fbpx

The online lead generation has become a vital sales strategy for businesses, especially in the B2B sector. With the rise of the digital age, businesses are opting for advanced and efficient methods to generate online sales leads.

This process of online generated is carried out by marketers before it is passed on over to sales. With new techniques and strategies being developed rapidly, it is hard to determine the best performing strategies.

There are numerous online lead generation strategies and tips available on the web to boost sales. The following are the 10 best online lead generation strategies that have proved to be successful-

1.Email Marketing

Emailing is an extremely efficient and flexible medium that provides access to any number of prospects who are otherwise inaccessible. Direct email can be used for various purposes such as to sell products, generate sales leads, follow-ups, keep in touch with customers, referral marketing etc. You are able to consistently present every benefit or your product or service. You can contact prospects who are everywhere at any time. Reaching the right set of prospects with the right message and the right offer is the key to a successful lead generation campaign. The most important aspect of any online lead generation campaign, especially email campaign, is the number of sales inquiries it generates.

Source: MarketingWizdom.com

ImageSource: DigitalMarketingPhilippines

ImageSource: DigitalMarketingPhilippines.com

2.Website Lead Generation

A good website needs to be able to generate leads and not just attract traffic. Many websites are not designed to generate leads. They are mostly focused around propagating their products or services via brochures and banners. This makes the visitors passive. A good lead generation website needs to have a user-friendly description of your value proposition and provide information on the key problem or requirements that you can fulfill. Unless the visitor acquires this information upon visiting your page, they’ll go elsewhere. A lead generating website also needs to be easily accessible, provide valuable information, offers opportunities to sign up and provide contact information that easily accessible.

Source: Kyle-irving.co.uk

ImageSource: VTLDesign

ImageSource: VTLDesign.com

3.Automate Your Online Lead Generation

The online lead generation has given rise to various online lead generation tools and services. Using such lead generation tools and services saves a lot of time and resources and also help in acquiring qualified leads. Various web-based prospect and lead generation tools help mine qualified leads from various online sources. Such tools also provide you with lead management features where you will be able to edit, categorize and manage your leads in an organized manner. You can further automate this process by opting for advanced lead generation services. These prospect and lead generation services provide you with a processed list of qualified leads that is specifically built for you. This list contains leads with qualified contact details with email addresses and can be provided within 48 hours as per your requirements.

best lead generation tools | aeroleads

4.SEO, SEM, and PPC

Gabriel Shaoolian, the CEO & Founder of Blue Fountain Media says that generating leads through SEO and PPC is the best lead generation strategy for IT companies or B2B companies for the lowest cost per acquisition. He feels that way as whenever people require IT companies or IT services, a large majority of people search via Google. To capture these people, you need to increase the effectiveness of SEM and PPC campaigns. Brett Prince, President of Marketaire, says that his can be achieved by using long-tail keyword phrases. These keywords are highly targeted and drive targeted traffic due to their specificity, and they’re less competitive than related, shorter search terms, which tend to be higher in volume and more competitive. For SEO purposes, you need to focus on offering something informational or beneficial to the audience. You can rank faster and start generating traffic and leads once you identify your target keywords and create content around it.

Source: CIO.com

ImageSource: SearchEngineLand

ImageSource: SearchEngineLand.com

5.Online Lead Generation via Social Media

As per the report of Global Digital Statistics, Stats and Facts, social media is one of the most effective sources of lead generation. Social media is a very important channel not only in engaging or connecting with your targeted audiences, but it has evolved into a new digital marketing culture that has a strong influence on consumers’ buying behavior. Forbes indicates that up to two-thirds of the top sales experts in the world categorize social media as an important lead generation and sales channel. Another market research expert, Chadwick Martin Bailey, reported that up to 67% of twitter users and 51% of Facebook users are most likely to purchase based on recommendations from the brands they follow or their followers. This is the impact of social media on lead generation and sales. As per the report on US Social Network Ad Revenues by eMarketer, revenues are expected to go up exponentially through social media.

Source: DigitalMarketingPhilippines.com

Image Source:

Image Source: BMA Carolinas

6.Landing Pages

Landing pages which are created around the intention of online lead generation have a very specific purpose. Such pages are used to capture user data such as email addresses, names, phone numbers etc. Their only purpose is to collect such information so that it is available to you later to market your product or services to them. Acend2‘s  landing page optimization page survey reveals that 93% of respondents said increasing conversion rates is one of the most important objectives of a landing page strategy. Improving lead quality came in second at 58%. Landing page visitors are specifically directed to a page from a social media page, an email, a paid ad or similar source of traffic. These visitors are not coming to the page blind, and they expect it to be consistent with the content that brought them there. According to Marketo, you can make your landing page copy and CTAs clear and direct by going through these 4 steps: 1. Set up the problem, 2. Talk about the solution, 3. Point out the WIFM (what’s in it for me), 4. Deliver the goods.

Source: Digioh.com

ImageSource: DCDAgency

ImageSource: DCDAgency.com

7.White Papers or E-Books

This is one of the most common and successful online lead generating techniques. This lead generation technique works on the simple principle of give and take. White papers or E-Books can help in establishing credibility and generating leads. These downloadable can be offered on your website or be distributed through third party services. For the website visitor to obtain such downloadables, registering with an email id must be necessary in order to generate leads. Such downloadables also make a great PPC offering. A variation on the white paper is the e-book. Typically longer than a white paper, it serves a similar function. If you e-book goes into great depth on a subject, it can generate a great deal of buzz and establish your reputation and help boost your online lead generation campaign.

Source: HingeMarketing.com

ImageSource:

8.Online Lead generation via Blogs

Online lead generation is all about engaging your website visitor with content. Blogging is such a phenomenon that is all about sharing great content with your website visitors. Offering content that helps readers solve their business problems or provide some value will have them coming back and share your site with other people. Blogging isn’t as instant as some of the other suggestions but is very beneficial in the long run. You can have dedicated members from your team to write such valuable and insightful content that helps readers. This should be a good way to get a lot of posts written fairly quickly. Once you get the ball rolling, you can reduce to around 2-3 blogs per week.

Source: CoBloom.com

ImageSource: WrittenT

ImageSource: Writtent.com

9.Growth Hacking

Growth hacking is a revolutionary way to spread awareness of your business. Offering free trials, freemium versions and free credits are good ways to start online lead generation via growth hacking. You can make this valuable and addictive element of your website accessible to a larger audience by sharing and inviting new users which will expand your leads tremendously in a short span of time. Whether it be free credits for use of a particular plug-in or a queue jump of some kind, create a simple problem with a simple solution. The best aspect of growth hacking is that it is more so an inbound lead generation technique as you get the people to do the work for you. People will spread the word about your value offering and gradually, more and more people will come to your site, which provides an opportunity for more leads.

