Cyber security, what CMOs need to know

What do CMOs need to know about cybersecurity?

Cybersecurity is a fundamental consideration for all organizations operating in today’s connected and data-driven world. While all who work across your business – from the IT department, to the PR team and beyond – need to understand the fundamentals of cybersecurity, CMOs have a special responsibility as leaders to ensure they are mitigating risk and are prepared in the event of a possible breach. Here are five things CMOs need to know.

1. Vulnerabilities

In business, CMOs are perhaps some of the best placed when it comes to understanding the global reach of an organization. This is of particular importance when it comes to cybersecurity, as the growing popularity of globally-connected technologies – such as cloud storage and mobile sharing – bring with them increased points of potential vulnerability.

This is a key concern for the CMO, as they are custodians of potentially massive amounts of customer data. Recent security breaches at companies like Yahoo, Deloitte and Equifax have massively damaging implications – both in terms of revenue and brand trust.

CMOs need to be aware of the proliferation of connected technologies across the organization in order to fully understand where possible breaches might happen.

2. Threats

Understanding potential vulnerabilities is one step; acknowledging actual threats is another.

Businesses need to be prepared for increasingly sophisticated and globally organized attackers. Vulnerabilities can give hackers access to confidential business information, as well as lead to theft of personal information of staff and customers.

It is the last threat which is perhaps the most important to be prepared for. The breakdown of trust between organization and customer is the most damaging to business and brand image going forward.

CMOs also need to acknowledge theft of information in the digital realm is not the only threat. Connected IoT devices can also allow hackers to potentially gain access in the physical space such as buildings and vehicles.

3. Prevention

CMOs need to be clear as to how such cybersecurity breaches can be prevented.

They need to collaborate with those across other business departments in ensuring there are clear organization-wide guidelines for security best practice – including keeping apps and software up-to-date, changing passwords regularly and educating team members about phishing scams.

It is essential that CMOs champion these activities within their team, and ensure policies, training and enforcement are up-to-date. Working closely with the local governments is a good way to standardize practices to match those in the wider business community – and to ensure compliance.

For businesses with European connections, GDPR provides a good opportunity to review data best practices.

4. Action

A keen understanding of the above and the most stringent prevention techniques will never make an organization completely immune from cybersecurity breaches.

CMOs can use data and speculation tools to plan action in post-breach scenarios. Again, preparedness for action is key – and collaboration between CMOs and all other business teams are the best way to ensure the correct action takes place if cybersecurity is undermined.

5. Communication

All staff need to understand the importance of cybersecurity – but CMOs can help ensure that knowledge is shared. Collaborations tools help streamline this process by providing channels for any team to communicate.

If a cybersecurity breach has already happened, synergy among C-suite, security, IT and public relations teams is critical. CMOs must have answers to the questions like: What are your best practice communications strategies with customers? Is information about the breach easy to find for worried consumers?

In the event of a cybersecurity breach, businesses need to be clear in their external communications – clarifying exactly what data was exposed and making users aware of worst-case scenarios.

Takeaways

When it comes to cybersecurity, no organization can be 100% protected from breaches. All staff members need to clear on the above five areas, and CMOs have a unique position in being able to lead planning and education within the business to ensure all teams can work quickly and efficiently if the worst happens.

It is the responsibility of the CMO to ensure customers are protected and that they are first to know should such a breach occur. Collaboration and communication is key during such situations – to ensure trust is maintained, information is accessible and order is restored as soon as possible.

ABCO Technology teaches a comprehensive program for cyber security. Call our campus between 9 AM and 6 PM Monday through Friday at: (310) 216-3067.
Email your questions to: info@abcotechnology.edu
Financial aid is available to all students who can qualify for funding.
ABCO Technology is located at:
11222 South La Cienega Blvd. in STE # 588
Los Angeles, Ca. 90304.
Get trained and certified for cyber security today!

Why should you become an Oracle Certified Associate

As an Oracle Certified Associate, you will cultivate industry-supported skills and credentials that you will be able to transfer to future employment opportunities. With your OCA certification, you will be able to demonstrate and promote the fact that you have the necessary skills to do your job effectively and you are certified by Oracle Corporation the world’s leader in Database Management Systems.

What are the Prerequisites & for OCA

Prior to enrolling for OCA courses the applicants have to know how to use the Microsoft Windows operating system. General knowledge of computer programming and databases will be helpful but not necessarily required.

OCA® Topic Requirements:

SQL Fundamentals I

Program with PL/SQL

SQL Fundamentals I
Oracle routinely publishes new versions of exams, and the passing score across versions may differ.

Oracle Developer/Administrator Certified Associate (OCA)

SQL Fundamental I
This course introduces students to the fundamentals of SQL using Oracle Database 12C database technology, which revolves around the cloud. In this course students learn the concepts of relational databases and the powerful SQL programming language. This course provides the essential SQL skills that allow developers to write queries against single and multiple tables, manipulate data in tables, and create database objects.

