WordPress Security Hardening

WordPress Security Hardening In 14-Steps

WordPress is an Open Source project that’s maintained by hundreds of people all over the world. Started in 2003 it has grown to be the largest self-hosted blogging tool in the world, used on millions of sites and seen by tens of millions of people every single day. Pretty amazing for something that started as a single bit of code and used by only a handful of individuals.

Security of the WordPress environment is extremely critical, considering the vast reach that WordPress has garnered today and the number of people who depend on it. That is why the open source community supporting WordPress takes security so seriously. And you should too!

What is Security?

When it comes to computers, the concept of security is somewhat of an oxymoron. As long as a computer is turned on, someone, somewhere, somehow is going to try to break into it. In fact, the computer doesn’t even have to have any important information stored on it at all. If it’s on a network, it’s useful to someone and that’s why he or she will try to compromise it.

So at the end of the day a secure computing environment provides a trusted environment that protects the privacy, integrity, and availability of the software and hardware being accessed by the end user. When it comes to WordPress this encompasses the front-end webpages, the core environment files, and the backend databases used to deliver a WordPress website.

Security Vulnerabilities

There are two main vulnerabilities that need to be secured: hardware and software. Other than your own personal computer there’s not much you can do when it comes to securing hardware, unless of course you own the servers, routers, and networks that your WordPress environment runs on. In most cases you will have to rely on your web host and broadband providers to secure the core pieces of this infrastructure.

Good hosting providers will backup your site and do their best to provide a secure shared environment, so that nobody else that’s using the same hardware that you’re on will be able to infect our environment. Two web hosts that we recommend are HostGator and HostMonster.

Don’t forget that we are an affiliate for both of these services and if you haven’t read it yet make sure you read our Affiliate Relationship Disclaimer just in case you use one of our recommendations.

Although your service providers will also have some key software to secure across all the hardware supporting you, your main responsibility is making sure your WordPress environment is secure. So lets look at some of the key things that you control when it comes to securing your WordPress environment.

Level One Security

The following security steps are pretty basic. They are easy to implement and don’t required you to do anything outside of WordPress itself. Doing these are a minimum when it comes to security and taking just these few simple steps will help push intruders away from your site and towards someone else’s.

1. Applying WordPress Updates

The easiest way to keep your WordPress environment secure is to make sure you’re applying WordPress updates in a timely fashion. WordPress is no different than any other software package…it has bugs, bad guys exploit the bugs, good guys patch the bugs, and the cycle continues.

Prior to version 3.7 end users had to manually apply WordPress updates on their own, which many administrators never got to. However, automatic updates were introduced in WordPress version 3.7 that improved the overall global WordPress install base by enabling the direct push of update patches to installed environments.

NOTE: by default only minor point releases (3.7.1, 3.7.2, etc.) are applied automatically. Major release updates (4.0, 5.0, etc.) still need to be manually applied.

2. Theme and Plugin Updates

It’s no secret that themes and plugins are what make WordPress WordPress. If it weren’t for these two features, most WordPress sites would look identical and lots of cool features wouldn’t exists. Therefore, it’s extremely critical that any themes and plugins you purchase (or get for free) are acquired from reputable sources.

The last thing you want to do is install a theme or plugin that undoes all the other security steps you take to protect your visitors and your site. Just like WordPress itself, make sure you’re always applying the latest theme and plugin updates provided by your theme and plugin vendors.

There’s plenty of free stuff out there, just make sure the free stuff is trustworthy and not going to cause you more headaches down the road.

3. Strong Usernames

One of the easiest ways to keep the bad guys out of your site and moving on to the next site is to use strong usernames in place of default usernames. When doing a basic WordPress install a default administrative user named “Admin” is created. Using this or “Administrator” is not what you want to do.

When creating admin accounts you want to avoid usernames that are easily guessed like the two mentioned above or Webmaster, or your name, company name, etc. If you really want admin in the username of the account, then create something like “Admin_Acme” or “Admin_JD” for John Doe’s admin account.

