february 2014 spartantec’s secure perspective...get more free tips, tools and services at our web...

8
Get More Free Tips, Tools and Services At Our Web Site: www.SpartanTec.com February 2014 February 2014 Loris, South Carolina Inside This Issue… Your Image Here “As a business owner, you don’t have time to waste on technical and operational issues. That’s where we shine! Call us and put an end to your IT problems finally and forever!” - Lisa Carter, SpartanTec, Inc. Pop Quiz: You Just Discovered One Of Your Employees Had Their Smartphone Stolen… Over the last couple of months, we’ve come across some alarming sta- scs that you should know. Studies show that as many as 16% of smartphones are lost or stolen each year with only 7% of the stolen de- vices ever being recovered. Despite the fact that 60% of the missing smartphones are deemed to contain sensive or confidenal infor- maon, 57% of these phones were not protected with available security features, leaving the company exposed! In fact, only 14% of companies currently have a mobile-device security policy in place. The boom line is, no maer how careful your employees are with their smartphones, losing a smartphone (or having one stolen) is likely to happen to you or your employees at some point in me. In the hands of even a relavely unsophiscated hacker, all of your smartphone informaon can quickly be siphoned off. And me is of the essence for taking acon. Criminals will remove the baery of your phone to prevent “remote wipes” of your data by your IT staff and then use a room without mobile access to break into the phone. This is akin to giving a thief the key to your data and the code to deacvate the alarm. Asking employees to be more careful IS a good step in the right direc- on, but accidents happen and thieves are always on the prowl. That’s why it’s so important to take measures to lock down and secure any mobile devices you and your staff use to access your company’s net- work. Here are just a few steps you can take now to be prepared: 1. Strong Passwords. Enforce a strong mobile-device password policy and make sure your employees can’t leave devices un- locked and vulnerable. 2. Enable Device Wiping. Prepare to be able to wipe both compa- ny-issued and personally owned devices that access company data. Make sure your employees are signing off on this before they add company data to their phones. 3. Have A Plan In Place. If a phone is lost or stolen, act quickly! If you happen to find the phone again, then the data can likely be replaced; however, stolen data in the hands of a criminal can rarely ever be taken back! How To Protect Company Data On An Employee’s Lost Smartphone...Page 1 The Truth About Your Hard Drive’s Lifespan...Page 2 Is Cloud Computing Right For Your Company? Find Out Here...Page 2 Keep That Resolution To Get Fit – This Can Help!...Page 3 What Lines Do You Have In Your Busi- ness?...Page 3 Prepared for Cyber Attacks? … Page 4 What is Your Master Plan? … Page 5 HIPAA Brief … Page 6 5 Lessons From Mike Wolfe ...Page 7 How To Unlock The Secrets Hiding In Your Web Site Report...Page 8 8 Amazing Facts About Love You Proba- bly Didn’t Know...Page 8 “Insider Tips To Make Your Business Run Faster, Easier And More Profitably” SpartanTec’s Secure Perspective

Upload: others

Post on 26-Sep-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: February 2014 SpartanTec’s Secure Perspective...Get More Free Tips, Tools and Services At Our Web Site: February 2014 February 2014 Loris, South Carolina Inside This Issue… Your

Get More Free Tips, Tools and Services At Our Web Site: www.SpartanTec.com

February 2014

February 2014 Loris, South Carolina

Inside This Issue…

Your

Image

Here

“As a business owner, you don’t have time to waste on technical and operational issues. That’s where we shine! Call us and put an end to your IT problems finally and forever!” - Lisa Carter, SpartanTec, Inc.

Pop Quiz: You Just Discovered One Of Your

Employees Had Their Smartphone Stolen…

Over the last couple of months, we’ve come across some alarming sta-tistics that you should know. Studies show that as many as 16% of smartphones are lost or stolen each year with only 7% of the stolen de-vices ever being recovered. Despite the fact that 60% of the missing smartphones are deemed to contain sensitive or confidential infor-mation, 57% of these phones were not protected with available security features, leaving the company exposed! In fact, only 14% of companies currently have a mobile-device security policy in place. The bottom line is, no matter how careful your employees are with their smartphones, losing a smartphone (or having one stolen) is likely to happen to you or your employees at some point in time.