The students also learn to use single row functions to customize output, use conversion functions and conditional expressions and use group functions to report aggregated data. Demonstrations and hands-on practice reinforce the fundamental concepts.

In this course, students use Oracle SQL Developer and SQL *Plus as the tool.

Course Objectives:

• Retrieve row and column data from tables with the SELECT statement

• Create reports of sorted and restricted data

• Employ SQL functions to generate and retrieve customized data

• Display data from multiple tables using the ANSI SQL 99 JOIN syntax

• Create reports of aggregated data

•Use the SET operators to create subsets of data

•Run data manipulation statements (DML) to update data in the Oracle Database 12C

•Run data definition language (DDL) statements to create and manage schema objects

• Identify the major structural components of the Oracle Database 12C

Course Topics:

Introduction
•Listing the features of Oracle Database 12C
•Discussing the basic design, theoretical and physical aspects of a relational database
•Describing the development environments for SQL
•Describing Oracle SQL Developer, Describing the data set used by the course

Retrieving Data Using the SQL SELECT Statement

• Listing the capabilities of SQL SELECT statements.

• Generating a report of data from the output of a basic SELECT statement

• Using arithmetic expressions and NULL values in the SELECT statement

• Using Column aliases

• Using concatenation operator, literal character strings, alternative quote operator, and the DISTINCT keyword

• Displaying the table structure using the DESCRIBE command

Restricting and Sorting Data
•Writing queries with a WHERE clause to limit the output retrieved Using the comparison operators and logical operators
•Describing the rules of precedence for comparison and logical operators
•Using character string literals in the WHERE clause
• Writing queries with an ORDER BY clause to sort the output
•Sorting output in descending and ascending order
•Using the Substitution Variables

Using Single-Row Functions to Customize Output
•Differentiating between single row and multiple row functions
•Manipulating strings using character functions
•Manipulating numbers with the ROUND, TRUNC and MOD functions
•Performing arithmetic with date data
•Manipulating dates with the date functions

Using Conversion Functions and Conditional Expressions
•Describing implicit and explicit data type conversion
•Using the TO_CHAR, TO_NUMBER, and TO_DATE conversion functions
•Nesting multiple functions
•Applying the NVL, NULLIF, and COALESCE functions to data
•Using conditional IF THEN ELSE logic in a SELECT statement

Reporting Aggregated Data Using the Group Functions
•Using the aggregation functions in SELECT statements to produce meaningful reports
•Using AVG, SUM, MIN, and MAX function
•Handling Null Values in a group function
•Creating queries that divide the data in groups by using the GROUP BY clause
•Creating queries that exclude groups of date by using the HAVING clause

Displaying Data from Multiple Tables
•Writing SELECT statements to access data from more than one table
•Joining Tables Using SQL:1999 Syntax
•Viewing data that does not meet a join condition by using outer joins
•Joining a table by using a self join
•Creating Cross Joins

Using Sub-queries to Solve Queries
•Using a Subquery to Solve a Problem
•Executing Single-Row Sub-queries
•Using Group Functions in a Sub-query
•Using Multiple-Row Subqueries
•Using the ANY and ALL Operator in Multiple-Row Sub-queries

Using the SET Operators
•Describing the SET operators
•Using a SET operator to combine multiple queries into a single query
•Using UNION, UNION ALL, INTERSECT, and MINUS Operator
•Using the ORDER BY Clause in Set Operations

Manipulating Data
•Adding New Rows to a Table Using the INSERT statement
•Changing Data in a Table Using the UPDATE Statement
•Using DELETE and TRUNCATE Statements
•Saving and discarding changes with the COMMIT and ROLLBACK statements
•Implementing Read Consistency
•Using the FOR UPDATE Clause

Using DDL Statements to Create and Manage Tables
•Categorizing Database Objects
•Creating Tables using the CREATE TABLE Statement Describing the data types
•Describing Constraints
•Creating a table using a subquery
•Altering and Dropping a table

Creating Other Schema Objects
•Creating, modifying, and retrieving data from a view
•Performing Data manipulation language (DML) operations on a view
•Dropping a view
•Creating, using, and modifying a sequence
•Creating and dropping indexes
•Creating and dropping synonyms

ABCO Technology offers a comprehensive program for OCA version 12C. Call our campus today between 9 AM and 6 PM Monday through Friday. You can reach us at: (310) 216-3067.
Email your questions to: info@abcotechnology.edu
Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at 11222 South La Cienega Blvd. in STE # 588
Los Angeles, Ca. 90304.
Get certified for Oracle database OCA 12C today!

Equifax Cyber Security breach hearing October 3

Washington DC. The former CEO of Equifax, Richard Smith is testifying before congress today sitting on the hot seat. Members of the congress and senate from both parties are grilling Mr. Smith with respect to the Equifax cyber-attack.

