Coherent Marketing has worked with SCORE Raleigh for the past several years to help small businesses improve their online security. In an increasingly-connected world, small businesses are vulnerable to a range of malicious attacks. And because of this connectedness, an intrusion in one area can translate into a much broader problem. A successful malicious attack can be terminal to a small business.
Our online seminar is a cost-effective way to learn the basics that a small business needs to avoid a costly hack or ransomware.

- By: Norman Smit
- In: Learning
- Hits: 2501
In 2016, the CEO of Coherent Marketing, Norman Smit, was invited by the Raleigh office of the SCORE small business mentoring organization to offer a series of seminars in the first quarter of 2017. The seminars, which will take place at libraries across Wake County has been titled "The Smartphone-Wielding Small Business Guide to Content Marketing".
GET THE SEMINAR SLIDES HERE.
The ground we cover includes:
- By: Norman Smit
- In: Learning
- Hits: 3686
In an internet age, regular reviews of your company's digital footprint and how it may have been appropriated by bots scraping your content is important to do on a regular basis. Sites seeking to mash ransomware with customer reviews are now popping up. The way it works is your information is scraped from your site or social media pages and then a page created for your company. Reviewers can then post whatever they choose about your company. You are required to log into the site and 'claim' your listing. In some instances, you may be charged to transform your 'free' listing into some kind of service-based listing - for example, premium accounts have the additional options they can take when a negative review is posted. In many instances, the identities of the reviewers are obscured so that it is impossible to tell whether the reviewer is a real person or not, or an employee of the review site. An additional danger is the site may be actively soliciting you to claim the listing with incorrect information and requiring additional information with the goal of data mining, identity theft or levying charges to your bank account. Treat sites like these in the same way as you would treat spoofed emails from legitimate accounts you own such as your bank account and do not give them your information.
- By: Norman Smit
- In: Learning
- Hits: 880