White Paper: Social Media - The Dark Side

Size: px
Start display at page:

Download "White Paper: Social Media - The Dark Side"

Transcription

1 November 2010 White Paper: Social Media - The Dark Side by Elias Vamvakas President, BrandProtect a division of brandprotect

2 Understanding the Value of a Social Media Risk Management Program As Social Media has become a part of everyday life, we all are starting to believe that it may be as transformational to society as the introduction of the internet. It has become the new internet for most people and it s certainly indistinguishable by today s generation. What is even more There are thousands of articles and blogs available to help companies ride the waves created by the Social Media Tsunami. The focus of this article is to help companies learn how to prepare, prevent and even eliminate the devastation that such a Tsunami can bring. transformational is the adoption of Social Media by the 55+ crowd who appear to have embraced social media in spite of their fear and avoidance of mainstream internet usage, in order to stay in touch with their grandchildren and friends. There are three components: 1. What is Social Media and how can it impact you negatively? 2. How can you establish an appropriate Social Media Risk Prevention Program 3. Can you really minimize the risk and eliminate Social Media Threats Let s start from the beginning. What is Social Media and how can it impact you negatively? There is significant confusion on what constitutes Social Media. Many people assume that all internet content is considered social media, while others see Social Media Unfortunately, like every great leap in technology, the positive benefits and opportunities created are matched by the dark side of human ingenuity to create havoc and generate unearned personal benefit. Social Media has given corporations the power to communicate with their customers, solicit feedback to create better products and offer previously unattainable levels of service. It has allowed friends and families to stay connected and share life s special moments. Unfortunately, it has also created a vehicle where personal information is always at risk, identities can easily be stolen and both customers and employees can legally blackmail as only the portion where individuals congregate to get information, chat, keep in touch or just render their opinion. While Social Media sites like Facebook or Twitter are icons of Social Media, the reality is that the lines have blurred. Are Blogs individual expressions of opinion, or just daily updates of a friend s adventures? Is YouTube just a website for posting videos, a search engine (now considered the world s second largest), or a Social Media site? These questions lead us to conclude that the entire web has been transformed into a place where individuals congregate to get information, chat, keep in touch, or just render their opinion. anyone with a simple $50 video camera. So how could that possibly be a bad thing? Let s now examine the dark side of Social Media.

3 What is Social Media and how can it impact you negatively? Internet / Social Media threats can be characterized in 3 major areas: 1. Identity Theft 2. Brand or Intellectual Property Abuses 3. Malicious Discussion Before going into more detail, let s clarify what is considered to be a threat. In the world we live in today, you are your reputation. In the marketing world we would call this your brand. A threat is anything that will negatively impact your REVENUE, RIGHTS or REPUTATION. Identity Theft: Identify Theft is most well-known, because it is pervasive. Your identify can be stolen by an unknown individual or entity, gaining access to your financial assets and bank accounts. Identity Theft takes on two primary forms: Phishing (misleading s hoping to entice you to divulge personal information such as account numbers and passwords), and Malware (a piece of code that is downloaded onto your computer when you click on infected websites or s, ultimately taking over your computer, sending private information to pre-identified locations). While these attacks have traditionally targeted major financial institutions, the new security measures being incorporated by them are forcing cybercriminals to move to easier targets. Smaller organizations, that have not as yet invested in security measures, either because of awareness or financial limitations, are the new targets of choice for cybercriminals. If you sell products online, if you take credit cards, or if your customers have to log in to your website, you are at risk, and you must have a risk management program in place. It is not just the prudent thing to do, it is also the law. Great article: Brand and Intellectual Property Abuses These abuses come in many forms, and note that in some instances, the source is purely accidental. Here are some examples: 1. Competitor registers a website that is similar to yours to divert your traffic 2. Competitor uses your brand, produce, images and/or name to sell a competitive product or counterfeit imitation. 3. Companies use your brand or logo to infer a relationship or association with your company or product. 4. Companies use your brand and reputation to attract potential customers to their website or their products 5. Employees expose classified information, intellectual property or even financial information through unsecure , or while downloading personal information through peer to peer networks. Malicious Discussion: While the name malicious discussion implies intent, in most cases these threats are innocent, and in many cases, accidental. Unfortunately, they usually end up being the most damaging to a company s reputation, creating long term repercussions. Case-for-Internet-Brand-Governance.pdf