In the hands of even a relatively unsophisticated hacker, all of your smartphone information can quickly be siphoned off. And time is of the essence for taking action. Criminals will remove the battery of your phone to prevent “remote wipes” of your data by your IT staff and then use a room without mobile access to break into the phone. This is akin to giving a thief the key to your data and the code to deactivate the alarm.

Asking employees to be more careful IS a good step in the right direc-tion, but accidents happen and thieves are always on the prowl. That’s why it’s so important to take measures to lock down and secure any mobile devices you and your staff use to access your company’s net-work.

Here are just a few steps you can take now to be prepared:

1. Strong Passwords. Enforce a strong mobile-device password policy and make sure your employees can’t leave devices un-locked and vulnerable.

2. Enable Device Wiping. Prepare to be able to wipe both compa-ny-issued and personally owned devices that access company data. Make sure your employees are signing off on this before they add company data to their phones.

3. Have A Plan In Place. If a phone is lost or stolen, act quickly! If you happen to find the phone again, then the data can likely be replaced; however, stolen data in the hands of a criminal can rarely ever be taken back!

How To Protect Company Data On An Employee’s Lost Smartphone...Page 1

The Truth About Your Hard Drive’s Lifespan...Page 2

Is Cloud Computing Right For Your Company? Find Out Here...Page 2

Keep That Resolution To Get Fit – This Can Help!...Page 3

What Lines Do You Have In Your Busi-ness?...Page 3

Prepared for Cyber Attacks? … Page 4

What is Your Master Plan? … Page 5

HIPAA Brief … Page 6

5 Lessons From Mike Wolfe ...Page 7

How To Unlock The Secrets Hiding In Your Web Site Report...Page 8

8 Amazing Facts About Love You Proba-bly Didn’t Know...Page 8

“Insider Tips To Make Your Business Run Faster, Easier And More Profitably”

SpartanTec’s Secure Perspective

Page 2: February 2014 SpartanTec’s Secure Perspective...Get More Free Tips, Tools and Services At Our Web Site: February 2014 February 2014 Loris, South Carolina Inside This Issue… Your

SpartanTec’s Secure Perspective February 2014

Get More Free Tips, Tools and Services At Our Web Site: www.SpartanTec.com

How Long Do Hard Drives Really Last?

One-hundred percent of all hard drives will eventually fail. This is a fact. Some will fail prematurely due to manufacturers’ defects while others will fail because a mechanical part finally wears out. The question is, how long until that happens?

Online backup provider Backblaze.com has kept 25,000 consumer-grade hard drives constantly running for the last four years, diligently noting whenever a hard drive breaks down. The results are very interesting.

Ninety-two percent of all hard drives will survive the first 18 months. These failures are typically due to manufacturers’ defects (oftentimes called the “lemon effect”). Hard drives’ warranties are typically one to three years, which is basically the manufacturers saying that they are only on the hook to replace the lemons.

During the next 18 months, only a very small percentage of drives (~2%) will fail. These failures are from random “unlucky” issues and occur rarely anytime during the life of the drive.

Beginning in year three, hard drives start to wear out due to usage. They are simply mechanical devices that are getting old. 80% of drives will make it to year four and then they drop off at about 12% or more per year thereafter.

The failure rate is essentially a U curve with most failures very early on or after the three-year mark.

So, What Does This Mean?

Simple. Back up your data. With a 1-in-10 chance that your hard drive dies in the first three years of its life and an accelerating chance of failure after that, there is no excuse for being caught without a solid backup. Ever.

Make a plan. Build equipment replacement into your budget at least every four years for most devices, with a 10% equipment-replacement expense built in over the 1st year and then again starting in year three.

