How to Triple Your Blogs Views in 60 Days or Less

By Hector (the Connector) Cisneros
Working the Web To Win's blog Stats

So, you have a blog and you’re publishing articles on a regular basis, but you’re following and page views are growing at a snail’s pace. What do you need to do to get to the next level? Wouldn’t it be great if you could find some proven method that produced a quantum leap in growth? Would learning how to maximize your postings really help? Would learning how to use the right schedule, frequency, and time of day actually make a difference for your blog? Does sharing your posts with the right people in a coordinated manner make a difference?

If you what to learn how to take your blog from a mere few hundred page views a month to over 3,000 in the same period, read on. Better still, if you want to achieve an exponential growth from 500 to 12,000 page views a month, get excited because we’re going to tell you exactly how we did it.

Courtesy of
First, let’s start with some prerequisites for success. To reach the quadrupling effect in 60 days, you need to have already published over 100 high quality, separate blog posts. If you haven’t reached that number yet, our formula will still work, but it’ll just take longer to reach that quadrupling goal.

Also, it’s important to understand you can’t achieve this kind of following and readership by using quick and dirty means. The following items are part of our philosophy, our mind set, and our Guiding Principles that directs our work from start to finish. If you don’t have the right mind set, work ethic, and don’t follow the same principles we do, then this won’t work for you. On the other hand, if you follow our methodology and principles you can’t fail. Okay, let’s get started with our Guiding Principles:

Our First Guiding Principle – Consistency

  1. Having a strong social presence is important. Consistent posting, inviting, 
    engaging everyday if possible.
  2. A quick way to grow your social networks is to join lots of groups. Groups can contain thousands of members so this will help make up the difference when you’re just getting started and only have a few followers.
  3. Make sure you join both industry-specific and customer-specific groups.
  4. Provide useful, regularly curated content to your social nets; this is important to build loyalty.

Our Second Guiding Principle – Be Customer-centric
Courtesy of

  1. It’s all about what the reader wants. Quality, relevance, timeliness and professionalism are all important.
  2. Creating unique quality content and publish it on a weekly basis (at the least). This is extremely important.
  3. Sharing your authoritative posts with your social nets is also important. Your unique posts are more valuable than someone else’s post to you.
  4. Have a focused clientele.

Our Third Guiding Principle – Being a Giver, Not a Taker

  1. Be more concerned with producing something of value rather than trying to be found via keywords or some technique.
  2. Find others and support them. Fostering a group of like-minded, loyal supporters who are willing to read, comment on and share your post every week is very important.
  3. Be willing to join multiple groups and also be willing to participate by providing these groups with useful content.

Our Fourth Guiding Principle – Always Make it Easy for Your Readers

  1. Make sure your content is easy to find, share and understand.
    Courtesy of
  2. Always deliver on your promise. If the opening paragraph and summary talk about a subject, your article better pertain to and expand upon that topic.
  3. Catchy titles using the right key words is important.
  4. Provide lots of links to your previous content.
  5. Also provide links to lots of other people’s relevant content.
  6. Adding pictures, videos, podcasts and other multimedia elements can raise your blog’s visual appeal, “stickiness” and share-ability.
  7. Make it easy to share your work with social sharing plugins. Also, ask others to share and comment on your articles.
  8. Always strive to produce evergreen content. This will allow you to recycle your content exponentially much more than content designed to jack (i.e., utilize) key words or trending topics.

Our Fifth Guiding Principle – Be Willing to do Whatever it Takes

  1. You must commit for at least a year before you evaluate how you’ve done.
    Courtesy of
  2. Set up “S.M.A.R.T.” goals (Specific, Measurable, Achievable, Realistic, Timed) and review them at least on a monthly basis.
  3. Set up Google Analytics to track visitors and social shares
  4. Don’t be afraid to get help; a coach can be a Godsend.
  5. Get a blogging buddy to proof your work, keep you honest and on target.
  6. Set up a rewards reaching short-, mid- and long-term goals.
  7. Commit without fail, to writing at least one quality blog a week.

