2022 Hurricane Checklist and Shopping List

Hurricane season is fast approaching. When facing a storm like a hurricane, preparation is key to mitigating losses and downtime for your business. We’ve compiled a list below of best practices to protect your network from wind, water, and the worst!

Having this checklist is crucial to ensure the proper safety procedures are taken and in place when a storm is coming your way. Along with our checklist, we have a shopping list for top items needed to prepare for Hurricane season. 2022 is predicted to be a year of heavy storms, so planning ahead is critical.

On June 1st- 3rd, 2022 ADVYON will be running a Hurricane drill. What does this mean for our customers? This means as we prepare and practice these drills, your business may receive a call from us to confirm backups are up-to-date, and preparations are in place, just like we would in an actual hurricane storm. During these drill days, we will be answering emergency-only tickets and calls.

Clear Plastic:

First Aid Kit:

Tactical Flashlights:

Clean Release Tape:

Hand Sanitizer for Cleanup:

Solar Power Portable Charger:

Weatherproof Storage Totes:

Gloves for Cleanup:

AAA Batteries:

AA Batteries:

Battery Powered Radio:

Clorox Wipes for Cleanup:

Trash Bags for Cleanup:

Three Ring Binder:

Please Note: As an Amazon Associate, we earn from qualifying purchases.

Charleston Roofing and Exteriors: Content Writing and Website Design

What We Did For Them: Content Writing, Website Design

Industry: Roofing

Content Writing:

The Charleston Roofing and Exteriors website was an ambitious project. The finished site has 117 pages, most of which were written from scratch by our content writer. The writing process began with a simple outline of every topic we needed to cover. The website covers general topics like roofing, windows, and gutters then breaks each down into more detailed subjects like roof types, window styles, and gutter guard services.

The whole site was written to be extremely search engine friendly while also explaining the roofing process. To ensure that the site would appeal to search engines, we started the content writing process by doing keyword research and taking notes of the most important words and phrases to include throughout the site. We then began to write content that would explain all services to the customers.


To begin the process of designing the website, we started from an existing logo and brand. The Charleston Roofing and Exteriors logo featured blue and green colors which we used throughout the site. We added additional colors including lighter versions of both colors and a rustic blue and soft darker blue for larger sections of the site. We used the green color from the logo only as an accent color to draw more attention to the important calls to action. For the headline, we incorporated blue with an accent of green.

Our main call to action was the quote form. We wanted to get as many people as possible to fill out the form to help the owner funnel in leads. We made the form easy to fill out and submit. The user can fill out a form in two ways: a quick, easy form on the home page or on the “contact us” page.

For the menu, we had to figure out the best way to incorporate the over 100 pages of the site. We designed the drop down menus so that when users hover over the title for each page, they can see the featured image. These hover effects and graphic changes help keep the user interested in the content of each page and create an added wow factor. We have a large “get a free quote” button to continue to lead customers to filling out the quote form.

The sticky menu is the same as the menu at the top of the site so that as the user scrolls down through the site, they can still easily navigate through the different sections of the website. This keeps the text-heavy pages organized and easy to work through. 

We created a rotating section with the three main services: roofing, windows and gutters. These services section display above the fold. The animated feature is subtle, but draws the eye and encourages user interaction.

We were sure to build a prominent section to showcase reviews from customers. Roofing is a service-based business, so reviews are especially important. Customers are more likely to hire a service provider based on what other users think.

Internal pages:

One of our favorite internal pages is the window styles pages. For a secondary level of user friendliness, we added a menu just for this page. Every type of window Charleston Roofing and Exteriors offers is listed in the top menu so that each can be accessed quickly. Each section has an illustration and a description of each.

For each internal page, we organized the information in a way that made it digestible for the customer. For the “about us” page, we broke up each section with larger headings and roofing.

For the “insurance claims” page, we included a chart to explain how each step of the process works.

Making the information on each page easy to follow for our customers was one of our priorities when creating the site.

