Web Presence Management: Email and Internet Security

Web Presence Management: Email and Internet Security

A crash course on email and Internet security basics.

web-mgmt

Last month, I put the finishing touches on three different online training modules for the industry-serving, non-profit Automotive Management Institute (AMi). These modules are: Website and SEO Basics, Social Media Management and Video Production, and Email Security Basics. Each are now available online, along with over 100 others at www.amionline.org. I’ll give you a sneak peek into Email Security Basics below, but first I want to put in my plug for AMi.

The Next Generation

AMi has evolved into a state-of-the-art training organization with the addition of their online training modules. The recent launch of the next generation of AMi is a significant event for collision repair and mechanical shop business owners and managers. The new AMi offers relevant front office and management education, including career paths, certificates and professional designations. On the collision side, AMi now offers a certificate in Collision Repair Customer Service, and three professional designations: Collision Repair Office Manager, General Manager and Master General Manager.

AMi collaborates with industry training providers to accredit their programs toward their certificates and designations. Access to AMi’s 100-plus online courses is available through their my AMi learning management system, which includes industry-relevant content from myself and colleagues Mike Anderson, Michael Graham, Frank LaViola and many others. The new AMi is designed to improve repair businesses’ front office and management efficiency, accuracy and communications, resulting in better CSI, net promoter scores and profitability. Exciting, huh?

Email Security Basics

One of the many important core courses offered now at www.amionline.org is my Email Security Basics module, where I discuss the fact that crimes are being committed online every second of every day. These criminals are seeking vulnerabilities found on your website, computers, tablets and phones to access your personal information, steal business trade secrets or pursue other exploitive or malicious purposes. People who do this are often referred to as hackers. The tools and methods these people use include:

  • Spam
  • Phishing
  • Malware
  • Hacking

I’ll describe each of these briefly below, and you can get the full course at AMI.

10-tipsSpam. The first method is electronic “junk mail,” also known as spam or unsolicited bulk email. This method involves numerous recipients receiving identical messages. Not only are spam emails annoying, they can be harmful. Spam may have attachments containing harmful computer viruses, also known as malware. Many also include hidden or disguised links to something that looks legitimate. But beware, these links can lead to phishing websites or sites hosting malware that can be installed on your computer just by visiting the sites. Keep in mind, these criminals are good at making these emails look legitimate in an attempt to get you to open them and click on the attachments or links.

Phishing. Spam is frequently used to direct people to fake websites or phishing websites. These websites are designed to look like they’re from banks, schools, PayPal, eBay, Amazon, newspapers, domain registration services and even the IRS. When unsuspecting people are baited into visiting these sites, the criminals go “phishing” for private information, such as credit card numbers, social security numbers, bank passwords and much more. But, as you should know, none of these services will ever ask you for personal information in this manner! And phishing isn’t exclusive to email. Social media sites like Facebook, Twitter and Instagram can also be used to bait and catch unsuspecting victims.

Malware. Malicious software, or malware, is a term used to describe many techniques criminals use for nefarious purposes. It includes:

  • Viruses
  • Worms
  • Trojan horses
  • Ransomware
  • Spyware
  • Scareware

My new AMI training module describes each of these, and the threats they pose, in more detail.

Hacking. A hacker, in the context of computer security, is someone who looks for weaknesses in computer systems and networks. They have different motivations for what drives them to hack into a system. Some hire hackers to find weaknesses in their own business systems and protect their systems from threats. Some hackers do it to protest the actions of a company or government. Other hackers are paid to access accounts, discover passwords and break into lucrative accounts. Others do it for the challenge or for the pure enjoyment of it, much like a hobby. Mostly, hackers look for easy targets.

Included in this AMI Email Security Basics module is a suggested email policy document and an email etiquette guidelines document. If you would like to obtain a copy of these, visit www.optimaautomotive.com/contact-website-specialist/.

You May Also Like

Exit Strategies: Personal Vision & Financial Planning

The most critical first step in an exit or transition plan is to develop a financial plan and personal vision of what your life will look like post-business.

Jerry was a 63-year-old auto body shop owner who contacted me regarding putting together an exit strategy. Like most shop owners, he had become tired of the day-to-day grind of dealing with the back-and-forth fights with the insurance carriers, yet he still loved the idea of being a part of a business he built from the ground up. Ideally, he would have liked his production manager, Evan, to become his heir apparent, yet he had no idea if Evan was interested in owning the shop or if he was even capable of doing so. His shop was a prime candidate for a consolidator, and he had received an offer from one, yet he cared about his employees and wanted to make sure they were taken care of. Also, he was unsure what he would do with himself if he did not have a place to go. He did not know where to turn.

Collision Repairers: Will You Take the Oath?

Today’s collision repairers are challenged with a new set of concerns, one being the need to follow OEM repair procedures.

Three Generations Keep Trains Running on Time at CARSTAR Jacobus

CARSTAR Jacobus Founder Jerry Jacobus and son Dave share a passion for collision repair and also model railroading.

Auto Body Repair: The Right Way, the Wrong Way and Another Way

In a perfect world, every repairer would make the right decisions in every repair, but we don’t live in a perfect world.

The Digital Blitz

We talk so much about how much collision repair is changing, but so is the world of media!

Other Posts

Auto Body Shops: Building a Foundation for the New Year

For the new year, it’s important to conduct a thorough audit of your finances to look for areas of opportunity and things to change.

Auto Body Consolidation Update: There’s a New Buyer in Town

The good news for shops that want to sell but do not fit a consolidator’s
profile is that there is a fresh pool of new buyers.

Is Your Auto Body Shop a Hobby … or a Business?

So you want to provide safe and properly repair vehicles to your customers … even at a financial loss?

BodyShop Business 2023 Executives of the Year

Greg Solesbee was named the Single-Shop Executive of the Year, and Charlie Drake was named the Multi-Shop Executive of the Year.