Wednesday, 21 July 2010
Man-in-the-Middle Attacks: LiveEnsure™ will help to Eliminate the Threat Without Impacting Business.
A sophisticated type of phishing, man-in-the-middle attacks occur when an attacker attempts to intercept communications between two parties who are transacting online, such as a customer and a retailer, without their knowledge.
By doing so, the attacker becomes "the man in the middle."
Both parties are unaware of the attacker's presence. So, acting as a proxy, the attacker can both review and manipulate the contents of the messages he is relaying between the two parties.
Today I read with sadness that BP claimants have been victim of a phishing scam adding to chaos of the disaster.
Live Ensure™ protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks. There are no complicated, ineffective tokens and cookies. Users can trust the site or application they are accessing cannot login under their identity without their permission. (Insider attack)
www.livensure.com
Developers you can join the beta-test next week simply register on the website.
Learn how to protect your customers now.
Tuesday, 13 July 2010
'How to achieve excellence in joined-up marketing'
Savvy businesses understand the power of social media. It can be very challenging to integrate with traditional marketing.Below is a list of which social media tools can be easily integrated, how to use them in an effective way alongside traditional methods and how to prove they're a good investment.
The Marketing Mix has changed Dramatically
Socialmedia: Twitter:The News Feeder/Seeder
Twitter allows direct contact with the audience, in a simple and effective way: messages are limited to140 characters.
Twitter can be used to perpetuate messages/news, create, support competitions to monitor people’s opinions and market activity. It is proven as an effective media to launch a product on the market. There are automatic tools you can use but the business needs to engage with it to make it successful. (Dell. Sun and BestBuy, Liveensure, are excellent examples)But your followers unless you are a full on A lister are unlikely to be interested in the fact you are enjoying a frapocino as starbucks...keep it real, re-tweet your news, research and information.
Facebook and Linkedin
Social media campaign and communities: Linkedin Network/Facebook Fan Page
Facebook is the biggest social network all around the world with more than 28 million active profiles in the UK representing over 70% of the UK community.
LinkedIn has 50 million business users worldwide and is growing at one new member per second ‘Groups’ are a compelling way to communicate to your end users..
Buzz Words: Tribe, lurk and blurt.(I admit to being a bit of a lurker it comes from my heritage in online customer experience and natural female curiosity).
We have formed groups on both:
Facebook Short: http://bit.ly/cQIp27
LinkedIN :Short: http://bit.ly/c5F4jq
Simply link these to your website and add to email signatures, let people share your information and you will increase your digital footprint.
Blogger Outreach
Direct communication with bloggers is a effective way of increasing buzz online. Certain bloggers are considered experts in their sector and “opinion leaders”: they are the ones to activate the word of mouth viral activity getting too the real influencers. In internet security we have the effervescent Graham Cluley. The main objective is to grab their attention and interest and get them to endorse the product/brand. Create a list of key influencers in your sector and start to engage with them, don't sell- cut and paste will not work with these guys).
Social Success is Measurable
Marketing Analytics, Measurement, Metrics, Social Media, Twitter
More than ever, hard numbers are necessary to demonstrate success. They are all but incontrovertible and easy to communicate, and they can point out what is or isn't working.
There are some leading players in agencies who can help largers organisations get Social:
- Steve Richards, MD, Yomego - The social media agency, http://www.mysocialmediareputation.com/
- Jam http://www.spreadingjam.com/
- Adam Parker of realwire www.realwire.com/ourStory.asp.
For new-media Twitter, with its established tweetocracy (and people coining phrases with "tweet" left, right, and center), marketers are finding more tools to help them understand how their efforts are performing in this new medium.
There are many free time saving tools to measure the dynamics of activity.
Social Streams
You can very simply activate,monitor and connect:
ActiveTwitter Profiles,
Active Blog Content ,
FACEBOOK Page,
Viral Videos- You Tube,
Case Studies- video and editorial,
Communities,
MEET UP.
Once activated, communicate alongside your usual email and telephone details, let your customers and staff know you are social.
Summary
The good news facebook pages, linkedin communities and blogs are free BUT the challenge is engaging with internal resource to make the strategy work to ensure the messages are consistent in traditonal and social media. For best results a company needs to as a whole get social.
This post is part of the #JUMPchallenge, a blogging competition designed raise awareness on how to join up online and offline marketing, launched to support Econsultancy's JUMP event
Vote for me at http://advice.perkettpr.com/err-on-the-side-of-caution/
Wednesday, 7 July 2010
The First Thing Young Women Do in the Morning: Check Facebook [STUDY]
Young women are becoming more and more dependent on social media and checking on their social networks, according to a new study released earlier today by Oxygen Media and Lightspeed Research. In fact, as many as one-third of women aged 18-34 check Facebook when they first wake up, even before they get to the bathroom.
What conclusions can we draw from this data?
It’s not just that young women are using Facebook religiously: it’s that they’re very open with what they post and who they accept as friends.
Combined, it can lead to a privacy mess.
When will networks, retailers and websites start to protect their users identity by implementing authentication.
www.liveensure.com
The First Thing Young Women Do in the Morning: Check Facebook [STUDY]