The Internet and Corporate Reputation

Size: px
Start display at page:

Download "The Internet and Corporate Reputation"

Transcription

1 The Internet and Corporate Reputation What you need to know Windfall Media

2 How the internet is affecting the corporate reputation of AIM quoted companies Online reputation The power of search engines and speed of re-publication on the internet means that damaging tweets and blog posts can become big news very quickly and remain on the internet for search engines to pick up, often with detrimental effects on corporate reputation and share prices. An increasing danger is for malicious individuals and opportunists to post allegations on market information websites, either to cause damage to the company or profit from the subsequent swings in share prices. These allegations, invariably made anonymously, can gain significant traction and create uncertainty, which is often the apparent intention of perpetrators. AIM companies AIM companies are particularly susceptible to such attacks since their share prices may be more vulnerable in the market to such rumours than larger companies. In conjunction with The Quoted Companies Alliance (QCA) we have conducted a survey of CEOs and FDs of AIM companies to see how they are using social media and how internet attacks have affected their businesses. The results are surprising. What is clear is that whilst this is a very real and growing problem, businesses are not as prepared as they should be to spot and respond to online attacks. A snapshot of the results is shown below. For a more detailed analysis, see the last page for relevant contacts. 1. Social media is alive and kicking in AIM companies 30% of AIM companies use social media for marketing & PR Two thirds of the companies we surveyed are using social media or are considering using it as part of their marketing and PR strategy. Whilst Facebook and Twitter proved most popular, significant use is being made of corporate blogs and discussion forums. Does your company use social media as part of a marketing/public relation/ investor relations strategy? If so what social media do you use? Twitter Facebook 37% 33% 30% Yes No, not considering No, but considering 23% 6% 9% 11% 11% 23% 17% Corporate Blogs Company s own forum Industry forums You Tube Other

3 2. Don t ignore the risks for corporate reputation AIM companies are experiencing damaging material and rumours on the internet 43% of companies surveyed have been victims of untrue allegations or rumours on the internet, of which over 50% were made anonymously. Are you aware of your company being the victim of allegations or rumours on the internet? 57% 43% Yes No Of those who experienced damaging allegations, 50% of the allegations were made on blogs, 40% on discussion forums and 10% on social media websites. 60% of the companies that had been victims of untrue allegations or rumours on the internet said the allegations were likely to have an impact on the company s share price. If so, has such damaging material been posted on: Do you think the damaging material had any impact on the company s share price? 10% 20% 40% 50% Blogs 20% 60% Likely Discussion forums Unlikely Social Media Websites Unsure There is increasing concern about the effect of online rumours on share prices on the AIM market and this survey demonstrates that some companies are not as ahead of the game as they should be. Tim Ward, Chief Executive, The Quoted Companies Alliance (QCA)

4 3. Monitor your online reputation Speedy reaction is key to avoid a knock-on effect on share price Only 60% of the companies surveyed are actively monitoring their online reputations, mainly through PR agencies. Only 4% were using specialist monitoring companies. 34% still relied on search engines such as Google. Is your company actively monitoring its online reputation? If so, by what means? 8% 4% 40% 60% Yes 34% 54% Through PR agencies Search engines Other means No Using specialist monitoring companies Social media monitoring is a vital first step in managing corporate reputations online. The latest software can allow companies to track conversations in real time and act quickly to douse the flames of false rumours and innuendo. Andrew Orchard, Managing Director of Windfall Media, specialists in crisis management, online surveillance and advisory services to a wide variety of listed companies Over recent years, we have worked on numerous cases where significant reputational damage has been caused to companies and their executives from online sources. Often, a speedier response may have mitigated much of the damage. Dan Tench, Partner, Olswang

