tiktok path to purchase

TikTok Algorithm

The TikTok Algorithm In 2022?

tiktok path to purchase

As a platform with high engagement and growth potential, TikTok is a favorable app for businesses that want to get their solutions in front of more people.

According to TikTok, 49% of users (over 490 million people) seek and discover something new on the app each month. TikTok’s highly personalized algorithm delivers relevant content to users through the For You feed, keeping users engaged.

Here’s what brands need to know about TikTok’s algorithm and the unique path to purchase on the app.

TikTok is revamping the outdated linear sales process and is focusing on driving growth at scale. The smoother and more seamless customer experience from their unique path to purchase is described as an “infinite loop.” Rather than a sales funnel with a defined start and endpoint, TikTok users enter, exit, and re-enter the buyer’s journey at the stage that best matches their needs and wants.

TikTok’s massive success is due to following its user’s lead, building around their behavior, and providing them with the right content based on which stage they are at in the customer journey.

Why Brands Need to Be on TikTok in 2022

Let’s be honest. Putting together a whole strategy for each social platform, monitoring the results, and optimizing performance is a lot of work. And brands have been hesitant to adopt TikTok into their existing social strategy.

Whether this is because of limited internal bandwidth, it being considered a “Gen Z” app, or nobody in the office wanting to be behind the camera — there is no denying the potential of TikTok when you look at the numbers.

Let’s dive into the top TikTok statistics brands need to know:

  • TikTok monthly active users: There are 1 billion monthly active users on TikTok.
  • Number of App Installs: TikTok has been downloaded 3 billion times and had the most non-game app installs for 6 months in 2021, achieving 383 million downloads from January to June 2021.
  • Surpassing competition: In 2021, TikTok was the 7th ranked social media app. Surpassing Pinterest, Twitter, Snapchat, Reddit for monthly active users is impressive considering it was only launched in 2016.
  • Engagement Rate: With a session duration of 10.85 minutes, TikTok has been recognized as the top social media platform for engagement. This is twice Pinterest at rank #2 with 5.06 minutes.
  • Growth rate: In the U.S., TikTok had a 787.86% user growth rate and a 1157.76% increase in its user base worldwide.
  • Influencer earnings: TikTok influencers and creators can earn up to $5 million a year if they have up to 100 million followers. The most popular categories for influencer content are beauty, fitness, dance, pranks, and entertainment.

This rapidly growing social media app’s innovative and unique algorithm allows users to reach more people based on how they interact with your content.

TikTok’s key differentiator is the sense of community on the app. TikTok’s niche communities provide a place for everyone to connect, and new communities are continually emerging as more people join the app.

If you’re new to TikTok, check out #BusinessTok or #BrandTok. These niche communities provide content for marketers, entrepreneurs, and business owners on tips, real-life experiences, and live streams of their networking events.

Gina Nacnac, manager of brand partnerships at HireInfluence, shared with us the importance of TikTok marketing for brands in 2022:

In 2022, we’re going to see a rise in Content Creators on TikTok that create content specifically for the brand’s owned channel appearing as the face of the brand for a contracted period of time, like quarterly or every six months. This is going to provide more opportunities for smaller creators to monetize and will provide ways for brands to connect with consumers authentically through relatable creator content.

TikTok’s Unique Path to Purchase

TikTok transforms how brands connect with their audiences, drive purchases and find success. The platform recently conducted a global research study to understand TikTok’s role in and perceptions across the retail consumer journey. Here is what they found:

  • People on TikTok are 1.5x more likely to instantly purchase something they discovered on the platform than other platforms’ users.
  • TikTok is 1.7x more likely to be the source for product discovery compared to other social platforms.
  • TikTokers are 1.4x more likely than the other platform users to research products/brands they find on the platform.
  • TikTok users are 1.5x more likely than other platform users to persuade friends or family to purchase a product or service they’ve come across on the app.
  • TikTok users are 2.4x more likely than other platform users to create a post and tag a brand after buying a product.
  • TikTok users are more than twice as likely to comment or D.M. a brand after purchasing a product compared to other platform users.

Brands that see massive success on TikTok aren’t just pushing products and creating content when it’s time to sell. Instead, they develop a consistent presence by using a TikTok scheduling tool and focusing on their brand’s role as a creator of entertainment. Successful brands leverage their TikTok Business Account to create a home on the platform, establish their unique brand voice, and build a community.

TikTok Algorithm: which social media platforms marketers plan to increase investments in

TikTok is revolutionizing the social media marketing landscape through its infinite loop buyer’s journey. Compared to other platforms, TikTok is leading the way at each stage of the customer journey — awareness, consideration, and decision.

How The TikTok Algorithm Works in 2022

One of the key ranking signals on the TikTok algorithm is video completion. Each time a user watches a video in full, that video will be more likely to be suggested to other users’ feeds.

Another major influence on the TikTok algorithm is hashtags and user-viewing habits. TikTok will take note of the type of videos you’re watching and which niche communities they are coming from. It will then suggest similar videos to you based on your content consumption.

For example, if you can’t get enough of DanceTok, good news — the algorithm will keep suggesting related videos. Brands looking to increase the reach of their videos should use trending songs, hashtags, and dances.

This is how TikTok has defined their For You page algorithm:

“This feed is powered by a recommendation system that delivers content to each user that is likely to be of interest to that particular user. Part of the magic of TikTok is that there’s no one For You feed – while different people may come upon some of the same standout videos, each person’s feed is unique and tailored to that specific individual.”

Key Components of the TikTok Algorithm:

  • Video Information: video information signals are based on the content you seek out on the Discover tab (i.e., captions, sounds, hashtags).
  • User Interactions: as mentioned above, the TikTok algorithm is influenced by a user’s content consumption and interactions on the app.
  • Device and Account Settings: although these do not have as strong of an influence on the TikTok algorithm, it’s still worth mentioning. These are settings (i.e., language, country, device type) a user chooses on their account that TikTok considers when optimizing content.

What Engagements Are Not Important to the TikTok Algorithm

As we covered, the TikTok algorithm considers a few key ranking signals when suggesting videos to your feed. But what are the least important metrics of engagement?

  • Content already viewed
  • Duplicated content
  • Potentially upsetting content (TikTok provides examples of “legal consumption of regulated goods” or “graphic medical procedures”)
  • Content that gets flagged as spam

And the best news yet? For new users or TikTokers with a low following, the TikTok algorithm doesn’t use follower count as a ranking signal. Meaning small accounts still have the potential for high reach.

