Why Fixing Websites Is a Growth Opportunity for Freelancers

For years, freelance web designers have been encouraged to book new projects. It’s how I built my business. I’m betting that many more have done the same.

There’s great appeal in building a new website. It’s a chance for a fresh start. You can use the best tools for the job. The experience is even better if you are unencumbered with technical debt.

It can also be a lucrative business – but there are challenges. You’ll need to book clients with a sizeable budget. You’ll also need to find a way to stand out among competitors. That’s one path to success.

There are other ways to make money, though. The growing complexity of the web creates a different opportunity for web designers.

Think of all the websites out there. Consider how many of them are “broken” or poorly maintained. An enterprising freelancer could train their focus on these clients.

Let’s examine the pros and cons of fixing websites.

An Opportunity Years in the Making

There is no shortage of virtual fixer-uppers. You don’t have to look far to see outdated and neglected websites. But why?

I believe much of it stems from content management systems (CMS). Tools like WordPress offer plenty of possibilities for a great website. However, they also require education and commitment.

Sometimes, an entrepreneur may attempt to build it themselves. But, they will soon find that they’re in over their head. Or they don’t know the ingredients of a stable and performant site.

Even those who hire a web professional can run into problems. That web designer may have done a terrific job. However, they may not have communicated the importance of maintenance.

Continued care is required to keep things running smoothly. Outdated themes, plugins, and core software will turn any site into a bucket of bolts.

Website owners aren’t likely to call for help until something is wrong. It appears to be a common issue these days.

Why Fixing Websites Is a Growth Opportunity for Freelancers

I’m Not a Hero – Just a Web Designer

Longtime freelancers know the drill. You receive an email from a panicked website owner. They’re not a client. However, their site has crashed, been hacked – or maybe both. They need to get it fixed right away.

How do you respond? It’s easier to say “no” if you’re busy. Perhaps you have enough clients. But if not?

There’s an opportunity to play the part of hero. It’s also a chance to make money and establish a relationship.

Fixing this person’s site could lead to bigger things. Since you have their attention, you can use that time to make recommendations.

For example, their site may have other issues that need fixing. Things like accessibility and security could be lacking. Maybe they need a complete overhaul.

Helping a client in a difficult situation can create trust. It may be just the motivation they need to level up. You have a chance to guide them in the right direction.

Website repair is a way to establish new client relationships.

What’s Lurking Inside That Website?

Website rehabilitation is not without risk. What you see on the surface is one thing. What lies beneath is another.

It’s among the downsides of inheriting a website. You’re stepping into uncharted territory. That often leads you down the proverbial rabbit hole.

Maybe the site was built using unfamiliar tools. Or it’s so riddled with malware that you can’t find the root cause. These issues aren’t for the faint of heart.

There are also questions about the client. How did their website get into this state? Did they have a poor relationship with their last designer? Did they pay their bills on time?

Sure, people can change. But you’ll want to find out why their site is in disrepair. You may find some red flags that scream, “Stay away!”

Perhaps this is the biggest hurdle for freelancers. The willingness to accept risk and dive in headfirst are musts. Not everyone will have the stomach for it.

Pricing is also a concern. Estimating the cost of a fix isn’t easy. So, develop a formula that protects you from taking a loss on a messy site.

You won't know the depth of a website's problems until you investigate.

Is This the Right Path for You?

Website maintenance services are popping up all over the place. They often consist of teams of developers ready to get to work. There’s a good reason for it. The market needs experts who can turn online garbage into gold.

It’s not as simple a path for freelancers, though. You’ll have to weigh the potential benefits against the drawbacks.

Signing up for these types of projects may take away from other opportunities. But they could be a steady source of revenue. You might also turn them into yearly maintenance clients. And you’ll also be in line to handle the inevitable redesign.

Still, looking at broken websites all day isn’t for everyone. The remediation process can be stressful. Meanwhile, clients are waiting with bated breath for a solution.

There’s plenty of business for those interested in this type of work. It’s unlikely to go away any time soon, as the way we build modern websites almost guarantees it.