Final Thoughts:

The Charleston Roofing and Exteriors website was an ambitious project for our team! From writing the 117 pages to figuring out the best way to display them in our menu to incorporating an existing brand in an updated way, we feel that we were able to help this client better display information for their business. We made it easy for people to get a quote, which has been a valuable tool to funnel in more leads. The hover effects and thoughtful integration of pictures, charts, and other opportunities for customers to engage with the site help maximize the time users spend on the site and keep them interested. We are very proud of the way this site came together and continue to work with the client to create additional marketing materials for his business.

6 Ways to Overcome Writer’s Block with Artificial Intelligence

Writers often feel stuck when they are unable to produce the material they had hoped. Whether it’s because their creativity has been exhausted, or their mental health is blocking them from writing, there may be a way for you to overcome your writer’s block with artificial intelligence. Artificial intelligence is an interesting idea in that it can provide some of the inspiration and information needed to get past these blocks. Here are six ways you can use AI to overcome writer’s block and get back to producing great content.

What is writer’s block?
Writer’s block is a term that describes a condition where an author becomes unable to produce the material they had originally hoped or expected. You could experience this when your creativity has been exhausted, or when you are experiencing a mental health block. Writer’s block can be difficult, but there are ways to overcome it and get back to producing good content.

Use Artificial Intelligence to Overcome Writer’s Block
There are many ways you can use AI to overcome your writer’s block. You may want to start by doing some research into the different writing styles and see which one suits you best. After that, it may be helpful to look up examples of how other people have overcome their blocks. If a friend has told you about a technique they used, an article you read, or an app that helped them get through writer’s block, those ideas can be helpful for others as well.

AI can also help with content creation by providing some of the inspiration and information needed to write your article. There are many websites that offer articles on various topics in hopes of inspiring more content on their site. If you have created a budget for marketing efforts, it may be worth looking into which AI tools work best for your industry or sector and using those tools to provide some inspiration for your writing.

If none of these techniques sound right for you, consider finding an AI program that offers advice and isn’t too expensive. Some AI programs will give you feedback on what they believe is important in your article while others will offer general suggestions such as starting the article with a quote or including graphs in the text.

Become a better writer with AI
Artificial intelligence can help you become a better writer. When you are stuck, you may need to take a break or take some time to brainstorm. You can use the artificial intelligence to generate content for you and inspire your creativity. You never know what could come out of it!

Get Ideas for Creative Writing Prompts
Artificial intelligence can come in handy when you’re looking for ideas to write about. To find prompts, you can use services like Quora and Reddit to see what’s trending. You could also use Google to search for popular keywords related to your topic and see what results show up.

Use AI to Generate Content
This is a great way to get back on track when you have writer’s block. The idea here is to use the AI to generate content for you and fill the gaps where you can’t produce the material yourself. I know it sounds like it would be a bit of a stretch, but there are a number of platforms that offer this service (for free!)

One such platform is called Writesonic (click here to try it out free). This website offers a number of features including grammar checking, text rewriting, article spinning, and even the ability to create an article out of just one word. With this site, your creativity isn’t needed – Writesonic will do all the work for you!

Another option for overcoming writer’s block is using tools like HemingwayApp.com or Turnitin.com. These sites allow you to write rough drafts which they then analyze for readability and style. This can be useful when working on pieces with tight deadlines or strict guidelines as these sites provide instant feedback on your writing before you submit it for editing.

Writer’s block can be a real problem for authors, but AI is here to help. With the right tools, you can become a better writer, boost your creativity and even generate new content. Whether you want to write a novel or a blog post, AI can be your creative muse.

How to Balance Work and Life as a Tech Parent

The tradeoff between work and life is a modern-day dilemma. If you’re a tech parent, you might be feeling this pressure even more intensely. The latest studies show that nearly one-third of parents are working more than one job to make ends meet. You have to find out how to set boundaries so you can get the most out of both time periods. Here are some tips for balancing your work and life as a tech parent:

Set Boundaries
Many parents find it challenging to balance work and life. For those who also have children, this can be even tougher as you’re trying to equalize your responsibilities as a parent with your responsibilities as a tech employee.