4 Establishing an appropriate Social Media Risk Prevention Program Malicious Discussion con t: Here are some examples: 1. Employee is upset with boss and goes home and tells all his friends online how terrible they are. He describes them as cruel and unethical, claiming how they treat their customers even worse than their employees. 2. A waitress at a golf club tweets about the intoxicated member who propositioned her last night. 3. A worried employee tells her mother that business is terrible and if things don t improve they may not have enough money to pay her or any of their creditors. 4. The excited receptionist at the doctor s office can t wait to tell her online friends that a public figure just came in for a pregnancy test. 5. Two employees decide to make a YouTube video of how they add special off the floor ingredients to every pizza they deliver. The list can go on, but as you can appreciate, any of these situations are possible. In fact, with the popularity of Facebook, Twitter, YouTube and the iphone, it is more than likely that such issues will occur often. Can anything be done about it? Absolutely!!! First and foremost, you need to be prepared. You need an appropriate Social Media Risk Management Program that includes the implementation of the right policies and procedures, and a process for identifying, analyzing and implementing a strategy to eliminate threats! Establishing an appropriate Social Media Risk Prevention Program There are three key elements to a good Risk Prevention Program: Prevention, Monitoring and Response. Prevention: An appropriate prevention program is the key to creating an effective Risk Management Program. What are the key components to a prevention program? 1. Appropriate policies and procedures: Having clear, comprehensive corporate policies and procedures, communicated to all employees, is an essential first step. As an example, if you want to reduce the risk or even take down a threat that was generated by one of your employees, it is essential that a policy is in place that restricts your employees from posting private or confidential corporate information on social media sites. 2. Identify the individual in your organization that is responsible for protecting the company s brand and reputation: Identify your CRO (Chief Reputation Officer) and his/her emergency response team. In many cases, the team includes the CEO the CFO and head of Sales/ Marketing. The worst time to try to figure out who should coordinate a response is after a threat has been identified. 3. Determine a process for analyzing the threshold that must be crossed for a threat to require action.

5 Establishing an appropriate Social Media Risk Prevention Program Monitoring: Monitoring can take many forms and can encompass a variety of internet search tools. Many of them are free. tools_directory.html Respond: The ability to respond to threats is critical within a Social Media Response Program. It is generally believed that nothing can be done to eliminate Social Media threats, but that is not accurate! QUICK and DECISIVE action is required for an effective result. Given the magnitude of internet content, it s important to manage expectations. There is no way to search everywhere and monitor everything. There is no perfect tool, and you will need to go through a fair bit of junk. One of the most important elements of successful monitoring is picking the right search terms. This is somewhat of an art. You will know you have done well if your monitoring tools provide you more than 30% relevant data. (Live real-time help in this area from your Monitoring Service Provider is a significant bonus.) Monitoring should include forums, news, websites, pictures, videos and Domain registrations. Domain/URL registrations are not generally a part of normal search engines, since they are a unique service normally accessible only by registrars and brand protection companies, but critical to protecting your reputation. This is where vigilante consumers create havoc by registering websites like yourcompanysucks. com or yourcompanydisaster.com or ihateyourcompany. com. It is important to find these kinds of sites, as soon as possible, to minimize the damage they can cause. Eliminating Social Media Threats Contrary to general opinion, Social Media Threats can be eliminated! As a minimum they can be mitigated or minimized. The extent of damage a particular incident will cause, is determined by 3 factors: More importantly than just the search capabilities are case management functions that need to either be included in your program or supplemented with internal processes. We may want to consider these case management tools as part of the RESPOND program. Being able to manage, track and share information is critical, as threats will most likely span several members or functional areas of an organization. In addition, the ever-changing nature of the internet requires the ability to store a copy of offending websites and postings in a permanent, structured database for benchmarking purposes, or support a take-down process or litigation. 1. The comprehensiveness of the company s prevention measures 2. The level of analysis and expertise available to deal with the incident 3. The company s ability to act quickly and decisively BrandProtect has developed a formula for dealing with Social Media issues that will minimize, and in most instances, eliminate Social Media and other reputation threats.