Source: WhoIsVisiting.com

ImageSource: StartUpNation

ImageSource: StartUpNation.com

10.Webinars for Online Lead generation

Webinars are the best ways to engage your audience and in turn, provides an opportunity for an online lead generation. When you host a webinar, you can reach a new audience of people interested in your topic. They may not know much about your brand yet, but they probably know that they’re interested in the webinar subject. Once your webinar event concludes, make sure to continue to nurture your leads with appropriate follow-up content. Thank them for attending, send them more relevant articles or downloadable resources, invite them to your next event, and survey them regarding their experience. Webinars provide information to attendees that your potential customers can actually use. You can increase your event’s draw if you partner with an industry influencer to promote or co-host your event. That way, your influencer can advertise the webinar to their audience, introducing more of them to you in the process.

Source: Business2Community.com

ImageSource: ReadyTalk

ImageSource: ReadyTalk.com

Online lead generation needs to be done consistently and always ensure you monitor your campaigns. Analyzing the progress of your various online lead generation campaigns can help you improve your campaigns.

Comment below and share your insights on online lead generation.

 Source: This article was published aeroleads.com By Vedh Jagadish

Categorized in Online Research

Search multiple social networks at the same time on this free website

What is it? A free search engine to help journalists find posts about certain topics on social networks.

How is it of use to journalists? Social media is becoming an increasingly powerful channel for sourcing stories, but with the number of platforms now around it's becoming more difficult to stay on top of the chatter.

It may be that you're looking for reactions on social about certain news events, or you might be trying to find eyewitnesses, photos or videos from the scene of a story.

With Social Searcher, you can search for keywords on multiple platforms at the same time.

The social networking search engine supports a wide variety of platforms, from Facebook and Twitter to Instagram, Tumblr, Reddit, and YouTube.



You can save individual searches you may need to perform more often, and use advanced filters to help you find what you're looking for quicker.


search results social searcher
Screenshot of search results.

Social Searcher enables you to search based on 'post types', for example, and find results that include links, photos, videos or any combination of media.

Each search also comes with its own analytics dashboard, where you can see the most popular related hashtags, the overall sentiment of the posts (i.e. if the language denotes a positive view of the topic), or other keywords that are often featured alongside the terms used in your search.

Social Searcher is free to use for up to 100 searches a day, after which you can choose from a number of pricing options available.

These include additional features such as the ability to save individual posts, access web mentions of keywords, and use the 'monitoring' service.

'Monitoring' enables you to save the mentions history, access advanced analytics and export data as a CSV file.

Social Searcher started out in 2012 as an Android app allowing users to search through Facebook without logging in and has since expanded to become a comprehensive tool for finding posts on social media.

 Source: This article was published journalism.co.uk By Catalina Albeanu

Categorized in Search Engine

By William Comcowich—Boolean search queries are a powerful and easy-to-use tool to improve your search results. This article will teach you how to use them.

Public relations measurement and marketing teams may subscribe to a media monitoring service to find mentions of their brands in news and social media. But many companies miss mentions because they aren’t using the best search strategies. Even worse, they may be inundated with irrelevant mentions about companies or brands with similar names in different industries.

The use of Boolean search queries can assure more accurate media monitoring results. It’s especially useful in eliminating extraneous results. Some PR and marketing folks may cringe when they hear they should use “Boolean,” thinking it’s some sort of geeky computer solution that’s beyond their skills. It’s not. The art of constructing Boolean search queries is actually quite easy to learn and master. Mainstream search engines like Google and Bing as well as social media monitoring services such as CyberAlert permit Boolean searches.

Boolean Search Terms Explained

[emember_protected for=2-3-5 custom_msg=’This article requires a subscription. Sign up now and get 30 days of free access to the world’s best source of knowledge and insight about measurement. Or log in if you’ve already signed up.’]
Simply put, Boolean search involves words like AND, OR, and NOT, and punctuation like parenthesis and quotes. In the Google search engines, the connecting words must be in all caps.

Simply put, Boolean search involves words like AND, OR, and NOT, and punctuation like parenthesis and quotes. In the Google search engines, the connecting words must be in all caps.

AND — Write AND between search terms to require the search results to include both words in any order. If you enter the search term Dove, you’ll see results for the bird, the soap, personal hygiene products, and a nonprofit foundation, among other unrelated results. Boolean search narrows results to your desired outcome. If you input Dove AND chocolate, you’ll receive results that contain both words, leading with Dove Chocolate.

OR — OR will produce results containing any of the words connected by OR. If placed between several words or phrases, results will display pages with one, several, or all of the words. You can use OR to search for nicknames, abbreviations, and common misspellings of your company and its products, as in Wal-Mart OR Wallmart OR Wally Mart. Including OR in queries is especially useful in social media, given the preponderance of abbreviations and misspellings.

NOT— Place NOT before a word to exclude the word from results. That’s a useful technique to eliminate irrelevant results. If your company name or other search term is identical to an unrelated term, perhaps another company in an unrelated industry, use NOT to exclude undesired results. The search term Volkswagen may not require NOT terms to eliminate unrelated results, but Lincoln certainly does. Example: Lincoln AND (auto OR car OR dealer OR etc.) AND NOT (president OR penny OR emancipation OR St. OR Ave.)

If you’re researching what consumers are saying about a product online, you can use NOT to exclude the company’s own online comments, since those results would skew research results. In some search engines, the minus sign replaces the word NOT.

Quotes and Dashes  — Use double quotation marks for searches for exact phrases. When you search without putting search terms in quotes, many results will be separated by other words, sometimes many other words. That may not be what you’re seeking. Placing the words in quotes will yield that exact phrase – and it that exact order, as in “Wal-Mart sucks” or “College of the Holy Cross”. Phrases can also be expressed in many search engines with dashes between words, as in University-of-Michigan.

Parenthesis — Parentheses group terms together so operators like AND and NOT can be applied to all the terms in the brackets. For instance, Dove AND chocolate AND NOT (soap OR lotion OR beauty) will exclude mentions of the beauty products.

NEAR— A proximity operator, NEAR returns results when two or more words are close to each other. You determine the maximum number of words separating the search terms. For instance, if you seek Dove within five words of “soft skin”, you would enter something like: Dove NEAR/5 “soft skin”. The NEAR operator helps narrow results when different brands are discussed in the same post.