In order to create some boundaries around your work time, consider limiting the hours you spend on the computer each day. This type of self-regulation can help you stay on task and limit distractions from outside sources like social media or email that can keep you from getting things done.

When setting boundaries for personal time, try alternating days where you take care of business and days where you spend time with family and friends. This way, there won’t be any resentment created when it comes to taking care of business or spending quality time together. As tempting as it may be to always put business first (to increase efficiency), try balancing self-care with work responsibilities by alternating which one takes priority each day.

Another tip for balancing your work and life involves staying connected with your team members outside of the office. Technology has made this easy: just start a group chat on an app like Slack or join an online forum for people in similar fields. You might find that these connections help you feel less isolated when you’re at home—not just during office hours!

Finding the Right Balance
If you’re a tech parent, balancing your work and life can be difficult. Working in the tech industry for most of my life, I know how important it is to find balance. We all want to be able to give our kids the best we can while making sure we take care of ourselves and our families.

The tradeoff between work and life is a dilemma that many people deal with on a daily basis. The latest data from the Bureau of Labor Statistics show that 32% of parents are working more than one job in order to make ends meet. Here are some tips for balancing your work and life as a tech dad:

Managing Technology to Make You More Productive
The first step in balancing work and life is to use the technology you have more efficiently. This doesn’t just mean using your computer or your phone more efficiently, but it also means using other technologies, like an automated home. Automating certain aspects of your home can help free up time so you can focus on other things. For example, if you had a dishwasher that automatically started when you left the house, then that would be freeing up some time for you to do something else.

Tips for Working From Home
The first thing you can do to balance work and life as a tech mom/dad is set boundaries. If you’re a parent, it’s important you find a schedule that works for your children and your family in general before you start working from home. Working from home can be a challenge if you don’t have a system that allows you to balance work and life. For example, if your child has an appointment at school one day, there are two options: either you go with them to the appointment or they go alone. If you decide to go with them, then someone needs to stay home with the other children while the appointment is going on which causes another set of problems. You can avoid these problems by being clear about how much time will be spent working from home each day and setting a schedule for who will care for the children when necessary.

How to Keep Your Home Downtime Productive
What are you supposed to do when you’re home?

– Do chores
– Take care of the kids
– Read a book
– Call your mom

The last one might sound fun, but it can be difficult to stay on the phone for hours. Instead, why not try an online chat? Skype is a great way to catch up with friends and family without having to talk on the phone for hours. You can have a video call or just have a simple text conversation. You’ll still get that personal connection without being tethered to a phone for a long period of time.

Find Your Ideal Schedule
The first step to finding a balance is to examine your schedule and find out what works best for you.
If you’re not sure where to start, try setting aside time for each side of your life. For example, if you work from home in the morning, set aside time for your family in the evening. If you work from home in the evening, make sure you take time off during the day. These little adjustments can help you find a balance.

Setting boundaries and finding the right work-life balance is a challenge for any parent and can be especially difficult for those who work from home. However, the benefits of working from home and staying connected to your family make balancing work and home life worth the effort.

The key to finding your ideal schedule is to determine what you need to do to be productive and then create a schedule that aligns with those needs. For example, if you need downtime in the evening after your kids go to bed, build that into your schedule. It may be difficult at first, but over time it will become second nature. And as your kids grow, so will your schedule.

How To Increase The Scope Of Your DHCP Server In A Windows Environment

If you have a working DHCP server on a Windows Environment which has run out of IP addresses, you may want to increase the subnet to give more addresses. This article addresses how to increase the scope of your DHCP server without having to redo all of the existing settings in your DHCP server.

Follow these 10 Steps to increasing IP addresses in your Windows Server DHCP without changing excluded ranges or other configurations.