5 4. Be prepared and don t stick your head in the sand Legal, PR and monitoring specialists know when to react, and when to do nothing 46% of the victims of untrue allegations or rumours chose to do nothing, with only 31% seeking removal through legal means and 15% using other techniques such as search engine optimisation. How did the company respond to the damaging material? 15% 31% 8% 46% Ignore it Seek removal through legal means Respond through other means Respond directly on the internet There are simple steps that can be taken relatively quickly to trace anonymous internet users through IP address tracing and disclosure orders from the court. This information can often be vital for companies to understand who they are up against and whether taking action will resolve or inflame the problem. Dan Tench, Partner, Olswang In our experience, many companies are unaware of the tools available to them for dealing with damaging material on the internet. PR, search engine optimisation, and legal means all have a role to play in protecting a company s online reputation. Those companies that monitor their online reputation effectively and have a specialist team on hand will be quicker to react and make the right decisions. Delay often leads to further damage. Ashley Hurst, Senior Associate, Olswang

6 Key Contacts Dan Tench Partner +44 (0) Ashley Hurst Senior Associate +44 (0) About Olswang We are a full service law firm with strong practices in corporate, commercial, employment, outsourcing, tax, financial services, regulatory and competition, litigation and intellectual property. We have a team of over 600, including nearly 100 partners, across six European offices. We are partnered with US technology focused law firm Cooley, and have a best friends network of leading independent law firms throughout the world. About The QCA The Quoted Companies Alliance is a not-for-profit trade organisation that works for small and mid-cap quoted companies in the UK and Europe to promote and maintain vibrant, healthy and liquid capital markets. For more details please contact Tim Ward, Chief Executive, on either or mail@theqca.com. About Windfall Media Windfall Media is a social media analytics company. It combines proprietary blog search technology with human expertise to deliver strategic analysis of social media conversations, threats and opportunities. It specialises in crisis management, providing online surveillance and advisory services to a wide variety of listed companies. Berlin +49 (0) Brussels London +44 (0) Madrid Paris Thames Valley +44 (0)

Knowledge. Practical guide to competition damages claims in the UK

Knowledge. Practical guide to competition damages claims in the UK Knowledge Practical guide to competition damages claims in the UK Practical guide to competition damages claims in the UK Contents Reforms to damages litigation in the UK for infringements of competition

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

Third Annual Study: Is Your Company Ready for a Big Data Breach?

Third Annual Study: Is Your Company Ready for a Big Data Breach? Third Annual Study: Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: October 2015 Ponemon Institute

More information

The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice

The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice The business case for managed next generation firewalls Six reasons why IT decision makers should sit up and take notice THREATWATCH Cyber threats cost the UK economy 27 billion pounds a year 92 percent

More information

ACE European Risk Briefing 2012

ACE European Risk Briefing 2012 #5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs

More information

Gold Sponsor of the study: Incident Response Management

Gold Sponsor of the study: Incident Response Management Gold Sponsor of the study: Incident Response Management How European Enterprises are Planning to Prepare for a Cyber Security Breach Y R A M SUM IVE T U C E PAC 2015 X E Telefonica company profile About

More information

Introduction. Corporate Investigation & Litigation Support

Introduction. Corporate Investigation & Litigation Support Introduction Established in 2014 two companies, Carratu and MLI came together to create CarratuMLI Risk Management. In the joining of these two companies, we have created one of the UK s premier providers

More information

Preparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world

Preparing for and coping with a crisis online. White Paper 2 Crisis management in a digital world Contents 3 6 11 16 19 Introduction Preparing for a crisis During a crisis After the crisis About The Partners Group 2 In the new world of social media and mobile technology, communication is instantaneous,

More information

Managing your online reputation

Managing your online reputation MANAGING YOUR ONLINE REPUTATION Community Development Managing your online reputation MANAGING YOUR ONLINE REPUTATION The digital world is changing the way patients manage their health Decision making

More information

Cyber Security: Protecting your business survey stats

Cyber Security: Protecting your business survey stats Cyber Security: Protecting your business survey stats Researched and authorised by Pitmans LLP in partnership with techuk. Report prepared in January 2014 by Philip James, Partner and Rob Jarrett, Solicitor.

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

Virtual world, real risks. When social media becomes a liability

Virtual world, real risks. When social media becomes a liability Virtual world, real risks When social media becomes a liability When social media becomes a liability Since setting up its Facebook fan page, Starbucks has amassed a captive audience of 25 million fans

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

Instant Messaging and Security

Instant Messaging and Security Strategic Guide Instant Messaging and Security Businesses recognise that instant messaging can help to improve employee productivity, but are often reluctant to sanction its use due to concerns about security.