Now that you understand our Guiding Principles, you can start with the publishing techniques that roll out the content so your followers can consume it. New, fresh posts will normally garner approximately twice as many page views as recycled, old posts. New posts should be introduced on your social media channels with verbiage such as, “Here’s our latest article, check it out,” followed by the article title and a link. You can’t use this specific verbiage with recycled articles however, because you’d be breaking the trust with your followers. They’d quickly realize you’ve lied and then you’d lose credibility, so don’t pass off old posts as new ones.

Here’s how your first year will play out: Your journey will begin slowly, like a snowball rolling down a mountain side. At first, the snowball will only be the size of your fist. By
English: The Snowball Русский: Снежок
English: The Snowball Русский: Снежок (Photo credit: Wikipedia)
the time it reaches half way down the mountain, it will be the size of a mid-sized car, and when it hits the bottom, it will be the size of a five-story house. Your page views will behave similarly. At first, you’ll only have a few page views. As your article library, support partners, and your social network followers grow, so will your page views. When you hit 30+ articles, you’ll start reposting your articles as recycled social posts; as a result, your page views will double for the first time. Here you’ll be recycling a blog post every other week. When you reach 60+ articles and triple your social network connections, you’ll be able to double up (i.e., post two blogs per week) your recycled article posting schedule and your page views will double again. When you reach 130+ articles and double the number of your social network connections once again, you’ll be able to quadruple your page views in as little as 60 days (if not sooner).

If you already have a nice following and a 100+ blogs posted, you can jump right in and start posting two blogs a day. Articles that are not evergreen will only garner a few page views. However, your evergreen articles could easily grab a hundred page views.

Want to Know a Short Cut? (Hint: There are very few.)

English: Hikers taking one of many short cuts
English: Hikers taking one of many
short cuts (Photo credit: Wikipedia)
If you double or triple your article production, you also shorten the overall time it takes to grow your following and page views. This literally means writing two to three unique quality articles a week. Having more unique, quality, timely and relevant material to feed your social nets is the key (along with having numerous social net followers to read your content). Page views are a function of good content being exposed to large numbers of people. This in turn, less than 10 percent of those exposed to your article link will view your page.

How do you know what I’m telling you is true? 

My company, Working the Web to Win, did several experiments, posting different numbers of new and recycled blog posts each week for 60 days. During that time, we were able to increase our average monthly page views from 3,600 to over 12,200 a month. We also found that if we lowered the number of recycled post and new article posts, the monthly page views would diminish.  We found that new, unique articles would receive double the page views of recycled blog posts. We also found that posting at certain times of day had different effects as well. We learned that posting first thing in the morning (8:30 a.m.), just past noon (12:20 p.m.), just before quitting time (4:15 p.m.) and after the kids are put to bed (9:45 p.m.) to be the best times to post. The social networks that you posted to also had an effect on when posts would most likely be read. Facebook would peak on weekends and evening. Twitter was somewhat even across the board while Google+ and LinkedIn seem to do better between 7 a.m. to 7 p.m. We also found some variability in words used to curate the post and the titles of the articles themselves.  While this isn’t an exact science, we do know that the quality and timing of the posts play an important factor.

Are There Any Other Short Cuts?

Courtesy of
The only other short cuts we know of will cost you money. Lots of it. You can participate in Pay Per Click (PPC) to get more page views and followers. Pay Per Click/Views promos are available on Google Search, Facebook, Twitter and LinkedIn. These can accelerate your growth and monthly views but these views will not be as loyal as the organic growth that you can gain with the natural progression of week in and week out production of quality content distribution.

Here’s Our Magic Formula in a Nutshell

Follow the Guiding Principles 1 through 5 when producing content. For every 32 blogs you publish and share, you can repost one of those blogs each day until you run out, then start the process over again.