1. Backup Your existing scope. Open your command prompt with elevated privileges and type the following. It will backup your DHCP scope to your Administrator Documents Folder

netsh dhcp server export C:\Users\Administrator\Documents\dhcp_fullbackup.exp all

2. Export your existing DHCP scope to a text document we can edit later. This will be imported after the scope has been removed.

netsh dhcp server dump> C:\Users\Administrator\Documents\dhcp-readable-export.txt

3. Turn off your DHCP Server Service so we can rename the DHCP database files. Go into your services and stop the DHCP server service.

4. Rename the existing DHCP Database Files. Navigate to C:\Windows\System32\DHCP and rename both the dhcp.pat and the dhcp.mdb files to .old

5. Remove the existing scope from the DHCP Server by right clicking the scope and selecting delete. (Breathe, remember you have a backup)

6. Edit your DHCP scope in the dhcp-readable-export.txt in the following areas to your preferences (Change the places in red with your wanted range):
# =====================================
# Add Scope
# =====================================

Dhcp Server \\*yourserverhere* add scope “*ScopeName” “*ScopeName*”
Dhcp Server \\*yourserverhere* Scope set state 1
Dhcp Server \\*yourserverhere* Scope set delayoffer 0

# ==================================================================
# Start Add Ipranges to the Scope, Server *yourserverhere*
# ==================================================================

Dhcp Server \\*yourserverhere* Scope Add iprange
Dhcp Server \\*yourserverhere* scope set napstate Off

7. Save your changes to the dhcp-readable-export.txt you created earlier.

8. Import the dhcp-readable-export.txt file into your DHCP server. Open a command prompt and type the following.

netsh exec C:\Users\Administrator\Documents\dhcp-readable-export.txt

9. Start the DHCP Server Service

10. Go to your DHCP server and refresh, check your scope.

Pro Tip: Check all of your DHCP devices to see if it has received the new subnet. Restart their DHCP client or renew the network configurations of the computers which have not received the new subnet/address

Pro Tip 2: Change any devices which may have a static IP address to have the new subnet, ie servers, printers, etc.

How To Identify Email Scams

It’s always a good idea to know what to look for in an email that could be malicious. Whether these emails come from someone you don’t know or from a familiar email address, scam emails can occur in three different ways. The emails you should keep an eye out for are spam, phishing, and scams. Here are a few ways to identify each of them and some examples.


Spam is the most familiar of the types of common email scams you might experience. Spam emails are unsolicited emails sent en masse. It’s what we refer to as “junk mail.” Unlike phishing and scam emails, spam is usually sent without the malicious intent of getting you to download destructive software. Instead, they may aim to get personal information from you later on. These “old fashioned” scam emails include chain emails, bogus business opportunities, health scams, discount software offers, and advance fee fraud.

Spam emails often include enticing headlines like “More Money Now” or “This New Diet Will Change Your Life.” Common scams will focus on monetary factors, such as building a better credit score, a work-from-home offer, “free” goods, how to earn easy money, and even investment opportunities. In the body of the email, grammar errors will likely give away the fact that the email isn’t sent from a legitimate organization.

Email services like Gmail  have developed ways to identify scam emails based on factors like administrator set policies, empty message content, and unknown sender addresses. But if your spam filters don’t catch the emails, keep an eye out for any email addresses that don’t seem familiar or offers that seem too good to be true. If the scam is common, you may be able to search the web to see if other people have reported it.

Example of Spam Email:

Gmail has already identified this email as spam because it came from an unknown sender and is similar to emails that other users have reported as spam. The “too good to be true” headline and the sense of urgency immediately gives this away as spam. You can also see that the email contains grammatical errors and random capitalization.


Phishing emails are designed to look as if they’ve been sent from a legitimate organization. Their goal is to entice the recipient to click on a link, download an attachment, or provide personal information. Some common phishing scams include fake communications from a bank or IT provider asking for money, or an email asking you to click on an attachment or go to a different site to view a joke, special offer, etc.