In some applications, the tilde, the ~ sign on the top left of your keyboard, can be used as the proximity operator. Place quotation marks around the search terms and a number after the tilde to indicate the maximum number of words between the keywords. For instance, “Dove skin”~5 will return sites with those words separated by no more than five other words. Some of the major search engines do not support proximity operators.

Additional Filters — Many search engines and media monitoring systems allow you to apply additional filters based on geographic location, social media channels, language, and other factors.

Companies with difficult-to-search keywords or acronyms may wish to investigate the power of regular expressions (REX) to purge irrelevant search results. Used in addition to Boolean queries, REX statements can add greater specificity to a search query and permit even more precise search results. For example, REX statements can specify initial caps as in Orange, the French mobile phone service, thereby ignoring all mentions of orange with a lower case. Another REX statement specifies all caps as in acronyms (which is especially useful if your acronym is also a common word). Among many other capabilities, REX statements can also stipulate the number of times a keyword must appear in an article. REX statements often solve long-standing search problems. The major search engines don’t typically support REX statements. Among media monitoring services, CyberAlert can include a full range of REX statements in its client queries.

Corporate Functions

A Boolean query is mandatory for any acronym since most every three or four-letter acronym represents multiple organizations. Boolean queries are also very useful in sorting out clips for specific divisions, departments, or geographic areas. For example, legal would have a specific set of Boolean terms plus the corporate or brand names.

A query for legal threats of a bank, then, could be constructed as:

([Name of Bank] OR [Nicknames of Bank] OR [Stock Exchange Symbol] OR [Names of Executives]) AND (litigation OR legal-action OR legal-issue OR class-action OR lawsuit OR filed-suit OR charges OR trial OR subpoena OR inquiry OR examination OR probe OR investigation OR alleged OR deceptive OR fraud OR warning-letter OR lawyer OR attorney OR lobbyist OR money-laundering OR capital-requirements OR corporate-governance OR Securities and Exchange Commission OR SEC OR Federal-Deposit-Insurance-Corporation OR FDIC OR Federal Reserve Board OR Office-of-the-Comptroller-of- the-Currency OR Dodd-Frank OR stress-test OR settlement OR pact OR hacked OR customer-data OR data-loss OR credit-agency OR tax-evasion OR off-shore-accounts)

The same principle can be applied to countries. Combine AND with the name of the country to sort and deliver relevant clips to country managers. Boolean requires using foreign language terms for generic words if searching for clips from the foreign country.

Brands can use Boolean search techniques to search for problems and risks by using problem terms or terms that denote anger such as “sucks.” Thus, a complaint query would read: ([Name of Company] OR [Nicknames of Company] OR [Stock Exchange Symbol] OR [Names of Executives]) AND (sucks OR stinks OR useless OR lousy OR stupid OR worthless OR [etc.])

Bottom Line Boolean search queries can improve your media and social media monitoring results, uncover mentions of your brand and exclude irrelevant results.

 Source: This article was published painepublishing.com By William Comcowich

Categorized in Search Techniques

How does local search work? If you’re a small business owner, you probably wish you knew. All that time you’re putting into your product or services, your customer experience, your social media marketing and all the other things you do on a daily business to give customers the best of what you can do — what does it mean if they can’t find you in search?

We are here to help bridge that information gap. We’ll tell you what goes into local search and how you can harness its power for your business.

Let’s start with the ‘why’— specifically, why is local search important?

  • 82% of local searchers follow up offline via an in-store visit, phone call or purchase (TMP / comScore)
  • 74% of internet users perform local searches (Kelsey Group)
  • 61% of local searches result in purchases (TMP / comScore)

Think about that for a moment — three out of four people searching for a business are looking for something in their local area, and almost two out of three local searches result in a purchase. Local search is all about intent to buy. So if you want to catch those potential customers in their moments of need, your business needs to rank in the top of relevant search results.

Most people think search is just about the big name search engines (Google, Yahoo!, Bing, etc.) but that’s simply not the case. Discovery of local business through queries happens all over the internet.

Information about your business lives all over the web. Important details like your business name, address, phone number, category, services, hours of operation, and all the other information that matters to someone searching for a business can be found on hundreds of websites.

On average, people are almost three times more likely to discover information about a business on third-party intelligent services like Facebook, Google, Yelp, Foursquare and Citysearch than on the business’s own website. For restaurants, that number jumps up to almost 10 times!

So how does local search work?

In this video, I’m joined by my co-worker, Duane Forrester, VP of industry insights for Yext, who spent years working inside the search engine at Bing. He knows exactly how search works. I personally have spent years, not only as a small business owner but as an agency owner that worked with small businesses — helping them with digital marketing.

Duane and I discuss how search used to work, how search works now, what the future of search will look like, and best of all, what you can do to position your business for the best search engine results.

Source: This article was published smallbiztrends.com By Rev Ciancio

Categorized in Search Engine

To be successful companies and businesses have to constantly innovate and come up with marketing strategies that will deliver. These days no marketing plan is complete without a digital marketing strategy. The impact of digital marketing in generating brand awareness is tremendous especially if you can get the right people talking about your brand.

These would be the influencers. They have a number of followers on social media and the internet and their recommendations and reviews carry a lot of weight with their audience.

The influencers are any individual or group who is capable of swaying the sentiments of the audience in a certain direction regarding a person, brand, idea, or business. There are already a number people out there who are making and breaking the reputation of the brands!

Here are few ways in which an influencer will be able to boost your digital marketing efforts.

Enhance Your Search Ranking

The face of digital marketing has experienced significant changes in the last few years. Keyword optimization will not have a robust impact on the search engine ranking. Google tends to prefer high-quality organic links. Thus, if you do not have high-quality sites linked to your website, you will have a difficult time outrunning the competitors.

If you are able to partner with influential bloggers for reviews and features of the products and services you offer, it will help in developing high-quality links. Micro-influencers have a large following. This can have a significant impact on your brand. Moreover, they are so influential that they have a good domain authority.

Generates High-Quality Leads

Micro-influencers specialize in certain niches. If you are able to target the right influencers, you will be able to enhance the brand visibility. This will also raise awareness among the relevant market. Moreover, it will help to enhance the quality leads that it generates. This means that you will be able to enjoy higher ROI.

Make sure that you work with influencers who are related to your industry and will have an appreciation for your product. You should get in touch with them and provide free samples of your products. This way they will know the kind of products that you offer. Make sure that you tell them about the benefits of the products so that they are able to share the information with their respective followers.

If you starting a small business, it is necessary to make sure that every penny that you spend on marketing yields the highest ROI. When you target the ideal micro-influencers, you can be sure that the message will out to the relevant audience. Thus, they will be more interested in what you are offering.