As for that 10-year-old PC in the back room still running Windows XP and your most critical reporting soft-ware, the clock is ticking …

Free Report Download: If You Are Considering Cloud Computing For Your Company – Don’t, Until You Read This …

If you are considering cloud computing or Office 365 to save money and simplify IT, it is extremely important that you get and read this special report, “5 Critical Facts Every Business Owner Must Know Before Moving Their Network To The Cloud.”

This report will discuss in simple, non-technical terms the pros and cons of cloud com-puting, data security, how to choose a cloud provider, as well as three little-known facts that most IT consultants don’t know or won’t tell you about cloud computing that could end up causing you MORE problems and costing you more money than you anticipat-ed.

Even if you aren’t ready to move to the cloud yet, this report will give you the right information and questions to ask when the time comes.

Get Your Free Copy Today: http://www.SpartanTec.com/cloudreport/

Page 3: February 2014 SpartanTec’s Secure Perspective...Get More Free Tips, Tools and Services At Our Web Site: February 2014 February 2014 Loris, South Carolina Inside This Issue… Your

SpartanTec’s Secure Perspective February 2014

Get More Free Tips, Tools and Services At Our Web Site: www.SpartanTec.com

The Art of Backup……….. If You Don’t Know For Sure If Your Company’s Data Is Being Backed

Up In A Way That Would Guarantee You Are Back Up and Running

FAST in the Event of a Major Disaster, You May Need My Backup

Master Someday Very Soon……http://www.BSecureDR.com/

FitBit

It’s the No. 1 New Year’s Reso-

lution – lose weight and get in

shape. And by now you are ei-

ther well on your way to achiev-

ing that resolution or you have

gotten sidetracked and are back

to your old ways. Either way,

this little gadget can help you.

Whether you want to get on

track or just stay there, the FitBit

One™ can keep you in line.

This little device uses Bluetooth

technology to track and report

your steps, distance, calories

burned and stairs climbed. Come

nightfall, it measures your sleep

quality, helps you learn how to

sleep better and wakes you in

the morning. You can even sync

it with a smartphone app to track

the food you eat and other activ-

ities you perform that burn addi-

tional calories.

For just $99, it’s a great com-

panion to help keep you motivat-

ed and on track with your fitness

goals. Remember Pearson’s

Law: “That which is measured

improves. That which is meas-

ured and reported improves ex-

ponentially.” Check it out at

www.fitbit.com

Shiny New Gadget Of The Month:

The Lines In Your Business

I have been working on my new book, which, most likely, will have the word “Line” in the title. So, I decided to do a little research on the word “Line.” I had no idea there were so many words that have “line” in them … that have a great deal to do with being successful. Let me give you a few ex-amples:

Discipline – Discipline and success go hand in hand. You cannot have one without the other.

Streamline – The successful companies today are doing everything they can to streamline operations. Complicated policies, procedures, rules and regulations are being simplified, re-placed or deleted. Subtraction (simplifying) is the exercise of genius … addition (complicating) is the exercise of fools … so streamline your operations and your life every chance you get.

Deadline – A goal without a deadline is just a wish, so it is important to set deadlines. But also understand that a missed deadline is more than a disappointment, it is a statement to your client or boss that you can’t be counted on.

Online – Being online can be a useful tool for productivity but also a terrible distraction to productivity if something else catches your attention … so be careful and stay focused on the task at hand.

Guideline – If it was important enough to establish a guideline, then it should be followed.

Bottom line – Companies that don’t make a profit will eventually fail. It is not how much mon-ey a company takes in (revenue) that will make it successful … it’s all about profitability. To sustain success, you must always control your bottom line.

Frontline – The problem with so many companies today is those making the decisions are so far removed or have been away from the frontline for so long that they haven't a clue what the true consequences of their decisions are until it’s too late. If you want to be successful, then you need to stay as close to the frontline as possible. Get out from behind your desk and get on the frontline to see what is really going on in your company.