Phishing scams likely look like they come from a company you might trust and can even use logos from large companies. Given how sophisticated some of these emails may look, it’s even more important to be able to identify some of the common factors of phishing emails. A generic greeting such as “Hello, Customer” can be one common sign that this email is not from the company it claims to be. Another common identifier for phishing scams is misspellings. For example, the phrase “Eliminate Debt” may be shifted to say “Ĕliᵐińate Ɖebţ” to evade filters but still remain legible. Most scam companies are aware of filters built into email systems, and will purposefully insert spelling errors into their subjects to get past these filters.

The best way to confirm that an email is a phishing scam is to verify with the company from which you’ve received the email. Log in to the official site with your secure information and see if you have received any notifications that match the email or contact a support representative. Don’t follow the links in any email that feels “off” as these links could have malicious software.

Example of Phishing:

This email is an example of a new phishing scheme that appears to be from Amazon. If you received this email and knew that you had not made a purchase, you would likely be tempted to click on the link to cancel the order. When you respond to an email like this, someone will collect your real Amazon login to access your account. Key giveaways for this particular email as a phishing scam are the generic greeting and the phone number which has been programmed with html to hide other characters so that it looks like a legitimate number.


Scam emails are most likely to be received from a person who looks real. These emails often come from an email “hack.” If you received a suspicious email from a real email address, it falls under a hack. These emails will likely be asking for money outright. If you haven’t heard from someone in awhile and they reach out asking for money, that should raise alarms. Scammers could have breached a colleague’s email address and sent you the email. A good rule of thumb is to personally ask your contact or colleague if the email is truly from them using a different form of contact. Do not reply directly to the suspicious email if it can be avoided.

Example of Scams:

This person hacked an email account and looked for any emails that referenced payments to try to get more money from people. To avoid any scams, the recipient texted the sender to make sure that it was legitimate before responding, and when he replied that it wasn’t, changed the password to secure the account.

What to do if you encounter a scam email:

If you receive a scam email (particularly spam), you can take a few actions to help protect yourself and other users.

First, update your spam filters in your email to reflect the spam you’ve seen. You can restrict the users who are able to send email by updating your filters. You can customize your level of security from just filtering our junk mail to filtering out anyone who isn’t on your safe list. Second, report the email as spam. This will let the email provider know to filter out the emails on their entire system. Third, install an antivirus software and firewall on your device to help protect against installing any harmful software received via email.

If you would like to receive more training on email safety or if you have any concerns about an email you’ve received, please call our team at (843) 324-5824.

Privacy in the Modern World of Technology

Each day, it seems that we are hearing about a new form of technology. For example, NASA has recently sent a helicopter to Mars! Ten years ago, this technology wasn’t available to us. Since technology evolves so quickly, it can sometimes grow at a speed that makes it hard to understand. With every new wave of fantastic technological advancements, we open ourselves up to new concerns. Many Americans have expressed particular concerns about a growing lack of privacy that has come with increased internet usage. Studies have expressed that six out of ten Americans don’t believe that it is possible to go through daily life without having their data collected. 

Companies like Instagram, Google, and TikTok have been accused of overstepping privacy policies to gain more information and data on their customers, and some cases have even been sent to court. These court cases only shine a brighter light on the larger issue at hand: the lack of privacy when accompanied with extensive technology. 


Instagram was accused of viewing users through their phone cameras without expressed consent; Facebook (the owners of Instagram) responded to the lawsuit by claiming the issue to be nothing more than a bug defect. Despite Facebook’s response, Mark Zuckerberg has used tape over his laptop’s camera in the past. Many interpreted this as Zuckerberg’s own distrust of technology. 