Related Topics


Top

Biohybrid Robotics: Living Skin Successfully Bonded to Humanoid Robots

In a groundbreaking development, researchers have successfully bound engineered skin tissue to the complex forms of humanoid robots. This achievement is a significant leap forward in the field of biohybrid robotics, blending biology with mechanical engineering to create more lifelike and functional robotic systems. The breakthrough,…

Fliki Review: Supercharge Your Content Creation with AI

As a content creator, I know firsthand how tough it can be to keep up with the constant demand for fresh, high-quality content. Balancing quality and quantity is a never-ending challenge, especially when maintaining a strong presence across multiple platforms like TikTok, Instagram, and YouTube. It’s…

10 daunting cyber physical attacks (and proactive mitigations) – CyberTalk

10 daunting cyber physical attacks (and proactive mitigations) – CyberTalk

EXECUTIVE SUMMARY:

Cyber physical attacks, which weaponize computer code to cause physical disruption or destruction, represent a growing threat, worldwide. These types of attacks tend to target water treatment facilities, power plants, transportation services, and other digitally connected, critical infrastructure-related segments of our society.

Years ago, cyber systems and physical systems had little-to-no interconnectivity. However, in recent years, internet-based systems have been employed, at-scale, to control physical systems and objects. Emergent cyber physical systems have sensors, computational capacities, real-time monitoring options, and automated components, among other (fancy and useful) things.

Experts have expressed concern around how AI could result in an era rife with cyber physical attacks. With greater technological advancement comes greater responsibility, one could argue. The challenge, at present, is that we’ve largely under-allocated resources to the protection of cyber physical systems. A rich discussion of cyber physical attack types and prevention modalities is to follow…

10 daunting cyber physical attacks (and proactive mitigations)

1. Water treatment facility threats. Cyber physical attacks on water treatment plants and systems are increasing and growing increasingly severe. Threats include potential contamination with deadly agents, as nearly occurred in the Oldsmar water treatment plant attack. Water treatment facilities, at least, in the U.S., have been notoriously slow to adopt adequate cyber security measures.

Mitigations: Experts broadly recommend that the water sector implement a multi-layered approach to cyber security. This includes rigorous network segmentation to isolate OT systems from IT networks, employing multi-factor authentication, monitoring network traffic and system logs, along with training staff around cyber security best practices.

2. Threats to industrial machinery. Although these threats have not appeared as frequently as water treatment facility threats, some of the world’s most sophisticated cyber criminals can target construction sites.

White hat researchers have proven that cyber criminals can potentially manipulate excavators, cranes, scrapers and other large pieces of machinery. Five years ago, Forbes noted that in the context of cyber security research, “cranes were hopelessly vulnerable.” Patches and work-arounds have been released, however some flaws may continue to persist.

Mitigations:
To prevent cyber physical attacks on industrial machinery located in or near active construction sites, cyber security professionals should pursue a comprehensive cyber security strategy – with both technical and procedural elements. Products with integrated AI security, like this, can help.

3. Power plant threats/the grid. As the world moves towards smart grid technology, cyber physical attacks on such systems are growing in frequency and sophistication. And artificial intelligence can make the development and launch of these attacks even easier than ever before, according to experts.

Mitigations:
One of the greatest challenges around power plant threats is actually lack of knowledge surrounding mitigation. Organizations need to ensure that all default passwords in systems have been changed to unique passwords. They also need to patch systems to the latest patch level. It’s also important to decommission unused systems. Employees need to remain aware of social media and social engineering threats. Contractors need to be held to high security standards…etc. The U.S. government’s comprehensive analyses and recommendations can be found here.

4. Transportation system threats. Transportation systems move millions of people and products across countries and continents everyday. Cyber physical attacks that target transport systems have the potential to slow down or stop the supply chain, preventing people from accessing essential, life-sustaining resources.

Mitigations:
One issue within the transportation sector is the historic lack of resources devoted to cyber security and cyber physical threats. But as different transportation sub-sectors become increasingly connected, improved funding, comprehensive cyber security strategies and collaborative efforts will become essential.