More information

Eurocom Worldwide Technology Confidence Survey 2012

Eurocom Worldwide Technology Confidence Survey 2012 Eurocom Worldwide Technology Confidence Survey 2012 E ach year Eurocom Worldwide and its member agencies survey technology business leaders and senior senior executives in the technology sector. This brief

More information

Moodle Implementation - Build or Buy?

Moodle Implementation - Build or Buy? www.webanywhere.co.uk/workplace Moodle Implementation - Build or Buy? Introduction As business organisations look to save costs by considering more affordable open source Learning Management Systems, Moodle

More information

Social Media Strategy 2015-16

Social Media Strategy 2015-16 Social Media Strategy 2015-16 We don t have a choice whether we do social media, the question is how well we do it [Erik Qualman, 2010, Socialnomics] Introduction The CRC has previously been active on

More information

www.bonddickinson.com Cyber Risks October 2014 2

www.bonddickinson.com Cyber Risks October 2014 2 www.bonddickinson.com Cyber Risks October 2014 2 Why this emerging sector matters Justin Tivey Legal Director T: +44(0)845 415 8128 E: justin.tivey The government estimates that the current cost of cyber-crime

More information

Social Media Charter

Social Media Charter Social Media Charter 1. Internet, social media, web 2.0 interface and on-line communication "Social media" and "web 2.0" interface are generic terms which designate different activities integrating technology,

More information

Investor survey of fixed income liquidity 2013

Investor survey of fixed income liquidity 2013 Investor survey of fixed income liquidity 2013 Association for Financial Markets in Europe Sponsored by: About AFME The Association for Financial Markets in Europe (AFME) is the voice of Europe s wholesale

More information

UK Search Engine Marketing Benchmark Report 2011

UK Search Engine Marketing Benchmark Report 2011 Market Data / Supplier Selection / Event Presentations / User Experience Benchmarking / Best Practice / Template Files/ UK Search Engine Marketing Benchmark Report 2011 In association with Guava UK Search

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

emarketing There are lots of reasons to shift your e-marketing to Tikit emarketing v6

emarketing There are lots of reasons to shift your e-marketing to Tikit emarketing v6 emarketing There are lots of reasons to shift your e-marketing to Tikit emarketing v6 Pause to think whether you can create email messages as effortlessly as this. Drag & drop template, form and message

More information

Are You the Target of a Denial of Service Attack?

Are You the Target of a Denial of Service Attack? A Guidance Consulting White Paper P.O. Box 3322 Suwanee GA, 30024 678-528-2681 http://www.guidance-consulting.com Are You the Target of a Denial of Service Attack? By Guidance Consulting, Inc Contents

More information

Contact: Corinne Gladstone, Baker Tilly Head of PR, 020 3201 8145

Contact: Corinne Gladstone, Baker Tilly Head of PR, 020 3201 8145 news release Date Embargoed until 4 February 2015 Release: Immediate Contact: Corinne Gladstone, Baker Tilly Head of PR, 020 3201 8145 Looking for funding in 2015? UK s top fund managers reveal their top

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit

Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit Keeping sight of your business Hot topics facing Financial Services organisations in IT Internal Audit 2014 Welcome to our third annual review of the IT hot topics facing Internal Audit functions within

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

SEO, Search Engine and Online Reputation Management

SEO, Search Engine and Online Reputation Management SEO, Search Engine and Online Reputation Management Presented By: Kathleen Dorsey, Founder & CEO, Global Results & Inner Circle Member 1-800-408-0093 x 210 kdorsey@globalseoresults.com Today s Topics Overview

More information

Guidance on the Use of Social Networking

Guidance on the Use of Social Networking Guidance on the Use of Social Networking Version 1 - January 2012 Reviewed: September 2013 Version 2 Approved by SM: November 2013 Version 2 modified and approved by the PCC Board: April 2014 Overview

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK Executive Summary Core statements I. Cyber security is now too hard for enterprises The threat is increasing

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Risk Limited Corporation innovation & expertise