6 Eliminating Social Media Threats The process begins with the recognition that threats can be eliminated using one of the following 4 Action Strategies 2. Respond to minimize or neutralize the threat: Getting your side of the story out is a natural response to online threats: assuming you have something to say. This 1. Turn the threat into an Opportunity 2. Respond to minimize or neutralize the impact 3. Remove the threat 4. Bury the threat is a very good strategy. Making sure that the response is appropriate, respectful and honest is key. A critical element to neutralizing a threat is making sure that the response has had the same amount of traction as the actual threat. You need to know all the sites that the initial threat was posted We have developed the I5 process as a systematic tool to help make quick decisions. The entire Emergency Response on, and make sure that the response is easily found and available in all of the corresponding social media sites. Team, including external advisors, lead by the CRO (Chief Reputation Officer), should go through the I5 process as soon as a major threat has been identified. 3. Remove the threat: This is the most common approach employed for comments, blogs and websites that are inaccurate, offensive, or use a The process requires the Team answering the following 5 questions in detail: 1. What are the facts associated with the situation? 2. What internal issues/factors are controllable by us? 3. What external issues/factors are not controllable by us? 4. Identify risk scenarios. What is the worst thing that could happen to us? What is the best thing that could happen to us? 5. Choosing an Action Strategy from above. Identify actions that are needed to mitigate or stop the worst thing that could happen, and formulate a plan to try to achieve the best thing that could happen. Examples of how Action Strategies have been used company s brand and intellectual property inappropriately. This can be done by legal means or by asking the person who posted the offensive material to remove it. All legitimate social media sites have a dispute resolution process that is appropriate and fair for inappropriate content. We have found that in most cases (80%+), a simple letter properly drafted and sent to the right person is all that is needed to remove offensive material. Only inappropriate threats will be removed in this way. Opinions that are founded on fact will not be easily deterred. Mitch Joel was recently quoted saying, You can t stop people from telling other people that your product sucks, if it does. Make your product not suck first! successfully to eliminate or mitigate Social Media Threats. 4. If you can t eliminate it, than bury it: 1. Turning a threat into an Opportunity: Domino s Pizza was severely criticized for the poor taste of their pizza and the fact that their crust tasted like cardboard. Rather than trying to fight the negative media, they chose to embrace it and use the negative comments as a rallying No one reads page 17 of a Google search. There are multiple strategies that can be employed to move offending data to the back of the bus. By leveraging organic and paid for search engine optimization techniques, you can ensure that the message you want to be heard cuts through. point to rejuvenate their brand and their company. They launched a very successful social media campaign that literally changed the company. watch?v=ah5r56jilag Through understanding Social Media, its potential risks and your options in responding to these, organizations can indeed prepare, prevent and even eliminate their potentially devastating effects.

7 About Us internet911 Internet911 is a Social Media Risk Management Program for small to mid-sized companies, offered by BrandProtect, the leader in internet threat management. It s a combination of policies and procedures, technology and services that help Prevent, Monitor and Respond to incidents on the internet. brandprotect For over a decade, some of the world s largest and most security sensitive organizations have been relying on BrandProtect to mitigate their online threats and protect their revenues, intellectual property rights and reputation. Our customers include global brands and leading financial institutions, including five of the top 10 banks in the world, as well as many small and mid-sized organizations. Toronto Headquarters 5090 Explorer Drive, Suite 203 Mississauga ON Canada L4W 4T9 As members of the International Forum of Incident Response Security Teams (FIRST), we work alongside organizations such as Visa, the U.S. Air Force, IBM, Microsoft and Deutsche Bank to define and implement online protection and response policies and procedures. We also have relationships with over 4,000 Internet Service Providers around the world, currently supporting over 90% of Internet traffic. This, combined with our knowledge and expertise which includes dealing with Social Media Issues, helps us to manage and mitigate internet threats quickly and effectively. Local Telephone: Local Fax: Fax Toll Free: Mon - Fri 9AM to 5PM (EST)

DEVELOPING A SOCIAL MEDIA STRATEGY

DEVELOPING A SOCIAL MEDIA STRATEGY DEVELOPING A SOCIAL MEDIA STRATEGY Creating a social media strategy for your business 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Video Tutorials 3 Getting Started with Social

More information

white paper Malware Security and the Bottom Line

white paper Malware Security and the Bottom Line Malware Security Report: Protecting Your BusineSS, Customers, and the Bottom Line Contents 1 Malware is crawling onto web sites everywhere 1 What is Malware? 2 The anatomy of Malware attacks 3 The Malware

More information

Instant Messaging and Security

Instant Messaging and Security Strategic Guide Instant Messaging and Security Businesses recognise that instant messaging can help to improve employee productivity, but are often reluctant to sanction its use due to concerns about security.

More information

DIGITAL STRATEGY AND TACTICS FOR BRAND REPUTATION MANAGEMENT

DIGITAL STRATEGY AND TACTICS FOR BRAND REPUTATION MANAGEMENT FOR BRAND REPUTATION MANAGEMENT Do you know what your customers are saying about your brand in the online world? How about your competitors? What about your ex-employees? The Internet and many Web 2.0

More information

Staying Safe.....on social media and online

Staying Safe.....on social media and online Staying Safe.....on social media and online What is this guide about This booklet is about how to keep safe when you are using social media and the internet. Some people get called names, are bullied or

More information

5 Point Social Media Action Plan.

5 Point Social Media Action Plan. 5 Point Social Media Action Plan. Workshop delivered by Ian Gibbins, IG Media Marketing Ltd (ian@igmediamarketing.com, tel: 01733 241537) On behalf of the Chambers Communications Sector Introduction: There

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

Security Awareness Campaigns Deliver Major, Ongoing ROI

Security Awareness Campaigns Deliver Major, Ongoing ROI Security Awareness Campaigns Deliver Major, Ongoing ROI CONTENTS 01 01 02 04 05 06 Introduction The Challenge Immediate Value Evaluating effectiveness Ongoing value Conclusion INTRODUCTION By this point,

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

Plus, although B2B marketing budgets have increased, the number of channels may far surpass what you can do with your budget.