4. Strong Passwords

Another easy way to keep the bad guys out of your site and moving on to the next site is to use strong passwords. And by strong password we don’t mean Happy123. Strong passwords are things that are hard to guess and hard to hack by brute force.

Using numeric and alphabetic (upper and lower case) letters, special characters, no repeating characters, minimum lengths of 10-12 characters, nothing related to your name, birthday, company, dictionary words (in any language) is starting to put you in the realm of strong passwords. And if this makes it too hard for you to come up with a password, then try the old phrase technique.

Take a phrase like “The red fox runs in the forest to the river every Sunday afternoon.” If you take the first letter of each word, alternate each character between upper and lower case, and then change a couple letters to special characters you can come up with a password like: TrFrItF2tRe$A – which will be pretty hard to guess or attach by brute force.

5. Modify Your WordPress Nickname

Each username you create in WordPress is given a nickname and by default the nickname will be the same as the username. Unfortunately this can open up a security hole, because the nickname is used as the author tag on post that you write. Hackers use scrapper programs to roam the web looking for WordPress author tags, which they then use as the login username to your site in a brute force password attack.

Make sure you update each users profile and modify your WordPress Nickname to something different than the username. And when doing so make sure you select the “Display name publicly as” option. This option will make sure the displayed author tag on your posts is not your username.

6. Limit Login Attempts

One of the easiest security hacks to prevent against a live site is a brute force attack. This is where an attacker uses a known username and then just tries password after password to access the account. Unfortunately, limiting login attempts is often overlooked…just ask Apple who not long ago had a number of celebrity iCloud accounts hacked in this manner.

The best way to prevent a brute force attack is to use a plugin that’s designed to do just this…limit login attempts. One we use is called Login Lockdown by Bad Neighborhood. In addition to doing what it’s designed to do, it has a nice feature that allows you to “Mask Login Errors.” When you set this feature to “Yes” WordPress will generate a more generic error message when incorrect login information is entered; you won’t be told that the password only is in error when a valid username is entered. This makes it a little harder for an attacker to determine if they have a valid username or not.

NOTE: if you’re really paranoid and want to implement even more security on your website, then you’ll want to install the plugin Wordfence Security. Not only does this plugin allow you to control many more security related options on your site, it also has an interesting Live Traffic option that allows you to see who’s attacking your site.

7. Schedule Regular Backups

If you do nothing else, not even the basic security steps, then the most important thing that you must do is have a solid backup strategy; although this will always be suspect, if you don’t do the basic stuff too. There are plenty of plugins that do this, so find one you like and use it to schedule regular backups.

Also, don’t just rely on your web hosting service provide to backup your WordPress environment. Having them help you recover is not only harder, but will take much longer as well. Instead, schedule regular WordPress backups using the plugin of your choice and make sure you always keep your backup files in a secure location. And by regular we mean hourly, daily, weekly, or monthly – it really all depends on how often your content is updated.

By the way, a secure location is NOT the same location where your WordPress environment is installed. A more secure environment, for starters, is a directory on your web host outside your WordPress environment, while an even more secure environment is on a totally different web host all together. A secure cloud environment, your own PC, or a stand-alone storage drive can provide you with a simple offsite storage solution.

Level Two Security

Up until this point we have been addressing security within WordPress itself. Now we’re going to tackle some things outside of WordPress. These next set of tasks are not that difficult to implement and will go along way in security your setup. Don’t worry if you’re not comfortable with editing files on your server, just make sure you backup any files before you edit them and you’ll have a quick recovery plan in place.

8. File Permissions

It’s important to have all the files within your WordPress environment secured properly and the easiest way to do this is with file permissions. At a minimum the security permissions of all files from your root level on down should be set to 644 and all folders should be set to 755.

When it comes to file permissions it’s best to secure things as much as possible and only when you have problems should you reduce the security permissions of a file or directory. Also, be careful and suspicious of any themes or plugins that require write access to core files.

