Sometimes, in order to stand out, you need to do something unusual. Something that makes people’s heads turn. You want your business on the forefront of people’s minds, rather than faded into the blur of all the other companies out there. How can you make your brand pop out? Here are three different, highly unusual […]
SWOT: A Classical yet Effective Competitive Research Tool
Every MBA student will have studied SWOT at some point. SWOT, or “Strengths, Weaknesses, Opportunities and Threats” is a classical yet still effective tool for analyzing competition. By doing a SWOT analysis, you can analyze your marketplace in a very systematic way. Here are the basics of how to do a SWOT analysis. ==> Strengths […]
Secure Sockets Layers and Encryption for ECommerce
Encryption is what allows users to safely browse and buy online. Without encryption, data would be so openly vulnerable to theft that nobody would feel safe buying on the internet. There are a few encryption tools that every eCommerce site should be familiar with. These tools will help you protect your website, as well as […]
Secrets to Yelp Marketing Success
Yelp is the largest and most successful online peer-to-peer review website for local businesses. If you run a local company, especially if you’re a retail or brick and mortar shop, you should pay very close attention to Yelp. If you get to #1 in your category on Yelp, that’s all the advertising you’ll ever need […]
Secrets of Local Press: The Art of Free Publicity
Buying a full-page ad in your local newspaper would cost more than most small businesses could afford. However, if you got your local newspaper to cover you for free, that’s exactly what you’d get: an entire page dedicated to you. Here’s how to leverage the power of the press to get massive free publicity in […]
Root Exploits – The Death of an Unsecured ECommerce Site
There are a lot of different ways an eCommerce site can get attacked. You could get hit with a DDoS attack. Your users could get mass-emailed phishing messages. They could even try to steal individual user passwords. None are as powerful or as dangerous as a root exploit, however. A root exploit is when a […]
Price Manipulation Attacks – When You Don’t Get Paid
Price manipulation attacks are most common on custom shopping cart platforms or smaller shopping cart platforms. Most larger and more popular off-the-shelf programs don’t have this vulnerability. However, because the vulnerability isn’t on the server level and is relatively unknown outside of eCommerce, many programmers just don’t know to look out for it. ==> What […]
Phishing Attacks: What You Can Do to Prevent Them
Phishing attacks are very simple types of attacks that even moderately skilled hackers can execute. Though simple, these kinds of attacks are unfortunately effective. Hackers are often able to steal login credentials and nab customer login details by using not much more than email spoofing technology. Here’s how phishing attacks work and how you can […]
Newspaper, Radio and Traditional Advertising
Newspaper, radio and other forms of traditional advertising can be fantastic ways to advertise a local business. If you get your advertising message right, you’ll send streams of new customers through your doors. Getting it right is tricky, however; and experimentation is expensive. This guide will help you make sure you get the best bang […]
MySQL Injections: What Are They, How to Prevent Them
MySQL injections are a common way for attackers to break into eCommerce systems. Generally MySQL injections take advantage of mistakes made by the programmer, which allows the attacker to subsequently access and manipulate data and have commands be executed on the server. Here’s a brief description of how MySQL injections work and what you can […]