5. Autonomous vehicle threats. Self-driving cars and trucks rely on a complex web of network sensors, AI algorithms and communication systems; potential targets for cyber physical attacks. Key vulnerabilities include sensor spoofing, exploitation of vehicle-to-vehicle and vehicle-to-infrastructure communications, and malicious interference with AI decision-making systems, among other things.

In 2023, researchers demonstrated the ability to upend an autonomous vehicle’s driving abilities after placing stickers on road signs. This kind of trickery (or sabotage) can lead to misinterpreted traffic signals or misunderstood road conditions.

Mitigations: Explore this expert interview pertaining to connected vehicle cyber security mitigations. In addition, this EV cyber security risks and best practices article may be of interest.

6. Smart building system threats. While building-based attacks are rare at the moment, building system attacks are poised to become a serious problem. It’s not worth waiting for a catastrophe before taking action.

Modern buildings often have interconnected HVAC, lighting, access control and elevator systems – all of which are indeed vulnerable to cyber physical attacks, unless properly secured.

Mitigations: Cyber security professionals should first familiarize themselves with the inherent management system and its built-in security features (basics, right?).

Subsequently, professionals may wish to implement network segmentation. Systems should be regularly patched and updated. Security assessments at regular intervals are a must. In addition, implement strong access controls, like least privileged access, and monitor for anomalous behavior.

7. Manufacturing facility threats. Within manufacturing environments, Industry 4.0 has led to heightened levels of connectivity. On this account, cyber physical attacks could disrupt production, compromise product quality and/or crush profits. Operational adaptations, such as remote work adoption, have also increased the risks of cyber physical attacks in this sector.

Mitigations: The Cybersecurity and Infrastructure Security Agency recommends developing both a long-term and multi-faceted cyber security strategy. Manufacturing organizations are also advised to invest in training for both security analysts and those who are working on the ‘shop floor’. Those on-site should maintain cyber security and operational knowledge. Partnerships between production staff and security analysts should be facilitated and aligned with the organization’s risk tolerance.

8. Healthcare device threats. Cyber criminals have been known to target hospital-based IoT systems, implantable IoT systems, and personal wearable devices (like smartwatches).

To highlight the magnitude of implantable IoT security challenges, Dr. Sanjay Gupta, an American neurosurgeon, noted that former U.S. Vice President Dick Cheney’s heart defibrillator had to be monitored ahead of implantation to avoid potential cyber physical terrorist attacks.

Mitigations: Because the healthcare cyber physical attack landscape is so varied, it’s tough to summarize mitigations in a single paragraph. For hospital-focused threat prevention insights, click here. For medical IoT (IoMT) cyber security insights, see our Buyer’s Guide.

9. Drone system threats. The proliferation of commercial drones has created the potential for cyber physical attacks of new varieties. We’re not talking about flying pizza that fails to land…Drone threats could result in disruptions to critical national infrastructure and could lead to public safety concerns.

Mitigations: Enterprises that leverage drones are advised to encrypt drone communication technologies. They should also deploy anti-spoofing and anti-jamming technologies. Beyond that, experts suggest establishing real-time monitoring capabilities for drone fleets with automated anomaly detection. These reflect just a handful of the cyber security tactics that can be put into place.

10. Quantum computing threats. While technology isn’t quite there yet, quantum computing may present a threat to cyber physical systems by making it possible for adversaries to break encryption methods used for sensitive data.

In turn, cyber criminals may be able to gain access to industrial control systems or other sensitive cyber infrastructure that could be used to incite physical damage.

Mitigations: Organizations may wish to focus on hiring talent that is familiar with quantum computing security. In addition or alternatively, organizations may want to participate in the development of quantum security standards, and help to establish best practices. As quantum technology evolves, stay informed.

Summary

To effectively prevent cyber physical attacks, organizations need to fully understand their own ecosystems; both digital and physical assets.