Want to see what other businesses are doing on TikTok? Check out this roundup of TikTok marketing examples to inspire your brand.

Wrapping Up

Incorporating the latest platform trends into a brand’s marketing strategy can help them to more effectively engage, educate, and sustain their audience seamlessly into the TikTok community. Don’t know where to start? We’ve got you covered! Check out the Trend Discovery Tool to uncover what’s trending in your vertical, what’s on consumers’ minds, and what’s viral on TikTok in real-time.

In 2022, businesses need to stay on top of new marketing techniques, trends, and rising platforms to drive key growth and better connect with their audience. One of them is TikTok, and there’s no sign of it slowing down. There is a huge opportunity for businesses to take advantage of the viral nature of the app and allow it to take their digital campaigns to the next level.

Blog - Content Mapping Template



A version of this article was first published on Hubspot

screenshot 2022 03 31 at 22.43.10

Postmaster Toolbox

Postmaster Toolbox - (the short list)

screenshot 2022 03 31 at 22.43.10

Commissioning a mail server is initially not terribly complicated, but at the latest when it comes to keeping an eye on your reputation, or if you want to implement authentication measures like SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail) or DMARC (Domain-based Message Authentication, Reporting and Conformance), it becomes considerably more complex and there’s no way around using appropriate analytical and other tools. Fortunately, there are several free possibilities available in the Internet. The websites are all in English.


Cisco Talos Intelligence

At https://talosintelligence.com/, alongside a range of blog articles, white papers and presentations on the topic of e-mail security, there is also the possibility to check the reputation or your own domains and IP addresses and to see how the provider of a spam filter assesses your emails.


MX Toolbox

As the name says, at https://mxtoolbox.com there is a whole collection of useful tools. Ranging from multi-faceted DNS query tools to blacklisting checks, there are also tools for analyzing e-mail headers. You can find answers here to many different questions.


Free Postmaster Tools from 250ok

As well as their fee-based tools, 250ok offer a range of helpful tools free of charge at https://250ok.com/tools/. A special mention should go to the “Gmail Tab Tester,” which you can use to find out to which tab in the Gmail surface an e-mail will be sorted before sending a campaign.



On the website of the DMARC-specialists dmarcian (https://dmarcian.com) you can find tools relating in particular to DMARC and the associated technologies SPF and DKIM, which considerably simplify the implementation of DMARC.



This organization has taken on the task of encouraging the spread of DMARC. The website at https://dmarc.org/resources/deployment-tools/ contains, alongside many articles, tutorials and statistics, a collection of tools for generating, checking and parsing DMARC records, and much more.


Internet.nl email Test

An initiative of the Dutch government and industry makes a simple-to-use test available at https://internet.nl/test-mail/ to evaluate a range of standards. Are the mail servers reachable with IPv6? Is the domain signed with DNSSEC? Are my e-mails authenticated and does my mail server use transport encryption? The test provides answers to all these questions and details on the assessment and the meaning of the results for the individual points.


In Brief

Sending e-mails is easy. Sending large volumes of e-mails professionally is not. The technologies necessary to ensure a well-functioning platform have their quirks.

However, with the help of the tools mentioned above they can be mastered. Given that these tools can be used free of charge, there’s no reason not to try them.

blog i social media trends of 2022

Social Media Trends

blog i social media trends of 2022

Social media has evolved.

We’ve said goodbye to simple status updates
hello to selling and digital communities

So, what’s on the horizon for 2022?
From the staying power of short-form video to an emphasis on mental health,
we’re sharing the top social media trends to pay attention to this year.

1. The Creator Economy Will Boom

vertical double new iphone

The creator economy is now worth over $100 billion, and we predict it’s just getting started. Many platforms have started to heavily invest in creator marketplaces and creator tools – like TikTok, Instagram, Pinterest, and even LinkedIn.  These tools help make it easier for creators to connect with their audience and collaborate with brands.

As social media platforms move more into the e-commerce space, it makes sense to invest in creators who are driving engagement, growing engaged communities, and promoting products.

And if you thought the creator community was oversaturated, think again. There are thousands of creators who’ve seen huge growth within the span of a year or two –  they’ve simply found their niche and stuck to it.  Take @coffeebae97 who started her TikTok account in April 2020 and now has over 1.2M combined followers on TikTok and Instagram: Or Kat Norton who started her Instagram account in September 2020 and now has over 500K followers

2. More Streamlined Social Commerce 

Social commerce is a subset of e-commerce where everything happens on social media – product discovery, click-to-purchase, and post-purchase support. 

And it’s revolutionizing the way we shop:

Social media has become a virtual mall of sorts, right in the palm of our hands. We can browse products, find inspiration, and purchase within a few clicks.

As a result, platforms have begun to introduce new social commerce tools:

vertical double new iphone2

In 2022, we predict a doubling-down on social commerce, as each platform vies to make their shopping features the best-in-class for both consumers and brands alike. 

Speaking of shopping on social media, with Later’s Linkin.bio tool, you can seamlessly drive clicks to your website or individual product pages. Learn more here:

3. Short-form Vertical Video is Here to Stay

Short-form vertical video has boomed, thanks to the rise of TikTok and Instagram Reels

Not only is video content an engaging form of storytelling and a way to drive sales, it’s also a major growth hack

  • Videos on Instagram get more engagement than other formats

  • Tweets with videos generate 10x more engagement than those without

  • Pinterest reported a 240% increase YoY of organic video pins from 2020 to 2021

In the past year alone, we’ve seen brands and creators use video to connect with their audience on a deeper level, spotlight products, and raise awareness about causes they care about.

In 2022, we think we’ll see a lot of new trends and creative content pop up – whether it’s fun editing transitions or in-depth tutorials.

Over 430M people in the world are Deaf or Hard of Hearing, and 85% of video on Facebook is watched without sound.
So, we suggest using subtitles (or captions) on your videos to make them more accessible.

4. An Emphasis on Mental Health & Burnout Prevention 

According to a recent report by Vibely, 90% of creators have experienced burnout and 71% have considered quitting social media altogether.

Between ongoing lockdowns, more time spent online, and the pressure to consistently churn out content, the digital burnout is real.

In 2021, we noticed an uptick in creators and brands talking about self-care, setting digital boundaries, and taking breaks:

And in 2022, there’ll be more conversations surrounding our relationship with social media and how it affects us.