Plus, although B2B marketing budgets have increased, the number of channels may far surpass what you can do with your budget. 1 CNBC s list of the Top 10 Most Stressful Jobs of 2011 revealed that the sixth most stressful job was that of an advertising account executive. The reason today s account executives are so stressed is

More information

Social Media Guidelines

Social Media Guidelines Anchorage School District Social Media Guidelines Social media includes the various online technology tools that enable people to communicate easily over the Internet to share information and resources.

More information

WSI White Paper. Prepared by: Baltej Gill Social Media Strategist, WSI

WSI White Paper. Prepared by: Baltej Gill Social Media Strategist, WSI Understanding the Buzz Around Social Media WSI White Paper Prepared by: Baltej Gill Social Media Strategist, WSI Introduction You might have heard that social media can help build your brand, promote your

More information

Email Marketing Best Practices - Top 10 tips

Email Marketing Best Practices - Top 10 tips Email Marketing Best Practices - Top 10 tips Contents 1. Make a good first impression... 2 2. Above the fold... 3 3. Keep it short and to the point.... 3 4. Send what your customer wants not what you want

More information

Securing the Mobile App Market

Securing the Mobile App Market WHITE PAPER: SECURING THE MOBILE APP MARKET White Paper Securing the Mobile App Market How Code Signing Can Bolster Security for Mobile Applications Securing the Mobile App Market How Code Signing Can

More information

DIGITAL MARKETING STRATEGY. Setting up, Raising Awareness For and Monitoring Social Media

DIGITAL MARKETING STRATEGY. Setting up, Raising Awareness For and Monitoring Social Media DIGITAL MARKETING STRATEGY Setting up, Raising Awareness For and Monitoring Social Media INTRODUCTION 1 INTRODUCTION 1 Social media first emerged as a personal means of communication; enabling new connections,

More information

10 ways Professional Service companies can increase their profits through marketing

10 ways Professional Service companies can increase their profits through marketing 10 ways Professional Service companies can increase their profits through marketing A Xander Marketing Guide T: 03302232770 E: hello@xandermarketing.com W: www.xandermarketing.com Introduction Traditionally

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

a guide to social networking for massage therapists

a guide to social networking for massage therapists a guide to social networking for massage therapists table of contents 2 3 5 6 7 8 9 10 11 12 13 get the facts first the importance of social media, different types of social media and what twitter can

More information

BRAVE NEW WORLD. Reaching Customers Through the Internet NUMBER 1 WINTER 2013 OVERVIEW

BRAVE NEW WORLD. Reaching Customers Through the Internet NUMBER 1 WINTER 2013 OVERVIEW NUMBER 1 WINTER 2013 BRAVE NEW WORLD Reaching Customers Through the Internet OVERVIEW The Internet has changed everything. Music, books, shopping, banking, news, networking, sharing, everything. Add market

More information

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS

Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS A Primer TROUBLE IN YOUR INBOX 5 FACTS EVERY SMALL BUSINESS SHOULD KNOW ABOUT EMAIL-BASED THREATS Even with today s breakthroughs in online communication, email is still one of the main ways that most

More information

Website Planning Questionnaire. Introduction. Thank you for your interest in the services of The Ultimate Answer!

Website Planning Questionnaire. Introduction. Thank you for your interest in the services of The Ultimate Answer! Website Planning Questionnaire Colleen Rice Nelson Introduction Thank you for your interest in the services of The Ultimate Answer! Every choice and decision you make concerning your website may or may

More information

SOCIAL MEDIA OPTIMIZATION

SOCIAL MEDIA OPTIMIZATION SOCIAL MEDIA OPTIMIZATION Proxy1Media is a Full-Service Internet Marketing, Web Site Design, Interactive Media & Search-Engine Marketing Company in Boca Raton, Florida. We specialize in On-Line Advertising

More information

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise

Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical to Today s Enterprise White Paper Business Continuity and Breach Protection: Why SSL Certificate Management Is Critical

More information

STOP. THINK. CONNECT. Online Safety Quiz

STOP. THINK. CONNECT. Online Safety Quiz STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

More information

Online Merchandising: Best Practices for Marketing and Merchandising Your Hotel

Online Merchandising: Best Practices for Marketing and Merchandising Your Hotel Author: Paolo Boni President & Chief Executive Officer, VFM Leonardo, Inc. Paolo has been leading VFM Leonardo s vision and strategic direction since 2001 and is a recognized travel industry expert on

More information

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages.