Senator ELIZABETH Warren spent time forcing Mr. Smith to explain why the company hadn’t updated its security software. The senator also wanted to know why the company failed to act after suspicious activity was discovered in consumer sections of their site six months before the cyber breach occurred? Congress was extremely upset about the fact several officers of Equifax sold shares of their stock ahead of the public when facts about the Equifax cyber breach became known to officials of the company six weeks before that news was revealed.

The officers who sold stock in advance of the public release made a nice profit on their sale of securities.
It was just revealed that Richard Smith, Equifax’s former CEO delayed informing the company’s board of directors about the cyber-attack for at least three weeks after he learned of the cyber penetration. Several members of congress emphasize that both the technology and personnel exist to prevent such a cyberattack from occurring.

The technology and personnel exist in the field of cyber security. Intrusion prevention and detection devices are available and ready for installation. Many network professionals are not trained in the proper use of these devices. Cyber security is a field of information technology, which fixes this problem.

Courses including the CompTIA Security +, Cisco CCNA, Cisco Security, Certified Ethical hacker, Certified Information Systems Securities Professional, Linux Fundamentals and a thorough understanding of network servers will go a long way towards training network professionals in the use of cyber security protection devices. Job recruiters are on the lookout for network administrators who possess cyber security skills and certifications.
The work environment is focusing on security because of the events, which have occurred over the past five years.

ABCO Technology offers a powerful Cyber Security program, which will prepare you to compete successfully in the cyber security field. Call our campus between 9 AM and 6 PM Monday through Friday. You can reach us by phone at: (310) 216-3067.
Financial aid is available to all students who can qualify for the federal funding.

Email your questions to: info@abcotechnology.edu
ABCO Technology is located at 11222 South La Cienega Blvd. in STE #588
Los Angeles, Ca. 90304
Join a field of information technology professionals who are in demand today!

Computer Repair jobs, the Excellent Network entry-level position

We constantly receive this question from new students. They all want to know the best entry-level position in the information technology industry with respect to networking?

The answer or job is in the occupation of computer repair. Let’s look at this concept for a moment.

Computers always break down in some form. Most breakdowns are in the form of computer hardware, software or the operating system in general. Viruses, incompatible software or improper connections are usually the major problems most users will encounter. The key question is whose around to fix these things when stuff goes wrong? The answer is the person who knows how to repair computers and handle operating systems. This magic individual is usually certified as a computer repair technician by a vender neutral certifier known as CompTIA.
CompTIA has a certification known as the CompTIA A+, which will teach students how to repair computers, install printers, configure plus install operating systems, a bit of cyber security and how to configure small networks. The CompTIA A+ is the best certification for any individual who wants to enter the information technology field in the fields of networking or cyber security.

Organizations both large and small will hire a new employee and assign tasks of computer repair. Entering a company as a computer repair specialist often provides opportunities for promotion. Many of our students have been hired as computer repair or desktop support specialists. After several months on the job the new employee is promoted to a higher position within the company.

The average course for CompTIA A+ is usually completed in less than five weeks. Students completing the A+ course will be required to pass two CompTIA certification exams, which consists of hardware and operating systems. Once certified, the door is opened for many employment opportunities.

ABCO Technology offers a complete program for networking, cyber security and information technology. Call our campus between 9 AM and 6 PM Monday through Friday. You can reach our campus at: (310) 216-3067.

Email all questions to: info@abcotechnology.edu
Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. in STE # 588
Los Angeles, Ca. 90304.
Join the information technology field today!

CompTIA Network +, a network Server fast track course in Los Angeles.

The CompTIA Network + is an excellent course for computer repair technicians to learn the theory and application behind a network server.

The network server is the larger computer at a company or in the cloud, which distributes programs to individual computers or workstations. Network servers save both time and money because of their ability to send copies or images of programs to individual computers. Since the client server networking model was adopted in the late 1980s, the idea of a network in organizations large and small became practical.

Computer repair technicians who want to advance networking skills can do so by completing the CompTIA Network + certification. The network + is vender neutral like its’ younger brother, the CompTIA A+, which covers computer repair.

The network + course teaches you how to install, implement and configure a network server. The server can be at your physical location or in the cloud. Holders of the Network + also gain a basic knowledge of network security, which is essential in today’s work environment. the Understanding of the basic operation of a server is a powerful step toward advancing your career in the field of network administration.

The CompTIA Network + is a course, which can be completed in as little as four weeks. Students are encouraged to complete lab assignments, practice exams and participate in class discussions.
Companies both large and small look favorably upon candidates who apply for employment holding both a CompTIA A+ and Network + certification.

The knowledge gained from completing the A+ and Network + certification course will open the door for a candidate to become certified for Cisco Certified Network Associate. Obtaining the Cisco certification on top of the Net + and A+ will qualify you for a position as a junior level network administrator.

ABCO Technology offers comprehensive courses in the fields of network and cyber security. The certifications discussed in this article are important steps for both programs. Call our campus today. You can reach us by telephone at: (310) 216-3067 from 9 Am to 6 PM Monday through Friday.