Might and Magic
Might and Magic (Photo credit: Wikipedia)
Here’s a possible example: Reach a total number of 32 published articles (however you can do it ― by writing one, two, or three articles a week). Then start recycling your posts. Push two blogs per week to your and your team’s social nets. At the end of 32 days, you’ll have recycled 32 articles and created and posted, at the minimum, four new articles.

Once you reach 64 published blogs, recycle two posts per day, except on the day you’re posting your latest blog for that week. Post one blog in the morning and one in the late evening for 30 days. Continue to do this until you reach 96 blogs. When you reach 96 blogs, you can either recycle two a day for 48 days, or recycle three posts a day for 30 days and so on. Continue this process for at least a year.

Courtesy of
Every time you double your base number of 32 published blogs (i.e., 64, 128, 256, etc.) you can repost another blog that day. Once you build your library of 256 articles, you can recycle posts four times a day for 60 consecutive days without repeating any posts. I’ve read of some companies that have large numbers of articles in their content library that only post their own unique content, and they do so to the tune of ten recycled post a  day. The combination you use may be different than what I’ve listed, so make sure you experiment with multiple posting schedules.

In this article, I showed how our company was able to increase our blog’s page views from an average of 3,600 per month to over 12,000 page views per month in less than 60 days. I provided our five Guiding Principles that direct how and what kind of content we produce, along with the specifics on post scheduling, building credibility, engaging the audience, and fostering social dynamic partnerships.

If you’d like to find more articles like this, read, “Blogging Secrets of the Pros”  and “The Secrets of Blogging For Dollars” or enter the words “Blogging or Story Telling” in the search box at the top of this blog to find even more. If you found this article useful, please share it with friends, family, coworkers and associates. If you have something to add or have a different opinion, place them in the Comments section below.  It’s been my pleasure sharing this information with you.

That's my opinion; I look forward to hearing yours.

If you'd like a free copy of our eBook, "Internet Marketing Tips for the 21st Century," please fill in the form below and we'll email it to you. Your information is always kept private and is never sold.

Hector Cisneros is a partner, COO and Social Media Director for the award-winning, Internet-based marketing firm, Working the Web to Win, in Jacksonville, FL. You can connect with him on TwitterFacebookGoogle+,  LinkedIn,  and YouTube.  He’s also the co-host of BlogTalkRadio’s “Working the Web to Win,” where he and Working the Web to Win’s co-founder, Carl Weiss, make working the web to win simple for every business. Additionally, Hector is a syndicated writer on EzineOnline and is an active blogger (including ghost writing). He's a published author of two books, "60 Seconds to Success"(available at Amazon and B&N), and "Internet Marketing for the 21st Century," which you can get by filling out the form above. He’s also the co-author of the new book, “Working The Web to Win,” which is now available on

Related articles

How to Stop Sir Spamalot

Monty Python's "Spamalot" (Photo credit: Wikipedia)

Do you remember Monty Python's 2005 musical comedy "Spamalot," along with its irreverent send up of the Arthurian legend?  Directed by Mike Nichols, the Broadway production garnered three Tony Awards and grossed more than $175 million..  Fast forward: Nearly ten years and that term is being applied a lot, only this time without actors clapping coconut shells, substituting for horses or the Holy Hand Grenade of Antioch.  What I am referring to is online spam.

Ever since the Internet began, there have been individuals who weren’t willing to follow the rules of email etiquette. Spammers have been the bane of many people’s existence online, especially in terms of using the worldwide web as a kind of email assault weapon.

So What is Spam? 

According to, Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. Clicking on links in spam email may send users to phishing web sites or sites that are hosting malware.

 How Big of a Problem is Spam Mail? 
Courtesy of

According to as of August 2013:
  1. The percentage of spam in email traffic in August was down 3.6 percentage points and averaged 67.6%.
  2. The level of phishing increased tenfold compared with July, and averaged 0.013%.
  3. Malicious attachments were found in 5.6% of all emails, an increase of 3.4 percentage points compared to the previous month.