Comprehensive visibility into systems will enable organizations to prioritize risk mitigation efforts, allocate resources more effectively, and develop targeted strategies that address the most critical weaknesses in cyber physical infrastructure.

Also worth mentioning: A cyber physical security approach should also extend beyond internal systems as to include third-party vendors and supply chain partners.

For more on cyber physical attacks, click here. Lastly, to receive cyber security thought leadership articles, groundbreaking research and emerging threat analyses each week, subscribe to the CyberTalk.org newsletter.

📝 Guest Post: Designing Prompts for LLM-as-a-Judge Model Evals*

In this guest post, Nikolai Liubimov, CTO of HumanSignal provides helpful resources to get started building LLM-as-a-judge evaluators for AI models. HumanSignal recently launched a suite of tools designed to build production-grade Evals workflows, including the ability to fine-tune LLM-as-a-judge evaluators, integrated workflows for human supervision,…

The Legend Of Zelda: Majora’s Mask Part 19 | Super Replay

The Legend Of Zelda: Majora’s Mask Part 19 | Super Replay

After The Legend of Zelda: Ocarina of Time reinvented the series in 3D and became its new gold standard, Nintendo followed up with a surreal sequel in Majora’s Mask. Set two months after the events of Ocarina, Link finds himself transported to an alternate version of Hyrule called Termina and must prevent a very angry moon from crashing into the Earth over the course of three constantly repeating days. Majora’s Mask’s unique structure and bizarre tone have earned it legions of passionate defenders and detractors, and one long-time Zelda fan is going to experience it for the first time to see where he lands on that spectrum.

Join Marcus Stewart and Kyle Hilliard today and each Friday on Twitch at 1:00 p.m. CT as they gradually work their way through the entire game until Termina is saved. Archived episodes will be uploaded each Saturday on our second YouTube channel Game Informer Shows, which you can watch both above and by clicking the links below. 

Part 1 – Plenty of Time
Part 2 – The Bear
Part 3 – Deku Ball Z
Part 4 – Pig Out
Part 5 – The Was a Bad Choice!
Part 6 – Ray Darmani
Part 7 – Curl and Pound
Part 8 – Almost a Flamethrower
Part 9 – Take Me Higher
Part 10 – Time Juice
Part 11 – The One About Joey
Part 12 – Ugly Country
Part 13 – The Sword is the Chicken Hat
Part 14 – Harvard for Hyrule
Part 15 – Keeping it Pure
Part 16 – Fishy Business
Part 17 – Eight-Legged Freaks
Part 18 – The Side Quest Episode

[embedded content]

If you enjoy our livestreams but haven’t subscribed to our Twitch channel, know that doing so not only gives you notifications and access to special emotes. You’ll also be granted entry to the official Game Informer Discord channel, where our welcoming community members, moderators, and staff gather to talk games, entertainment, food, and organize hangouts! Be sure to also follow our second YouTube channel, Game Informer Shows, to watch other Replay episodes as well as Twitch archives of GI Live and more. 

Flintlock: The Siege Of Dawn Goes Gold, PC Specs And 20-Minutes Of Gameplay Revealed

Flintlock: The Siege Of Dawn Goes Gold, PC Specs And 20-Minutes Of Gameplay Revealed

Flintlock: The Siege of Dawn has gone gold, meaning it should be all but ready for its release on July 18. Developer A44 (Ashen) has also released the game’s PC specs and 20-minutes of raw gameplay footage.

The upcoming “Souls-lite” fantasy action game stars elite soldier Nor Vanek and her furry fox-like companion Enki on a revenge quest to kill the gods of their world. She wields an arsenal of melee, firearms, and magic that can be chained to create stylish combo attacks. Nor Venek also has special traversal abilities to navigate the world, which is being besieged by the angry deities.

We last saw Flintlock during the Xbox Games Showcase a few weeks ago, but you can check out 20 minutes of new gameplay footage in the video below. Set during a later stage of the game, a synopsis adds context to the footage: “Join Nor and Enki as they prepare to step into the deserts of Wanderer’s Rest to take on the personal guard of the god Dukmar. With an entire army hunting for her, Nor will need all of her skills to make it to her eventual destination – the City of Sibyl, where she hopes the gods’ true intentions will finally be revealed.”