Engage New Target Audience

Contests and giveaways are great ways to engage the target customers. This will help you-you to reach an audience who are relevant to your business. In case you have a small business, there is a high chance that the micro-influencers followers have not heard of your before. Since they haven’t heard of you before, they might hesitate to spend money, even if someone they know is promoting it. Giveaways and contest are great for engaging this kind of followers.

 

These tactics will help in optimizing digital marketing by influencers. Hence, you can start developing a relationship with the influencers to generate high-quality leads.

What are your most effective sources for finding talent? Do you leverage job postings? Ask for employee referrals?

These are both successful ways to fill a position. In fact, each one can play an integral role in your recruiting.

The only downside is that they’re reactive. You have to wait for the talent to come to you, in hopes that the right candidate is among them.

What you need is the ability to aggressively seek and go after ideal candidates. You need to build an active pipeline to fill today’s requisitions, make connections for hard-to-fill roles, and prepare for future needs.

You need to be proactive.

Luckily, there are several sourcing techniques you can start leveraging right now:

Boolean Sourcing for Google

Boolean sourcing allows recruiters to search for candidate information from all over the web.

You can find resumes and cover letters that are stored within personal websites, job boards and social platforms by using a unique set of search commands.

These commands tell search engines exactly what you’re looking for, and help drill down your search results to reveal the candidates who truly align with your requisition.

Getting started with boolean sourcing is as simple as learning some basic commands. The following operators work best when used within Google.

OR The command OR will return results containing at least one of your specified keywords or phrases. For example, entering programmer OR developer OR engineer would produce results containing any of these terms but not necessarily all of them.
"" Use quotations to return sites containing the exact phrase you’re searching for. For example, the senior manager would return pages containing either of these keywords, but "senior manager" would only return pages containing that exact phrase.
- Use the minus or dash command "-" before a keyword to return pages that exclude that word. For example, if you searched "marketing -manager" your results would exclude any pages that contain the word manager.
* Use the asterisk (*) within your query to identify a placeholder or wildcard terms. For example "Master's degree in *" would return pages containing the phrase "Master's degree in Marketing," "Master's degree in Computer Science, " etc.
() Brackets are for grouping Boolean phrases, and are generally used in more complex search strings. For example, if you searched for (Engineer or "Software Developer")(CISCO OR Microsoft OR HP), your results would show pages containing any of your job title keywords that also contain one of the company keywords. This is a great combination for finding talent who has worked for one of your target competitors.
site: Use the command site: to search pages within a specific website. For example, search for Facebook profiles by entering site:facebook.com. Searching for site:facebook.com "web designers" Phoenix would return Facebook profiles containing both keywords Web Designer and Phoenix.


Use these basic commands to create more elaborate search strings and effectively find candidates through Google. By adding more criteria to your search queries, you can produce more relevant results and ultimately find the best candidates who align with your job.

Job Board Sourcing

You can also leverage most online job boards to proactively source your candidates. Look for the option to search or source the job board's resume database by using common keywords your prospects would use.

Social Sourcing

Leverage the social platforms where your prospects already spend a lot of their time. Sites like LinkedIn, Twitter and Facebook offer unique tools to proactively find your next great hire.

In March 2013, Facebook released Graph Search. It’s a free tool that allows anyone to use specific queries to search for individuals. Find people who work for a specific industry, near a special location or for a particular company.

Here is an example of a common Facebook Graph query:
Facebook Graph

Twitter is also a great tool for sourcing candidates. Use its search engine to identify professionals by specific keywords, phrases, and locations. The best part is that Twitter is an open network, so you’re free to connect with anyone.

You can also find candidates on LinkedIn by using the Boolean logic you’ve already learned. After you replace the italicized words with your keywords, enter this powerful search string into Google to return precise LinkedIn profiles:
site:linkedin.com "web designer" "location * Greater Phoenix Area"

Go After Your Talent

Identifying qualified candidates is the most critical part of the recruiting process. It can also be the most difficult—especially if you're waiting around for the right job seekers to apply. Instead, set yourself up for success by proactively finding them yourself.

But before you get started with methods like Boolean, job board, and social sourcing, make sure you have a clear understanding of the job you’re recruiting for and the keywords your prospects may use during their job search.

Knowing how your candidates describe themselves and which terms resonate with them will give you a head start on your proactive search for talent.

Initiate Conversation

When you finally find the candidates you’re looking for, connect with them! Send them a message about your available position and ask if they would be interested in the opportunity. For more tips on reaching out to candidates, read Candidate Sourcing: Get More Replies to Your Contact Emails.

Categorized in Research Methods

News flashes and sound bites are constantly calling our attention to the latest hacks or threats to our cybersecurity that seem to be filling our social media news feeds and television reporting circuits. While there are plenty of bad actors out there hell bent on doing us harm, symbiotically living in the digital ethers and layers that make up the vast web, there are companies and organizations working in the background to protect and remediate any potential disasters.

Some of these online threats pose significant harm to our lives, our businesses and our finances. Some of them are easy to detect, while others have become increasingly challenging and more sophisticated over the years. They sometimes involve massive bot-nets of millions of devices all acting in concert with one another, and sometimes they're far more individualistic in nature, with specific high-value targets that involve social engineering and location tracking to ensure that their cryptic intentions are fulfilled.

If you've ever been the victim of a phishing scam online or you've ever had someone hijack your profile or social engineer you or your employees to gain access to critical corporate information and infrastructure, or to steal any amount of money from you through methods such as Instagram money-flipping, then you know just how painful this process is. Oftentimes, we search for ways to exact our revenge, usually falling flat on its face due to the anonymity of the World Wide Web.

So, how do you go about protecting yourself from these online threats and cyber criminals who are determined to extra money and valuable information from you?

Clearly, there is no full-proof method to protect yourself. As technology evolves, so do our methods for combating these online threats. However, that doesn't mean that the threats stop. They also evolve. They get smarter, more efficient and more scalable as the near-limitless reach of the web gives them unfettered access to potential billions of dollars in crimes against unassuming individuals and businesses from across the planet.

What Are The Top Online Threats In Cyberspace? 

While there are numerous threats that exist at every turn on the internet, there are 10 very significant threats that pose malicious harm to us. Understanding what these threats are that exist on the web and learning how to combat them is integral to conducting any semblance of business or personal activity these days. Falling for these is painful to say the least, but even more so when you didn't even see it coming from miles away.