Not only have malicious emails increased during the past year, but spammers have become much craftier, using everything from “Back to School” themes during August and September, to other lures relating to everything from popular holidays, sports, lifestyle, age and gender slants. 

Recent spam trends have included fake airline ticket offers, cruise ship deals and other inducements targeted toward people looking to take a vacation.  A number of these emails were even made to look as though they had been sent by legitimate companies such as Delta Airlines, Royal Caribbean Cruise Line or shipping companies such as FedEx, UPS and DHL.

“Fake notifications often utilize the names of popular international delivery services such as FedEx, UPS and DHL. They tell recipients that a courier failed to deliver their parcel due to an incorrect delivery address. To get the parcel, the recipient should print out the attached document and call the company's office or confirm specified data, including the delivery address. Malicious files can also hide in fake documents supposedly containing detailed information about the parcel, which does not in fact exist. Spammers try to make their fake notifications look legitimate and typically use not only an apparently real sender's address but provide non-existent order information, genuine contact details from official websites and a copy of a privacy notification letter.”

There Are Laws, Right?

While there are indeed a number of laws on the books in the US, the problem begins with trying to
Courtesy of

determine where the spam originated.  In fact the preponderance of spam originates from foreign shores.  A number of spammers also use proxy servers, slave drives and other forms of subterfuge to cover their trail.  There are a number of state, national and international laws in effect to prosecute these crimes. However, this type of subterfuge not only makes it difficult to prosecute the offenders, it makes it nearly impossible for the average citizen to seek any sort of redress should their system be compromised by malware.

Active Prevention is Better Than a Pound of Cure

The first line of defense in the fight against spam is to never open an email from an email address with which you are unfamiliar.  This doesn’t guarantee success either, since email addresses can be pilfered and/or spoofed.  So if your best friend sends you an email that goes something like, “Check out this blog/offer/link,” don’t go there since your friend’s address has in all likelihood been compromised.  The quickest way to infect your system with malware is to get you to accept a link.

Courtesy of
Also look for odd word choices or misspelling since people to whom English is a second language frequently have a hard time getting a fluent grasp on our native tongue.  If the message tells you that you have either won some contest that you never entered, or are about to be penalized due to an implied negligence, don’t fall for this trick. (Note: The IRS does not notify you by email.)  When in doubt, call the company from which the notice was purportedly sent or talk to an expert such as your business partner, accountant, or attorney if you need to check out any offer’s validity.  Never click on a link due to any emotional response.

Do not fall for an unsubscribe that requires you to enter your email address.  This is just a ruse designed for you to verify that your address is active.  There are dozens of ways for a spammer to get your email.  They can purchase a list or they can use a bot to trawl your site looking for contact information.  Don’t make spammers lives easier by signing up to win a free iPad.  Guess what? The only winner is going to be the spammer.

Need to leave your contact info on your website?  No problem.  If you use Gmail, you can create a number of subsidiary email addresses that you can use and eventually change once the spammers get hold of them.  Here’s a tip from WikiHow:

Have one main account, and then make a separate account for different purposes (one for friends, one for entertainment sites, one for your financial websites, etc.).  
  1. In gmail, you can add a "+" button to your email address. For example, you can signup for newsletters like if your email address is
  2. Set all those addresses to forward the mail to your main account so that you do not have to check multiple accounts.
  3. If you start receiving spam through one of your alternates, you can trace it to one of your disposable addresses and simply delete that account.

Courtesy of

You Need at Least Two Lines of Defense

While most email systems come with a spam filter, this is not nearly enough to protect your system from malware.  I recommend you not only invest in a first-rate virus and malware protection system, but you should also invest in a secondary adware/malware system such as Malwarebytes or Advanced System Care.  Today one level of defense is insufficient to protect your system and your data.  Better to pay a few dollars now than many thousands of dollars should your security be compromised.

