By Chad Giron
#10. “Did you fax out the press release?”
(Cue Grumpy Old Man voice) BACK IN MY DAY, people actually used to fax out press releases. No, seriously. In the year 2000! Didn’t you ever wonder why Cision still includes fax numbers?
#9. He or she still has a Blackberry. And, correspondingly, also perhaps a belt clip.
“I couldn’t live without a physical keyboard!”
#8. “Does this media list have the top 25 dailies?”
Uhm, are there even 25 total daily newspapers LEFT in this country? There are. But when the Honolulu Star-Advertiser has a higher average circulation than the Boston Globe, I wouldn’t sweat it too much.
#7. “Are we on MySpace? We should do something on The Facebook.”
The only person on MySpace is Justin Timberlake. Shh. Shh. Hush, now, social media illiterate. There will be plenty of time for you to discover Facebook when your children go off to college and you humiliate them by commenting on their photos and status updates.
#6. “Make sure you run the ad equivalency numbers for the client.”
Ad equivalency values are B.S. Have always been B.S. and will always be B.S.
#5. “Let’s do a press conference!”
NO! NO!!! Here’s when you hold a press conference: when you hire a new head coach or you sign a bill into law. That’s about it. You hold a press conference, and your client expects this:
…but is much more likely to get this…
#4. “Where are the folders for the press kit??”
No reporter, especially at a trade show or conference, wants 20 folders worth of press kits to lug around. Put that stuff on a microsite or, if you must, a thumb drive. Hard copies, like cassette tapes and landlines, are so 20th century. Speaking of which…
#3. ”Did you do all of your call-downs?”
Gather ’round, all ye young PR pups born in the 1980s, and let me tell you of a time long past…when pitching required the strange, bygone tactic of picking up a telephone, dialing “9″ to get an out-of-office line, and actually calling a reporter with the goal of selling your story to them, via your voice…and your words…via telephonic communication! WHAT??? Yes!
#2. “I don’t tweet.”
#1. “Did the client get their daily clips?”
Hey, PR kiddies, did you ever wonder why news articles that mention your client are called “clips”? Because back in the day, part of a PR person’s job (OK, usually the interns) was to actually read dozens of newspapers each morning – real, physical newspapers that get ink all over your fingers and everything – and cut out (or “clip”) articles that mentioned their client, paste these clips onto a sheet of paper, photocopy all of these articles and fax them to the client. It was called “doing clips”. It SUCKED. Google Alerts have made clips go the way of the Dodo.
** Editorial Note: clip books are so old-school, I can’t even find a picture of one online…
That’s my take. I ask you, my PR pro friends, what are some of your signs that your boss or a fellow PR person is out of touch?
National Cyber Security Awareness Month (NCSAM) – celebrated every October - was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online.
Look for our tweets and blog posts this month!!!
Since its inception a decade ago under leadership from the U.S. Department of Homeland Security and the National Cyber Security Alliance, NCSAM has grown exponentially, reaching consumers, small and medium-size businesses, corporations, educational institutions, and young people across the nation.
This year, we are celebrating the 10th anniversary of National Cyber Security Awareness Month!!!!
- See more at: http://www.staysafeonline.org/ncsam/about
A great piece from PRNews on the value of a social media presence for C-level executives and how PR can help the disconnect that may exist with the perceived value.
A recent report from CEO.com found that 68% of Fortune 500 CEOs have no social media presence. Interestingly, we wrote about another study showing that roughly 80% of director-level respondents indicated that their CEO would be open to coaching and counseling.
Think that’s a void that PR can fill?
The dearth of C-level executives on social media (and the simultaneous desire for counsel) represents an opportunity for PR pros to step in and help CEOs build a valuable presence on social channels.
In a recent issue of PR News, Anne Green, president-CEO of CooperKatz & Co. Inc., argued that PR should take the lead on social. “PR has rapidly ascended the curve on social, to where we now drive the leading edge,” Green said. “The multi-channel, multi-message nature of our work is perfectly suited to engaging heavily fragmented audiences.” There’s no reason why this shouldn’t apply to a CEOs Twitter or Instagram account.
Need some reaffirmation about why it’s important that your CEO develop a social media presence?
Indeed, having your CEO on social channels can be a powerful brand asset. PR pros should seize this opportunity and make the push to get their C-level execs on board.
With ComicCon coming to San Diego next week - San Diego’s EdgeWave is doing a quick survey to see who everyone’s favorite comic book super hero is. Batman is currently in the lead with a strong push in the past couple days.
Vote here for your favorite here.
I’m actually a Superman fan myself - ability to fly, shoot lasers out of my eyes, and strength of a thousand men, no brainer!