Email your questions to: info@abcotechnology.edu
Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. in STE # 588
Los Angeles, Ca. 90304.
Get certified for network server operation today!

Turning a 404 error page into a possitive marketing experience

Turning a 404 error page into a positive marketing experience for your customers is unlikely to top your list in terms of digital marketing priorities. However, it’s not something you should overlook or try to rush – especially if your site is frequently changing URLs.

404s (…or four zero fours if you’re in the military) are just another marketing tool – if made correctly.
◾What is a 404?
◾Impact of 404s on SEO
◾What are soft 404s?
◾Helping your user
◾Reporting 404s in Google Analytics
◾Making it fun!

What is a 404?

A 404 is the response code that should be provided by your web server when a user attempts to access a URL that no longer exists/never existed or has been moved without any form of redirection. At an HTTP level the code is also followed by the reason phrase of ‘Not Found’.
It’s important to realize that DNS errors are a totally different kettle of fish and occur when the domain has not been registered or where DNS has been misconfigured. There is no web server to provide a response –

If you’re looking to pass time or have a penchant for intellectual self-harm you may enjoy Googling this list of HTTP status codes, where you can discover the mysterious differences between a 301 and a 308…

Impact of 404s on SEO

We can’t all be blessed with the foresight to develop a well-structured and future-proof site architecture first time around. 404s will happen – whether it’s a new site being tweaked post-launch or a full-blown migration with URL changes, directory updates and a brand spanking new favicon! In themselves, 404s aren’t an issue so long as the content has in fact been removed/deleted without an adequate replacement page.

However, if a URL has links from an external site then you should always consider a redirect to the most appropriate page, both to maintain any equity being passed but also to ensure users who click the linker is not immediately confronted with a potentially negative experience on your site.

What are soft 404s?

Soft 404s occur when a non-existent page returns a response code other than 404 (not found) or the lesser known 410 (gone). They also happen when redirects are put in place that aren’t relevant such as lazily sending users to the homepage or where there is a gross content mismatch from the requested URL and the resulting redirect. These are often confusing for both users and search engines, and are reported within Google Search Console.

Helping the user

Creating a custom 404 page has been all the rage for a number of years, as they can provide users with a smile, useful links or something quite fun (more on this later). Most importantly, it’s crucial that you ensure your site’s 404s aren’t the end of the road for your users. Below are some handy tips for how to improve your 404 page.

Consistent branding

Don’t make your 404 page an orphan in terms of design. Ensure you retain any branding so that users are not shocked into thinking they may be on the wrong site altogether.

Explanation

Make sure you provide users with some potential reasons as to why they are seeing the error page. Stating that the page ‘no longer exists’ etc can help users to understand that the lovely yellow raincoat they expected to find hasn’t actually been replaced by a browser-based Pacman game…

Useful links

You should know which are the most popular pages or directories on your site. Ensure your 404 page includes obvious links to these above the fold so that (coupled with a fast site) users will find the disruption to their journey to be minimal.

Search

There’s a strong chance that a user landing on a 404 page will know why they were on your site; whether for jeans, graphic design or HR software, their intent is likely set. Providing them with a quick search box may enable them to get back on track – this can be useful if you offer a very wide range of services that can’t be covered in a few links.

Reporting

Providing users with the ability to report the inconvenience can be a great way for you to action 404s immediately, especially if the button can be linked to the most common next step in a user’s journey. For example: “Report this page and get back to the shop!”
Turn it into a positive

Providing a free giveaway of a downloadable asset (by way of an apology) is a great way to turn an otherwise-disgruntled user into a lead. By providing a clear CTA and small amount of data capture, you can help to chip away at those inbound marketing goals!

Reporting 404s in Google Analytics

Reporting on 404s in Google Analytics couldn’t be easier. While in many cases your CMS will have plugins and modules that provide this service, GA can do it without much bother. The only thing you’ll need is the page title from your 404 page. In the case of Zazzle this is ‘Page not found | Zazzle Media’.

The screenshot below contains all the information needed. Simply navigate to Customization > Custom Reports > Add New within your GA console.

Title: The name of the custom report

Name: Tabs within the report (you only need one in this case)

Type: Set to Explorer

Metric Groups: Enter ‘Site Usage’ and add in Unique Page Views (to track occurrences per page) and Bounce Rate (to measure how effective your custom 404 page is).

Dimension Drilldowns: Page > Full Referrer (to track where the visit came from if external)

Filters: Include > Page Title > Exact > (your 404 page title)

Views: Select whichever views you want this on (default to all if you’re unsure)

Save and return to Customization > Custom Reports, then click the report you just made. You’ll be presented with a list of pages that match your specified criteria. Simply alter your data range to suit and then export and start mapping any redirects required.