Parents guide to online safety. Practical, issue-focussed information and advice for parents of children of all ages. Parents guide to online safety Practical, issue-focussed information and advice for parents of children of all ages. Cybersmart is a national cybersafety education program managed by the Australian Communications

More information

SPECIAL REPORT. Tips to Jumpstart Your. Network. 2011 All Rights Reserved

SPECIAL REPORT. Tips to Jumpstart Your. Network. 2011 All Rights Reserved SPECIAL REPORT 20 Tips to Jumpstart Your Network 2011 All Rights Reserved Twitter is a perfect medium for building an online brand, getting instant feedback from your core audience, strengthening two-way

More information

Social Media Guidelines

Social Media Guidelines MARKETING AND MEDIA RELATIONS Social Media Guidelines Emporia State University Last Updated: July 09, 2011 Introduction What is Social Media? Social media consists of web-based tools used to interact with

More information

Reputation Marketing

Reputation Marketing Reputation Marketing FAQ 1) Do I need Reputation Marketing? If you do not already have a 5-star reputation & are spending any amount of money to market your business, then you are publicizing your bad

More information

How To Ask For A Referral Online Without Being Afraid

How To Ask For A Referral Online Without Being Afraid The Art of the Ask How to Overcome the Fear of Asking for Referrals 2013 Copyright Constant Contact, Inc. 12-3149 BEST PRACTICES GUIDE SOCIAL MEDIA MARKETING When you think about your main source of new

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure

Defense Media Activity Guide To Keeping Your Social Media Accounts Secure Guide To Keeping Your Social Media Accounts Secure Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something

More information

GFI White Paper. How Web Reputation increases your online protection

GFI White Paper. How Web Reputation increases your online protection GFI White Paper How Web Reputation increases your online protection Contents Introduction to Web Reputation 3 Why use Web Reputation? 3 The value of using Web Reputation and antivirus software 3 The value

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

OVERVIEW OF INTERNET MARKETING

OVERVIEW OF INTERNET MARKETING OVERVIEW OF INTERNET MARKETING Introduction to the various ways in which you can market your business online 2 April 2012 Version 1.0 Contents Contents 2 Introduction 4 Skill Level 4 Terminology 4 What

More information

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks Smartphones and tablets are invading the workplace along with the security risks they bring with them. Every day these devices go unchecked by standard vulnerability management processes, even as malware

More information

Haslingden High School

Haslingden High School Haslingden High School ICT Department Year 8 esafety and Web Design homework Student name: Form: ICT teacher: Date issued: Date due: Level Effort House points Teacher feedback: KS3 Target level Parent/Carer

More information

WEBSITE CREATION PROCESS

WEBSITE CREATION PROCESS WEBSITE CREATION PROCESS Skylark is a Toronto Web Design Studio known and respected for its professional approach and elegant, exquisite and affordable web design that provides the best business value

More information

Guidelines for smart phones, tablets and other mobile devices

Guidelines for smart phones, tablets and other mobile devices Guidelines for smart phones, tablets and other mobile devices Summary Smart phones, tablets and other similar mobile devices are being used increasingly both privately and in organisations. Another emerging

More information

Online doctoral programs no dissertation >>>CLICK HERE<<<

Online doctoral programs no dissertation >>>CLICK HERE<<< Online doctoral programs no dissertation. And since blogging platforms are virtually free and require no resources in order to use other than electricity and an Internet connection fee, the price of producing

More information

Colleen s Interview With Ivan Kolev

Colleen s Interview With Ivan Kolev Colleen s Interview With Ivan Kolev COLLEEN: [TO MY READERS] Hello, everyone, today I d like to welcome you to my interview with Ivan Kolev (affectionately known as Coolice). Hi there, Ivan, and thank

More information

SOCIAL MEDIA GUIDELINES FOR CANADIAN RED CROSS STAFF AND VOLUNTEERS

SOCIAL MEDIA GUIDELINES FOR CANADIAN RED CROSS STAFF AND VOLUNTEERS SOCIAL MEDIA FOR CANADIAN RED CROSS STAFF AND VOLUNTEERS INTRODUCTION Communities have the power to make the world a better place. We know this because we see it happen every day through the work of staff

More information

New developments and trends in Social Media for 2015

New developments and trends in Social Media for 2015 A Social Media Presentation By New developments and trends in Social Media for 2015 Presenter: Brenda Burch A real change in the Philosophy of Social Media I have operated Social Media is Simple for four

More information

However, there has still been one serious limitation until now.