Laugh line – While you are doing all of this, it is important for you to keep your sense of hu-mor and have some fun. Any wrinkle I have on my face caused by my laughing or smiling is a welcomed wrinkle. As far as I'm concerned, laugh lines are signs you are living a happy life.

Lifeline – You have no idea how long or short your lifeline is, so make the most of the time you have. Keep asking yourself … “Is what I am doing taking me where I want to go?” Your lifeline is a finite amount of time … there are no “do-overs” or recouping of moments lost … so make the most of the moments you have.

Sideline – The sideline is not where you want to be. Get in the game. Learn the necessary skills and have the courage to be a player. To paraphrase former President Theodore Roose-velt …

This is all about YOUR TIME LINE so … pay attention to how you are handling the LINES in your life.

Robert Stevenson is a highly sought after, internationally known speaker. He is the author of the best-selling books How to Soar Like an Eagle in a World Full of Turkeys and 52 Essential Habits for Success. Robert is a gradu-ate of the Georgia Institute of Technology (Georgia Tech) and is a former All-American Athlete. He started his first business at 24 and has owned several companies. Robert has international sales experience dealing in over 20 countries and his client list reads like a Who’s Who in Business. He has shared the podium with such renowned names as Generals Colin Powell and Norman Schwarzkopf, former President George H.W. Bush, Anthony Robbins and Steven Covey. www.robertstevenson.org/

Page 4: February 2014 SpartanTec’s Secure Perspective...Get More Free Tips, Tools and Services At Our Web Site: February 2014 February 2014 Loris, South Carolina Inside This Issue… Your

SpartanTec’s Secure Perspective February 2014

Get More Free Tips, Tools and Services At Our Web Site: www.SpartanTec.com

96% of businesses are unprepared for a cyber attack

A new survey has discovered that out of the 1,909 executives questioned, 96% believe their business is

unprepared for a cyber attack.

Ernst & Young, who carried out the research, said in its report: As many organizations have learned,

sometimes the hard way, cyber attacks are no longer a matter of if, but when. Hackers are increasingly

relentless and often politically motivated.

There are several reasons cited as to why businesses continue to feel vulnerable to attack. The largest

issue identified via the survey was financial, with 65% of respondents saying that budget constraints

posed the biggest barrier to meeting security expectations. In smaller businesses, with annual revenues

under $10 million, the level of concern about budgets rose to 71%.

But with 68% of the respondents saying that their security function only partially meets the needs of the

business, security professionals would seem to have much work to do in order to justify any increases in

funding that they hope to acquire.

Of more concern, perhaps, was the finding that many businesses are struggling to acquire the required

information security skills. 50% of those surveyed said that a lack of skilled resources was a problem

within their organization. Furthermore, 31% of businesses cited issues at executive level, saying that

there was a shortage of support or awareness.

Another perennial problem, that of the growth in the number of threats, was also apparent. 59% of re-

spondents said that their company had seen an increase in the number of external threats over the last

year. Some 31% said that the number of security incidents over that same period had increased by at

least 5%.

Mark Brown, Ernst & Young's director of information security, said, This year's results show that while

businesses are faced with a rising number of security breaches, budget constraints and talent shortages

mean that they fail to put in place those systems that match their needs.

It's not all bad news though. The survey also highlighted the fact that 70% of organisations said that

their information security policies are now handled at the "highest level" within the business, with the

person in charge of security reporting directly to the CEO in 1 in 10 companies.

In 35% of the businesses, the security team reported to the board on a quarterly basis, and just over 10%

reported on a monthly basis.

Despite concerns over budget constraints, almost half of the responding firms said that the funds made

available to the security team were actually on the rise. Small businesses with a turnover of less than

$10m saw the biggest budget increases in percentage terms.

Tellingly, the report ends by saying that: Too frequently, information security is perceived as a compli-

ance necessity and a cost burden to the business. Executives need to view information security as an op-

portunity that can truly benefit the company and its customers.

