to problem 03 2. Social media introduction 04 3. Referral follow-up 05 Following up 06 4.

More information

Obviously, this is after you start to get some traffic, but that is one of the steps, so I want to get that in there.

Obviously, this is after you start to get some traffic, but that is one of the steps, so I want to get that in there. Traffic Generation We ve built our authority site our squeeze page, and we may or may not have created a niche site, if you wanted to go that way. All of these traffic sources that I m going to get into

More information

ITSM Maturity Assessment Models How does your organization stack up? The Federal Leaders Playbook Season 1, Episode 3

ITSM Maturity Assessment Models How does your organization stack up? The Federal Leaders Playbook Season 1, Episode 3 ITSM Maturity Assessment Models How does your organization stack up? The Federal Leaders Playbook Season 1, Episode 3 Featuring: Eric Lazerson - Vice-president at Acuity Jessica Alfaro - Senior Manager

More information

HOW TO BUILD AN LIST FOR YOUR JEWELRY E- COMMERCE BUSINESS

HOW TO BUILD AN  LIST FOR YOUR JEWELRY E- COMMERCE BUSINESS HOW TO BUILD AN EMAIL LIST FOR YOUR JEWELRY E- COMMERCE BUSINESS THRIVE BY DESIGN WITH TRACY MATTHEWS A small and mighty list is much better than a super large list of non-responsive people. So it s not

More information

by Christina Hills V22

by Christina Hills V22 V22 by Christina Hills The Essential Pages of a Successful Website You want to take control of your business. That's why you downloaded this PDF. Maybe you are getting started building your business and

More information

Tony Shepherd Reveals

Tony Shepherd Reveals Tony Shepherd Reveals We Made $40,000 From This Cheeky Little Technique! Tony Shepherd is an online marketer, writer and blogger You can get an idea of why he s been called a Hippy Marketer By Clicking

More information

POWER HOUR BUILDING YOUR BIZ (Time Blocking in Your Calendar for Success)

POWER HOUR BUILDING YOUR BIZ (Time Blocking in Your Calendar for Success) POWER HOUR BUILDING YOUR BIZ (Time Blocking in Your Calendar for Success) You can build this business part time, with a full time mindset as you also handle the other important parts of your life. You

More information

Script Guide. 1. Prepare to Inspire. 2. Craft Your Conversation. 3. Scripts to Step Forward. 4. Create Curiosity. 5.

Script Guide. 1. Prepare to Inspire. 2. Craft Your Conversation. 3. Scripts to Step Forward. 4. Create Curiosity. 5. 1. Prepare to Inspire 2. Craft Your Conversation 3. Scripts to Step Forward 4. Create Curiosity 5. Handle Objections 6. Lead the Conversation through Questions 7. Refer to Your Team Leader 8. Script Summary

More information

The Real Secret Of Making Passive Income By Using Internet At Your Spare Time!

The Real Secret Of Making Passive Income By Using Internet At Your Spare Time! Internet Marketing - Quick Starter Guide The Real Secret Of Making Passive Income By Using Internet At Your Spare Time! FILJUN TEJANO Table of Contents About the Author 2 Internet Marketing Tips For The

More information

Amazon Money Maker... 2 Section 1 - Amazon Heat Seeker... 3 Star Rating... 3 Reviews... 3 Cost... 3 Finding Products... 4 Keyword Research...

Amazon Money Maker... 2 Section 1 - Amazon Heat Seeker... 3 Star Rating... 3 Reviews... 3 Cost... 3 Finding Products... 4 Keyword Research... Amazon Money Maker... 2 Section 1 - Amazon Heat Seeker... 3 Star Rating... 3 Reviews... 3 Cost... 3 Finding Products... 4 Keyword Research... 5 Section 2 Create Your Amazon Affiliate Website... 7 Setting

More information

Females in Fine Fettle: from wiped out to well-thy

Females in Fine Fettle: from wiped out to well-thy Listen to this episode at: www.femalesinfinefettle.com/021 PODCAST TRANSCRIPT: Episode 021 - Purposeful Planning for 2018 (and beyond) Ashlie Rose: Hello out there Ashlie Rose here with Dr. Michelle. Dr.

More information

Why is time tracking important?

Why is time tracking important? Why is time tracking important? Time tracking isn t just a necessary evil. It provides crucial insight into your business. Here are seven ways time tracking can transform how you work. HARVEST Introduction

More information

SESSION 101. BETH: Hello, this is Beth Brodovsky and welcome to Driving Participation. Today. ALLIE: Thank you, Beth.

SESSION 101. BETH: Hello, this is Beth Brodovsky and welcome to Driving Participation. Today. ALLIE: Thank you, Beth. SESSION 101 WHAT MAKES A GOOD VOLUNTEER MATCH WITH ALLIE HALLOCK BETH: Hello, this is Beth Brodovsky and welcome to Driving Participation. Today in our continuing series on volunteer communication we have

More information

The 2K Method. How to earn $2,000 per month with a simple affiliate marketing method that anybody can use Tim Felmingham

The 2K Method. How to earn $2,000 per month with a simple affiliate marketing method that anybody can use Tim Felmingham The 2K Method How to earn $2,000 per month with a simple affiliate marketing method that anybody can use 2017 Tim Felmingham Introduction $2,000 per month is enough to make a difference to most people.

More information

UNIVERSITY OF CAMBRIDGE FACULTY OF LAW OPEN DAY 2018

UNIVERSITY OF CAMBRIDGE FACULTY OF LAW OPEN DAY 2018 UNIVERSITY OF CAMBRIDGE FACULTY OF LAW OPEN DAY 2018 Applying to Cambridge Law Speaker: Mrs Ali Lyons Okay, good afternoon, everyone. My name is Ali Lyons and I work here at the Faculty of Law. I am working

More information

CR - Basic Training on ICANN's Community Wiki

CR - Basic Training on ICANN's Community Wiki Sunday, March 11, 2012 11:00 to 11:30 ICANN - San Jose, Costa Rica Filiz Yilmaz: how it was set up and how it was promoted. So she will give you some pointers where you can find what in this tool that

More information

all-in-one meeting guide How to Gain Control of Your Time

all-in-one meeting guide How to Gain Control of Your Time all-in-one meeting guide How to Gain Control of Your Time 1 Overview This guide offers time-management activities adapted from best-selling author Laura Vanderkam s TED Talk. They are designed help you

More information

DEFENDANT NAME: HOMICIDE SA# 12SA JAIL CALL. JAIL CALL Total time on tape 00:16:14 (Transcription begins 00:01:46)

DEFENDANT NAME: HOMICIDE SA# 12SA JAIL CALL. JAIL CALL Total time on tape 00:16:14 (Transcription begins 00:01:46) DEFENDANT NAME: HOMICIDE SA# 12SA022031 JAIL CALL JAIL CALL 18568099 Total time on tape 00:16:14 (Transcription begins 00:01:46) Information from recording: Date: 2012/4/15, Time: 15:29:04, dialed number

More information

Nicole Young interview 20 March 2015 INTERVIEW. Nicolesy on Life Adventuring and Shopify for Photographers

Nicole Young interview   20 March 2015 INTERVIEW. Nicolesy on Life Adventuring and Shopify for Photographers INTERVIEW Nicolesy on Life Adventuring and Shopify for Photographers Transcription A Nicole Young landscape photograph. I really love your photography blog at nicolesy.com and where you live, the Western

More information