Web Presence Management: Email and Internet Security

Web Presence Management: Email and Internet Security

A crash course on email and Internet security basics.

web-mgmt

Last month, I put the finishing touches on three different online training modules for the industry-serving, non-profit Automotive Management Institute (AMi). These modules are: Website and SEO Basics, Social Media Management and Video Production, and Email Security Basics. Each are now available online, along with over 100 others at www.amionline.org. I’ll give you a sneak peek into Email Security Basics below, but first I want to put in my plug for AMi.

The Next Generation

AMi has evolved into a state-of-the-art training organization with the addition of their online training modules. The recent launch of the next generation of AMi is a significant event for collision repair and mechanical shop business owners and managers. The new AMi offers relevant front office and management education, including career paths, certificates and professional designations. On the collision side, AMi now offers a certificate in Collision Repair Customer Service, and three professional designations: Collision Repair Office Manager, General Manager and Master General Manager.

AMi collaborates with industry training providers to accredit their programs toward their certificates and designations. Access to AMi’s 100-plus online courses is available through their my AMi learning management system, which includes industry-relevant content from myself and colleagues Mike Anderson, Michael Graham, Frank LaViola and many others. The new AMi is designed to improve repair businesses’ front office and management efficiency, accuracy and communications, resulting in better CSI, net promoter scores and profitability. Exciting, huh?

Email Security Basics

One of the many important core courses offered now at www.amionline.org is my Email Security Basics module, where I discuss the fact that crimes are being committed online every second of every day. These criminals are seeking vulnerabilities found on your website, computers, tablets and phones to access your personal information, steal business trade secrets or pursue other exploitive or malicious purposes. People who do this are often referred to as hackers. The tools and methods these people use include:

  • Spam
  • Phishing
  • Malware
  • Hacking

I’ll describe each of these briefly below, and you can get the full course at AMI.

10-tipsSpam. The first method is electronic “junk mail,” also known as spam or unsolicited bulk email. This method involves numerous recipients receiving identical messages. Not only are spam emails annoying, they can be harmful. Spam may have attachments containing harmful computer viruses, also known as malware. Many also include hidden or disguised links to something that looks legitimate. But beware, these links can lead to phishing websites or sites hosting malware that can be installed on your computer just by visiting the sites. Keep in mind, these criminals are good at making these emails look legitimate in an attempt to get you to open them and click on the attachments or links.

Phishing. Spam is frequently used to direct people to fake websites or phishing websites. These websites are designed to look like they’re from banks, schools, PayPal, eBay, Amazon, newspapers, domain registration services and even the IRS. When unsuspecting people are baited into visiting these sites, the criminals go “phishing” for private information, such as credit card numbers, social security numbers, bank passwords and much more. But, as you should know, none of these services will ever ask you for personal information in this manner! And phishing isn’t exclusive to email. Social media sites like Facebook, Twitter and Instagram can also be used to bait and catch unsuspecting victims.

Malware. Malicious software, or malware, is a term used to describe many techniques criminals use for nefarious purposes. It includes:

  • Viruses
  • Worms
  • Trojan horses
  • Ransomware
  • Spyware
  • Scareware

My new AMI training module describes each of these, and the threats they pose, in more detail.

Hacking. A hacker, in the context of computer security, is someone who looks for weaknesses in computer systems and networks. They have different motivations for what drives them to hack into a system. Some hire hackers to find weaknesses in their own business systems and protect their systems from threats. Some hackers do it to protest the actions of a company or government. Other hackers are paid to access accounts, discover passwords and break into lucrative accounts. Others do it for the challenge or for the pure enjoyment of it, much like a hobby. Mostly, hackers look for easy targets.

Included in this AMI Email Security Basics module is a suggested email policy document and an email etiquette guidelines document. If you would like to obtain a copy of these, visit www.optimaautomotive.com/contact-website-specialist/.

You May Also Like

Are You Ready to ROCK in 2023?

Do you know a “rockstar” in the automotive aftermarket? Then it’s time to nominate them as a Vehicle Care RockStar!

Unless you have been on a remote desert island the past few weeks, you’ve likely seen some intriguing teasers for the latest brand launched under the Babcox Media umbrella — Vehicle Care RockStars. If you have seen it, I’m sure you’ve got some questions.

It can be tough to articulate exactly what defines a RockStar. Is it Mick Jagger’s swagger? Eddie Vedder joyously stagediving into a crowd? Eminem’s clever lyrical prowess or Beyonce’s ability to inspire viral TikTok dances? Elvis’ upturned lip? Is it Slash’s iconic top hat and leather jacket? Dave Grohl’s infectious anthems?

BodyShop Business 2022 Executives of the Year

This year’s Single-Shop award winner is Michael Bradshaw of K & M Collision in Hickory, N.C., and the Multi-Shop winner is Matt Ebert of Crash Champions.

Conducting Collision Business: It’s a New Day

The goal is not to declare war against insurers; it is to declare independence for your organization so that you’re able to provide the highest level of service to your true customers.

Don’t Be Quint: Embrace ADAS and Modern Vehicle Equipment

We can avoid a fate similar to Quint’s in the movie Jaws if we embrace ADAS, technology and training.

Welder Woman: Forging a Trail with Fire

Jaime Shewbridge is the first woman to have won the 2020 I-CAR Instructor of the Year award and the 2021 Welding Instructor of the Year award — and she’s not done yet.

Other Posts

It’s Time to Talk About Money with Young Body Techs

It’s time that we as leaders start to educate our young technicians on how to manage, grow and save money.

Boosting the Value of Your Business

If you have more than five years before you plan to exit your business, there are many things you can do to increase its value and decrease your asset gap.

Running a Family Collision Business: Stay in Your Lane

In a family business, it’s important to divide the duties and respect each other’s lanes.

Need the 411: What Should Consumers Do After a Vehicle Crash?

What do you do when consumers need info after experiencing a vehicle crash?