Page 5: February 2014 SpartanTec’s Secure Perspective...Get More Free Tips, Tools and Services At Our Web Site: February 2014 February 2014 Loris, South Carolina Inside This Issue… Your

SpartanTec’s Secure Perspective February 2014

Get More Free Tips, Tools and Services At Our Web Site: www.SpartanTec.com

What is Your Master Plan?

As a security professional, I’m sure that you know there are various ‘solutions’ and ‘layers’ of security that

you can put in place in your network. Layers include (but are not limited to) router(s), firewall(s), gateway

anti-virus, anti-spyware, spam filtering, web filtering and intrusion detection/prevention. Let’s not forget

the desktop or your mobile users which throws in a whole new dimension to your security plan.

As new ways to do business emerge and the ever increasing threats that we have to guard against persevere,

we put solutions in place to ‘Guard Our Assets’. However, it’s our experience with our clients that the

checkboxes may be checked but who’s monitoring all these layers? Are you getting emails that notify you?

Are you getting SO MANY emails that you put them on the back burner to check it out later? What about

backups? Do you have a backup solution in place? Does it backup the data? How do you know?

The SpartanTec, Inc. team really wants to help you ‘Guard Your Assets’. We can recommend solutions to

help you manage the risk. Even more importantly, we want to help you Monitor your network to make sure

that the investments that you’ve made are working the way that they are expected to. So ask yourself, “Is

Worry Free IT possible?” What can SpartanTec, Inc. do for me? I’m so glad you asked.

As YOUR IT partner, we understand why your critical business services are so important to your daily

operations. This is why we spend so much time aligning our technology support with your business ser-

vices. Building a program that relies on network monitoring coupled with an aggressive preventative

maintenance component to ensure uptime for your business. Our À la carte services program allows you to

customize your support and service needs directly related to your critical business services….all at a cost

effective price.

One of the major challenges in maintaining a computer network is trying to predict what will fail and when.

With our SecureCare Services, we can prevent many network failures from ever happening. By combining

regular and comprehensive preventative maintenance and robust real-time monitoring of your critical net-

work and desktop devices, we ensure the reliability and stability of your IT assets.

Take the next step, call or email me today: [email protected] or 843-418-4792.

IT Services Designed for Real-World IT Problems:

Managed Firewall

Hosted Exchange Service

Cloud Management Anti-Virus Service

Desktop Monitoring Service

Managed Business Continuity and Disaster Recovery

Vulnerability Assessment Services

Cloud Assessment Services

Managed Replication Services

Page 6: February 2014 SpartanTec’s Secure Perspective...Get More Free Tips, Tools and Services At Our Web Site: February 2014 February 2014 Loris, South Carolina Inside This Issue… Your

SpartanTec’s Secure Perspective February 2014

Get More Free Tips, Tools and Services At Our Web Site: www.SpartanTec.com

HIPAA Brief: Why You Shouldn’t Use Webmail Or Text Messages For Patient Information

Definition: Webmail includes the free mail services available on the Internet, like

Gmail, Yahoo! Mail, Hotmail, etc. plus free e-mail accounts you may

receive with an Internet service from Verizon, Time-Warner, Cox Cable,

Comcast, Century-Link, and others. Text messages include the services

from cell carriers like Verizon, AT&T, T-Mobile, Sprint, and others.

These services are free and so easy. So why is it a bad idea to use them? Free webmail services are not secure methods of communication. While they may be fine for personal

messages, they do not include the security required to communicate protected information, including

medical records, lab and test results. Even e-mail messages you send to someone else in your office goes

outside to the free webmail service and then back. Text messages are never deleted by the cell phone car-

riers. The recent scandals involving the media prove that text messages can be hacked. The companies

that offer these services typically will not sign Business Associate Agreements, required for any organi-

zation that stores patient information, including any messages or attachments containing Protected Health

Information (PHI.)