Google, a product which 90% of people in the world use as their primary search engine, has been sued for $5 billion for tracking users, even while in Incognito Mode. Google offers Incognito Mode as a private way to browse the Web. Chrome’s Help section assures users that “…[N]one of your browsing history, cookies and site data, or information entered in forms are saved on your device”. A misleading concept is that Incognito Mode — or any other private browsing program — keeps you completely anonymous; however, this is not the case. Your data and personal information are not kept private during these Incognito sessions. Websites can find out where you are through your IP address, and figure out who you are from there.


TikTok, a rapidly growing social media platform, has recently edited their privacy policy to include the gathering of biometric data from US users. This includes faceprints, voiceprints, and whatever else can be used to identify an individual. Biometric data is used to uniquely identify someone; this technology has been helpful in forensic studies and maintaining high security. Educating yourself and others on the importance of your biometric data is the first step in bringing awareness to the dangers of data-leaks. Someone with ill intent might attempt to harm your image or use this data to impersonate you.

Why Data Collection Happens:

Why would enormous multi-billion corporations want your data, anyway? Well, if these companies can figure out what you, as a consumer, would be willing to spend your hard-earned money on, then they can place targeted advertisements in front of you, which could earn them money from advertisers. Your interests, buying behavior, and even your political affiliation can be gleaned from your consumer data

Precautions You Can Take:

Because the Internet is a relatively new frontier, very few laws surround your online privacy. So, what can you do as a precaution? It all starts with what you willingly post on your social media: sharing locations, names, addresses, phone numbers, birthdays, and even pictures of yourself could lead to identity theft or a breach of privacy. We recommend using a VPN (virtual private network) when browsing the ‘Net to maintain anonymity, and antivirus software if you’re concerned about hackers easily accessing your computer. 

As a new wave of technology is explored each day, the need for security and privacy becomes more apparent. If you’re concerned about your online privacy and security, give us a ring at (843) 324-5824; we would love to help you learn more!

Greg Mathis Charter High School: Creating a Custom Portal

Web Design: Creating a Custom School Registration Portal

Creating a secure portal for filling out, storing, and sending forms requires technical expertise in several different areas. In creating a custom portal for Greg Mathis Charter High School, our goal was to create a secure online portal to allow parents to sign their children up for school. We needed to gather a variety of information about each student from health conditions to school supplies. It was important that we create a way for parents to complete the sign-up process in multiple sittings, authorize each form, and send them to the school.

Our portal needed to allow for a simple process to login, fill out forms, and submit them. Let’s take a look at how we accomplished each step.

Step 1- Login:

Parents create a unique account that allows them to access all of the forms needed for enrollment and to edit previous entries. We’ve streamlined the process to be easy for many forms to be completed at one time or across several days. After completing and signing each form, the user is given the option to continue to the next form or to save their progress and return to the process later.

Step 2- Fill Out Forms:

The school provided us with the packet of forms which they typically use at the start of each school year. These forms were printed, scanned in, retyped, and re-formatted. To correctly build each form, we identified a WordPress plugin that allowed us to create custom fields for entries such as dates, times, numbers, and names. We could specify the fields that were required.

The school signup process consisted of 30 forms. Each was formatted to be aesthetically pleasing and easy to understand. Imputing the forms took several days. We set each form up to show whether or not it has been completed and to allow for future edits.

Step 3- Submit:

Every form is equipped with a digital signature field. Each form is then signed and dated so that all information provided is marked as approved by the parent. We secured each form with reCAPTCHA protection to protect from spam submissions and preserve security. After that, we set up a delivery process that would allow each form to be sent to the school in PDF form once completed. This way, the school could easily keep records for each student and sign them up for the new school year as usual.


With the start of the school year approaching, ADVYON’s expert team worked tirelessly to make a user-friendly, high tech portal for this local high school. Both our team and the clients were very pleased with the end results. If your business needs a secure portal built for banking, medical forms, or any other secure sign-ups, please contact our team at (843) 324-5824 to see how we can help.

Watch our video for more details on the project!