You may wish to use Google Search Console for reporting on 404s too. These can be found under Crawl > Crawl Errors. It’s always worth running these URLs through a tool such as Screaming Frog or Sitebulb to confirm that the live URL is still producing a 404. Exporting these errors is limited to ~1000 URLs; as such, you’ll need to Export > Mark as Fixed > Wait 24hrs > Repeat.

Making a fun 404 page

Some of the best 404 pages throw caution to the wind, ignore best practice and either leverage their brand/character to comical effect or simply go all out and create something fun and interactive. Let’s face it, there is no better way to turn a bad situation (or Monday morning) into something positive than with a quick game of Space Invaders!

The below examples are just a few popular brands that have a great ‘404 game’.

Lego

It was always going to be on the cards that Lego would have something quirky up their tiny plastic sleeves, and while the page lacks ongoing links it provides a clear visual representation of the disconnect between the content you expected and what you’re getting.

Kualo

Behind every great website, there’s a great host. Kualo have taken their very cost-focused industry and made a fun and interactive game for users who happen across a 404 page.

Bit.ly

If there’s one site that has its URLs copy and pasted more than any other (and often incorrectly) it’s bit.ly. With over 1.2 billion backlinks from over 1.8 million referring domains I believe there will be a few 404s…don’t you?

Blizzard

Ding! I’ve naturally lost count of how many times it’s given ‘Grats’ – Blizzard’s quirky 404 gives tribute to the commonly-uttered phrase seen in chat boxes across all their games.

Github

It only seems fitting that one of the geekiest corners of the internet be served with an equally geeky 404 page. Github’s page is unique because there is actually a dedicated URL for this design which has over 520 referring domains itself! Not to mention their server error page is equally as cool.

Summary

Hopefully the information detailed in this article has provided you with a great strategy to leverage your 404 page as a content marketing asset or simply to improve the experience for your user. We’d love to see any creative 404 pages you come up with.

ABCO Technology teaches a comprehensive program for web development. If you want to build high successful web pages, which users engage with, contact ABCO Technology. Reach our campus is easy. ABCO can be reached by telephone from 9 AM to 6PM Monday through Friday at (310) 216-3067.

Email your questions to info@abcotechnology.edu
Financial aid is available to all students who can qualify for federal funding.

ABCO Technology is located at 11222 South Lacienega Blvd. in STE # 588
Los Angeles, Ca. 90304.
Learn to build successful webpages today!

Should you convert your website to HTTPS?

Whether you’re a website owner or simple visitor, everyone wants to experience a fast loading website which can carry out sensitive exchanges of information securely.

In 2014, Google announced that it was beginning to use HTTPS as a ranking signal, signaling an increased emphasis on secure connections from the world’s biggest search engine.

Then, last month, the news came that Google’s Chrome browser will begin displaying a “Not Secure” warning message for unencrypted webpages. This message will be displayed in the address bar of websites not running the HTTPS protocol. Imagine a situation where your visitors withdraw from your website after seeing this warning message.

Google does check whether your site uses HTTP or HTTPS protocol. It might not be a crucial factor if you are not truly serious about your website. However, if you are an online business, this is not something to overlook – website visitors demand secure connections to the websites they are interacting with.

If you aren’t very familiar with the technicalities of SEO, working with HTTPS might seem a bit intimidating. However, it isn’t as complex as it seems to be. Also, the good thing is that you do not have to understand the behind-the-scenes work when it comes to implementing HTTPS.

So, is HTTPS important?

Yes, HTTPS is undoubtedly essential, and many websites have already made the shift.

At the time that HTTPS was announced as a ranking signal, it was only a “light” one and affected less than 1% of global searches. But Google warned that this could strengthen over time, and we have already seen with Mobilegeddon how Google can shake things up once it decides to put emphasis on a particular element of the web.

For a website that has an HTTPS protocol, the search bar in the browser will display a lock symbol, and on Google Chrome, the word “secure”. However, if it isn’t on HTTPS, you won’t see the symbol and users may consequently be more wary about what data they enter – especially if soon, they start to receive a warning about the site’s security.

Exhibit A: Search Engine Watch

Benefits of shifting to HTTPS

Makes your site secure

This is the most obvious benefit of shifting to HTTPS. When you are enforcing HTTPS on your site, you are guaranteeing that the information passed between the client and the server can neither be stolen nor intercepted. It is basically a kind of proof that the client’s data wouldn’t be tampered with in any form.

This is great for sites that need the customers to log in and accept payments through credit or debit cards.

Encryption

Okay, so if someone even does manage to intercept it, the data would be completely worthless to them. In case you are wondering why, it is because they obviously wouldn’t have the key to decrypt it. As website owners, you would have the key to do so.

Authentication

You must have heard of middleman attacks. However, with HTTPS, it is close to impossible for anyone to trick your customers and make them think that they are providing their personal information to you, when in reality they are providing this to a scammer. This is where an SSL certificate comes into light.

Good for your site’s SEO

You definitely want your site to rank higher in the search engine results and HTTPS would contribute to doing that. With your site ranking higher, you would have more customers, an increased traffic and an improvement in your overall revenue. It’s not just us saying that – Google said so itself!