[embedded content]

Here are the game’s minimum and recommended PC specs:

Minimum

  • Operating System: Windows 10
  • Processor: Intel Core i5-8400 / AMD Ryzen 3 3300X
  • Memory: 8 GB RAM
  • Graphics Card: GTX 1060 / Radeon RX 580 (6GB+ RAM)
  • DirectX: Version 11
  • Storage: Up To 30 GB Available Space
  • Additional Notes: SSD

Recommended

  • Operating System: Windows 10
  • Processor: Intel Core i7-8700K / AMD Ryzen 5 3600X
  • Memory: 16 GB RAM
  • Graphics Card: GTX 2060 Super / Radeon RX 5700 (8GB+ RAM)
  • DirectX: Version 12
  • Storage: Up to 30 GB Available Space
  • Additional Notes: SSD

Flintlock: The Siege of Dawn launches on July 18 for PlayStation 5, Xbox Series X/S, PlayStation 4, Xbox One, and PC. It’s also launching day one on Xbox Game Pass. 

Behind the Scenes: “Never Fully Gone” Music Video Shoot – Videoguys

Filmmakers Jennifer Pautke and James Frasca recently collaborated on an exciting project: shooting a music video for Collideoscope’s new song “Never Fully Gone.” This two-day shoot took place at a local beach and a vibrant local music venue, utilizing top-tier equipment to bring the music video to life.

Behind the Scenes: “Never Fully Gone” Music Video Shoot – Videoguys

Equipment Highlights: LUMIX S5IIX, Atomos Ninja Ultra, and OWC Atlas Ultra SD Card

To ensure the highest quality footage, the team used state-of-the-art equipment, including the LUMIX S5IIX camera, the Atomos Ninja Ultra monitor, and the OWC Atlas Ultra SD Card.

LUMIX S5IIX: The Camera of Choice

The LUMIX S5IIX was the primary camera for the shoot. Director of Photography James Frasca selected this camera for its full-frame, mirrorless design, which delivered stunning shots and brought the music video vision to life. Key features include:

  • 24.2MP 35mm full-frame CMOS sensor with phase hybrid autofocus
  • Active I.S. for stable walking shots
  • High-resolution imaging engine with approximately 2x higher-speed signal processing for high bit-rate video recording
  • 5.8K Pro-Res, Pro-Res internal, RAW over HDMI, and Wireless/Wired IP streaming capabilities
Atomos Ninja Ultra: Perfect for Car Shoots

The Atomos Ninja Ultra was instrumental during the interior car shoots. With DP James Frasca in the front seat and Jennifer Pautke directing from the back seat, the Ninja Ultra monitor allowed Jennifer to view the camera feed and provide real-time direction to the actor. Notable features include:

  • ProRes RAW capture up to 8K 30P, 6K 60P, and 4K 120P
  • Full codec flexibility with ProRes RAW, ProRes, DNxHD, and H.265 (HEVC)
  • AtomOS 11 with exclusive monitoring and recording features
OWC Atlas Ultra SD Card: Reliable and Fast

To record all the footage, the team used the OWC 128GB Atlas Ultra SDXC V90 UHS-II Memory Card. Known for its reliability and speed, this card ensured smooth and uninterrupted recording. Features include:

  • Super-fast read and write speeds
  • Thorough quality control process for data integrity
  • Ideal for high-end workflows and maximum camera settings

Conclusion

The collaboration between Jennifer Pautke and James Frasca, combined with the cutting-edge equipment, resulted in a visually stunning music video for “Never Fully Gone.” The seamless integration of the LUMIX S5IIX, Atomos Ninja Ultra, and OWC Atlas Ultra SD Card played a crucial role in capturing the essence of Collideoscope’s new song, making it a project to remember.

Watch the Never Fully Gone music video below:[embedded content]