If you haven’t realized it already, spam is not going to go away.  If anything, it is becoming ever more prominent, effective and insidious.  While laws will continue to be created, these will have little or no effect slowing much less stopping those who wish to spam a lot.  Unlike the Knights of the Round Table, the call to arms when it comes to spam is not "One for all and all for one!”  It’s more like, “Every person for themselves!.”  That being said, it is up to every individual to defend themselves against this ilk since the courts are for the most part stymied by the international nature of this techno crime.  Where’s the Holy Hand Grenade when you really need it?

In this article, I discuss the current problems associated with spam (aka junk email or UBE) and the various type of attacks that are accompanied with this type of email. I have also provided a number of defensive tactics a person can implement to protect themselves from all kind spam and other forms of junk email.

If you found this article useful, please share it with friends, family, co-workers and associates. To learn more about this subject read, "21 Century Email - What's New, What Works, What's Scary!” and "Going Postal - With Touch Marketing" located on our blog. You can also search this blog by keying in "Spam Email”  in the search box to find other articles on the same subject. If you have something to add or have a difference of opinion, place that in the comments section. Thanks for taking the time to read our blog… and by the way, don’t forget to share this with friends.

If you'd like a free copy of our eBook, "Internet Marketing Tips for the 21st Century," please fill in the form below and we'll email it to you. Your information is always kept private and is never sold.

When Carl Weiss isn’t tilting against technological windmills, he helps clients learn how to work the web to win.  He is also co-host of the weekly online radio show, Working the Web to Win that airs every Tuesday at 4 p.m. Eastern. Carl is also the co-founder and CEO of the award-winning, Internet marketing firm, Working the Web to Win

Related articles

The Piracy of Privacy - The Looting of Privacy in America

Privacy Lost (Photo credit: Wikipedia)
By Hector Cisneros

In case you haven't noticed, personal privacy, for the most part, does not exist anymore. Most large retail businesses have full surveillance systems. The highways and roads are replete with traffic cameras. Satellites watch all of our streets; our government is recording and storing our emails, texts, and phone conversations; and criminals are having a hack-a-thon on our computers and smart devices for fun and ill-gotten gains. Heck, if you have a smart watch on, Google knows when you go to the bathroom! In the book, and then movie, “Minority Report.” by Philip K. Dick and the popular science fiction TV show, “Continuum,” created by Simon Barry both forecast a world where government and business combine to produce a society where many freedoms and privacy issues are expensed in the name of the greater good. Unfortunately, the greater good is defined by a union of few powerful government officials, politicians and rich corporate executives.

The Beginnings of Pre-Crime Tech is already here!

Cover of
Cover of Minority Report [Blu-ray]
Far-fetched you say? In the “Minority Report,” a technology that predicts when a crime is about to happen, signals and alarm and issues arrest warrants for people to be booked for pre-crime events… without the events ever happening! In Barry’s “Continuum,” a government/corporate police state regulates everything and controls all sales. You work to pay off your life debt; and every building, street and electronic device is monitored and connected to the state’s computer surveillance systems.

Today our government is funding research and experimenting with computer systems that provide pre-crime perdition based on prior crimes having taken place in specific areas. The
se same programs are used to profile terrorists and criminals as well. The police then use these “forecasts” to schedule patrols and resources. This seems fine on the surface, but this is a slippery slope and God forbid you happen to be in the wrong place and match some profile of criminals and crimes that haven’t been committed yet. 

Get Some Freedom and Privacy Back

So, what can the average person do to get some of their freedoms and privacy back? How can the average person make any headway against a government bent on knowing everything about everyone? How can a simple citizen fight against the big corporations that want us 
addicted to their products? How will we stand against the criminal syndicates fixed on stealing our personal information and assets? If you’re sick and tired of the government, big businesses and criminals hacking your life, read on and learn what you can do now to reel against the machine and turn the tides against a world bent on fulfilling a 1984 reality.

Why Has This Happened?