Even Instagram’s joined the fray, with their new “Take a Break” feature, which is being tested in the US, the UK, Ireland, Canada, Australia, and New Zealand:

The feature allows users to “receive break reminders in-app”
after a duration of their choosing. 

Instagram says they’ll also provide expert-backed tips on what you can do during your break like listening to your favorite song or taking a few deep breaths. 

5. A Renewed Focus on Accountability & Diversity 

In 2020, we saw many brands speak out against racism, with promises to listen, learn, and do better. 

Now two years later, the question remains: what’s next? 

Judging from a recent report, which found that the pay gap between white influencers and BIPOC influencers is 29%, brands still have a ways to go.

While diversity and inclusion should never be a “social media trend” per se, we predict there will be an ongoing conversation about holding brands accountable to the promises they made to their followers. 

From influencer partnerships to event speaker lineups, we hope it becomes more of a standard moving forward.

In other words, no longer something to simply check off your list. 

To learn how to create a more inclusive marketing strategy, watch our workshop with strategist Sonia Thompson:

6. Memes, Memes, Memes

Everyone loves a good meme, right? In 2022, we predict memes (both static and video) are going to have an even bigger moment.

We’ve seen thousands of niche meme accounts pop up on the scene for everything from astrology to social media manager woes:

screenshot 2022 03 17 at 14.09.14
screenshot 2022 03 17 at 14.11.51
And popular meme account Saint Hoax even partnered
with the Met Gala in 2021 as a “meme correspondent
to cover its biggest moment:
Memes are a great way for brands and creators to connect with their audience and join trending conversations. And the best part? They don’t need to be fancy.

In short?
Memes are here to stay, and the more creative or nimble you are
the better

7. Social Media Posts as a Form of Currency

Pay for a product with a social media post?


it’s real and this social media trend is just getting started

The result?

Long lines and consistently
sold out products. 

Similarly, Bun Burgers let customers to pay for their food with “TikTok currency” for the month of November. This video alone got over 6M views

While TikTokers got free burgers, Bun Burgers gained brand awareness and free user-generated content

As the world opens up again and brands begin planning in-person events, these types of campaigns could take off. Watch this space.

8. Rise of the LinkedInfluencer

So what will we
see in 2022?

 LinkedIn and influencer:

two words you likely never thought would work together.

But in 2022, think again. “LinkedIn is an underrated platform,” says marketing strategist and LinkedIn creator Sara Lattanzio.

“They’ve started to invest more in creators. From the Creator Mode rollout to global creator programs, they’re making it easier to share content and grow an audience. It’s just the beginning.” LinkedIn even launched its first Creator Accelerator last year, with creator Jon Youshaei encouraging others not to sleep on the platform

But why LinkedIn’s sudden popularity?

“The shift to work from home culture made many people realize the importance of creating a memorable personal brand outside of the one you have with your company,” shares Marketer and Creator, Danica S. Nelson.  “LinkedIn is a great way to create visibility and showcase thought leadership within your broader network.” Not to mention, the engagement potential is bananas. Check out this post that has over 20K reactions:

screen shot 2022 01 06 at 10.26.24 am


We predict more creators using the platform,
professionals growing their personal brands,
and CEOs positioning themselves as experts in their field

“What I hope we don’t see more of is the recycling of polls that ask whether internships should be paid or unpaid. Enough please,” adds Danica.

9. The “No Filter” Feed Takes Over 

Creators and brands alike are shifting away from the perfectly curated feed aesthetic, and choosing to share less filtered and more in-the-moment content.

Take @scienceoffoods whose simplistic posts look like they have no filters at all:

vertical double new iphone 2

Or fashion brand HARA, who often shares minimally edited content:

vertical double new iphone 3

This trend goes hand-in-hand with the rise of authenticity over recent years, which has seen a shift in the type of content posted on social media.

In 2022, we predict brands and creators will spend less time creating a picture-perfect perception, and more time fostering deeper relationships with their followers.

For the biggest photo editing trends, check out this post: The Biggest Photo Editing Trends on Instagram Right Now.

10. Brands Let Loose on TikTok 

TikTok was the cool kid on the block in 2021, and that won’t change in 2022.

With over 1B monthly active users, TikTok is a space for anyone and everyone – with a less filtered and curated vibe than Instagram. 

Brands who’ve pivoted to TikTok like The Washington Post or Starface, have been able to tap into the fun, zany, and bold side of the platform:

And with 60% of TikTok users being Gen Zers
(the ultimate trendsetters),
we predict more brands letting loose
and trying to tap into that market. 

Take Duolingo, whose TikTok content is so different from what it posts on other platforms:

They’ve nailed their TikTok strategy

by incorporating trending sounds with their oversized bird mascot –

it’s chaotic
(in a good way)

The result?

Millions of views and thousands of comments, on the regular. With TikTok, brands can be more casual and experimental. We’re looking forward to seeing how this trend evolves throughout the year. Like we said, social media is the wild west – it’s constantly evolving. And while it can be overwhelming when a new feature drops or a trend emerges, it allows you to experiment and see what works best for your specific audience and goals. 


whether it’s posting more meme content or

leveraging in-app shopping features,

we’re tapping these 10 social media trends as ones to watch. 

A version of this article was first published on later.com

loadshedding stage2

Online During Load Shedding

How to I Stay Online During Load-Shedding?

loadshedding stage2

Some of our users asked:

Is there is still connection during loadshedding using a UPS or inverter?

Do the Wireless Network infrastructure stay connected during Loadshedding?

What do I need to just keep the ONT and router ONLINE IN LOADSHEDDING?

Can I still have access to Fibre during Loadshedding?

We are here to answer YOUR QUESTIONS :


The short answer is YES. If you have backup power and nothing goes wrong with the backup power on the Fibre networks you can enjoy uninterrupted internet during loadshedding.

In most cases there are two main UPS types:

  1. The new Lithium-Ion DC UPS which plug directly into your ONT and Router like a battery pack, and can stay permanently plugged in to ensure you stay online. This is the easiest and most practical option.

    2. Lead Acid batteries connected to regular wall plug sockets can damage quickly. Get at least 2x7Ah batteries. Some 1000VA UPSs have 2x7Ah batteries, most 2000VA UPSs do as well.

FIBRE / WIRELESS Network Backup Power

Installing and maintaining backup power to a large network is tricky and expensive. Each node in the network needs its own backup power,
so when or if Loadshedding gets really bad sometimes the backup systems aren’t beefy enough to re-charge between power cuts, or they might just fail.
The fibre network operators want their networks up at all times but within achievable time and economic constraints.