9. Basic .htaccess File Security

The .htaccess file is a directory-level configuration file that is supported by most all web servers. Its main purpose is to allow for decentralized management of web server configuration.

There are a couple of things that we are going to secure via some basic .htaccess file security and we will need to Copy/Paste these parameters either before or after the # BEGIN and # END WordPress tags:

# Begin Security Updates: copy/paste from here down

# BLOCK Directory Access
Options -Indexes

# STOP Access to Sensitive Files
# BLOCK wp-config.php File Access
<files wp-config.php>
order allow,deny
deny from all
</files>

# BLOCK Include-only File Access
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteBase /
RewriteRule ^wp-admin/includes/ – [F,L]
RewriteRule !^wp-includes/ – [S=3]
RewriteRule ^wp-includes/[^/]+\.php$ – [F,L]
RewriteRule ^wp-includes/js/tinymce/langs/.+\.php – [F,L]
RewriteRule ^wp-includes/theme-compat/ – [F,L]
</IfModule>

# End Security Updates: copy/paste from here up

The first BLOCK section will prevent people from browsing directories on your server and seeing files that they shouldn’t. The second BLOCK section will prevent people from accessing your wp.config.php file. And the third BLOCK section will secure your “wp-includes” from unwanted access. NOTE: on Multisite environments you will need to remove the third RewriteRule for things to function properly, however that will reduce your overall security a little.

NOTE: the .htaccess file is already protected and forbidden to browsers, as long as, the file is named properly. To be sure, double check that the file is named “.htaccess” and not “htaccess” or “htaccess.txt”. The file must start with a dot.

10. Secure Your wp-config.php File

When it comes securing your wp-config.php file there are a couple of schools of thought on this one. Some people believe that moving the wp-config.php has minimal security benefits and, if not done properly, it will actually introduce serious security vulnerabilities to your site. Others disagree with this concept, including us, and prefer to NOT move the wp-confi.g.php file.

Instead we prefer to implement the second BLOCK concept in the .htaccess file as mentioned in Step 9 above. Implementing this method will secure your wp-config.php file and deny access to anyone surfing for the file. This method will also limit any additional security vulnerabilities that might arise by moving the file to a different location on your server.

11. Changing Your Database Table Prefix

This change is best done when you are first creating a new WordPress environment. Although it can be done to a live site, it’s much riskier and you can really mess things up if you make a mistake. We won’t tell you how to change a live site here, but if you need to just drop our support team an email and we’ll send you some notes on how to do it…totally at your own risk of course!

When installing a new WordPress environment the prefix “wp_” will be used for your default database table_prefix. Since there are plenty of automated attack tools out there looking for this default setting, it’s best if you change it to something else when you performing your install. It doesn’t really matter what you change it to, just change it to something other than the default.

12. Disable File Editing

By default the WordPress Dashboard allows users with administrator privilege to edit standard WordPress, Theme, and Plugin PHP files. An attacker who is able to login to a site will often use this feature as an attack method, since it allows code execution.

In order to disable file editing from the WordPress Dashboard the following code can be entered into the wp-config.php file:

define(‘DISALLOW_FILE_EDIT’, true);

Be aware that since you won’t be able to edit files through the WordPress Dashboard anymore, if the need does arise to edit files, then your best bet will be to do it through your CPANEL File Manager.

13. Delete the readme.html File

By default WordPress creates a readme.html file in the root directory of your site install. Unfortunately this file can provide some useful information to snooping eyes about the version of WordPress you’re running. After successfully installing WordPress just go ahead and delete the readme.html file. And you may want to delete any similar files that get installed by themes and plugins too.

NOTE: it’s possible that this file gets recreated when you update your version of WordPress, so if you do not want to keep checking for this file and deleting it over and over, you can add the following to your .htaccess file. By the way, not only will the below code prevent people from accessing the standard WordPress readme.html file, it will prevent users from accessing any readme.html file on your server… some plugins may have these files as well, so this is a good thing to do.