Now that you know all of its benefits, let’s look into the steps that you need to follow.

Getting an SSL certificate

SSL is the protocol that HTTPS uses and is something that you need to install. The SSL certificate would have your company name, domain name, address, country, state and your city. Several details including the expiry date of the certificate would also be mentioned here. Now, there are three different kinds of certificates that you can choose from.

Organization Validation and Domain Validation are the kind of certificates that you can get if you have an e-commerce site or a site that collects personal information from users. The third type, Extended Validation Certificates, are for testifying the legal terms of a HTTPS website.

You can purchase these certificates from a lot of websites. The prices differ, so compare them and then make a purchase. Once you have purchased one, get it installed.

Create your site’s URL map and redirect

The ‘S’ in HTTPS makes a huge difference in the URL. HTTP or HTTPS before your domain name are entirely different URLs. This implies that you would have to create copies of each and every page on your site and then redirect them. This redirection would be from your old HTTP page to the new HTTPS page.

It might all sound pretty complicated, but it isn’t in reality. Your URL map can just be a simple spreadsheet. When shifting from WordPress, all of the 301 (permanent) redirects can simply be added to the .htaccess file.

Work on getting at least one page working on the front end

You also have to work on getting your front end on HTTPS. If you’re not confident with the technical side of things, this can seem a little complicated. Therefore it is best to begin with just one page.

If you are an ecommerce site, you can begin with the page that accepts payments. This is the page where customers are sharing their personal banking details and therefore it has to be secure. There are several plugins available that can help you with this, such as WP Force SSL. With such plugins, you can easily force pages to be SSL.

Update internal links, images and other links

There will be several internal links throughout your site and these might redirect to your old HTTP page. If you have been using relative links, you have been lucky. However, if not, you would have to find each of the links and then correct it with the new URL. You would also need to correct links to other resources like stylesheets, images and scripts.

Also, if you use a content delivery network (CDN), you would need to make sure that the CDN supports HTTPS too. These days most CDNs support HTTPS, but not all of them. So, make sure that you check that too.

Re-add your site to Google Search Console

After you have made all the necessary changes, get Google crawling on it as soon as possible. If you don’t do it, your traffic would be affected negatively. But why is re-adding required? Well, it’s because an HTTPS site is considered a completely different and new site.

After that, submit your new sitemap in your new listing and above that, re-submit the old sitemap as Google will notice the 301 redirects and make the necessary updates.

Once you have carried out all of the steps, you may or may not notice a slight positive change in the search rankings. Whatever you do, make sure that the first step of installing an SSL certificate has been done correctly. Alternatively, you can also use plugins like Really Simple SSL, Easy HTTPS Redirection etc. to accomplish the task.

At the end of the day, the decision of switching to HTTPS is solely yours. If you just have a blog with an email newsletter that people can subscribe to, you might not need to make the switch. However, if you are an online business, switching to HTTPS would be a wise decision.

If you see some issues, keep researching and fixing them. Even if you’re not a technical person, it’s easier than you think.
ABCO Technology teaches a comprehensive program for web development. You will learn how to use SSL and many other exciting technologies. If a web development career interests you, contact ABCO Technology. Reaching our campus by telephone is easy. Call us between 9 AM and 6 PM, Monday through Friday. Call today at: (310) 216-3067.
Please email all questions to: info@abcotechnology.edu
ABCO Technology is located at:
11222 South La Cienega Blvd. in STE #588.
Los Angeles, Ca. 90304.
Become a web developer today and join a group of people who are in demand!

Why 200,000 Apps won’t work in iOS 11

For a while now, ever since Apple introduced a 64-bit processor with the iPhone 5S in 2013 and started giving gentle warnings that developers should update their apps.

But as far back as January of this year, users started getting a message warning them that the 32-bit apps on their phone wouldn’t work at all when iOS 11 became available. By June, Gizmodo noticed that some 32-bit apps had already disappeared from the App Store, but were still available to download if you had the direct link.

The iPhone 5s has been around for nearly three years, and most well-known apps are compatible with 64-bit processors. So what does this change actually mean?

Well, it turns out that Apple may stop supporting nearly 200,000 apps.

According to Oliver Yes, cofounder of app intelligence firm Sensor Tower, there are 187,000 32-bit apps still on the App Store, which equates to about 8% all iPhone apps (Sensor Tower estimated in March that there are approximately 2.4 million apps on the App Store).

32-bit apps Business Insider

While it’s impossible to make a complete list of all the apps that will no longer be supported, both Sensor Tower and Business Insider have anecdotally noticed a handful of apps that appear to be 32-bit:
• YouTube Capture, a video recording app that got 200,000 downloads last month, according to Sensor Tower
• iSpadez, a card game app
• Neo Nectaris, a military strategy game
• Infinity Blade, a role-playing fighting game

If you’re noticing a pattern among the 32-bit apps, you’re on to something: Sensor Tower found that of the remaining 32-bit apps on the App Store, most of them were games — 38,619 to be specific. Education, entertainment, and lifestyle apps followed.