Types of backup power

Not all backup power is equal.
Here’s a simple overview
Prices are for context only and are roughly correct as of mid-2020

– Lithium-Ion DC to DC “Mini UPSs” – Similar to a power bank. ~R600-R1500
– Traditional Lead Acid Battery UPS
– The big black box kind that beeps. ~R600-4,000
– Power Packs – Think if a huge power bank with a wall plug socket. ~R10,000
– Batteries (of your choice) + Inverters – These tend to be big systems. Upwards of R10,000

For the purpose of this article we’re exploring home and small office solutions. There are many other forms of backup power including generators, solar, Tesla Power Walls and many more. These and the Batteries + Inverters require an expert to design a system to suit your needs.

How to choose a UPS

For the purpose of this post the assumption is you will only be powering two devices:
Fibre ONT and a WiFi router.

If you go with a DC Mini UPS then you just need to make sure can recharge it, it has the right cables come with it and you match up the voltage correctly. If you’re choosing a traditional Lead Acid UPS, just make sure you get one with enough batteries, at least 2x7Ah batteries (most 2000VA UPSs will have these) and don’t get tempted to plug in more devices.

Efficiency &
battery storage

Mini UPSs that supply a DC current (DC->DC)via an adapter directly to your device doesn’t have this issue and as a result, are 30x smaller, last 2x longer and the batteries last many more cycles. They have deep cycle batteries, like your mobile phone, so won’t get damaged if Loadshedding lasts longer than expected.

Traditional UPSs supply electricity to a device via a wall socket plug (DC to AC power) will lose significant storage capacity due to the inefficiencies of changing stored DC electricity (usually 12V) to AC (220-230V). They are also not designed for deep cycling the battery, so using them below 50% will start to damage them and as Loadshedding lasts 2:30, most small UPSs won’t last 10-20 full cycles of the batteries.

All the cool kids use DC->DC systems because they last much much longer.


Mini UPSs

(The Best Option In Most Cases)

Mini DC USP with 24V Passive POE

Gizzu Mini DC UPS with 24V Passive POE

Lithium Ion DC to DC
“Mini UPSs”

These devices use Lithium Ion batteries (like in your cellphone, laptop, power bank) so have a high energy density and discharging all the way doesn’t damage them like Lead-Acid batteries.

The other advantage is they power your devices directly with DC power which means they are more efficient and you can get away with a smaller capacity battery.

The below products should power a fibre ONT and WiFi router for ~4 hours and recharge quickly enough for multiple loadshedding periods per day.

Which to buy?

If you would like to buy a DC UPS to power your fibre during loadshedding, these DC UPS power banks will power two devices with the provided splitter cable, or you can even power an AirCube WiFi Router via PoE. It will do 24V passive POE, as well as has a DC jack to power 9/12V and can power two 9/12V devices with the inclined splitter cable. Because of its flexibility and various voltages it will work for most fibre setups.

What to buy and accessories:

Out of stock? If the above link is out of stock, please let us know

Instructions for Ubiquiti AirCube owners:

Before you start, using the correct voltage is very important and you can break your equipment.
Proceed with caution and ask for help.

The cable to power the AirCube is not included with that kit, you need an additional ethernet (LAN) cable. A different colour LAN cable will be handy, like red or yellow. To set up the UPS correctly you need to set the voltage toggles on the device.

  • Buy an extra LAN Cable
    • Vinet can supply you with these as well or try your local computer shop.
  • Power on the UPS so you see the lights which highlight which setting you have selected.
  • The PoE toggle needs to be on 24V and the other one needs to be 12V.
  • Unplug the standard power adapter from your airCube
  • Plug your new ethernet cable into the POE port on the UPS and the POE In port (top left) on the back of the airCube (Leave the WAN cable plugged into your ONT)
  • Plug one of the included cables from the “Output” port into the power port of your ONT

The ultimate DC UPS?

If you want the crème de la crème of DC UPSs, take a look at the Acconet POE Smart PowerBank (pictured). It comes with a 94.5Wh battery, can can supply 24V passive POE or 48V Gigabit POE + 5V USB + 12V DC output. It even has a battery monitor display.

What to buy and accessories:

Proceed with caution: If you are powering your devices with POE, check if it is 24V or 48V. Powering your device with the wrong voltage will break it.

Traditional Lead-Acid UPSs
(Only Choose If You NEED A Wall Plug Socket)


Lead Acid UPS in a nutshell

As simple as these UPSs are to buy and install the most important thing to get right is the batteries. Do not think of a traditional UPS as anything like your USB Power Bank or Cellphone/Laptop battery. These batteries get damaged quicker than Luke Skywalker pulling out his light sabre if you don’t treat them with care (discharge them fully).

The reason for this is that traditional UPSs are designed to supply a short power backup e.g. to save work and shut down a computer. They are also used in applications where the UPS batteries are less critical than the equipment they are protecting. In other words, traditional UPSs are designed for short backup power and a short lifespan of batteries.

Deep Cycling: Discharging a Lead-Acid battery all the way will damage it very quickly (as little as 1-10 times).

Using the battery for a long period of time will also shorten the lifespan of the battery.

The cheap UPSs don’t have any cool features like internet connections, apps to monitor the device and they beep by default – it will drive you crazy (but you can turn it off. See below).

Having a wall plug is super convenient, but can be tempting to plug in more devices.

Which to buy?

The very cheapest Lead Acid UPSs are 1000VA but have 2x7Ah batteries. These two are generally the lowest priced.

If the above links are out of stock, please Google “1000VA line interactive UPS” and just check it has 2 x 7Ah batteries.


VAs and Ahs

Don’t worry, KVA ratings don’t mean a heck of a lot when choosing a UPS for running fibre through Loadshedding so you can pretty much ignore them. Even the tiniest UPS will be able to produce power enough for a WiFi router and ONT, but will run out of power quickly. Even the smallest of UPSs, a 600VA device, can produce 30x more than you need.

It’s all about the batteries. More retailers make it very difficult to find, but the thing to look out for is the batteries Ah rating if you want the power to last throughout Loadshedding and to not damage the batteries by discharging them too much (that’s called deep cycling).

Make sure the UPS you choose has at least 2 x 7Ah batteries in, some 1000VA and 2000VA and above should be fine.