One of the biggest and most challenging uphill battles here when it comes to online threats to our security is actually determining whether or not a visitor is human. Bots that crawl the web, or that are designed to somehow infiltrate systems and drop malware generally don't behave like humans. However, this isn't always something that's straightforward. How companies go about detecting automated software and threats in cyberspace has a lot to do with their potential to fall victim to these scams.

Not only is it important to institute a good set of habits when it comes to dealing with online threats like this, but it's also important to stay in-the-know. The more informed you are, the better off you and your employees will be. It's important to note that whatever you do, threats are always evolving. Locate reputable companies that you can work with to help alleviate some of the stress that failure might cause in this arena.

#1 -- Ransomware

One of the biggest ongoing concerns and threats to our digital existences has been the proliferation and exponential rise of ransomware. You know, the type of thing that locks you out of your computer with an impending countdown that signals the digital death of your entire virtual existence. As it counts down, threatening to encrypt every last shred of data, you realize the peril that digital criminals can inflict on their unassuming victims.

Your choices? According to Tod Beardsley, Director of Research at Rapid7, a firm dedicated to thwarting these types of attacks through some of their wildly-popular software platforms such as Nexpose and Metasploit, you should never pay the criminals because you don't know the outcome of whether your information will in fact be restored, or simply vanish into thin air.

Redundant backups should be a priority for you. Backup to an external drive somewhere on your network and to the cloud through DropBox or another provider. Rapid7, which oftentimes stress tests other corporations by hacking in an effort to expose security loopholes, working to ensure that networks are safe from potential attacks, knows a thing or two about this. Companies rely on their teams to ensure that they're protected, and they're often the first phone call many make when an attack like this and others do actually happen.

#2 -- Phishing schemes

A large majority of people get caught up in phishing schemes. Phishing schemes are engineered to get you to click on things and oftentimes they seem harmless. Simply click on a link and it will go to some URL. That's it. However, as harmless as they seem, phishing schemes can lead to to a number of major online security breaches if you're not careful. By paying close attention to what you're clicking on, you'll better be able to mitigate these types of attacks.

Once you're ensnared in this type of scheme, it's hard to untangle yourself. There are phishing schemes for bank accounts, email accounts, big e-tailers and other service providers that have massive footprints. The goal? Gain access to the consumer's account to do the most damage. If you think you were the victim of a phishing scheme, and you entered in your username and password somewhere online and things didn't seem right, immediately change all your passwords.

Another important thing to note is that most people use the same (weak) password across a variety of services such as Gmail, Facebook and online banking as one example. Never do that. Always use different passwords and ensure that they're not simple passwords to begin with. If a cybercriminal gains access to one service, you don't want them gaining access to the others. You should also be changing up your passwords every few months or so.

#3 -- Man-in-the-middle (MIIM) attacks

One of the most sophisticated threats that exist online are man-in-the-middle attacks. I've seen these threats firsthand and know just how malicious they can be. Everything seems okay all the way to the final point of entry (even when using 2-factor authentication). This malware sits on your computer and waits until you've entered in all your credentials, then it actually swaps out the server that receives the communication and even communicates back to you.

Throughout all of this, everything seems fine. Nothing seems amiss. That's why it's such a sophisticated online threat. You almost don't know that anything is happening when it actually is happening. You have to be very wary of what you download to your computer and what reputable sources they're coming from. Virus software is not going to help you in most cases here because these threats are always evolving.

Oftentimes, MIIM attacks are a result of phishing schemes that installed latent software on your computer that sits dormant for some time until you begin accessing the proper network or until its recorded the right keystrokes. It then substitutes its own intercepted server right when you submit your credentials to login.

#4 -- Ad fraud

Online ad fraud is far more widespread than anyone could possibly imagine. This is likely one of the biggest cyber-threats that seems to go under the proverbial radar. Few people know that they've been scammed by sophisticated ad fraud systems after it's occurred. Publishers simply see views increasing and most ad platforms don't provide high specifics as far as direct views on every single ad impression or click, leaving most people in the dark.

In a recent conversation with Tamer Hassan, CTO of WhiteOps, a firm deeply entrenched in the fight against automated ad fraud, they've taken this fight to a new level by developing a platform that actively measures 500 to 2000 technical metrics to determine whether the person viewing the ad is in fact a human or a robot. This software analyzes several layers at a time and its the leading platform amidst the largest publishers in the world.

This impressive system developed by Hassan and team runs silently in the background, with no impact on the speed or latency of ad serving or delivery. In fact, most publishers are now building White Ops' software into their contracts, stating that violations in ad clicks and views from bots will result in non-payment of revenues. This human verification on the web is potentially one of the most lucrative types of fraud that so many cybercriminals are working to exploit and companies are working to protect against.

#5 -- Social media schemes 

Instagram (IG) money-flipping schemes and many others social media scams have surfaced in recent years. Considering that IG is one of the most popular social media platforms in the world, it's no wonder that unscrupulous cybercriminals are targeting individuals who are in desperate situations, looking to make a few hundred or a few thousand dollars quickly. These IG money-flipping schemes have become so widespread that the company can only take down 1 money-flipping scam for ever 3 that are being created.

In a recent conversation with Evan Blair, co-founder of ZeroFox, a firm specializing in social media security, he tells me that 70% of companies are using social media for business but that a large majority of those companies are uninformed about potential impersonations of customer service representatives or duplication of accounts and impersonation of profiles, until it's too late. In fact, there's little that many of the most popular platforms like IG can do to safeguard against the windfall of social engineering and phishing that is constantly occurring against companies at any given moment.

However, this isn't just a risk to digital security; cybercriminals are now using IG and other social media sites to physically track and harm well-to-do executives, celebrities and other high-profilers such as athletes and even politicians. Without a good system to thwart such attacks, most businesses and individuals are completely left lost in the dark. That's likely why so many of the world's leading companies and affluent individuals rely on ZeroFox's groundbreaking platform to thwart and mitigate such attacks.

#6 -- Bitcoin scams

Bitcoin scams have been on the rise recently, especially since the cryptocurrency leaves little in the way of traceable information and unlike with the banking sector, the transactions are irreversible. For those particular reasons alone, cybercriminals have been flocking to the Bitcoin platform. In fact, a large part of their criminal activity is dealt with in Bitcoins for a great majority of their malware attacks that include ransomware and other hacking initiatives.

Considering that Bitcoin valuations have been fluctuating and that there is little in the way of current regulations in the marketplace, this will only continue to get worse. Be very wary of paying for things in Bitcoin and in clicking on any URLs that look deceiving. Read the URLs thoroughly enough to ensure that it's not a variation of a popular domain name, something that hackers and cybercriminals tend to do often.