But if some of your favorite apps are only 32-bit compatible, they won’t immediately disappear when iOS 11 becomes available. According to Sensor Tower, the apps will probably stay in the App Store for a while and continue working on phones that haven’t updated to the new OS. Eventually, though, Apple will probably delete the apps from the App Store altogether.

Luckily, there’s an easy way to check if you have any 32-bit apps on your phone: Go into your settings, open “General,” tap on “About,” then click on “Applications.” That should show you which of your apps are 32-bit — if you don’t have any 32-bit apps, nothing will happen when you click.

Apple did not immediately respond to a request for comment.

ABCO Technology offers a comprehensive set of classes for computer programming. Call our campus between 9 AM and 6 PM Monday through Friday. Call us today at: (310) 216-3067
Financial aid is available to all students who can qualify for the funding.

ABCO Technology is located at:
11222 South La Cienega Blvd in STE # 588.
Los Angeles, Ca. 90304
Become a computer programmer today!

Google Search Console updates in 2017, get on the platform and benefit.

Google Search Console has been the ultimate platform for SEOs on a daily basis.

Search Console provides invaluable insights into how your customers are finding your websites that you built, but also allows you to monitor and resolve any issues Google is having in accessing your content.

Originally known as Google Webmaster Tools, Search Console has benefited from some significant upgrades over the past decade. That said, it is still far from perfect and few would argue that it provides a complete package in its current guise. A raft of industry updates, particularly those affecting mobile rankings, has left Search Console’s list of features in need of an overhaul.

Therefore, Google’s recent announcement of some ongoing and upcoming changes to the platform was warmly received by the SEO community. These changes go beyond the cosmetic and should help site owners both identify and rectify issues that are affecting their performance. There have also been some tantalizing glimpses of exciting features that may debut before the end of the year.

So, what has changed?

Google categorizes the initial Search Console changes into the following groups: Insights, Workflow, and Feedback Loops.

Within the Insights category, Google’s new feature aims to identify common “root-cause” issues that are hampering the crawling and indexation of pages on a website. These will then be consolidated into tasks, allowing users to monitor progress and see whether any fixes they submit have been recognized by Google.

This should be extremely beneficial for site owners and developers as it will accelerate their progress in fixing the big ticket items in the platform.

analytics

On a broader level, this is in line with Google’s drive to use machine learning technologies to automate some laborious tasks and streamline the amount of time people need to spend to get the most out of their products.

The second area of development is Organizational Workflow which, although not the most glamorous part of any SEO’s work, should bring some benefits that make all of our lives a little easier.

As part of the Search Console update, users will now be able to share ticket items with various team members within the platform. Given how many people are typically involved in identifying and rectifying technical SEO issues, often based in different teams or even territories, this change should have a direct and positive impact on SEO work streams.

Historically, these workflows have existed in other software packages in parallel to what occurs directly within Search Console, so bringing everything within the platform is a logical progression.

The third announcement pertains to Feedback Loops and aims to tackle a longstanding frustration with Search Console. It can be difficult to get everyone on board with making technical fixes, but the time lag we experience in verifying whether the change was effective makes this all the more difficult. If the change does not work, it takes days to realize this and we have to go back to the drawing board.

feedback

This lag is caused by the fact that Google has historically needed to re-crawl a site before any updates to the source code are taken into account. Though this will remain true in terms of affecting performance, site owners will at least be able to see an instant preview of whether their changes will work or not.

Feedback is also provided on the proposed code changes, so developers can iterate very quickly and adjust the details until the issue is resolved.

All of the above upgrades will help bring SEO to the center of business discussions and allow teams to work together quickly to improve organic search performance.

In addition to these confirmed changes, Google has also announced some interesting BETA features that will be rolled out to a wider audience if they are received positively.

New BETA features

Google has announced two features that will be tested within a small set of users: Index Coverage report and AMP fixing flow.

Google_Search_Console_New

As Google summarized in their announcement of this new report:

“The new Index Coverage report shows the count of indexed pages, information about why some pages could not be indexed, along with example pages and tips on how to fix indexing issues. It also enables a simple sitemap submission flow, and the capability to filter all Index Coverage data to any of the submitted sitemaps.”

Once more, we see the objective of going beyond simply displaying information to go to a deeper level and explain why these issues occur. The final, most challenging step, is to automate the prescription of advice to resolve the issues.

Other platforms have stepped into this arena in the past, with mixed success. SEO is dependent on so many other contingent factors that hard and fast rules tend not to be applicable in most circumstances. Automated advice can therefore either be too vague to be of any direct use, or it can provide specific advice that is inapplicable to the site in question.

Technical SEO is more receptive to black and white rules than other industry disciplines, however, so there is cause for optimism with this new Google update.