However, there has still been one serious limitation until now. INTRODUCTION Social Media is now the dominant communication platform for just about everyone especially home buyers. The traffic they create is in the billions of hits per day and any agent/broker who

More information

Website Design Checklist

Website Design Checklist Website Design Checklist Use this guide before you begin building your website to ensure that your website maximizes its potential for your company. 3 THING YOU SHOULD NEVER SAY ON YOUR WEBSITE (That I

More information

Auburn University at Montgomery Policies and Procedures

Auburn University at Montgomery Policies and Procedures Auburn University at Montgomery Policies and Procedures Title: Responsible Office: Social Media Policy University Relations I. PURPOSE This policy outlines the procedures governing social media pages created

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

Presented by: Pikr.co.za Contact us: info@pikr.co.za Visit us: www.pikr.co.za

Presented by: Pikr.co.za Contact us: info@pikr.co.za Visit us: www.pikr.co.za Presented by: Pikr.co.za Contact us: info@pikr.co.za Visit us: www.pikr.co.za 1 Do you KNOW what is being said about YOUR business online? In the age of social media and technology, it is sometimes easy

More information

Social networking guidelines and information

Social networking guidelines and information Social networking guidelines and information Introduction Social media is an emerging and changing landscape. The digital marketing communications team and corporate communications have a social media

More information

Reputation Management for Local Businesses: Protect Your Image

Reputation Management for Local Businesses: Protect Your Image By: James Iannelli RI Reputation Management www.reputationmanagementri.com (401) 316-2931 1 Introduction As a business owner, you already know that managing a business is a LOT of work; from keeping the

More information

Montana State University Department of Athletics

Montana State University Department of Athletics I. Social/New Media Guidelines A. Purpose statement Montana State University Department of Athletics Athletics Employee Social Media Policy Bobcat Athletics is dedicated to fostering a community of stakeholders

More information

Tips for a Solid Facebook Fan Page

Tips for a Solid Facebook Fan Page social marketing software 10 Tips for a Solid Facebook Fan Page Perspectives on Facebook An Industry ebook from Awareness Creators of the Social Marketing Hub @awarenessinc awarenessnetworks.com Introduction

More information

Local Search Optimization Guide: Google+ Local & Getting Found in Your Neighborhood

Local Search Optimization Guide: Google+ Local & Getting Found in Your Neighborhood Local Search Optimization Guide: Google+ Local & Getting Found in Your Neighborhood How Do You Get Found in Local Search and Stay There? As you've likely noticed when searching on Google over the past

More information

Social Media For Law Firms

Social Media For Law Firms Social Media For Law Firms Considerations and Recommendations (Based on the SRA Handbook and the Law Society practice notes) January 2013 Introduction Social Media in the Legal Industry The last year (2012)

More information

GUIDE. Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams

GUIDE. Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams GUIDE Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams Stop Phishing: A Guide to Protecting Your Web Site Against Phishing Scams Introduction If you use the Internet or spend any

More information

Your guide to using new media

Your guide to using new media Your guide to using new media A comprehensive guide for the charity and voluntary sector with tips on how to make the most of new, low cost communication tools such as social media and email marketing.

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

Five Critical Components: Building Successful B2B Demand Generation Plays for Channel Partners. Presentation Name 1

Five Critical Components: Building Successful B2B Demand Generation Plays for Channel Partners. Presentation Name 1 Five Critical Components: Building Successful B2B Demand Generation Plays for Channel Partners Presentation Name 1 Great Content (That s brief) Content is king. You ve heard that before, and with 91% of

More information

The Five Biggest MISSED Internet Marketing Opportunities Most Lawyers Don't Know About

The Five Biggest MISSED Internet Marketing Opportunities Most Lawyers Don't Know About The Five Biggest MISSED Internet Marketing Opportunities Most Lawyers Don't Know About Many lawyers and other professionals equate internet marketing with Search Engine Optimization (SEO). And while SEO

More information

Panda Security Affiliate Program USA

Panda Security Affiliate Program USA Panda Security Affiliate Program USA Alexander Moheit Panda Security Affiliate Management Team USA Email: alexander.moheit@asknet.com Welcome! The Panda Security affiliate program is one of the most profitable

More information

How To Start A Successful Online Business

How To Start A Successful Online Business How homework helps time management school. Other options for earn money Through InternetIt also proposes to create a blog paid an online service or an online store. How homework helps time management school

More information

Thank You! Contents. Promoting SmartDollar... 3. Implementing SmartDollar... 4. SmartDollar Resource Center... 6. Internal Communications...

Thank You! Contents. Promoting SmartDollar... 3. Implementing SmartDollar... 4. SmartDollar Resource Center... 6. Internal Communications... Promotion Guide Thank You! Thank you for adding SmartDollar to your benefits program. You are changing lives by helping your employees take control of their money and get on track for retirement! SmartDollar

More information

Top 10 Tips to Keep Your Small Business Safe

Top 10 Tips to Keep Your Small Business Safe Securing Your Web World Top 10 Tips to Keep Your Small Business Safe Protecting your business against the latest Web threats has become an incredibly complicated task. The consequences of external attacks,

More information

Dental Health Week Event Handbook 3rd - 9th August 2015

Dental Health Week Event Handbook 3rd - 9th August 2015 Dental Health Week Event Handbook 3rd - 9th August 2015 The Wrath of Trauma Do you know your dental first aid? www.dentalhealthweek.com.au the best education occurs face to face, from professional to patient

More information

Umpqua Web Design 541-673-2671. www.umpquawebdesign.com

Umpqua Web Design 541-673-2671. www.umpquawebdesign.com Umpqua Web Design 541-673-2671 www.umpquawebdesign.com 1 Most small businesses understand the importance of having a company website. A website can act as a virtual storefront and information hub, which

More information

Social Media Marketing: ENGAGE rather than SELL involvement leads to purchase!