EdgeWave's CEO Dave Maquera recently spoke with security writer Sramana Mitra for her Thought Leaders in Mobile and Social (TLMS) interview series. During this interview, Dave talks about Edgewave’s unique approach to security solutions and addresses open problems in the industry. In TLMS, Sramana interviews thought leaders in the mobile and social sectors with unique perspectives on how the mobile and social industries are evolving. The series is part of the One Million by One Million (1M/1M) global initiative, whose aim is to help a million entrepreneurs reach $1 million in revenue and beyond.
This is part one of a series which will be published over the next several weeks. To see the interview, please visit the 1M/1M blog!
Sramana Mitra: Dave, let’s start with setting some context about what EdgeWave does.
Dave Maquera: EdgeWave is a web and email, social media and mobile security company. We are about 110 folks in the company and we have around $18 million in revenue. The historical focus of the company has been primarily on web gateway and web filtering capabilities. In 2010 we added an email filtering – spam filtering – capability and have since augmented both products and leveraged what we saw as strategic in our e-mail acquisition, which was a cloud architecture that is highly scalable and extremely cost-efficient, whereby we could continue to offer security capabilities to mobile devices and globally distributed organizations in a high-security demand environment, which is highly flexible and cost-efficient. We started off several years ago. As a matter of fact, the core company St. Bernard was one of the first web filter appliance companies – about 15 years ago. Since we started back then, the company has rapidly changed in the last few years to adopt what we believe are game changing technologies to secure the environment.
SM: What is special about mobile security?
DM: The most obvious thing is a physical difference. Most mobile devices are used by people outside of the physical perimeter of the corporate network or the enterprise where they are employed at. The whole idea of a PC on a LAN that is secured through a single firewall has gone away. When you are on a mobile device, you are not only connected to your carrier’s voice network, you are also connected to your carrier’s SMSC, which is the short messaging and mobile messaging system. You are also connected to the mobile Internet, which goes through their network, goes out to the web and goes back to whatever focus you are touching on the other side of your corporate or institutional group. So it is completely different. You have to think about “How do I secure my data? How do I prevent malware intrusions and attacks? How do I really maintain compliance with key policy and regulatory items, now that I am way outside of all the historical safety measures that were behind the perimeter?” That is why it has changed dramatically.
SM: The particular problem you are solving is mobile security in the context of the enterprise?
DM: I would say it is not a particular problem. The way we look at it is that there are lots of problems rolled up into this use case of having a mobile device that you probably own personally. Statistically, most mobile devices that people use to interface with their enterprise or company are not issued by the company. That is one piece of it, but all the touch points that I talked about are several problems by themselves, and they have to be managed. The way we look at it is that we manage web and e-mail security through that entire extended network through which people are now connected to each other through mobile devices. We still do web filtering in the enterprise and simultaneously out to your device. We still do policy compliance within the enterprise, but also out to your device – wherever you are. So it is across the entire ether of what the corporation or enterprise now is, by virtue of having mobile devices connected through the web. It is not a particular focus. We still do all the things we used to do, but we added key technologies and approaches to how we manage that on behalf of our customers.
Look for part two of the series coming soon!
It seems high-profile social media hacks are all the rage. The organization taking credit for some of them, including the attack last week on The Onion, calls itself the Syrian Electronic Army (SEA). The Onion, for the few who don’t know, is a satirical news site that specializes in funny fake news stories. So it’s not surprising that some people doubted they’d been hacked at all – coming as it did on the heels of the AP Twitter attack. However, The Onion hacking gained credibility after they wrote about it on their technical blog – one that’s not as widely visited as their main news site.
Even more surprising, SEA wasn’t using some next-generation hacking technique that makes stopping these attempts so challenging – they used good, old-fashioned phishing! Phishing and its close relatives spear-phishing and whaling have been around since the 90’s. They are tried and true methods that remind us of our vulnerability and caution us to remain vigilant.
According to The Onion blog, SEA phished Onion employees’ Google Apps using 3 different methods:
- First, they sent out phishing emails to some Onion employees, but only a few so as not to raise suspicions, asking them to read a Washington Post story. Those who clicked on the link were redirected to a URL where they were asked to enter their Google credentials. One Onion employee fell for this stage of the attack.
- Once they gained access to the employee’s account, they used it to send emails to other Onion employees. Now they had their phishing emails coming from a known sender, increasing the odds someone would respond.
- Two employees entered their credentials and one of them had access to all of The Onion’s social media accounts, and the rest is history.