If you feel like you've been the victim of a Bitcoin scam, it's best to contact the FBI or your local law enforcement agency. Bitcoin does have built-in protections such as wallet backups and multi-signatures, but that doesn't mean that scams don't happen. Cybercriminals are getting more sophisticated by the day so be careful and avoid anything that looks suspicious.

#7 -- Social engineering

Social engineering isn't a new threat. In fact, criminals have been using social engineering hacks in person for ages now. However, when it comes to fraud and other crimes occurring online, this threat is certainly on the rise. With the layer of anonymity that the internet affords, it's no wonder that social engineering works so well in this medium. Most aren't that careful about who they interact with or what type of information that they give out or expose online.

It's not inherently difficult for a criminal to Google the web to find information about a person in an effort to social engineer a scam against them. They can discover their occupation on LinkedIn, their family members or children on Facebook, where they are through Instagram or what they're talking about on Twitter. They can then work to infiltrate those profiles and take over a person's entire social media presence, and use that control to take over email accounts and eventually bank accounts and so on.

It's important to be very careful about who you interact with and what information you expose to the general public. Utilize the privacy features on platforms like Facebook or Twitter and be sure not to share too much personal information on platforms like Instagram. If you do, make your profiles private so that not everyone can track your every movement.

#8 -- Targeting employees to compromise corporate networks

Another major online threat involves directly targeting employees to compromise corporate networks. Since some employees act as the gatekeepers into their corporate networks, there's no surprise that this is on the rise. For example, a large part of the wire fraud that occurs happens because cybercriminals successfully target the right employees to compromise the company's corporate network, allowing them almost unfettered access and approval to steal millions of dollars with ease.

Vulnerable employees also act as a gateway into a corporation's email servers, files and databases, where these cybercriminals can do massive amounts of damage. Employees need to be very careful on social media networks about who they interact with or through what phishing schemes that they click on and unknowingly provide credentials to. ZeroFox's game-changing software helps to alleviate a large part of this worry for most large companies, but not everyone is proactive enough to engage in their services.

Without using a company like ZeroFox, most corporations have no idea about what threats exist out there to their employees or their networks, and it really is one of the most revolutionary platforms that exists out there. Either way you cut it, employee education is a must here to ensure any potential attacks are thwarted before they even begin.

#9 -- Tracking movements for physical targeting

One massive online threat that exists, which can also help put your physical safety into peril, is the tracking of movements through social media and other channels. For consumers, this is an enormous risk, especially for those individuals that aptly portray a lavish lifestyle, traveling around the world. When cybercriminals know that you aren't home, it's simple for them to break into your home and steal your belongings.

You don't need to be uber-wealthy in order to be targeted. Criminals will target all types of individuals through social media channels, able to see when they're home and when they aren't. If you go on vacation, be careful of what information you're sharing and whether or not your profile is public or private. If you don't have home security systems installed and don't want to be a victim of a crime, be very wary about what you share.

Much of this remains common sense, but our physical security can also be put at risk if criminals know where we're going and learn what our routines and schedules might be. They can use that information to do all sorts of bad things to us, virtually and physically, so be very careful.

#10 -- Customer service interception

One of the gatekeepers to any company are their customer service representatives. They are one of the most proliferous category of employees who are interfacing with the clients on a daily basis. However, as skilled as they might be at their jobs, they are often unaware of the online threats that most cybercriminals pose when interacting through a number of mediums. In fact, cybercriminals are known to replicate profiles and post throughout social media to draw attention to unassuming individuals.

They do this in an effort to gain access to accounts, alter the awareness of the general public and to funnel or filter payments and other inquiries that might otherwise alert companies to something that's amiss. This is an enormous threat to businesses, and those without a system like ZeroFox or something similar, will most likely be unaware until the very last moment that a crime actually occurs.

Not only is this bad financially speaking, but it's also bad for a company's reputation. When a customer is angry, they often don't care whether they were speaking to an imposter or the actual company's representative themselves. At that point, it's usually too late to put out the fire. If you're a business and you're serious about your company's online security through social media channels, it's important to invest in a platform to help you mitigate such attacks.

 Source: This article was published forbes.com By R.L.Adams,

Categorized in Internet Privacy

Give me someone's name, and I'll find their personal email address. Sure, it may take some extensive digging and sleuthing, but I'll find you eventually. And I'm not paying to root you out or buying your private info from a lead gen company (though sometimes that would be easier). This is just good old fashioned, organic searching, scanning and scouring the Internet like a Web gumshoe. And not stopping until I ferret out that personal email.

How to find someone's email address [Summary]:

  1. Google Name + "Email"
  2. Google Name + Place of Work
  3. Search LinkedIn
  4. Search their company website
  5. Use Google's site search operator
  6. Use advanced Google search operators
  7. Try some "kitchen sink" queries
  8. Check social media profiles
  9. Check their personal blog
  10. Check Whois
  11. Check people search sites
  12. Message via Twitter or LinkedIn

We'll look at each of these methods in a little more detail, but first:

Why is it important to use someone's personal email address?

If you're sending out an important email that you really want to be taken seriously and improve your chances of getting an actual response, you need to go directly to the source. Sending an important, personal email to the info[at]companyX.com, or dumping it into a "Contact Us" form is a virtual black hole.

This is especially true if you're trying to get in touch with someone you don't know or you've never contacted before. Primary examples of this include:

  • Applying for a job
  • Any form of outreach, like a link request, interview request for your blog, if you're seeking media coverage for a story, etc.

What's more, by taking this extra step and getting directly to the source, you show real initiative and will distinguish yourself from the candidates applying for that same job or requesting that same link.

12 Tips and Tricks to Find Anyone's Email Address

Now, when I say "personal" email address, I'm not talking about a Gmail, Hotmail or AOL account exclusively. I'm also referring to their personal company email address, Web hosting domain email, blogger mail account, or any Web property email address I can find. Because of the depth and breadth and ubiquity of content sources on the Web, you can find contact information for pretty much anyone who has an email address, even if they don't actively promote it on their website. All you have to do is search and keep refining your searches until you strike pay dirt.

Let the Hunt Begin

1) Basic Name Queries by Googling Emails

You can start your sleuthing by running a generic search query for someone's name. But understand that this approach probably won't get you very far, unless the person you're seeking has a unique name, like say Jets WR Jerricho Cotchery. However, if that person's name is at all common, you'll need to add some distinguishing modifiers. Think of it as engaging in the long tail of name searching.