Pro tips for UPSs with lead-acid batteries

The batteries in most UPSs are not like your cellphone, laptop or power bank, so they need to be handled differently
Do not discharge your UPS battery fully or else you will damage the batteries
Try keep the UPS cool when it’s recharging (well ventilated, near a fan will help)
Let it charge to 100% between discharges – this can take as much as 24 hours with Lead Acid Batteries.

Power Packs

Power packs are like USB power banks with the convenience of being able to use a regular wall plug. Suitable for sensitive electronics including power tools, mixers, laptops, TV.

Batteries + Inverters

R10,000 and up.
This us where things get industrial and modular so our advice is limited. If you have a business or want to think about going off-grid this is the option for you. Options start at an inverter  and high / deep cycle battery and go upwards from there.

if you need any help or are unsure about your power needs, please don’t hesitate to contact us and we will assist with the best solution to keep you connected during load-shedding


021 007 0200



Tech rules for your tween

Tech Rules You Need For Your Tweens & Teens


A version of this article was first published on parentingteensandtweens.com

Parenting Teens and Tweens is Hard.

BUT then you add in technology and it feels almost impossible.

First, there is the worry that keeps us up and night. We worry about what our teens might be seeing online, or what they might be doing or WHO they might be meeting.  And then there are just the daily battles of trying to get them to turn off the devices and plug into life.

There isn’t one easy answer when parents are tearing their hair out over tech, but there are tools we can use to make easier. One of the biggest is to set some ground rules.

When expectations are clear, at least on some basic principles, than our teens understand where we stand. It also gives a starting place for conversations on some pretty tough topics that we really need to be talking about with our teens.

Technology is NOT a Right

Our teens and tweens today sometimes have a hard time understanding the difference between what is a right and what is a privilege.

They have a right to shelter, food, an education, clothing and our love.

By food, we don’t mean that we’ll fund their daily before school Frappuccino habit. And by clothing, that doesn’t mean brand new $300 kicks every six months.

When it comes to tech, it’s true, our tweens and teens often do need some kind of access for their education. In some cases, as young as elementary school, our children are actually being provided with laptop computers and tablets to take home for their personal use.

And by high school, giving them some kind of mobile phone is almost inevitable. These technologies have become fundamental parts of our society and they need to learn how to use them responsibly and safely. That has become part of our job as parents.

But that doesn’t translate into a right to brand new expensive mobile phones with all the bells and whistles along with unrestricted access and unlimited amounts of time to spend on all these tech toys.

Technology is a privilege, one that they earn. And in some cases, one they pay for themselves. They need to show us in other areas of their lives that they have the maturity to handle some of the temptations and risks that come with technology.

Digital Citizenship

It’s amazing how the rules for interacting with other people online can be so different than in real life.

How many of us have seen someone post something on Facebook and thought, “Wow, this person would never say something like this to my face.”

The anonymity that the internet provides, emboldens some people to act before they think. When they don’t have to actually see the face of the person who is the target of their words and process the way it hurts or demeans them, it is so much easier to say hurtful and hateful things.

Teaching our children that they shouldn’t act any differently online than they would in the real world is an essential part of parenting this generation.

There Is No Such Thing As Delete On The Internet

Tell your children to imagine that they are 18 years old. They’ve just applied to the college of their dreams. They’ve got the grades, the amazing essay, top test scores. Getting in is now nothing more than a formality.

Then your child’s application comes across their admissions officer’s desk, the first thing they do is type their name into Google. What pops up?

Maybe nothing. But as more and more teenagers are finding out today, they’re leaving a photographic history of themselves online that doesn’t represent the best of who they are.

Sometimes it’s a stupid selfie they snapped at a party when they were a little drunk of them and some friends clinking together their beer bottles in an underage toast.  They stuck it on Snap-chat and an idiot friend grabbed as screen shot and posted it on Instagram. Ooops.

Or maybe they didn’t even know someone snapped a photo of them making a lewd gesture at a school pep rally and posted it on FB.

So many of these incidents are momentary youthful indiscretions that wouldn’t have mattered even a decade ago.

But that was then and this is now.  Our tweens and teens must know that their cyber-identities are made up of every single thing they write and post online, as well as every single photo other people take of them and post online. Hitting the delete key is often not enough to wipe these mistakes clean and they can have serious consequences for their future.

Relationships Matter

Looking someone in the eye, used to be something most people did naturally as part of interactions with other people. Now, not so much.

How often do we see kids hanging out and instead of talking to each other, their all sitting around staring down at their phones.

Does your child regularly get out of the car when you drop them off somewhere and sort of grunt a goodbye as they continue texting or watching a silly cat video.

Maybe you have a tween or teen who would rather spend hours playing a virtual game then spend time with his family playing a board game or just hanging out.

It can become so easy to allow technology to get in the way of having real conversations and making real connections.

Our teens and tweens must learn to set limits for themselves for healthy technology use and when and where it’s time to put away the phone and actually pay attention to the people around them.

Speak Up

We’re hearing too many tragic stories of tweens and teens taking their own lives because they’ve been harassed by their peers with technology being the main instrument of torment.  In many of these cases, others who were not involved were aware of what was happening and yet stayed silent.

Nobody wants to be a snitch or a tattle tale, but with online bullying as prevalent as it is today, there are times when our kids need to be willing to go to a trusted adult and tell them what is going on.

When we talk to our kids about cyber bullying, it often is out of our concern that they will be a victim. What we don’t always think about is coaching them on how to handle it if they know someone else is being bullied.

They need to know that speaking up takes courage and it is the right thing to do. As Dumbledore says in the Harry Potter books, “It takes a great deal of bravery to stand up to our enemies, but just as much to stand up to our friends.”

We also need to reassure our children that if they speak up, they won’t be punished or suffer retribution.

A NO ZONE For Cell Phones

There are some places that a cell phone just doesn’t have any place. One of those is most definitely at the dinner table. Considering how busy our schedules are, most families rarely get to sit down and have a meal together anymore. On the rare occasions it does happen, technology shouldn’t be allowed to interfere.

Families that have uninterrupted dinners together have kids that generally do better in school, are less likely to be tempted to try drugs and overall benefit from better mental health. One of the main reasons for all of these positive outcomes is what happens at the dinner table. Parents get a chance to actually talk with their kids. They find out what is happening in their lives. They also get to observe their children and may be able to spot early signs of behavior changes or other indicators that things just aren’t quite right.

All of this stops happening when cell phones enter into the mix.