Read the entire blog
In their blog about these events, The Onion included some tips under “Don’t let this happen to you”, including, educating users to be wary of links that lead to login requests; isolating Twitter email addresses from other organizational email; using strong passwords; and having a way to reach your users outside the organization’s internal email accounts.
However, another critical component of effective security measures is technology that can mitigate risks before they turn into damaging breaches. EdgeWave has solutions that offer multi-layered protection against the risks associated with social media in the workplace as well as award-winning solutions that defend against email-borne threats. EdgeWave Social offers granular control over social media interactions that allows you to monitor and block content based on policies and rules you establish. You can use the templates included in the solution or write your own unlimited rules. EdgeWave’s ePrism Email Security includes proprietary Zero Minute Defense, which can detect and block spam, malware and phishing exploits in close to real time.
AhnLab, South Korea’s largest IT security vendor, has revealed that 78 percent of IT security professionals have admitted to picking up and plugging in USB flash drives found abandoned or lying around. This goes against all the rules and warnings these professionals try to drum into their own colleagues inserting a “found” flash drive into a network lead to infecting files and networks, and ultimately, the loss of valuable data.
The study, which was conducted at last month’s RSA Conference 2013 among 300 IT professionals — many of whom were security experts —, found that data which was discovered on the “found” USB drives often included viruses, rootkits, bot executables, movies, music and other office documents.
The study also uncovered that more than 68 percent of those surveyed had been involved in a security breach, either at home, work or personally – with many relating back to the infected USB drives.
“I am utterly shocked at these figures, in particular, the 78 percent number,” said Brian Laing, VP of marketing and business development, AhnLab, Santa Clara. “For example, Stuxnet, one of the world’s most sophisticated cyber-attacks, gained access to its target system through a ‘found’ USB drive. The creators of the malware left infected USB drives near a uranium enrichment facility and someone picked it up and inserted into their PC. Stuxnet derailed the efforts of that nation to purify nuclear materials at its facility.”
According to Laing, IT security professionals are clearly ignoring basic rules and this must stop. An infected USB drive could result in infected machines, infected networks, and a PC or PCs in the network converted to a bot for use by cyber criminals. The result could include stolen intellectual property, such as sales forecasts, customer, and financial information. The list is endless.
“I urge IT security professionals to begin practicing what they preach,” said Laing. “This ‘it won’t happen to me’ attitude doesn’t wash. It really does come down to the old mantra of combining people, process and technology – if you can get all three elements right, you are on track to a safe and secure environment. “
So very proud to have just won 'PR Team of the Year for the Security Industry' at RSA for our work with partner Madison Alexander Public Relations.
October is the Annual National Cyber Security Awareness Month, created to help increase awareness of the dangers that exist online and develop best practices to avoid being a victim of cybercrime.
Established by the National Cyber Security Alliance (NCSA), a non-profit partnership of educational institutions, professional organizations, corporations and the Federal government. National Cyber Security Awareness Month (NCSAM), conducted every October since 2001, is a national public awareness campaign to encourage everyone to protect their computers and our nation’s critical cyber infrastructure.
Today’s evolving Web-based threats such as phishing attacks, spyware and identity theft are top concerns for businesses and consumers alike. By utilizing proper precautions such as multiple passwords, updated security patches, and software solutions - ex. web filtering, anti-virus, firewalls - users can build a strong defense against cyber crime. National Cyber Security Awareness Month reaches more millions of Americans through media, middle school and high school lesson plans, and partnerships with dozens of companies and associations.
The success of National Cyber Security Awareness Month rests everyone to engage in education and awareness activities. There are opportunities for everyone from home users to major corporations and government entities to get involved.
To view ways that you can get involved with NCSAM, please visit for tips - http://www.staysafeonline.org/
• There are no individuals, businesses or government agencies that have sole responsibility for assuring Internet security.
• Each person who accesses the Internet has a role in securing their digital world, including their devices and the networks they use.
• When individuals take actions, they affect everyone – practicing personal Internet safety makes the Web more secure for others.
• Each of us can play a role in making the internet safer by practicing personal cyber safety, promoting awareness in our communities and educating our youth – our combined efforts make for a strong and safe digital society.
NCSAM promotes a simple three step method for Cyber Security that anyone can implement. By making your personal digital lives more secure, we can increase the security for all users:
• STOP: Be aware of the risks and threats before you go online so that you are better able to spot potential problems.
• THINK: Consider what actions you are about to take and think of how they might affect your personal safety or that of your friends and family. Be alert to warning signs.
• CONNECT: Once you have taken the first two steps, you are free to enjoy your Internet experience knowing you are safeguarding your digital existence and your computer.