Social Media Marketing: ENGAGE rather than SELL involvement leads to purchase! Approximately 90% of the people you find on the internet in today s world know at least one social network and are registered as an active user on it. The imminence and influence of social media is what

More information

Top Cyber Threats Of 2009

Top Cyber Threats Of 2009 Top Cyber Threats Of 2009 Who were the top 5 riskiest celebrities in 2009? Did spammers really know who killed Michael Jackson? Data from Symantec Security Response November 2009 Top 5 Riskiest Celebrities

More information

Enterprise Social Networks - The Seven Advantages

Enterprise Social Networks - The Seven Advantages BEST PRACTICE IN ENTREPRISE SOCIAL NETWORKING - 2013 BY WITH 0 ZYNCRO 2013. All right reserved CONTENU - 1/ GUIDELINES FOR USING ENTERPRISE SOCIAL NETWORKS - P.02 2/ HOW AND WHEN TO USE ENTERPRISE SOCIAL

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

Digital marketing strategy

Digital marketing strategy Digital marketing strategy You don t need a digital strategy, you need a business strategy for the digital age Judy Goldberg, Sony Pictures #HRVision14 Branding goes Digital Understand your brand before

More information

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Protect Yourself. Who is asking? What information are they asking for? Why do they need it? Protect Yourself Your home computer serves many purposes: email, shopping, social networking and more. As you surf the Internet, you should be aware of the various ways to protect yourself. Of primary

More information

Online Reputation Management Protecting your Brand & Reputation In The Digital Marketplace

Online Reputation Management Protecting your Brand & Reputation In The Digital Marketplace Online Reputation Management Protecting your Brand & Reputation In The Digital Marketplace POWERi Technologies Inc. Overview - Online Reputation Management Solutions: - Online Brand Protection Monitoring

More information

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86%

Simplicity Value Documentation 3.5/5 5/5 4.5/5 Functionality Performance Overall 4/5 4.5/5 86% Alt-N SecurityGateway for Email Servers - Universal Email Security Gateway Manufacturer: Alt-N Technologies Model: Standard Origin: Texas, USA Website: www.altn.com Price: 204 for up to 25 users Simplicity

More information

CYBER STREETWISE. Open for Business

CYBER STREETWISE. Open for Business CYBER STREETWISE Open for Business As digital technologies transform the way we live and work, they also change the way that business is being done. There are massive opportunities for businesses that

More information

National Cybersecurity Awareness Campaign. Kids Presentation

National Cybersecurity Awareness Campaign. Kids Presentation National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

More information

Social Media and Content Marketing.

Social Media and Content Marketing. Social Media and Content Marketing. A Guide for B2B Marketing Managers. On the Internet, marketing trends come and go faster than ever. Do you remember frames, flash intros, and even visitor counters?

More information

HOW TO... Make your website. Marketing4Solicitors. more effective. Next Month: Turn your website into a lead generation machine.

HOW TO... Make your website. Marketing4Solicitors. more effective. Next Month: Turn your website into a lead generation machine. Marketing4Solicitors Toolkit / Issue M4S 3 Make your website more effective HOW TO... Bring in new leads for you every single month without you having to leave your desk! Turn your website into a lead

More information

Tips for cost effective marketing in a recession (or at any other time)

Tips for cost effective marketing in a recession (or at any other time) Tips for cost effective marketing in a recession (or at any other time) 20.01.2012 Jagger Creative Communication llp To supplement or substitute other marketing activity, there are low-cost marketing options

More information

Balancing Cloud-Based Email Benefits With Security. White Paper

Balancing Cloud-Based Email Benefits With Security. White Paper Balancing Cloud-Based Email Benefits With Security White Paper Balancing Cloud-Based Email Benefits With Security Balancing Cloud-Based Email Benefits With Security CONTENTS Trouble Spots in Cloud Email

More information

BeeSocial. Create A Buzz About Your Business. Social Media Marketing. Bee Social Marketing is part of Genacom, Inc. www.genacom.