What happens if we use webmail or text messages to communicate patient information? In 2012, a small medical practice was using webmail to communicate patient information. They were

also using an online calendar to schedule patient appointments. The practice was fined $100,000 and had

to pay for notification costs for patients whose data was breached. It also had to implement secure com-

munications and undergo a Corrective Action Plan to address their underlying lack of HIPAA compli-

ance.

So what should we do? You have several choices. First, you should immediately stop sending patient information by webmail or

text messages.

1. You can use faxing or other methods to communicate patient data. You should not use a system that

converts faxes to e-mail messages sent through a webmail account.

2. It is less expensive and easier now than ever to implement a Cloud-based secure e-mail system for

communicating within your practice. Communicating patient information to anyone outside of your

practice should be done using e-mail encryption.

3. If you use an Electronic Health Records (EHR) system, it probably includes a portal through which

you can securely communicate with patients.

4. You can subscribe to an e-mail encryption service that secures sensitive data. Instead of receiving an

e-mail containing protected information, your recipient receives an e-mail inviting them to log into a

secure site to retrieve the protected information. All they get is a message to log-in; no protected in-

formation is ever sent.

5. Text messages should be replaced by voice calls as long as any voice message you leave is not con-

verted to an e-mail or text message through an unsecure service.

If you have more questions on HIPAA or how to protect your firm, please email [email protected].

Page 7: February 2014 SpartanTec’s Secure Perspective...Get More Free Tips, Tools and Services At Our Web Site: February 2014 February 2014 Loris, South Carolina Inside This Issue… Your

SpartanTec’s Secure Perspective February 2014

Get More Free Tips, Tools and Services At Our Web Site: www.SpartanTec.com

Social Media

Follow us and stay connected with us across the web and throughout your day.

http://www.SpartanTec.com/

Quotes To Ponder:

5 Lessons From Mike Wolfe Of American Pickers

Earlier this year, I had the opportunity to hear Mike Wolfe from American

Pickers speak. He shared his journey as a boy digging through the trash to

becoming a TV hit series star. His story was inspirational, energizing and

full of wisdom for any entrepreneur chasing after their dreams. I was so im-

pressed with his passion. Since this month inspires new beginnings, I wanted

to share some of Mike’s wisdom with you to encourage and lift you up.

The importance of MAKING it happen everyday. Mike has been self-

employed for over 26 years and he claims a key to his success is – he

simply gets up and has created a habit of “Making It Happen” every sin-

gle day. He said this with such compassion and conviction – you could

tell that it has been a rough road. Nevertheless, he “made it happen” each

and every day.

Core Value – Make A Personal Tangible Difference In Other’s

Lives. Mike shared that he always knew he was supposed to make a per-

sonal difference in other people’s lives – not just writing a check to some

nameless, faceless person. His heart told him to make a personal connec-

tion with people. As an example, he is a “hugger” when he meets some-

one new or serves others. He said there is something magical about con-

necting with others. Likewise, his show American Pickers gives him this

opportunity everyday. The show is not about the junk – it’s about the

personal stories and connections the people have with their stuff. He

thoroughly enjoys learning and sharing those stories with others – it’s

about the people and their stories that make him love the show so much.

Stay Grounded and Remain True To Yourself. As Mike’s success

grew, doors opened and opportunities blossomed. Some were good and

others just didn’t set right with him. He said “No” to many opportunities

that others dreamed of because he had strong convictions about his be-

liefs, right and wrong. I can tell you – that after you have sweated blood

and tears for a personal passion – it’s hard to say “No” to opportuni-

ties. In doing so, the “right opportunities” presented themselves. He is a

living example that one can fulfill their dreams and stay true to one’s core

and central values.

Being Told No Is An Opportunity. Mike pitched his TV series count-

less times and faced too many rejections to count. Instead of giving up,

he used these moments as opportunities to improve and better his

game. He said that “No – often simply means not right now – not No for-

ever.” Taking this outlook, he pressed on and eventually the right oppor-

tunities presented themselves.