John Underkoffler explains the human-computer ...
John Underkoffler explains the human-computer interface he first designed as part of the advisory work for the film Minority Report. The system, called "g-speak", is now real and working. Note the gloves Underkoffler is wearing. (Photo credit: Wikipedia)
Why have we lost most our privacy? Is it because 9-11 or because we value safety more or because we trust our government more? Is it because big business provides us with free stuff (like Google), or is it because we’re just ignorant or maybe just plain lazy? The whole loss of privacy slide started with the Bolshevik Revolution and continued through World War I, World War II, and the various wars we seen over the last 90+ years. War has given rise to spying, wiretaps and a multitude of surveillance inventions designed to keep track on the other side. This has slowly bled over into spying on possible treats within our own country. Then it moved to spying on all of us!

This spying has now escalated because it much easier spy on people using the Internet. When people use their computers and smart devices to share their lives on social networks and correspond with emails, they don’t realize that the corporations who own these networks must, by law, share your personal information with our government. They also share your information with their advertisers and corporate partners in order to sell you their products.

What Social Savvy Criminals Are Doing

The November Criminals
The November Criminals
(Photo credit: Wikipedia)
Adding insult to injury, hackers and socially savvy criminals can track your movements by just reading your current social posts on any of the social sites. Our streets and highways have many surveillance cameras and businesses also have many cameras pointed both at the street and inside the business. Sometime the intrusiveness is a mistake like when target sent a babe products catalog to an expecting mother based on here shopping habit. However the mother wasn’t married and her father received the catalog. The label on the catalog congratulated the expecting mother (unwed teenage) on her pregnancy!  Oops!  Add this type of problem to the fact that corporation are increasingly gathering personal information on its customers, including financial information and you have a time bomb waiting to go off. Hacker know this all too well and it has led to many huge breaches of security and data thief.

Again, all of these items ― with the exception of criminal hacking ― can be used for good. But abusive bureaucrats, bad politicians and greedy corporations are increasingly common and they’ve already proven they’re ready to abuse this power. If the American public doesn’t rebuff those in power for these abuses, they will continue to lose more rights and freedoms.

What Can We Do!

So what can you do? To start with, stop sitting on the sidelines while passively letting your freedoms and privacy rights get erased without contending for them. Do research, get current and educate yourself. Write your congressmen and senators and tell them you want the government to stop gathering vast amounts of public emails, texts and phone calls without cause. Ask them to pass laws that prohibit corporations from owning your personal data that you’re sharing with your friends. The law should allow an individual to remove any and all data that they’ve posted on social networks or other sites. Small business should be able to dispute anonymous posts defaming their businesses. 
Comodo Dragon (web browser)
Comodo Dragon (web browser) (Photo credit: Wikipedia)

You can vote with your pocketbook, too. Choose to use Internet providers that are fighting against the government demands to fork over all your data. Write your service provider asking them to stop providing this data illegally. Don’t like Google Chrome tracking all your moves? Use Comodo Dragon Internet Browser or other browsers that don’t track your every move. Don’t like Google Search tracking you and selling your information to advertisers? Try DuckDuckGo for your search engine needs. They don’t track your every move.

Don’t download free smartphone apps as virtually 99.999% of all free apps track and sell your information in some way. Buy only the apps you really want and only if they don’t track or share your information. Buy software that implements anti-tracking capabilities. This includes using anti-malware for your all smart devices, especially your smartphones. Encrypt your emails so that others can’t read them. A simple search in DuckDuckGo will provide you with dozens of article and sites that provide PGP encryption, (a.k.a., pretty good privacy) for your emails. Many antivirus software companies such as Norton and Trend also provide these types of encryption packages.

Check Out the New Smart Phone That are Untraceable!

Curtesy of
You can even buy a smartphone that was designed from the ground up with protecting your privacy. Check out the Black Phone and Silent Circles software; these have all the high-tech security features a person would want. I’m sure every Black Hat Hacker is scrambling to figure out a way to compromise this device, but I’m also sure the Black Phone and Silent Circles are implementing counter measures to thwart their plans. Currently, the Black Phone and the Blackberry are the most secure smart phones available. It’s no doubt this new phone is just a sign of more such devices to come.

