SEO - Starting to pay off

allstarit

Well-Known Member
Reaction score
462
Location
Melbourne Australia
So i have been learning alot about Digital Marketing, SEO, SEM and all things related on this topic.

On my website i have been doing regular blog posts on recent topics and one of these was Ransomware. I simply wrote a basic article saying This is Ransomware, here are some of the variants around and what to do if your infected.
This week i have started to get more ransomware calls saying they googled Ransomware Removal Melbourne and i as one of the top websites on page 1 that they looked at. So i think im on the right track with my SEO and hope to continue this with my site and more importantly my clients sites.

upload_2016-8-9_23-6-52.png

I am also finding that this same post sticks for many of the suburbs in my area as well so really excited to see how this goes.
 
So i have been learning alot about Digital Marketing, SEO, SEM and all things related on this topic.

On my website i have been doing regular blog posts on recent topics and one of these was Ransomware. I simply wrote a basic article saying This is Ransomware, here are some of the variants around and what to do if your infected.
This week i have started to get more ransomware calls saying they googled Ransomware Removal Melbourne and i as one of the top websites on page 1 that they looked at. So i think im on the right track with my SEO and hope to continue this with my site and more importantly my clients sites.

View attachment 6210

I am also finding that this same post sticks for many of the suburbs in my area as well so really excited to see how this goes.
Well done! I got a laptop in yesterday with cryptolocker on it. Haven't looked at it yet. What's your advice?
 
First thing i ask client is what backups do they have. If they dont have a backup then they really have one option and thats to pay the ransom.

There are decryptors online but there are so many variants of ransomware it can be hard to find one that will work with the one on laptop.

So if client decides to pay the ransom they need go get bitcoins and pay it..this downloads the exe to run and it decrypts.
Other alternatives is to find attachements in emails and see if they have any cloud storage you maybe able to salvage some files from here.

Then next stage is clean up and lockdown

-do virus scans and remove any found

- ensure fully patched and up to date

- install crypto prevent which locks down appdata from running exes and other good security measures

- ensure antivirus and web filter is installed.
Ill introduce my managed services plans to cover antivirus, web filter, patch ect

- discuss backups with client and convince them they need to get one.

- sign the client up to my newsletter to get ransomware alerts and tips/guides

- change passwords as a security measure.

- limit admin access to user account and haveca seperate admin account.

- if they have network drives limit access to only stuff they need.

- if they do have backups make sure it has unique credentials and $share the folder so it cant be found easily.

- check if they have a spam filter and if they dont sell them one

- if they have a server ensure RDP ports arent open

- if they have a mail server make sure port 25 isnt open to the world and limit only spam filter to access it to enforce all mail to pasd through filter or be blocked.

-if office 365 ill put *.exe attachments and apply spam filter to mail flow.

Majority of my work is cleanup and protection/prevention to stop it happening again. The damage is usually done by the time they call. There is no silver bullet but doing all of the above is definately worth while.
 
First thing i ask client is what backups do they have. If they dont have a backup then they really have one option and thats to pay the ransom.

There are decryptors online but there are so many variants of ransomware it can be hard to find one that will work with the one on laptop.

So if client decides to pay the ransom they need go get bitcoins and pay it..this downloads the exe to run and it decrypts.
Other alternatives is to find attachements in emails and see if they have any cloud storage you maybe able to salvage some files from here.

Then next stage is clean up and lockdown

-do virus scans and remove any found

- ensure fully patched and up to date

- install crypto prevent which locks down appdata from running exes and other good security measures

- ensure antivirus and web filter is installed.
Ill introduce my managed services plans to cover antivirus, web filter, patch ect

- discuss backups with client and convince them they need to get one.

- sign the client up to my newsletter to get ransomware alerts and tips/guides

- change passwords as a security measure.

- limit admin access to user account and haveca seperate admin account.

- if they have network drives limit access to only stuff they need.

- if they do have backups make sure it has unique credentials and $share the folder so it cant be found easily.

- check if they have a spam filter and if they dont sell them one

- if they have a server ensure RDP ports arent open

- if they have a mail server make sure port 25 isnt open to the world and limit only spam filter to access it to enforce all mail to pasd through filter or be blocked.

-if office 365 ill put *.exe attachments and apply spam filter to mail flow.

Majority of my work is cleanup and protection/prevention to stop it happening again. The damage is usually done by the time they call. There is no silver bullet but doing all of the above is definately worth while.
nice checklist. Oh dear! I accidentally pressed ctl-a, ctl-c ....
 