I hope you take these pearls of wisdom and apply them in your own journey to create moments and opportunities of a lifetime. To your own personal success, Lisa

“Take the first step in

faith. You don’t have

to see the whole

staircase, just take the

first step.”

~ Martin Luther King, Jr.

“If you want to

achieve excellence,

you can get there to-

day. As of this second,

quit doing less-than-

excellencent work.”

~ Thomas J. Watson

“The less you respond

to rude, critical, argu-

mentative people, the

more peaceful your

life becomes.”

~ Anonymous

Page 8: February 2014 SpartanTec’s Secure Perspective...Get More Free Tips, Tools and Services At Our Web Site: February 2014 February 2014 Loris, South Carolina Inside This Issue… Your

SpartanTec’s Secure Perspective February 2014

Get More Free Tips, Tools and Services At Our Web Site: www.SpartanTec.com

How To Unlock The Secrets Hiding In Your Web Site Report Web site reports can tell you a LOT about the visitors to your web site IF you know how to read them. Here’s a quick lesson on how to decipher those reports …

Hits vs. Unique Visitors It’s been said that “hits” is short for “How Idiots Track Sales.” Total hits is a deceptive number because a single visitor on a single page could easily pull a dozen files or more. We focus on “unique visitors,” the best indicator of how many individual people are actually visiting your site. If your number of unique visitors is extremely low, it’s ei-ther a sign of weak marketing or a technical issue. Note however that 61.5% of web traffic is via “bots” (non-human traffic) searching the web. Browsers What web browsers are visitors using when coming to your site? There are many browsers in use today, including mobile browsers. You need to test that your site works with all the browsers identified in your reports. Exit Page Your “Exit Page” shows the last page someone is at before they leave your site. If you’re not getting visitors to “convert” to a customer or lead, take a closer look. There may be a technical issue, a bad web site headline, no offer, slow-loading graphics or confusing copy. Something on this page is making your visitors leave without doing what you want them to do. Experiment with various headlines, offers and designs until you find something more successful. Update Keywords and Keyword Phrases Be sure your web site keywords line up with the words people use when searching for products or services you offer. Keeping these aligned will allow you to optimize your conversion rate and minimize your expenses when using pay-per-click search-engine marketing.

Trivia Challenge Quiz According to Hallmark, the No. 1 card-

giving holiday is

a) Mother’s Day

b) b) Christmas

c) c) Valentine’s Day.

E-mail Us Right Now With Your Answer! [email protected]

The Lighter Side:

Amazing Facts About Love

February is traditionally love month, so here are some random love facts (or myths) that might surprise you:

1. People are more likely to tilt their heads to the right when kissing instead of the left (65% of people go to the right!).

2. Falling in love can induce a calming effect on the body and mind and raises levels of nerve-growth factor for about a year, which helps to restore the nerv-ous system and improves the lover’s memory.

3. Love can also exert the same stress on your body as deep fear. You see the same physiological responses – pupil dilation, sweaty palms and increased heart rate.

4. Philadelphia International Airport fin-ished as the No. 1 best airport for mak-ing a love connection, according to a recent survey.

5. Men who kiss their wives in the morn-ing live five years longer than those who don’t.

6. The tradition of the diamond engage-ment ring comes from Archduke Maxi-milian of Austria who, in the 15th cen-tury, gave a diamond ring to his fian-cée, Mary of Burgundy.

7. People who are newly in love produce decreased levels of the hormone sero-tonin – as low as levels seen in people with obsessive-compulsive disorder. Perhaps that’s why it’s so easy to feel obsessed when you’re smitten.

8. According to mathematical theory, we should date a dozen people before choosing a long-term partner; that provides the best chance that you’ll make a love match.

Spiritual Spark

“And let us not grow weary of doing good, for in due

season we will reap, if we do not give up.” ~ Galatians 6:9 ESV