The second BETA feature is the AMP fixing flow. AMP (Accelerated Mobile Pages) is Google’s open source initiative to improve mobile page loading speeds by using a stripped-back version of HTML code.

With the weight of one of the world’s biggest companies behind it, AMP has taken hold with an increasing number of industries and looks set to widen its reach soon within both ecommerce and news publishers.

Google has bet on AMP to see off threats from the likes of Facebook and Snapchat, so it stands to reason that they want to help webmasters get the most out of its features. Any new coding initiative will bring with it a new set of challenges too, and some developers will find a few kinks as they translate their content to AMP HTML.

What’s next?

The one aspect of Search Console that all marketers would love to see upgraded is the lag in data processing time. As it stands, the data is typically 48 hours behind, leading to some agonizing waits as marketers hope to analyze performance on a search query level. Compared to the real-time data in many other platforms, including Google Analytics and AdWords, Search Console requires two days to source and process its data from a variety of sources.

That may change someday, however. As reported on SE Roundtable, Google’s John Mueller has stated that they are investigating ways to speed up the data processing. Although Mueller added, “Across the board, we probably at least have a one-day delay in there to make sure that we can process all of the data on time”, this still hints at a very positive development for SEO.

With so many changes focused on speed and efficiency, a significant decrease in the data lag time on Search Console would cap this round of upgrades off very nicely.

ABCO Technology Teaches a comprehensive program for the Certified Internet Webmaster. This program includes search engine optimization. If you are interested in building websites, which will generate high traffic, it’s time for you to call ABCO Technology. Reaching our campus by telephone is easy. Call us between 9 AM and 6 PM Monday through Friday at: (310) 216-3067.

Email your questions to: info@abcotechnology.edu
Financial aid is available to all students who will qualify for the funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. in STE #588.
Los Angeles, Ca. 90304.
Become a successful web developer today!

The Best Cisco certifications for 2018

As we reported previously on ABCO Technology’s Facebook page,, 85% of CIOs predict that they will continue to hire new people in 2018. Anyone who has spent time in the IT industry knows that in-demand jobs and skills change rapidly—so what does 2018 have in store for the IT job market?

All the talk of hacking, cybercrime, and data theft means one thing for sure: Cybersecurity experts are going to be hot commodities. Network administrators are also predicted to be in high demand next year, and both of those fields are right up Cisco’s alley.

SEE: The Future of IT Jobs: Critical Skills and Obsolescent Roles (Tech Pro Research)

Data Center Must-Reads
Why Docker’s survival depends on money from customers, not investors
Every enterprise SDDC capacity strategy needs these 6 things
Why the biggest container lock-in threat may not be hardware or software-related
MCSE Data Platform Certification Exam Prep (ABCO Technology)

So which Cisco certifications should you get to advance or jump start a new IT career? Here are five that will get you far in 2017. Each comes in three levels (CCNA, CCNP, CCIE) but this piece is focused on CCNA, the entry level of the three.

What: CCNA/P/IE Security

Why: Security is going to be a huge topic in 2017 and beyond. Just look at the latest news headlines and you’re likely to see a variety of cybersecurity topics. From Russian hacks of the US political system to Yahoo leaking another billion account credentials, security professionals are going to be in demand for the foreseeable future.

What: CCNA Cyber Ops

Why: Cyber Ops is an entry-level security certification that focuses on working in security operations centers. It’s the first step into a cybersecurity career that focuses less on maintaining firewalls and antivirus software and more on responding to cybersecurity threats.

What: CCNA/P/IE Data Center

Why: Cisco’s Data Center certification focuses on design, implementation, and maintenance of networks. Each level of the certification adds more complexity and greater understanding of Cisco networks, allowing holders to further advance their careers.

It’s not just security that will be in demand—network administration is right up there as a hiring priority.

What: CCNA/P/IE Routing and Switching

Why: Just as network administrators are essential to the maintenance of enterprise infrastructure, network engineers are needed to understand and implement the newest technologies.
The Routing and Switching certification focuses on Cisco core network engineering skills and is designed for professionals who want careers as network engineers, support engineers, systems engineers, or network technicians.

What: CCNA/P/IE Collaboration

Why: The Collaboration certification series focuses on voice, video, and other Cisco collaboration software and hardware. Network administrators are in demand, and good ones are going to know how to manage enterprise-level collaboration equipment as well. The Collaboration certification is just one more way to diversify your skillset.

The datacenter keeps evolving, and so does the IT world. Find out how to stay afloat by going to ABCO Technology’s Facebook page.

ABCO Technology offers a comprehensive program for cyber security. Call our campus between 9 AM and 6 PM Monday through Friday. You can reach us by telephone at: (310) 216-3067.
Email your questions to: info@abcotechnology.edu

Financial aid is available to all students who can qualify for funding.

ABCO Technology is located at:
11222 South La Cienega Blvd. in STE # 588.
Los Angeles, Ca. 90304.
Learn network administration and cyber security today!