Some initial modifiers you should incorporate to narrow and refine your search are:

  • [name] + email (or) email address
  • [name] + contact (or) contact information (or) contact me

2) Name Queries with Personal Modifiers

Now, if that doesn't work, get even more granular and add any personal information you may have already or uncovered about this person in your initial search, such as:

  • [name] + "home town"
  • [name] + "company they work for"

You can even mix and match all the above modifiers. If you succeed here, terrific. Mission accomplished. But all too often, this is only the initial stage of your research, as this method yields results less than 10 % of the time. To really find who you're looking for, you'll need to go corporate.

Hunting for Company Email Addresses

3) Business Networking Search Queries

One of the best resources for finding direct contact information is through a company email network. Anyone working for an organization has an in-house email. Now, typically if you're searching for someone's direct email for a job interview, link outreach or media coverage, you likely know where they work or conduct business already. But if you're still in the dark, ZoomInfo and LinkedIn are pretty fertile grounds for harvesting personal information.

You can either search the websites internal engine or run queries in Google, like so:

  • [name] + LinkedIn
  • [name] + ZoomInfo

Notice the quick success I had with a probe of ZoomInfo.

4) Basic Company Name Queries

Now, once you get a place of business from their profile, you should visit the company website and start running queries, using the person's name in the hope that you'll find any indexed document with their email address. Most times, generic name searches yield citations (like so-and-so pitched a gem for the company softball team), not actual email addresses. So again, get more specific with modifiers.

  • [name] + email
  • [name] + contact

Adding these modifiers will really boost your chances of finding your target.

5) Basic Company Search Operators

However, if you're still coming up short, you'll need to roll up your sleeves. This is when I break out my super-sleuth hat and get creative with Google search operators. In the majority of cases, Google information retrieval yields more results than a company's internal search. If you're not familiar with search operators, read this.

So what you'll do now is search Google, using the Google Search Operator Query "site:companywebsite.com" as your root and sprinkle in modifiers, like so:

  • site:companywebsite.com + [name] + email
  • site:companywebsite.com + [name] + contact

6) Advanced Company Search Operators

Pretty much every organization has a unique, yet uniform company email addresses structure, which you can leverage in your search efforts, using advanced search operators. For example, at WordStream our email structure is “first initial + This email address is being protected from spambots. You need JavaScript enabled to view it.">This email address is being protected from spambots. You need JavaScript enabled to view it.." But since each company has their own format, you'll need to play around with a host of possible email address structures using the root search operator.

Note: Use the standard format here "@," I'm using [at] so as not to activate hyperlinks.

  • site:companywebsite.com + ken.lyons [at] companyname.com
  • site:companywebsite.com + kenlyons [at] companyname.com
  • site:companywebsite.com + klyons [at] companyname.com
  • site:companywebsite.com + ken [at] companyname.com
  • site:companywebsite.com + ken_lyons [at] companyname.com

It's important to mention here that the information you're seeking with these queries will be bolded in the meta tags text snippets, like so:

Find anyone's email site search operators

An example search engine results page (SERP) with results displayed
for site-search operation results 

I'd say this method yeilds results 80% of the time for me.

7) Random Kitchen Sink Queries

However, if you're still coming up short, you can drop the company search operator root and pound away with random combinations of the above suggestions. 99% of the time, this is very effective. For example, here's a random query I ran for a faculty member at Boston University (note: name is blurred for privacy):

Find anyone's email search by email domain

Notice my query: "BU [person's name] @bu.edu." It's kind of nonsensical, but nevertheless this query combination succeeded where the other techniques failed, yielding this person's email address. Point being, at this stage, I throw everything at the wall to see what sticks.

Even More Options to Find an Email Address

8) Social Networking Profile Queries

Another avenue you can explore for personal information are social media profiles. I've had the most success with social sites like Twitter. And chances are that employing the original basic queries that I mentioned above will display if this person has a Twitter profile.

  • [name] + Twitter

9) Personal Website or Blog Search Operators

Very often, my Web sleuthing reveals a personal website that I didn't know existed. Also, people include their personal websites or their blogs on their Twitter or LinkedIn profiles. This provides you a whole new channel to explore to find contact info for them. If you do find a personal site or blog, there's often have a contact page or even their email address listed right on the site somewhere. Even still, I prefer a direct line to that person. So if you've explored the site and come up short, navigate back out to Google and run some advanced search operators.

  • site:personalblog.com + [name] + email
  • site:personalblog.com + [name] + contact
  • site:personalblog.com + ken.lyons [at] personalblog.com
  • site:personalblog.com + kenlyons [at] personalblog.com
  • site:personalblog.com + klyons [at] personalblog.com
  • site:personalblog.com + ken [at] personalblog.com
  • site:personalblog.com + ken_lyons [at] personalblog.com

10) Whois Search

If you're still coming up empty after a deep dive of their personal website or blog, go to Network Solutions and run a Whois search for their domain registration data for an email address. 60% of the time, you'll find a personal email address here.

11) People Search Sites

Another resource for finding personal contact information are websites such as 123PeopleSearch, Intelius, and PeopleSmart. I've had great luck in the past using this type of free people search to locate the hard-to-find, and some sites allow you to search across multiple countries for personal contact info.

However, your mileage may vary from one search provider to another, and these days, it's getting harder and harder to find reliable, up-to-date information on these sites. As the Web has matured, many of these sites have either gone out of business or offer sub-par results. Sure, you might luck out, but be prepared for a mixed bag in terms of results.

It's always worth checking free people search sites as part of your research, but relying solely on sites like this is a mistake. 

12) If All Else Fails

Okay, if all else fails, you may have to resort to alternative, less "direct" methods like emailing your target through LinkedIn, or @-ting them on Twitter and asking them to follow you back so you can DM them and ask for contact information (if they're willing). For me, these are usually last-ditch efforts, which I've resorted to only a handful of times after if I've exhausted all of the other options I detailed in this post. But even though I prefer to send an email to someone's personal account, shooting them an unsolicited LinkedIn message to me is still far better than an info[at]companyX.com black hole.

Point being, 99% of the time if you're dogged, persistent, relentless and love the thrill of the chase like me, then ain't nothing gonna' stop you from finding the personal contact information you seek.

Happy email hunting!

Source: This article was published wordstream.com By Ken Lyons

Categorized in Research Methods

Search engines are a sourcers best friend, but how do you know when to use what search engine and what type of search to perform? A search will pull up almost anything you ask it to do as long as you know how to ask the right questions. The key to a successful search query is knowing what’s available and knowing exactly what you want without having to pour over pages and pages of useless results. Using search engines to find your ideal candidate will help cut out all of the noise by using them correctly.