No No At Night

Another place that cell phones just don’t need to be is in rooms behind closes doors.  In general, this is a good rule 24/7 , because having tech in non-communal spaces opens up even good kids to unnecessary temptations and trouble. At the very least though, this should be enforced at night.

More and more studies show that when technology is allowed in kids bedrooms it interferes with them getting adequate sleep. Some will stay up too late doing homework, others are secretly texting friends until all hours. Even the blue light that many of these devices emit messes with the body’s natural circadian rhythms and can keep kids from getting quality rest.

Consider having a designated overnight charging parking lot where everyone in the family puts their phones before bed. It’s not just good for the tweens and teens, moms and dads can benefit from better shut eye as well. Plus, what a great way to role model good choices.

You Break It You Pay For It

There are many life lessons that come with the privilege of technology, and they aren’t all about how to use it correctly.  Computers, tablets, and iPhone are not cheap and keeping track of and tacking care of them properly is important.

Make sure your tweens and teens are aware of exactly how much is invested in their devices. Establish a policy from the beginning about their responsibility when it comes to repairs or replacement. Should they be lost, broken or have a Starbucks Latte spilled on them what is it going to cost them?

It also doesn’t hurt for them to have a little skin in the game up front. Perhaps a condition of them getting any of these devices in the first place is that they have to pay for part of it. Or maybe they will have to contribute towards the monthly bill. At the very least, encourage them to be proactive and purchase a sturdy case. 

Oh, and don’t forget to talk to them about Data and how much they’ll be into you for if they go over. 😉

Put First Things First

A great book for all teenagers to read is the
7 Habits of Highly Effective Teens
(or the original 7 Habits of Highly Effective People is good too) .

The most valuable habit of all, IMHO, is #3 “Put First Things First”.  So many adults struggle with this and that’s why the sooner we can help our tweens and teens put it into practice, the better off they will be. Consider it an early graduation gift.

Texting friends, playing the latest gaming app, checking social media, these are all activities that come behind. homework and chores. Well behind.

It’s not a bad idea to set designated “off” times for phones with your tweens. This way they have some time set aside already. As your kids get older, more freedom may be in order so they begin learning to manage their own schedule.

Either way, make sure there are proper consequences in place if grades are suffering or the trash isn’t getting taken out.

Technology Use Will Be Monitored

Yes, most of us trust our tweens and teens, but they are still kids. And even good kids can make bad choices. In fact, tweens and teens are kind of wired to do dumb stuff, because their brains aren’t fully formed yet.

So, instead of equating trust with blind faith and total freedom, why not trust them within the boundaries of their life experience and brain development.

We believe that technology usage should be monitored. Bark is the best tool that we have found currently on the market.

Truth: It’s practically impossible to read every one of your kid’s text messages per day — and don’t even get us started on going through their web history! But we want to share a tool that’s been incredibly useful for many families.

Technology is incredibly powerful and gives access to so many things our kids have never seen or dealt with before in their lives. Many of us as adults have a hard time with it all.

Think about the way social media can make us feel sometimes.

It’s so easy to fall into the comparison trap and start feeling bad about ourselves. Or how often do you want to just tell someone off who is posting stuff you don’t agree with, but you stop yourself at the last minute and delete it.

Now think about our teenagers in the same position.  Everything is magnified 10x in the teenage mind. And self control…. yeah, that’s not exactly a teenager’s strong suit either.

Oh, and there’s a whole embarrassment factor going on here as well. Sexting, porn, naked selfies – these aren’t topics our teens are dying to talk with us about. If they can avoid the discussions they will, but that doesn’t mean they aren’t seeing this stuff.

Parenting is just as important in the virtual world as it is in the real world.  Our teens and tweens need our supervision and our guidance. We have to help them gain the skills and the discernment that are required to navigate online safely and responsibly.

This is why monitoring their internet and cell phone activity is the right thing to do. Be up front about it, let them know you will be watching and checking and reading. If you’re not being secretive about it, then it’s not spying, it’s parenting.

No Texting While Driving

This one is a no brainer.

The statistics are frightening.  8 deaths and 1,161 injuries a day in the US, on average, are caused by distracted driving.

The best place for your child’s phone when they are driving is in the glove compartment.  There are also auto-responders on most phones that can be set to remove the temptation of answering texts while driving. Some teens have created their own system, where they buddy check each other and a passenger just takes the driver’s phone.

Before handing over the keys to any vehicle you should have all new teen drivers sign a no texting while driving contract.

And finally, actions speak louder than words, make sure you are setting an example for safe cell phone use while in the car.

We’ve created a downloadable version of these tech rules in our shop. It’s cute, would be great to hang on a fridge or bulletin board and can serve as a reminder for your kids and make it easier to review the rules when necessary.

Tween and Teen Tech Rules Printable

rpbzm14ncpixlex0vdtqYou may also found our Managing Teens and Technology Bundle helpful as it includes the tech rules printable as well as the cell phone contract general and for driving, social media contract and important tech topics to talk about with your teen.

Teen Technology Management Bundle

screenshot 2022 03 10 at 12.13.00

Parenting Tweens and Teens is hard. Here are some popular technology posts that other parents found helpful to make it a little easier.

affiliate badge 1

We recommend @BarkTechnologies, a service that monitors your kid’s online activity for potential dangers, filters out websites you don’t want them visiting, and even helps you set healthy screen time limits to give them that all-too-important digital downtime! 🙌

It’s pretty dang hard to parent in the age of TikTok and Snapchat. But if you could use some help keeping your child safe online, we suggest giving Bark a try. we’ve got you covered for 7 days for free here

For more information or to sign up, please visit here.


Ethernet vs Wi-Fi​

Ethernet vs Wi-Fi


How do their affect your internet experience?

When it comes to choosing the best connectivity options for your home internet setup, the question usually boils down to whether you should use a Wi-Fi connection or ethernet connection.

A Wi-Fi connection enables users to access a network and use the internet wirelessly whilst an ethernet connection requires that a user makes use of an ethernet cable connected from their device to the Wi-Fi router in order to access a network and further access the internet. These two methods have their differences in terms of speed, reliability, convenience, and security.

So, let’s look into how differences between the two connection methods affect your overall internet experience.


There is a large variety of factors that determine the actual speed of a Wi-Fi or ethernet connection. Theoretically, the fastest speeds on an ethernet connection can go as high as 10Gbps and approximately 7Gbps on a Wi-Fi connection.

The reason an ethernet connection guarantees faster speeds is simply because the user is basically hard-wired to the internet, this reduces any delays in data transmission.