# Stop access to sensitive files
# BLOCK readme.html File(s) Access
<Files readme.html>
Order Allow,Deny
Deny from all
Satisfy all
</Files>

You can add this after you # BLOCK Directory Access and before you # BLOCK wp-config.php File Access.

14. Limit Bot Crawling

Although this doesn’t really provide you any real security, we’re still going to list it…just so we don’t have 13 Security Checklist Items for those who are superstitious. Google bot and other search engine bots crawl the web indexing everything they come across, that’s how they collect their content so they can provide all those search results when you go looking for things.

If you want to limit bot crawling and the directories that search bots have access to you can create a robots.txt file and place it in the root directory of your site. This file should contain at a minimum:

User-agent: *

Disallow: /wp-admin/
Disallow: /wp-includes/
Disallow: /dev/
Disallow: /test/

Note: the last two entries are examples of how to prevent bots from accessing directories with the name “dev” and “test” under the root directory. If you don’t have these directories on your site, then you don’t need these lines in your robots.txt file.

Remember that this isn’t providing any real security. Although real search engine bots like Googlebot will abide by the rules you include in your robots.txt file, not all bots will and the bad ones will search directories that you tell them not to anyway.

When All is Said and Done

At the end of the day there really isn’t much you can do to prevent someone from hacking your system. Given enough time and resources, those who are determined will find away in. As the old saying goes…”the only secure computer is the one not turned on and buried six feet under ground.” Of course it’s also not a very useful computer either.

On the other hand, if you took the time to read this post and then spent another hour or two at the very most to implement everything we told you, then you’ll be 99% more secure than all your friends who are running WordPress and plenty of other people out there too.

There’s plenty more WordPress security hardening that you can do, and just doing a little goes a long way to make your would be attacker go looking for an easier site to hack.

Creating Social Media Visual Content That Gets Results

Webinar Review: Creating Social Media Visual Content

As Mari said “Woohoo, what a fabulous webinar we had today!”

On Monday, June 9th 2014, Mari Smith hosted a webinar with Guy Kawasaki and Peg Fitzpatrick. both from Canva, in which they shared the tactics and best practices for crafting the perfect, most effective social media posts including:

  • How to create perfect social media posts for each of your channels
  • Which types of posts attract the most shares, comments, and search engine rankings,
  • How to increase your following with the right combination of standout social media  posts + enchanting engagement!

And for those of you who missed it, here’s a quick recap of the “How to Create Awesome Social Media Visual Content That Gets Results” webinar.

The Art Of The Perfect Post

First and foremost visual content is the way to go in social media. In fact, social media is now all about creating eye catching visual content that makes the viewer to want to share the content, not only with all their friends and followers, but also inspires them to take action; to sign-up for your list and to become a follower of your brand.

Remember that social media is a marketing platform for your brand. Take it seriously and your brand can soar above your competition. With that in mind here are 10 Key Points of the Perfect Post as recommend by Guy and Peg.

Key Point #1: Pass the re-share test

Probably the most important philosophical point to consider when creating your social media post is “Will it pass the re-share test?” Are you sending something out that is so interesting, informative, entertaining, that others will share your content. If your posting achieves just this one key point, you’ve probably cover 90% of what needs to be done when writing a post.

Key Point #2: What makes something pass the re-share test

Be Valuable. But what or who determines value in a post? It’s certainly not you! You need to send stuff out that is: Informational (what just happened), Analysis (what does it mean that this happened), Assistance (how to avoid a bad thing or have a good thing), or Entertainment (is this just funny stuff).

Key Point #3: Be bold

All this means is that you should feel “free” to express “your opinions!” Express your thoughts, regardless of the topic and do not be worried about negative comments. You’ll get them and you’ll also get plenty of positive comments too. So take a stand and be bold.