I would never advise them to pay the ransom. I have heard off many different companies doing this and only getting the first 25% then they have to pay more to get the rest which they get another 20 -25% of their files and so on. A home user may be different but if they know you need the files then it means $$ to them and they will do everything they can to take it off you.
 
I agree Dean - This is always a last option if no other alternative available. For all my existing clients this would never be an option because they have proper backup plans in place. However for this new potential client mentioned about i attended their office this evening and no backups since may 2015 :eek: and this XTBL ransomware completely wiped out their SBS 2008 box - Everything was encrypted - all shares, program folders, parts of windows folders. Tried to open a few applications and unable to do anything really on the server as everything corrupt.
The server was shut down once it was realised it had ransomware so i think it stopped the encryption from finishing - So i there was no Ransom Note on the server. I can totally understand how some businesses consider paying this ransom- When there is no other option due to no backups and you have basically lost your entire business's data - you will try anything to get it back - $500 (or whatever the fee is) isnt really alot of money for some businesses and ill take a backup restore any day over paying the bad guys..but unfortunately this is why ransomware is so popular it just shows people are paying to get their data back.

For me Prevention and Education is the biggest thing IT techs can do for clients in this position - Unfortunately some have to learn this the hard way.

So on the plus side i have now conducted an IT assessment onsite and now im putting a proposal through for a new server, Backup solution, Managed Services, Spam Filter and complete documentation/Tidy up of workstations and Network. Then eventually migrating to Office 365 as well.

Knock on Wood- all my clients i currently service haven't had ransomware under my managed services plans and its only new clients im helping who have been hit with ransomware.
 
So i have been learning alot about Digital Marketing, SEO, SEM and all things related on this topic.

On my website i have been doing regular blog posts on recent topics and one of these was Ransomware. I simply wrote a basic article saying This is Ransomware, here are some of the variants around and what to do if your infected.
This week i have started to get more ransomware calls saying they googled Ransomware Removal Melbourne and i as one of the top websites on page 1 that they looked at. So i think im on the right track with my SEO and hope to continue this with my site and more importantly my clients sites.

View attachment 6210

I am also finding that this same post sticks for many of the suburbs in my area as well so really excited to see how this goes.

Are you using any particular SEO plug ins on your site?
 
Yoast SEO is a plugin you add onto Word- When you create pages on Wordpress it will show you a score at the bottom of the page on what you need to do - EG have a better META Description, META TITLE, Your page doesn't have enough words ect. or your keyword isnt mentioned enough in your content - things like that. All these things they talk about is what helps your SEO for the page.

https://yoast.com/wordpress/plugins/seo/

Just google YOAST SEO and you will see lots of articles about it and how to use it ect.
There is a premium one but im just using the free one for now.
 
First thing i ask client is what backups do they have. If they dont have a backup then they really have one option and thats to pay the ransom.

There are decryptors online but there are so many variants of ransomware it can be hard to find one that will work with the one on laptop.

So if client decides to pay the ransom they need go get bitcoins and pay it..this downloads the exe to run and it decrypts.
Other alternatives is to find attachements in emails and see if they have any cloud storage you maybe able to salvage some files from here.

Then next stage is clean up and lockdown

-do virus scans and remove any found

- ensure fully patched and up to date

- install crypto prevent which locks down appdata from running exes and other good security measures

- ensure antivirus and web filter is installed.
Ill introduce my managed services plans to cover antivirus, web filter, patch ect

- discuss backups with client and convince them they need to get one.

- sign the client up to my newsletter to get ransomware alerts and tips/guides

- change passwords as a security measure.

- limit admin access to user account and haveca seperate admin account.

- if they have network drives limit access to only stuff they need.

- if they do have backups make sure it has unique credentials and $share the folder so it cant be found easily.

- check if they have a spam filter and if they dont sell them one

- if they have a server ensure RDP ports arent open

- if they have a mail server make sure port 25 isnt open to the world and limit only spam filter to access it to enforce all mail to pasd through filter or be blocked.

-if office 365 ill put *.exe attachments and apply spam filter to mail flow.

Majority of my work is cleanup and protection/prevention to stop it happening again. The damage is usually done by the time they call. There is no silver bullet but doing all of the above is definately worth while.

Great list - damm my hand slipped to on ctrl a + ctrl c :D
 
Glad SEO is working for you. You might want to check your SEO output though, your og: credentials are listed twice and should be listed only once.
 
Glad SEO is working for you. You might want to check your SEO output though, your og: credentials are listed twice and should be listed only once.
Thanks ill take a look. Would Yoast be doing this or something else? I know enough SEO to get me by but still learning. What issues can arise if this is listed twice
 
Back
Top