Risk Limited Corporation innovation & expertise Risk Limited Corporation The Recognized Leader in Energy Risk Management advisory services RISK MANAGEMENT TRADING ENERGY leaders in risk management Risk Limited Corporation An international management

More information

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail DDoS Attack Mitigation Report Media & Entertainment Finance, Banking & Insurance Retail DDoS Attack Mitigation Report Media & Entertainment Attack on Spanish-Language News Site is Abandoned When Traffic

More information

State of the Applications : Only 11% of Information Security Managers Feel Their Applications are Secure. www.quotium.com 1/11

State of the Applications : Only 11% of Information Security Managers Feel Their Applications are Secure. www.quotium.com 1/11 State of the Applications : Only 11% of Information Security Managers Feel Their Applications are Secure www.quotium.com 1/11 Table of Contents 1 INTRODUCTION... 3 2 DO APPLICATIONS IN YOUR ORGANIZATION

More information

Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a

Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a Central Asian Information Security Survey Results (2014) Insight into the information security maturity of organisations, with a focus on cyber security Introduction and Executive summary From September

More information

Legal Considerations: Best Practice Overview. EMPLOYMENT GROUP: DLA Piper UK LLP

Legal Considerations: Best Practice Overview. EMPLOYMENT GROUP: DLA Piper UK LLP SENIOR EXECUTIVE ISSUES Legal Considerations: Best Practice Overview EMPLOYMENT GROUP: DLA Piper UK LLP Senior executives have a massive impact on all aspects of a business: from setting and delivering

More information

SMALL BUSINESS REPUTATION & THE CYBER RISK

SMALL BUSINESS REPUTATION & THE CYBER RISK SMALL BUSINESS REPUTATION & THE CYBER RISK Executive summary In the past few years there has been a rapid expansion in the development and adoption of new communications technologies which continue to

More information

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Internet Reputation Management Guidelines Building a Roadmap for Continued Success Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.

More information

Prepared by. August 2009. 2009 RUSSELL HERDER and ETHOS BUSINESS LAW

Prepared by. August 2009. 2009 RUSSELL HERDER and ETHOS BUSINESS LAW embracing the opportunities, averting the risks. Prepared by August 2009 INTRODUCTION There is little question that social media is high on the agenda of corporate and nonprofit decision-makers across

More information

4/28/2010. Prediction

4/28/2010. Prediction Impact of Social Media on Small Business Internet Marketing Mike Andrew Consulting Web Site SEO Social Media Strategies Internet Marketing The biggest threat to small business today is not Technology -It

More information

The Future of Stakeholder Engagement

The Future of Stakeholder Engagement The Future of Stakeholder Engagement Views of Senior European Communicators on Current and Future Best Practice February 2013 Table of contents 3 4 6 11 18 25 28 29 Introduction Key findings The current

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

STATE OF B2B SOCIAL MEDIA MARKETING 2015

STATE OF B2B SOCIAL MEDIA MARKETING 2015 STATE OF B2B SOCIAL MEDIA MARKETING 2015 Research Report - June 2015 WHO WE SPOKE TO In a study that we did earlier this year on B2B marketing trends 1, we asked our respondents which distribution channels

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

risk management & crisis response Building a Proactive Risk Management Program

risk management & crisis response Building a Proactive Risk Management Program October 2014 risk management & crisis response Building a Proactive Risk Management Program Increasingly, businesses face a myriad of issues that expose them and their officers and directors to litigation,

More information

Executive Suite Series An Akamai White Paper

Executive Suite Series An Akamai White Paper An Akamai White Paper Plan vs. Panic: Making a DDoS Mitigation Playbook Part of Your Incident Response Plan Introduction When a huge Distributed Denial-of-Service (DDoS) attack took down the Website of

More information

WEB 2.0 AND SECURITY

WEB 2.0 AND SECURITY WEB 2.0 AND SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Kea Influencer Relations and Marketing for High-Tech & Technology Providers

Kea Influencer Relations and Marketing for High-Tech & Technology Providers Kea Analyst Relations Industry analysts play a key role in defining markets and educating buyers. We work with clients to identify and track the most influential and relevant industry analysts, and advise

More information

THE NEW WAY IN PROFESSIONAL SERVICES

THE NEW WAY IN PROFESSIONAL SERVICES THE NEW WAY IN PROFESSIONAL SERVICES THE NEW WAY IN PROFESSIONAL SERVICES VALUE At Ash St. our absolute commitment is to client satisfaction in all aspects of our work including certainty around pricing.