BeeSocial. Create A Buzz About Your Business. Social Media Marketing. Bee Social Marketing is part of Genacom, Inc. www.genacom. BeeSocial M A R K E T I N G Create A Buzz About Your Business Social Media Marketing Bee Social Marketing is part of Genacom, Inc. www.genacom.com What is Social Media Marketing? Social Media Marketing

More information

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Protecting Your Network Against Risky SSL Traffic ABSTRACT Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure

More information

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE SMALL BUSINESS IT SECURITY PRACTICAL GUIDE How to make sure your business has comprehensive IT security protection #protectmybiz Small businesses come in all shapes and sizes. But in today s world, no

More information

LOCAL LAW SOCIETY Annual Conference 2011

LOCAL LAW SOCIETY Annual Conference 2011 LOCAL LAW SOCIETY Annual Conference 2011 30 th March 2011 David Clarke Email david@dbs-uk.co.uk www.dbs-uk.co.uk 0800 046 1870 Cost effective, low maintenance income generation using e-solutions David

More information

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies

More information

Cost Per Action Marketing 101

Cost Per Action Marketing 101 1 Cost Per Action Marketing 101 By Duncan Wierman 2 CONTENTS Contents... 2 Introduction: What is Cost Per Action Marketing?... 4 The Benefits Of CPA Marketing... 5 The Top CPA Marketing Networks... 5 Applying

More information

Top 10 best practices that savvy marketers know about

Top 10 best practices that savvy marketers know about Top 10 best practices that savvy marketers know about Includes your three FREE bonus exercises courtesy of Sherry Prescott-Willis, author, Market This! www.marketthisbook.com Top 10 best practices that

More information

experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation

experts in your field Get the profile: Managing your online reputation A Progressive Recruitment career guide Managing your online reputation experts in your field Get the profile: A Progressive Recruitment career guide Contents Introduction... 2 Why you need an online reputation... 3 Monitoring your online reputation... 3 How to protect your

More information

influence influential interest issue key

influence influential interest issue key Finding influence: uncovering the brand conversations that matter in the new media world analytics blogs brand business comments community company conversations corporate discussed example firms forums

More information

Digital Consumer s Online Trends and Risks

Digital Consumer s Online Trends and Risks Digital Consumer s Online Trends and Risks Modern consumers live a full-scale digital life. Their virtual assets like personal photos and videos, work documents, passwords to access social networking and

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Bad Ads Spotlight: Ad Cloaking Abuses. May 2015. TrustInAds.org. Keeping people safe from bad online ads

Bad Ads Spotlight: Ad Cloaking Abuses. May 2015. TrustInAds.org. Keeping people safe from bad online ads Bad Ads Spotlight: Ad Cloaking Abuses May 2015 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Online advertising platforms use a number of technologies to ensure the right content is shown

More information

Public-Facing Websites: A Loaded Gun Pointing at Customers, Partners and Employees

Public-Facing Websites: A Loaded Gun Pointing at Customers, Partners and Employees Public-Facing Websites: A Loaded Gun Pointing at Customers, Partners and Employees The Importance of Incorporating Digital Property Security Into Your IT Strategy Public-Facing Websites: A Loaded Gun Pointing

More information

Staying Safe Online. A Practical Guide for Parents and Children.

Staying Safe Online. A Practical Guide for Parents and Children. Staying Safe Online A Practical Guide for Parents and Children. Introduction Young people are growing up in a technology rich world. They are surrounded by various forms of technology and they use it extensively

More information

Information Governance Software that allows Organizations to Track, Monitor and Classify Data in Real Time

Information Governance Software that allows Organizations to Track, Monitor and Classify Data in Real Time ceocfointerviews.com All rights reserved! Issue: September 7, 2015 The Most Powerful Name in Corporate News Information Governance Software that allows Organizations to Track, Monitor and Classify Data

More information

The Professional's Training Course to SEO as seen in...

The Professional's Training Course to SEO as seen in... The Professional's Training Course to SEO The Professional's Training Course to SEO as seen in... First of all, welcome to the exciting world of Search Engine Optimization and how your website can gain

More information

AIA Michigan s Social Media Marketing Course

AIA Michigan s Social Media Marketing Course AIA Michigan s Social Media Marketing Course Welcome to the AIA Michigan s Social Media Marketing Course You are now officially on your way to getting a strong foundation of how you can market your business

More information

SOCIAL MEDIA GUIDELINES For employees at Southeast Regional College

SOCIAL MEDIA GUIDELINES For employees at Southeast Regional College SOCIAL MEDIA GUIDELINES For employees at Southeast Regional College Why do we need guidelines for social media? This document outlines the guidelines for Southeast Regional College employees communicating

More information

Virtual Law Practice: Success Factors

Virtual Law Practice: Success Factors Virtual Law Practice: Success Factors An Analysis of the Factors that Contribute to the Success of a Virtual Law Practice By Richard S. Granat CEO, DirectLaw, Inc. 1 Virtual Law Practice: Success Factors

More information

Emerging Trends in Malware - Antivirus and Beyond

Emerging Trends in Malware - Antivirus and Beyond Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded

More information

Post & Promote Your Next Event

Post & Promote Your Next Event Presented by EVENTS Post & Promote Your Next Event Use Benchmark to create and manage your events for free Social, Political, Conference, Festival, Sporting, Religious, Fundraiser, Performing Arts Events

More information