Social Media Marketing Steps for A First-Time Business Owner

ADVYON was built through lots of hard work and constant effort. We understand the time required to dedicate to a start-up business, so we have created a guide to help you with one of the most important aspects of keeping your business successful: a good social media marketing plan! Once you get a little recognition, the only way to go is up; that is, if you keep a consistent, organized, and simple plan.

Step One: Keep everything organized. 

When you’re starting a new business, it’s imperative that you keep yourself organized. Keeping a to-do list or using a task management system to organize your social media posts is highly recommended. Read this article by Niel Patel which describes why organization is so important, and what you can do to prioritize it. Don’t try to remember everything; write it down, set a reminder, add it to your calendar! Our team uses a spreadsheet to keep track of what we’re going to post, when we’re going to post it, and who will create the content. Use a system that works for you!

Step Two: Stay simple with graphics.

When you scroll through social media, do you focus on each individual aspect of someone’s post? Usually, the answer is no. As you’re posting for your business, keep things simple; think big picture! When using a graphic in your post, keep the colors simple and ensure that all of the information you wish to convey would be communicated thoroughly with a single glance. It’s scientifically proven time and again that the most successful posts are images. Use larger and easy to read fonts for the most important info; if you’re announcing an event, use eye-catching words like “Biggest Event,” “Cash Prizes,” or “Free Food” to get people interested (Check out this article to learn why). Once you have them reading your eye-catching title, you can throw some more information at them to get them convinced that they want to join this event.

When you post on social media, use the same color palette throughout your feed. Humans are visual learners, and there are many subliminal messages through color selection. For example, combining black and white can convey antiquity, wealth, and success (when done correctly)! Color-pick the main colors in your logo or website (if you don’t have either one already, give us a call), and add them to your graphic. There’s plenty of evidence that supports the idea that humans associate colors to different things. When you think of yellow and red together, there might be several different fast food restaurants that come to mind. Use this to your advantage for your business! Consistently use the same colors for all of your marketing.

Step Three: Be consistent. Success favors consistency!

Post on social media most days of the week. ADVYON has found that the best times to post on Facebook for an IT company are Wednesdays between 9 AM and 2 PM. Do your own research on the best times to post on Facebook, Instagram, Twitter, YouTube, Tumblr, or any other social media for your specific company. People are inundated with so many media posts within a day, so make sure that your post stands out from among the crowd!

Step Four: Don’t be afraid to ask for help!

Starting a business is difficult, especially if you’re doing it alone. Thankfully, you don’t have to be alone in this! We’re here to help you: from the small social media posts to completely branding your company, we do it all! We understand that entrepreneurs are always busy with meetings, appointments, financial discussions, and whatever else you’ve put on your to-do list. We know that you’re busy with the in’s-and-out’s of a business, so let us help you by taking care of your marketing needs. Give us a ring at (843) 324-5824 to discuss the future of your business!

How to Identify Common Domain Scams

Recently, some of ADVYON’s clients have called us to ask about letters or emails they’ve received from fraudulent companies like Domain Listings stating that the customer must renew their business listing or domain. These letters are a scam designed to take advantage of a service that you are already paying for and convince you that their party needs additional payment for this service. The letters often appear very urgent, so we wanted to share some resources to help our clients and the public quickly identify this common scam.

How Can I Identify This Scam?

The best way to identify the scam is to figure out who actually hosts your domain. Use ICANN (Internet Corporation for Assigned Names and Numbers) to identify your domain ownership. Some popular sites which may be your domain provider include GoDaddy, Domain.com, Bluehost, and HostGator. You should never pay anyone who is not your domain provider for services related to your domain.

What Companies Are Using This Scam?

Here are a list of a few companies who have recently used this scam:

  • Domain Renewal Group
  • Domain Registry of America
  • Domain Listings
  • IDNS

What Will The Scam Letter Look Like?

Below are some examples of letters and emails received by our customers. Below are some examples of what a fraudulent domain renewal notice will look like. If there is any doubt, contact your IT provider!