More information

Corporations Take Control of E-Discovery

Corporations Take Control of E-Discovery Guidance Software Whitepaper Corporations Take Control of E-Discovery Chris Dale edisclosure Information Project What Does Your In-House E-Discovery Look Like? 53% indicate a GROWING CASE LOAD 55 % review

More information

RISK MANAGEMENT OF INVESTMENT & TREASURY PORTFOLIOS SIMULATION TRAINING@THE DEALING ROOM

RISK MANAGEMENT OF INVESTMENT & TREASURY PORTFOLIOS SIMULATION TRAINING@THE DEALING ROOM RISK MANAGEMENT OF INVESTMENT & TREASURY PORTFOLIOS SIMULATION TRAINING@THE DEALING ROOM Leading Excellence in Banking & Finance OUR PARTNERS CapitalWave provides truly dynamic educational simulation training

More information

Customer Experience Management

Customer Experience Management Customer Experience Management Best Practices for Voice of the Customer (VoC) Programmes Jörg Höhner Senior Vice President Global Head of Automotive SPA Future Thinking The Evolution of Customer Satisfaction

More information

UK Cloud Computing Interception - nothing new. Clive Gringras. Olswang LLP 2011 www.olswang.com 1

UK Cloud Computing Interception - nothing new. Clive Gringras. Olswang LLP 2011 www.olswang.com 1 UK Cloud Computing Interception - nothing new Clive Gringras Olswang LLP 2011 www.olswang.com 1 UK Cloud Computing Interception - nothing new Some UK cloud-computing customers are concerned that they should

More information

CGI Cyber Risk Advisory and Management Services for Insurers

CGI Cyber Risk Advisory and Management Services for Insurers CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their

More information

CONTENTS Introduction Call tracking Case Study Call Tracking tools Testimonials The Mediahawk Experience conclusion Request Demo

CONTENTS Introduction Call tracking Case Study Call Tracking tools Testimonials The Mediahawk Experience conclusion Request Demo 1 CONTENTS 1. Introduction 3 2. Call tracking Case Study Abbott Moore 4 3. Call Tracking tools For Financial Services 6 4. Testimonials 9 5. The Mediahawk Experience 10 6. conclusion 12 7. Request a Demo

More information

Tips for cost effective marketing in a recession (or at any other time)

Tips for cost effective marketing in a recession (or at any other time) Tips for cost effective marketing in a recession (or at any other time) 20.01.2012 Jagger Creative Communication llp To supplement or substitute other marketing activity, there are low-cost marketing options

More information

How retail investors in Australia view the importance of social and digital media channels

How retail investors in Australia view the importance of social and digital media channels How retail investors in Australia view the importance of social and digital media channels nightingale communications Published March 2013 How was the research conducted? What did we find? nightingale

More information

WHISTLEBLOWER POLICY

WHISTLEBLOWER POLICY WHISTLEBLOWER POLICY 1. PURPOSE Brunel is committed to conducting all our business in an honest and ethical manner, having full commitment to open communications, and we expect all staff to maintain high

More information

Harmful digital communications, cyber bullying and digital harassment can take a variety of forms.

Harmful digital communications, cyber bullying and digital harassment can take a variety of forms. FAQs - Harmful Digital Communications Bill What are harmful digital communications? Harmful digital communications, cyber bullying and digital harassment can take a variety of forms. Examples include sending

More information

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing Kaspersky Fraud Prevention platform: a comprehensive solution for secure Today s bank customers can perform most of their financial operations online. According to a global survey of Internet users conducted

More information

Data Privacy in the EU and the US

Data Privacy in the EU and the US Data Privacy in the and the US With big data the subject of much media focus and top of the public s mind, FTI Consulting presents the first in its findings of a comparative study that explores attitudes

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

Security tips for the use of social media websites

Security tips for the use of social media websites CYBER SECURITY OPERATIONS CENTRE NOVEMBER 2012 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