If you’re one that prioritizes speed and how fast data flows on your network, an ethernet connection will do best, but if you’ve got more than one user connecting to your network at a time it would be much more practical to use a Wi-Fi connection.


When the discussion of reliability comes up, we’re looking at which connectivity option is guaranteed to perform consistently well at all times.

A Wi-Fi connection is more vulnerable to interferences from physical objects that may block the signal as data is being transmitted wirelessly.

An ethernet connection, on the other hand, is generally unaffected by physical objects, however, any physical damage to the ethernet cable such as splits, cracks, crushing, or even bending of the cable will result in a poor internet experience. If you find yourself having to always adjust or “wiggle” your ethernet cable, you’re certainly better off connecting wirelessly, otherwise ensure that your ethernet cable is in good condition.


A Wi-Fi connection is without a doubt the more convenient option. Users are able to move around a property freely and are not obligated to spend most of their time on the internet from a desk or workstation. A Wi-Fi connection allows one to choose their surroundings when browsing or working on the internet, giving the user the sense of freedom and flexibility that we all love to have in the comfort of our homes.


An ethernet connection is more secure than Wi-Fi because data on an Ethernet network can only be accessed by physically attaching a device of some sort to the network.

On a Wi-Fi connection, because data is transmitted by means of wireless signals in the air, information can easily be intercepted without any physical actions being done on the network. However, a virtual private network (VPN) can be vital in protecting any data transmitted on your wireless network by hiding information such as your IP address, browsing activity, and personal info from potential threats or hackers. In summary, an ethernet connection is by default the more secure option but with a VPN, a Wi-Fi connection can prove to be equally as secure.


Both ethernet and Wi-Fi connection have their differences, how these differences affect your internet experience is directly proportional to your preferences as a home internet user. What works for your home internet setup may not work for your neighbor’s set up and what works for them may not work for you. We all want to accomplish different things with our internet package but what every home internet user has in common is the desire for an enjoyable internet experience.


Shop safely online

Tips on how to shop safely online


Online shopping is a quick and convenient way to buy any product you can imagine. Although there are several risks of shopping this way,
if you know how to identify a secure online store and know how to protect yourself you should be able to shop with confidence.

Here are 6 tips to help you shop safely online:

1. Ask for recommendations

Ask for recommendations from friends, family, or colleagues that have used the same online shop before. Reading online reviews to see what other customers have experienced may also help you make sound judgment and save you from the worst.

2. Look for a lock/SSL certificate

Lookout for a padlock on your address bar when online shopping, this is commonly seen in the payment stage of an online store. This means the website is using an HTTPS connection, which makes it safe to shop knowing that your information is kept private and secure.

3. Keep your computer and browser up to date and use antivirus software.

Security software notifications, like your antivirus, are very helpful, they are a good reminder to keep everything in check, and alert you before entering insecure sites. Do regular app updates to lessen the risks of vulnerabilities that can be exploited, this is an essential line of defense.

4. Check your bank statement

Regularly checking your bank statement will help you identify any unauthorized debit transactions on your account. You can request your bank to alert you for purchases over a certain amount.

5. Be aware of email scams

Email scammers can send out viruses and malware in a gift or special offer. Don’t open emails or attachments from someone you don’t know, or a site you haven’t visited before. If you’re tempted by an offer, do some research before clicking on any unreliable links.

6. Create a unique username and password

Having a unique username and password is essential for protecting your identity and ensuring your data is secured, if your password is easy to crack, it puts your accounts at risk of being hacked.

Send us your thoughts and share some of the tips you know of in the comments section or on any of our social media platforms. How to be safe when shopping online

2022 security broadband avoid getting hacked data breach

How to avoid getting hacked​

How to avoid getting hacked

2022 security broadband avoid getting hacked data breach
It is imperative to take preventative measures to avoid being hacked and having your data compromised. Any device with internet access, such as your router, computer or mobile device is susceptible to being hacked.
If you get hacked, that means that someone with unauthorized access has infiltrated your private and confidential information, and your files can then be shared, viewed or copied without your permission.
Getting hacked can happen to anyone, from a home individual user to a large-scale corporation. Cyber-criminals always look for ways to exploit data protection systems.

There are various types of attacks used by hackers

  • Brute Force Attack: An automation software or malicious person that tries different combinations of login details, passwords and encryption keys until it hopefully matches yours and gains access.
  • Phishing Attacks: Cyber criminals will try to trick, persuade and pressure you into revealing your passwords and personal information, by creating fake websites, fake emails and clickbait which may result in you giving your sensitive information.
  • Man-in-the-Middle Attacks: An attacker intercepts communication between two parties and secretly alters and relays the traffic between the parties. They lead the victims to believe they are communicating with each other and steals information.
  • Denial-of-Service Attack (DoS Attack): The aim of a denial-of-service attack is to deny a user access to a machine or network temporarily or indefinitely causing a disruption to services. This is generally achieved by flooding the network with traffic from various sources, triggering a network crash

Signs you may have been hacked


If you notice anything odd happening on your computer, you may have been hacked. Things to look out for:

  • Random popup messages.
  • Unwanted software installs.
  • Get ransomware or antivirus messages.
  • Internet searches are redirected to an alternative page.
  • Your passwords are no longer working.
  • Your mouse moves sporadically and makes odd selections.
  • Your friends receive social media invitations from you that you didn’t send.
  • Strange network traffic patterns.

Your personal data can be protected by adhering to some security measures and using Antivirus or Malware software.

How to avoid being hacked

Strong Password

Ensure you use a strong and secure password. Data should be encrypted, including online login details as well as personal and work laptops that have sensitive data.

Secure Password. 

If you would like to know more about Password Security please read our Help Centre article for more detail.

Change Admin Credentials

Your router is pre-configured with default log in details, this is the standard for all routers which means anyone aware of the default log in details can access your router. When you get a new router, it is advisable to change these default log in details.

Change your router admin details. 

If you would like to know more about How to secure your WiFi router please read our Help Centre article for more detail.

Keep Devices Updated

Be sure to keep all your devices up-to-date with any new firmware available with security patches to keep your devices secure.

Anti-virus and Firewall

Install a reputable anti-virus and firewall software to protect your data. An Antivirus is used to scan, detect, prevent and delete viruses from your computer and a firewall is either hardware and/or software that protects your network by filtering and blocking traffic from gaining access to your private data without permission.