Using search engines to find your ideal candidate

Not all searches or search engines are made equal. Understanding the fundamentals of search engines and when to use which one is critical when it comes to finding candidates in the most efficient way possible.  

Understanding the power of a Google Search

We all probably use this search engine several times a day, but do you know how to leverage a search to pinpoint what you’re looking for? There are two popular types of search strings that most sourcers are using when it comes to using Google. Both Boolean and X-ray searches will give you a boost in your searching endeavors.

Boolean involves using terms like AND OR NOT in your Google search to limit or broaden what you’re looking for. So, searching for “copy editors” -jobs -Nashville would exclude the term jobs and the results of candidates who live in Nashville, while (“copy editors” OR writers) would give you candidates with editing skills as well as those who may only have writing skills.

Check out some helpful hints from Google:

Common search techniques

Search social media

Put @ in front of a word to search social media. For example: @twitter.

Search for a price

Put in front of a number. For example: camera $400.

Search hashtags

Put in front of a word. For example: #throwbackthursday

Exclude words from your search

Put - in front of a word you want to leave out. For example, jaguar speed -car

Search for an exact match

Put a word or phrase inside quotes. For example, "tallest building".

Search for wildcards or unknown words

Put a * in your word or phrase where you want to leave a placeholder. For example, "largest * in the world".

Search within a range of numbers

Put .. between two numbers. For example, camera $50..$100.

Combine searches

Put “OR” between each search query. For example,  marathon OR race.

Search for a specific site

Put “site:” in front of a site or domain. For example, site:youtube.com or site:.gov.

Search for related sites

Put “related:” in front of a web address you already know. For example, related:time.com.

X-ray allows you to utilize a more powerful search engine (like Google) to search a website (like LinkedIn) whose search function may not be as thorough. You can give it a Google to see how to format your X-ray search. site:linkedin.com/in

search.png

Custom Search Engines

Another benefit to using Google over other search engines is their ability to provide a custom search engine. If you’re tired of writing out the same string of criteria time and time again, Google has provided this type of search engine that allows you to set up and refine your search in one easy location.

Bing Matters!

Google may be the most popular choice when choosing a search engine, but it’s important also to give others a chance as well. Results from each of these sources will be displayed differently and can bring up different results that allow you to see what another may have failed to show you. Make sure you check out the Boolean and X-ray functions of whatever search engine you are using as they may need to be formatted differently.

The reason we pick out Bing as a contender is that all of your popular platforms such as Yahoo, Altavista, and MSN all run off Bing’s search engine (Fun Fact circa 2010). There are some nuances to understand when working with Bing that doesn’t necessarily work when it comes to Google. For instance:

inurl: is something that works well in Google, but doesn’t work in Bing search engine because it was deemed as a “mass data mining tool” back in 2007. It’s long since been retired in Bing and never seen again. Instead, you’ll want to use a more friendly search string such as intitle:recruitment. This type of search string is going to look for the letters “recruitment” in either the title a web page. It also works in Google and most other search engines. This allows you to search for specific titles within a certain website using Bing’s search engine.

Take a look at the X-ray Search in Bing (PRO TIP – In Bing, you have to use the parentheses):

bing.png

Others

DuckDuckGo – The key feature of DuckDuckGo is that it’s a private search engine and doesn’t track your search history, like Google.

Dogpile – Dogpile has been around for decades and is still an excellent metasearch engine that all sourcers should consider.

Yandex – From Russia, with tons of love, this is one of the most popular and widely used search engines in the world!

Search engines are beautiful things. But learning to use them beyond looking up a single term is imperative if you want to remain a productive and efficient sourcer. Let the search engine do the brunt of the work for you, so you can focus on honing in on finding that perfect fit for the job. We know which is your favorite, but humor us anyway, Google or Bing? Go!

Source: This article was published sourcecon.com By Shannon Pritchett

Categorized in Search Engine

What You Need to Know About Finding an Email Address

Did you misplace an email you desperately need? Whether it's a business contact or an old high school friend, there are several ways to go about tracking down someone's email address. Employ these five strategies to find any email address you're looking for. 

Use Social Media

Browsing through pictures on a phone
Google/cc

Searching Facebook, Twitter, Instagram, or LinkedIn could quickly lead you to the email address you're looking for.

Search each those the social media websites directly to find users. Details such as age, high school, and hometown—if you know them—are particularly helpful on social media sites.

Even if a person's page isn't public on Facebook, users sometimes allow their email address to remain public. That way,  someone who isn't a "friend," can still contact them. More »

Close up of silhouetted male hand typing on laptop keyboard
Andrew Brookes/Getty Images

Sometimes a good old-fashioned web search can help you locate someone's email address. Use a large and extensive search engine such as Google to garner the best results.

Putting the person's name in quotes often narrows the search. However, if the individual you're looking for has a common name, like "John Smith," you're going to need some additional information.

You could launch a search, like this: "John Smith" + "Brooklyn, New York." The more information you have, the better. If you know where the person works, their hometown, or place of business, be sure to add that information to your search terms. More »

Laughing architects at conference table in office.
Thomas Barwick/Getty Images

It may have a scary name—Hidden Web, Invisible Web, Dark Web—but it contains a treasure-trove of information if you just know where to look. There are plenty of less-well-known search engines that are designed to search the Dark Web, including Internet Archive Wayback Machine, Pipl, Zabasearch, and others. Some require registration and some may offer only limited information without a fee. Remember where you are, and don't be eager to enter your payment information. More »

Check Web Directories or White Pages 

Phil Ashley/Getty Images

From public records to the white pages, there are email address directories that you can find on the internet. Once on these sites, such as Whitepages, you can use search engines that help you find an individual's email address. 

It's helpful if you know the city and state where a person lives or works.  More »

Guess Somebody's Email Address

Cup and balls guessing game.
Peter Dazeley/Getty Images

Most organizations do not let people choose email addresses freely but instead assign them by name. You can take advantage of that by assuming the email address using some syntax guessing. Of course, you have to know where the person works.

Try separating the individual's first and last name with a period. If you look on a company's email directory and everyone's email starts with their first initial and the first six letters of their last name, you can try this combination.

For example, if the addresses at the company website are all in the format This email address is being protected from spambots. You need JavaScript enabled to view it., John Smith's would be This email address is being protected from spambots. You need JavaScript enabled to view it.. However, if you see on the website that that This email address is being protected from spambots. You need JavaScript enabled to view it. belongs to the CEO, it's more than likely that an employee named Emma Osner's email address is This email address is being protected from spambots. You need JavaScript enabled to view it..More »

 Source: This article was published lifewire.com By Heinz Tschabitscher

Categorized in How to

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media