Key Point #4: Be brief

These are guidelines: Fifty Character headline, Three-sentence body, Active Voice. Social media is NOT a replacement for blogging. Your blog, like this one, can share valuable information that is rather lengthy. The key to social media is K.I.S.S… and we know what that means (Keep It Short Silly). Make it brief with eye-catching photo’s and you’re golden.

Key Point #5: Credit your source

Always, always, always credit your source. When you find great content form someone else just give them credit. When people see you sharing their post, it helps you establish a relationship with them and it fosters better engagement. And as Guy says “It’s good karma.”

Key Point #6: Add drama

Add a photo or image that helps tell your visual story and create more activity on each of your post. Text only isn’t going to grab attention on every platform. And if you’re re-posting / sharing something that doesn’t have an image, then create one or find one you can use that helps sell the story. By the way, size matters a lot in social media. You’ll want to use properly sized images per the platform your posting to. Here are Peg’s recommendations, in pixels of course: Instagram (640×640), Pinterest (735×1100), Facebook (940×788), Google+ (800×600), and Twitter (1024×512).

Key Point #7: Embrace hashtags – #

These have become extremely important in social media. The reason to use them is it ties content together. Typically when you click on the # tag it gives you a listing of all the posts that relate to that topic, so it’s a great way to connect all of your content with related content created by other people. By the way, don’t forget to “check” your # tag before using it or you could pick one that’s already being used for other (possibly inappropriate) content or totally unrelated to your target audience.

Key Point #8: Schedule and spread out

You want to trickle your content out at a steady pace. Don’t send out a bunch of tweets or post over a half hour or so. Find a scheduling tool that works with your service, if the service you’re using doesn’t have one, and schedule your content to go out at different parts of the day and days of the week.

Key Point #9: Keep calm and post often

You need to be consistent on social media. Being consistent helps people know that you’re a resource they can count on and use. Especially when new features or problems arise in your niche, you want people to be able to visit your site and find content and discussions taking place about the subject at hand that allow them to find the answers they’re looking for. In addition, frequent posting helps build your brand and (as long as it’s not thin or spammy) Google loves sites with lots of content.

Key Point #10: Cross-post

Share your content far and wide. If you have something you want people to see, you have to get it out in-front of them which might mean sharing it on multiple social media platforms. And you might want to consider not sharing exactly the same thing at the same time across each of the networks you’re a part of. Spread it out and format it differently on each network; it doesn’t have to be drastically different, just different enough and with any specific features the individual network requires.

Bonus Point: Check with an “incognito” page

Known as incognito in the the Chrome browser, while other browsers call this private browsing, this allows you to see what other people see when they visit your social media post or profiles. When activated its as if you are not signed into any services, so some features within a service won’t track your viewing habits and thereby show a profile owner that you were stalking them. BTW… it doesn’t necessarily hide things from your service provider or employer, so don’t think you’re following everyone.

Well there you have it. Guy Kawasaki and Peg Fitzpatrick have shared with Mari Smith every thing you need to know in order to create social media visual content that gets results. But wait, that’s not all.

Services and More

After sharing all these great tips on the art of the perfect post, Guy and Peg shared some additional information about tools / services that make their social media content creation that much easier. They also listed some sites that have great content that you can add to your sharing process.

Since Guy and Peg are Canva employees, they offered a special deal to everyone which you can also access even though you couldn’t watch the webinear live. They encouraged everyone to tryout Canva, an online graphics tool that you can use to design really great images for social medial and more. There are plenty of designs available for you to use, for a small fee, and plenty more that are free or you can upload your own items.

And to wrap things up they gave a quick demo of Canva. Oh… and as great live demos go, Guy dropped himself from the Google Hangout… oops! It didn’t take him long to reconnect, but Peg did the demo just to make sure we could see it :o)

Replay Info

Thankfully Mari understands that not all of us can join a live webinar due to other commitments and timezone differences. So, as promised, she recorded the entire event and here’s the replay link.