Scan your computer for viruses and malware

Ensure that all your tech devices have an up-to-date antivirus or malware application installed, keep it updated by turning on auto-updates and run a full system scan at least once a month.

Access Control

Do not leave your devices open and/or unlocked and do not share any passwords. Encrypt any sensitive documents to makes them unreadable by hackers.

Be Vigilant

Cyber-criminals use various malicious methods to obtain your data, this may include fake financial websites, emails aimed at obtaining your passwords or viruses that infect your mail server to promote unwanted content. Never click on strange links, open suspicious emails or visit untrustworthy websites. Ensure that websites that require you to submit your personal information have an SSL certificate installed. e.g: https:// or a padlock in front of the URL.


Understanding SSL certificates. 

If you would like to Understand SSL certificates, please read our Help Centre article for easy to follow steps.


Ensure you back up all your data and files regularly. If something does happen to your files you still have a copy. There are various means of backups made easy by current technology, cloud backup and offline backups.

Cloud backup – A remote online storage facility that you can use to safely backup your data on a server, which can be accessed from any computing device and in any location.

There are various platforms you can use for cloud backup i.e: Google Drive, OneDrive, Dropbox and iCloud etc.

Offline Backup – A traditional method of a backup system where the data is stored on a physical storage device such as a portable USB dive or an external hard drive and kept in a safe place.



Be sure to schedule and automate your backups to keep your data updated.


The best protection from being hacked is to be proactive and take steps to protect yourself and your data, then to be reactive and need to block your accounts, change passwords and reinstall your back up data.

screenshot 2022 03 08 at 15.14.14

Online Security​

Online Security

A version of this article was first published on psafe.com

screenshot 2022 03 08 at 15.14.14
There are so many places that require a password
– your computer, online banking, your favorite shopping site, social media platforms, apps – you name it.
With so many passwords to remember, it can be tempting to use the same password for everything.
But remember, a password acts as a shield to protect your private and sensitive data
if your shield is weak, you’ll be more vulnerable to attacks and hacks.

Here are the most common passwords of 2020

Source: Nordpass – https://nordpass.com/most-comm… put together a list of the most common passwords of 2020.

They are based on how many times a password has been exposed, used, and how much time it would take to crack it.

Most of the passwords can be cracked in less than a second.
If you’re using any of these passwords, we suggest you change it immediately.

  • 123456
  • 123456789
  • picture1
  • password
  • 12345678

How to create a strong password

  • Should be long and memorable. At least 8 – 10 characters.
  • Use special characters. Uppercase, lowercase, letters, numbers and symbols.
  • Use substitute letters. Use uppercase and lowercase randomly and substitute letters with symbols.
  • Never use personal details. Avoid using personal information like your name, birthday or address. These can be easy to guess.
  • Never recycle passwords. The best practice is to change your password once a month with something new and not something you have used before.
  • Keep your password private. Do not enter your password when in public view, don’t write it down or leave it lying around.

Use of a Password Manager

But how can anyone remember all these long, complicated passwords?

A password manager is a service or software that allows you to store passwords as well as generate random strong and encrypted passwords for multiple platforms. A password manager uses a Master Password to unlock all the generated passwords.

This can be a useful tool if you have many passwords to remember and need to keep them safe.

  • Dashlane
  • 1Password
  • Apple Keychain
  • Google Password Manage

Two-step verification

A lot of websites and apps offer two-step verification. For example, you enter your password, and an OTP (One-Time Pin) will be sent to your mobile number or email address. You’ll only gain access once that OTP has been entered. This method makes it unlikely to be hacked as two passwords must be entered and the OTP is randomly generated and sent from a separate source.


2022 Instagram Trends

Tap Into 2022 Instagram Trends

Instagram recently released the very first edition of the 2022 Instagram Trends Report—a look ahead to the upcoming next-gen trends defined by Gen-Z that will shape culture in the next year. Instagram is where these tastemakers are leading on the creation of culture, exploring new territories, and taking what already exists in unexpected directions.

It’s a helpful resource for businesses looking to stay on the cutting edge of culture on Instagram. Use the trends and insights below to help you craft strategy and build content that speaks to your audience in the months to come.

Tell the story behind your products.

Young people are interested in the story behind the products—reels that show how the dress was made, a live Q&A to answer questions from potential buyers in real-time, a quiz in Stories to uncover little-known facts. With the ability to tag products across every format on Instagram, you can make any type of content an opportunity to show off your brand’s products.


@trinitymouzon and @Golde, shows you how she tags products on Instagram to make them easy to discover.

Maximalist fashion
minimalist beauty
on the rise.

50% of teens and young adults are going to be trying bold fashion in 20221, and about 1 in 3 young people are interested in learning more about and buying “clean” makeup / skincare in 20222.

Bold fashion can translate to bold marketing. How might you stop the scroll with fashion that pushes the envelope and culture forward? How might you use products like Reels to tell the story behind your product ingredients in a fresh way?

Music is now social.

Short-form video is redefining music discovery, and dance challenges are here to stay. More than 1 in 3 teens are excited to see more dance challenges in 20223.

For a business, this means audio and music are instrumental in kick-starting trends in short-form video like Reels. How might you consider your brand’s audio strategy and rethink the role music plays in a default sound-on environment?

Ankit from Facebook and Instagram’s Global Business Group explains how to add music and voiceover to your Reels.

Creators have risen to the level of A-list celebrities.

1 in 4 13-24 year-olds agree micro-influencers with loyal and highly engaged audiences are most important when creating new trends4.

But keep in mind, people are influenced by shared interests, not necessarily popularity. With next-gen influencers driving culture forward, consider expanding your creator partnership scope to include micro-influencers with highly engaged audiences.

Holistic wellness is the next step forward.

At-home workouts are still expected to be key in 2022, but wellness is moving outside of exercise. Respondents are looking for ways to continue their mental health and wellness journeys and develop their creative interests—drawing, collaging, painting, writing music and so on—as well as their homes.

How might you support young people on their health and wellness journeys and help provide access to resources or reimagine the types of digital experiences you create for your audience? How might you consider building a supportive community on social media that fosters and sparks creativity?


Don’t forget about your team’s own wellness! Here, @megababe founder and creator @katiesturino shares how to manage your DMs when they’re overflowing with questions about your products or services.

Hungry for more? Dig into The Business of Instagram: How-To Guide for tips on engaging your community and reaching your business goals.

A version of this article was first published on Instagram Business Team

Shopping Basket