Make sure you protect all your smart devices with anti-malware/antivirus software. This includes all the so-called smart devices that are part of “Internet of things.” Such devices as computers, tablets, Smart TVs, refrigerators, smart watches, smart clothing, medical devices and much more. A recent article in Mashable reported,“70 Percent of Internet of Things Devices Are Vulnerable to Hacking, Study Says.” This includes all the increasingly popular items including activity monitors, watches, smart phones and more. Another article by Brian Donohue, posted on, discusses how “Connected Medical Devices Simultaneously Increase Risk and Safety” of its users because they are vulnerable to hacking.

To summarize all the things I’ve been talking about so far, here are a dozen items that can make a difference if you just stay vigilant. Remember, freedom isn’t free. A lot of people fought and died in order to establish what we have, I mean had. And privacy only exists if we demand that government and businesses stop eroding it. Demand that law enforcement prosecutes cybercriminal who insist on stealing our information.

Follow these 12 rules and things will get better:

  1. Make choices that protect your privacy.
  2. Read, learn and study about how surveillance is carried out and who is doing it.
  3. Buy products that protect your privacy.
  4. Shop at places that respect your privacy.
  5. Use a browser that does not snoop on you.
  6. Use email that is encrypted.
  7. Make sure your smart devices (computers, tablets, smart phone, etc.) have anti-malware/virus protection running all the time.
  8. Write your congresspersons and senators, asking them to stop spying on U.S. citizens without cause.
  9. Write retail outlets and express your disgust with their surveillance tactics.
  10. Vote socially by posting, share and expose privacy abuses by governments, Internet companies, retailers, corporations and social networks.
  11. Visit the FBI and other law enforcement websites regularly to look for imminent threats.
  12. Share posts and articles you read about surveillance and privacy abuses with as many people as you can.

In this article, I discussed the looting of privacy in America. I discussed how we’ve reached this state of affairs and who the pirates are that are doing stealing. I also provided a dozen ways you can protect and increase your privacy along with details on products and companies you can turn to for help. The bottom line is, it's our duty as Americans who care about our freedom and right to privacy, need to be vigilant of abuses. We need to aggressively demand that our government respect our privacy, and that the businesses we patronize don’t abuse our loyalties. We must demand that law enforcement aggressively prosecutes cyber criminals who are constantly hacking the system for personal gain.

If you’d like to find more articles like this, read, “Trick or Tweet? The Vulnerabilities Inherent
to Twitter and All Social Networks” and “Big Data Comes Wrapped in Big Danger” or enter the words “Hacking or Privacy” in the search box at the top of this blog. If you found this article useful, please share it with friends, family, co-workers and associates. If you have something to add or have a difference of opinion, place them in the Comments section.  It’s been my pleasure sharing this information with you.

That's my opinion; I look forward to hearing yours.

If you'd like a free copy of our eBook, "Internet Marketing Tips for the 21st Century," please fill in the form below and we'll email it to you. Your information is always kept private and is never sold.

Hector Cisneros is a partner, COO and Social Media Director for the award-winning, Internet-based marketing firm, Working the Web to Win, in Jacksonville, FL. You can connect with him on TwitterFacebookGoogle+,  LinkedIn,  and YouTube.  He’s also the co-host of BlogTalkRadio’s “Working the Web to Win,” where he and Working the Web to Win’s co-founder, Carl Weiss, make working the web to win simple for every business. Additionally, Hector is a syndicated writer on EzineOnline and is an active blogger (including ghost writing). He's a published author of two books, "60 Seconds to Success"(available at Amazon and B&N), and "Internet Marketing for the 21st Century," which you can get by filling out the form above. He’s also the co-author of the new book, “Working The Web to Win,” which is now available on

Related articles