(If the above link doesn’t work for you, you can watch the replay video directly on YouTube.)

Plus, the slides from the presentation can be accessed via Guy’s SlideShare account.

Now set aside some time, specifically 1:01:29;29, and watch this video so you can learn even more about Creating Social Media Visual Content That Gets Results and The Art of the Perfect Post.

12 Email Marketing Hacks To Double Your Sales

Webinar Review: Andre Chaperon - 12 Email Marketing Hacks

Another webinar review and this time it’s all about email marketing. On June 12th, 2014 Vishen Lakhiani of Zentrepreneur hosted a free Masterclass with Andre Chaperon about advanced email marketing tips related to – How To Double Your Sales – Without Growing Your List – Using 12 Email Marketing “Hacks” – and to establish that rare ability to make sales on demand.

12 Email Marketing Hacks

For those of you who missed the live webinar here’s a summary of it, so you don’t miss out on the 12 Email Marketing Hacks that Andre reviewed. Plus you’ll  also learn in this Masterclass:

  • How to use stories to instantly sell more of your products
  • Andre’s legendary “Soap Opera Sequence” email system
  • Discover what Hollywood Screenwriters know about creating extraordinary levels of desire that most other people don’t
  • Why to AVOID sending “click bait” emails like the plague
  • The best way to write emails that make MORE sales… without sounding “salesy”.

Oh and before we begin, sorry about not recording the very beginning of this webinar. We had a slight technical problem and missed the first few seconds of Vishen’s intro. Fortunately we didn’t miss anything important and that’s just how live events go. Not much you can do when your browser freezes.

Presenters Bio

For those of you not familiar with Andre he’s one of the top email-marketing experts on the planet. Not only has he won countless affiliate competitions (with tiny lists), he also created the game-changing course Autoresponder Madness.

Andre has also become known as THE go-to guy in the email world. He’s different from most marketing “gurus”, because he believes that your email list should be based on a trusting relationship that you nurture as you build and focus your marketing efforts. And should you do this, Andre believes you can realistically double or TRIPLE the amount of money you make.

Andre’s Notes

Yes, these really are Andre’s hand-written notes on using the art of storytelling within the context of email marketing. It’s his personal framework that he’s used for creating most of his storytelling emails.

Basically there is a universal framework for storytelling which consist of 8-points:

  • Ordinary World (create empathy)
  • The Call to Adventure
  • Refuse The Call
  • Meeting the Mentor
  • Crossing the Threshold
  • Test / Allies / Villains (drama, conflict, anticipation)
  • The Ordeal
  • The Reward

The story is the emotional delivery vehicle (a narrative) of your marketing message that leads people down a (specific) path that they follow and eventually complete your call to action.

Andre’s 12 Email Marketing Hacks

Hack #1: Talk To The Right Audience

This seems so easy, but it isn’t. Owning someone’s attention isn’t free. You must be relevant. An individual needs change over time, so you must stay relevant to their needs. Your trust equity starts at or near zero, builds non-linearly, and if you abuse the trust that you’ve earned with your subscribers, it can vanish overnight.

Note: Vishen suggest using a ratio of 7 emails that add to trust equity for every 3 emails that might take away from trust equity.

Hack #2: Be Interesting (Worth Reading)

Corporate emails are so boring and will put you to sleep. Being interesting is a dance… it’s entertaining, relevant, preeminent, teasing, flirty and gives value (but never at the expense of giving it all away.) Lust ends when craving ends, so you must always leave your subscribers with a sense of something else that something better is coming.

Hack #3: Segment!

The only hack that isn’t optional, hence the exclamation mark. You must segment your email subscribers. Why? Because everyone on your list has some shared core needs, wants and desires, but only very broadly. As your audience’s level of sophistication increases, so will their needs and desires. Thus your emails will need to evolve in order to meet those needs and desires; relevance is achieved through segmenting.