In every ear it spread,

In every ear it spread, In every ear it spread, on every ton gue it grew, and then the whole world knew, there was nothing you could do. Online Reputation Management The best part of working in this company the people and the

More information

Financial Incentives for Whistleblowers 1

Financial Incentives for Whistleblowers 1 Financial Incentives for Whistleblowers Note by the Financial Conduct Authority and the Prudential Regulation Authority for the Treasury Select Committee July 2014 Introduction 1. The Financial Conduct

More information

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison

CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison CYBER SECURITY Cyber Security for Canadian Directors in the Wake of Ashley Madison Gary Solway* Bennett Jones LLP The August release of the purported names and other details of over 35 million customers

More information

A FINEXTRA RESEARCH REPORT SPONSORED BY AXWAY MARCH 2015 OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A REPORT ON A SURVEY BY FINEXTRA AND AXWAY

A FINEXTRA RESEARCH REPORT SPONSORED BY AXWAY MARCH 2015 OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A REPORT ON A SURVEY BY FINEXTRA AND AXWAY A FINEXTRA RESEARCH REPORT SPONSORED BY AXWAY MARCH 2015 OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A REPORT ON A SURVEY BY FINEXTRA AND AXWAY OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A

More information

Purpose Scope: Responsibilities: Policy:

Purpose Scope: Responsibilities: Policy: Purpose: The reputation of Moser Baer Group amongst its key audiences is vital to the organisation s business success. In an age where information about a company flows instantaneously and globally it

More information

THE REGISTER OF PEOPLE WITH SIGNIFICANT CONTROL - REGULATIONS. Department for Business, Innovation and Skills Consultation Paper

THE REGISTER OF PEOPLE WITH SIGNIFICANT CONTROL - REGULATIONS. Department for Business, Innovation and Skills Consultation Paper THE REGISTER OF PEOPLE WITH SIGNIFICANT CONTROL - REGULATIONS Department for Business, Innovation and Skills Consultation Paper Submission by Transparency International UK (TI-UK) July 2015 1 Submission

More information

Raising and escalating concerns. Guidance for nurses and midwives

Raising and escalating concerns. Guidance for nurses and midwives Raising and escalating concerns Guidance for nurses and midwives We are the nursing and midwifery regulator for England, Wales, Scotland, Northern Ireland and the Islands. We exist to safeguard the health

More information

How To Protect Yourself From A Threat From Social Media

How To Protect Yourself From A Threat From Social Media Actionable Intelligence Hides Within Social Media Data Leverage Real-Time Social Media Data to Improve Security, Stop Information Leaks, Identify Problems, Neutralize Threats Twitter. Facebook. Email.

More information

Social Media Guidance Overview

Social Media Guidance Overview Date: June 2012 Status: Updated and Revised Adapted from the Cabinet Office s Social Media Guidance Contents 1. Introduction 2. Communicate with citizens in the places they already are 3. Understand that

More information

Fiduciary Management. What is Fiduciary Management?

Fiduciary Management. What is Fiduciary Management? Fiduciary Management What is Fiduciary Management? Fiduciary Management can be defined as a pension management solution which focuses on achieving the long term goals of a pension fund within a defined

More information

White Paper: Social Media - The Dark Side

White Paper: Social Media - The Dark Side November 2010 White Paper: Social Media - The Dark Side by Elias Vamvakas President, BrandProtect a division of brandprotect Understanding the Value of a Social Media Risk Management Program As Social

More information

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS Table of Contents 1 ABOUT FTI CONSULTING 2 CHALLENGES OVERCOME 3 OUR EXPERTISE 4 PROJECT TYPES 5 OUR TEAM ii FTI Consulting, Inc. CONSTRUCTION

More information

Digital Marketing Solutions that enable business growth

Digital Marketing Solutions that enable business growth Digital Marketing Solutions that enable business growth Who we are We are a bunch of people who believe in building trust online, offline and anywhere in between. Our experience A team of experts We bring

More information

Analysis of the A&E Crisis in January 2015

Analysis of the A&E Crisis in January 2015 Analysis of the A&E Crisis in January 2015 March 2015 Digital sources included mainstream news media, blogs, forums, Facebook & Twitter. Introduction Hanover and Onalytica were interested to analyse the

