Monday, June 30, 2014

The spam email problem and what to do about it

The spam email problem and what to do about it

Each day we are continuously bombarded with unsolicited   spam emails.  

The vast majority of these unsolicited spam emails are being sent from Google Gmail accounts  
 but we do occasionally get them from various internet domain names.

The other thing we noticed is that nearly all of the spam emails are coming out of India. We do not get these types of spam emails from China, Russia, Africa or any other part of the world for that matter. We do not know for sure why of all the countries in the world this is such a problem stemming from India 

For starters this is a serious problem for a few different reasons. First off it is bad for the environment because web servers gobble up a lot of energy and so spam email is wasting those resources.  

Secondly, this damages the economy because of lost time spent dealing with spam. Time spent dealing with unsolicited spam is time that cannot be used to earn a living and create wages and business growth.

Last but not least most of these emails are scammy in nature. They propose link building strategies, getting you on the first page of Google, and the list goes on. Fact is, if these spammers knew how to get something on the first page of Google they would be on the first page of Google and would not need to be sending all this unsolicited spam LOL!!!

What we need here is for people to understand that there are resources to deal with this and we need to make more effort to combat the spam. Combatting the spam problem is the only reasonable way we can expect to see anything improve.

Any spam email that you receive from a Gmail email account should be forwarded immediately to In the title just put, "Reporting spam email on Gmail account." Above the forwarded spam email just be sure to tell Google that you are complaining about this Gmail account sending unsolicited spam email. From there we can hope that Google will do their part to block the account and even the user IP.

Any unsolicited spam email from Gmail or any other source should ALSO immediately be forwarded to the U.S. government so that they can also take action. Just forward the unsolicited spam email to and in the title just put something like, "Formal complaint submission on spam email" and above the forwarded spam email once again just let them know that you are complaining about this spam email being sent to you. From there we can hope the government will take appropriate action.

I know it takes time to report these but let's work as a team to help combat this problem.

If you have any questions about dealing with or how to report unsolicited spam email please post your questions right in this thread.

You can visit this link to read more helpful information about dealing with the spam email problem:

Visit IMPACT SOCIAL MEDIA for more information, tutorials, reviews and updates on Socail Media and SEO

Sunday, June 29, 2014

Why you should use Flickr

Why you should use Flickr

Flickr is a great way to share photos and videos with the world but another cool thing is that you can also use Flickr to control who you share with such as friends or family sharing only.

Flickr is adept at handling full resolution photos HD videos and offers you an amazing amount of storage space which is 1 terabyte for free!

Since Flickr is so generous with free storage place this makes it an ideal option for backing up all of your valuable data on their platform Wink

In case you hadn't realized it this massive free storage resource also creates for you a free and very cool option to expand your mobile device 
storage capacity by migrating and storing at Flickr.

We happened across this 5 minute video at YouTube that does a fabulous job of pointing out the many enticing features of Flickr. The video also compares Flickr to the competing options and shows why Flickr is a superior option due to the massive amount of storage they provide for free. 

The video also does a great job in explaining a few tips and tricks when using the Flickr app on your mobile device.

Visit this Snapchat blog post to read the entire article.

Thursday, June 26, 2014

Impact Social Media: Quick Powtoon Review and Example

Impact Social Media: Quick Powtoon Review and Example: PowToon Animate your Presentations! You don't need to be a professional to be able to this.Get fast...

Quick Powtoon Review and Example


Animate your Presentations! You don't need to be a professional to be able to this.Get fast and professional Results with PowToon.

PowToon is a company which sells cloud-based software (SaaS) for creating animated presentations
and animated videos. PowToon was founded in January 2012. The company released a beta version in August 2012 and has seen fast subscriber growth since.

Powtoon uses an Adobe Flex engine to generate an XML file that can be played in the Powtoon online viewer, exported to YouTube or downloaded as an MP4 file.

PowToon is also available on the Google Chrome Store and has an application on In December 2012 PowToon secured $600,000 investment from LA based Venture Capital firm Startup Minds.

In February 2013 PowToon introduced a free account option allowing users to create animated videos that can be exported to YouTube. The free videos include the PowToon branding.

Here's a 3-minute Powtoon Review and example:

How to Create an Amazing Presentation with PowToon:

Join IMPACT SOCIAL MEDIA Blog to get ideas, updates,turotial and reviews and share what you know on SEO and Social Media.

Wednesday, June 25, 2014

What is hacking or hacked content?

What is hacking or hacked content?

Hacked content is any content placed on your site without your permission as a result of vulnerabilities in your site’s security. In order to protect our users and to maintain the integrity of our search results, Google tries its best to keep hacked content out of our search results. Hacked content gives poor search results to our users and can potentially install malicious content on their machines. We recommend that you keep your site secure, and clean up hacked content when you find it.

Some examples of hacking include:

Injected content

When hackers gain access to your website, they might try to inject malicious content into existing pages on your site. This often takes the form of malicious JavaScript injected directly into the site, or into iframes.

Added content

Sometimes, due to security flaws, hackers are able to add new pages to your site that contain spammy or malicious content. These pages are often meant to manipulate search engines. Your existing pages might not show signs of hacking, but these newly-created pages could harm your site’s visitors or your performance in search results.

Hidden content

Hackers might also try to subtly manipulate existing pages on your site. Their goal is to add content to your site that search engines can see but which may be harder for you and your users to spot. This can involve adding hidden links or hidden text to a page by using CSS or HTML, or it can involve more complex changes like cloaking.


Hackers might inject malicious code to your website that redirects some users to harmful or spammy pages. The kind of redirect sometimes depends on referrer, user-agent, or device. For example, clicking a URL in Google search results could redirect you to a suspicious page, but there is no redirect when you visit the same URL directly from a browser.