Hack #4: Only Promote Badass Products

Don’t promote “shit” (sorry that’s Andre’s word not ours, but we’ll agree) and burn your list for any commission. Regardless of your niche you should strive to be the fiduciary (the most trusted adviser) to your prospects, customers, and clients. So never promote products or services that do not help move your audience towards their desired end goals.

Hack #5: Use Storytelling as The Emotional Delivery Vehicle For Your Marketing Message

Why are stories so much better as a delivery vehicle for your marketing message: It’s because stories have a unique power to move people’s hearts, minds, feet, and wallets in the story teller’s intended direction. Stories teach, unite, and motivate by transporting audiences emotionally. The building blocks of all story telling are to: create a challenge, describe the struggle, and deliver the resolution. Stories don’t have to be long, but they must have a surprise.

Hack #6: Build Tension & The Desire For More

Nothing will grab the attention of your subscribers faster than their need to know what happens next. If you can keep your readers constantly guessing as to what’s next, you’ll have them hooked. Use an open loop, something like “I’ll explain why this is important shortly”, between two paragraphs will hook your reader. And you don’t even have to answer your open loop in the email it’s in; how insane is that?

Hack #7: Treat Your Customers Like You Would Expect To Be Treated

Don’t treat people just as a numbers… metrics and stats. The people on your email list are not just a commodity. They are real people with feelings, emotions, needs, wants and desires. And when you start treating them as just numbers, it becomes easy to burn your email list to the ground. Unless of course that’s how you want to be treated? Hopefully not, because your customers and clients will be the lifeblood of your business.

Hack #8: No Need To Sell

Hard selling is for amateurs. If you know the products you’re offering to your list fit their needs, there really is no need to sell. Your job is simply to bring a product to their attention and demonstrate to them how it fits their needs and desires.

Hack #9: ONE Action

There is no reason to have multiple actions in your emails. One and only one desired end result, call to action (CTA), per email is all you need. Trying to get someone to do just one thing is hard enough. Getting them to do four or five is impossible! Including more than one CTA creates choice, which creates confusion, and you’ll lose people. Stick to one thing and your emails will be much more successful.

Hack #10: Use (Part 1) and (Part 2) In The Subject Line

Create a series of emails and include an open loop indicator at the end of the subject – Part 1, Part 2, etc. This will set an expectation with your audience and they’ll be looking for more. And if you want to be really sneaky… skip a part (that’s a Ninja strategy) just to create conflict in your reads mind. Watch the video and hear more about that tactic around the one-hour mark.

Hack #11: Use a Story To Call Out The Best People To Expose To a Promotion

Tightly linked to Hack #1, use this hack to call out any extra people who are interested in being exposed to a promotion you have. You’re getting people to raise their hand that they want more; they’ve shown interest in your offering. Be transparent, it builds trust. You want to do business with pre-qualified people (those who’ve raised their hand.)

Hack #12: Soap Opera Sequence

This is the Holy Grail in Andre’s email marketing strategy. Sending out only broadcast emails is manual, it requires a ton of commitment, and has many other built in detractors. Build an email sequence and leverage automation to get it out to your audience. There’s a beginning and no end to the sequence, because over time you keep adding to the end of the sequence.

There you have it a summary of Andre Chaperon’s Email Marketing Workshop with Vishen Lakhiani. If you didn’t before, you should now realize that everyone has needs, desires, and wants and that your fulfilling their desire is the end result.

Replay Info

Now set aside some time, 1:24:22 to be exact, and watch this email marketing workshop mastermind by Andre Chaperon, as interviewed by Vishen Lakhiani.



And what would a video replay be without the associated documentation? Make sure you download Andre’s Email SOS Story Framework and his How To Double Your Sales eBook.

Our goal is to see you succeed and to succeed you need to take action. If you made it this far you’ve taken action. Now download the two PDF files, watch the video, and begin implementing Andre’s email marketing strategies into your business; then come back and leave a comment and let everyone else know how these strategies have helped you.

To your success!!