More information

ONLINE RECONNAISSANCE

ONLINE RECONNAISSANCE ONLINE RECONNAISSANCE HOW YOUR INTERNET PROFILE CAN BE USED AGAINST YOU May 2013 Most people and organisations put information about themselves on the web. Companies advertise their work and achievements

More information

How To Blog

How To Blog "Marketing is a contest for people's attention." Online Marketing Courses Professional Development Training has a specialised division of Online Marketing experts that will tailor the delivery of any of

More information

Security from the Cloud

Security from the Cloud Security from the Cloud Remote Vulnerability Scanning Writer: Peter Technical Review: David Contact: info@hackertarget.com Published: April 2008 Summary: This white paper describes advantages of using

More information

2015 GLOBAL ASSET MANAGEMENT SURVEY

2015 GLOBAL ASSET MANAGEMENT SURVEY 2015 GLOBAL ASSET MANAGEMENT SURVEY It's not what happens to you, but how you react to it that matters." -Epictetus A survey carried out globally by Linedata. INTRODUCTION It's not what happens to you,

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

Pre-IMEX 2012 social media survey by AIM Group International

Pre-IMEX 2012 social media survey by AIM Group International How Event Planners use Technology & Social Media Pre-IMEX 2012 social media survey by AIM Group International 1 This report is based on a May 2012 survey conducted by AIM Group International primarily

More information

Digital TV switchover: Social media

Digital TV switchover: Social media Digital TV switchover: Social media By Matt Heselden, Social media lead Summary With the growth in popularity of social media, we recognised that increasing numbers of consumers and opinion formers would

More information

UWS Social Media Guidelines

UWS Social Media Guidelines 1 UWS Social Media Guidelines Social Media Guidelines Table of Contents Social Media Guidelines 2 Table of Contents 2 Executive Summary 3 Part 1: Using social media 4 Section 1: Behavioural Standards and

More information

ALERT PRESERVING YOUR REPUTATION FINANCIAL SERVICES. Glass, china, and reputation are easily cracked, and never well mended.

ALERT PRESERVING YOUR REPUTATION FINANCIAL SERVICES. Glass, china, and reputation are easily cracked, and never well mended. FINANCIAL SERVICES ALERT January 2011 Issue 17 PRESERVING YOUR REPUTATION Maintaining a reputation is hard. Failure to do so can be catastrophic. The insurance industry is proficient at helping clients

More information

Business continuity management

Business continuity management Business continuity management The world is a riskier place. Emerging threats such as product recalls with the increasing vulnerability of sophisticated global supply chains and unpredictable natural

More information

Getting better SEO and AdWords results with Google+

Getting better SEO and AdWords results with Google+ Getting better SEO and AdWords results with Google+ Today s agenda 8.30 9.00 Setting your objectives Presenter Stephen Bavister Managing Director LexisClick 9.00 9.10 Worksheet 1 9.10 9.15 Break 9.15 9.45

More information

Internet investment scams in China

Internet investment scams in China Internet investment scams in China How to protect your business s reputation in China You get a call. Your offices in Beijing and Shanghai have been inundated with complaints from distressed members of

More information

FOR INSTITUTIONAL INVESTORS. Social Media

FOR INSTITUTIONAL INVESTORS. Social Media Social Media and Cyber Security Risk The Tricky Business of Managing Corporate Disclosures in the Information Age By Evan M. Berkow When to share, where, and how much? The growing online media presence

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

Taking the helm. Helping your business reach calmer waters

Taking the helm. Helping your business reach calmer waters Taking the helm Helping your business reach calmer waters David Rubin & Partners provides a specialist service to individuals and organisations wishing to restructure their financial arrangements. We add

More information

Corporate Disclosure Policy and Practices

Corporate Disclosure Policy and Practices Corporate Disclosure Policy and Practices FEBRUARY 2014 TABLE OF CONTENTS 1.... Introduction... 3 2.... Objectives of the Corporate Disclosure Policy and Practices... 3 3.... Corporate Disclosure Policy...

More information