Get more insights, updates, reviews, tutorials and share yours too, check out - IMPACT SOCIAL MEDIA Blog

Tuesday, June 24, 2014

Top Mistakes Webmasters Make Most in SEO Areas

Matt Cutts discusses 5 mistakes webmasters make most in SEO Areas by volume 

1. Not making your site CRAWLABLE
2. Include the RIGHT WORDS on the page
3. Create COMPELLING Content and Marketing NOT just Link Building...
4. Think about the TITLE and DESCRIPTION of your IMPORTANT pages...
5. Be AWARE and INVESTIGATE the free resources that are there on the web like... WEBMASTER TOOLS

Monday, June 23, 2014

Pinterest For business: Optimizing Descriptions

Pinterest For business: Optimizing Descriptions

Simple tips to efficiently take advantage of Pinterest for your business!

1. Keep it Short

  • Less than 200 characters

2. Make it Dynamic

  • Add a Hashtag (#)
  • Label another USER (@)
  • Add a Monetary Value ($)

3. Optimize REPINS

For more information go and read our Pinterest Review.

Sunday, June 22, 2014

What is an Online Community Manager?

The revolution of Digital Technology has made many things possible; connecting people around the world, expansion of businesses and changing the way it is done especially in the inclusion of social media in businesses, not only among established companies but in small businesses as well. It's importance and demand has actually created different kinds of occupation that seems far fetched a few years ago, and up to this present it is still unfathomable to many....

“So your job is to, like, tweet for your company?”

Community Managers, how many times have we heard this? Explaining you’re a “Community Manager” usually results in a blank stare. We excuse our friends and family, because your friends aren’t hip-enough to understand and your parents are, well, your parents. But what about the people in your company, or your boss for that matter? Unfortunately, it’s possible that your boss or coworkers are not entirely sure what it is that you do and how it contributes to the brand.

Being The Voice

Social media provides brands with the unique opportunity to get customers acquainted with more than their products. Social media can be a vessel to showcase what makes up the brand beyond the product. Community Managers are in charge of setting the tone on social, showing off the people behind your brand’s personality and adding a little life to your products.

Building Relationships

In my opinion, this is the most important part of being a Community Manager. The whole point of the job is to connect with your audience, and not just once. Every brand wants to improve their customers experience, and creating an ongoing relationship with a brand is a great way to do that. Without a Community Manager, creating a personal and connected relationship is difficult and time-consuming. Luckily, this is exactly what we love to do. You’re certainly able to build relationships without a Community Manager, but having at least one dedicated person to foster and grow these relationships is a must.

Creating Buzz

With over 883 million people on Twitter, odds are some of your current or potential customers are tuning into updates from both their friends and brands. When the time comes to release a new product or feature, you want to tap into this audience. Certainly, without a Community Manager you could reach these people once or twice, but with a dedicated Community Manager, who’s objective is to get your brand name out there and create some hype, your reach would dramatically increase. Your Community Manager is essential to creating hype around a roll-out of a new product or feature.


A great Community Manager is a good listener. A great Community Manager should be in touch with the space, as well as with their audience. For example, when a big development takes place, social media is usually the first place it breaks. You want a Community Manager on hand to keep an eye out, so you aren’t late to the party. In addition, listening to customer and fan feedback is another essential function of CMs. Keeping an eye on the sentiment surrounding your brand can be difficult for people who don’t have the time for it. Luckily, that’s what you have us for.

Visit IMPACT SOCIAL MEDIA to get more information on digital marketing and internet advertising by using the power of Social Media and Search Engine Optimization.

Source:Jade Furubayashi– January 27, 2014

Thursday, June 19, 2014

Using Pinterest to Boost Your Business

Pinterest has quickly risen to be one of the very top social media platforms in the world. We would call ourselves Pinterest lovers and for good reason.

Pinterest has an intuitive user interface and it is quick and easy to learn the ropes there. Past that they have implemented a superb mobile friendly alternate that makes engaging the platform very straight-forward on mobile devices.

If your business is a type of business that can benefit from branding and product exposure via imagery, Pinterest is a place where you need to make a substantial investment.

Just this morning we received an email that spotlights on savvy business that has become very adept at benefitting from the Pinterest platform.

Take a moment to go and read this article so that you can gain some insight into using Pinterest to inspire...

Wednesday, June 18, 2014

Matt Cutts gives us clues about social media affecting SEO

A highly recommended video that would help you understand the importance of Social Media as it relates to search engine ranking.

One interesting thing to note here is that the size of your fan page is not really an advantage although  it is true that social media is entertaining and and a great way to push traffic, it is not necessarily an SEO sledgehammer.

Visit and participate in our IMPACT SOCIAL MEDIA Blog for more information, updates, reviews and tips on SEO and Social Media. You can also share your views.

Tuesday, June 17, 2014

Top 5 Social Media Mistakes Made by Entrepreneurs

Social Media Marketing is the trend in this era. But you have to be careful, you can achieve a lot through this or just waste time, money and effort for nothing.... You have to know how to efficiently use these tools to grow your business.

1. Over engagement
2. Poor time management
3. Lack of clear objectives
4. Aiming for brand awareness
5. Burning out too quickly

This video will explain these mistakes entrepreneurs make...

Visit our comprehensive social media article to learn everything you ever wanted to know about social media!

Sunday, June 15, 2014

You Need Strong Passwords

You wouldn't believe how a lot of people still use 123 in their passwords.With all the issues on hacking, you'd better make sure your password in all your log ins are strong.

One of the favorite tools of hackers is a brute force attack. The way a brute force attack works is they use a script to try many different passwords over and over. Eventually they may stumble upon the correct combination.