Wednesday 21 July 2010

Man-in-the-Middle Attacks: LiveEnsure™ will help to Eliminate the Threat Without Impacting Business.

Man-in-the-Middle Attacks: LiveEnsure™ will help to Eliminate the Threat Without Impacting Business.

A sophisticated type of phishing, man-in-the-middle attacks occur when an attacker attempts to intercept communications between two parties who are transacting online, such as a customer and a retailer, without their knowledge.
By doing so, the attacker becomes "the man in the middle."

Both parties are unaware of the attacker's presence. So, acting as a proxy, the attacker can both review and manipulate the contents of the messages he is relaying between the two parties.

Today I read with sadness that BP claimants have been victim of a phishing scam adding to chaos of the disaster.

Live Ensure™ protects users by securing and authenticating their identities through a synthesized multi-factor approach. Users are confident that their credentials are protected whilst on your site. Your users are protected from phishing, pharming or man-in-middle attacks. There are no complicated, ineffective tokens and cookies. Users can trust the site or application they are accessing cannot login under their identity without their permission. (Insider attack)
www.livensure.com

Developers you can join the beta-test next week simply register on the website.
Learn how to protect your customers now.

Tuesday 13 July 2010

'How to achieve excellence in joined-up marketing'

Embracing Social Media in your Promotional Mix.

Savvy businesses understand the power of social media. It can be very challenging to integrate with traditional marketing.Below is a list of which social media tools can be easily integrated, how to use them in an effective way alongside traditional methods and how to prove they're a good investment.

The Marketing Mix has changed Dramatically

Socialmedia: Twitter:The News Feeder/Seeder

Twitter allows direct contact with the audience, in a simple and effective way: messages are limited to140 characters.
Twitter can be used to perpetuate messages/news, create, support competitions to monitor people’s opinions and market activity. It is proven as an effective media to launch a product on the market. There are automatic tools you can use but the business needs to engage with it to make it successful. (Dell. Sun and BestBuy, Liveensure, are excellent examples)But your followers unless you are a full on A lister are unlikely to be interested in the fact you are enjoying a frapocino as starbucks...keep it real, re-tweet your news, research and information.

Facebook and Linkedin

Social media campaign and communities: Linkedin Network/Facebook Fan Page
Facebook is the biggest social network all around the world with more than 28 million active profiles in the UK representing over 70% of the UK community.

LinkedIn has 50 million business users worldwide and is growing at one new member per second ‘Groups’ are a compelling way to communicate to your end users..
Buzz Words: Tribe, lurk and blurt.(I admit to being a bit of a lurker it comes from my heritage in online customer experience and natural female curiosity).

We have formed groups on both:

Facebook Short: http://bit.ly/cQIp27

LinkedIN :Short: http://bit.ly/c5F4jq

Simply link these to your website and add to email signatures, let people share your information and you will increase your digital footprint.

Blogger Outreach
Direct communication with bloggers is a effective way of increasing buzz online. Certain bloggers are considered experts in their sector and “opinion leaders”: they are the ones to activate the word of mouth viral activity getting too the real influencers. In internet security we have the effervescent Graham Cluley. The main objective is to grab their attention and interest and get them to endorse the product/brand. Create a list of key influencers in your sector and start to engage with them, don't sell- cut and paste will not work with these guys).

Social Success is Measurable

Marketing Analytics, Measurement, Metrics, Social Media, Twitter
More than ever, hard numbers are necessary to demonstrate success. They are all but incontrovertible and easy to communicate, and they can point out what is or isn't working.

There are some leading players in agencies who can help largers organisations get Social:

For new-media Twitter, with its established tweetocracy (and people coining phrases with "tweet" left, right, and center), marketers are finding more tools to help them understand how their efforts are performing in this new medium.
There are many free time saving tools to measure the dynamics of activity.

Social Streams

You can very simply activate,monitor and connect:

ActiveTwitter Profiles,
Active Blog Content ,
FACEBOOK Page,
Viral Videos- You Tube,
Case Studies- video and editorial,
Communities,
MEET UP.

Once activated, communicate alongside your usual email and telephone details, let your customers and staff know you are social.

Summary

The good news facebook pages, linkedin communities and blogs are free BUT the challenge is engaging with internal resource to make the strategy work to ensure the messages are consistent in traditonal and social media. For best results a company needs to as a whole get social.

This post is part of the #JUMPchallenge, a blogging competition designed raise awareness on how to join up online and offline marketing, launched to support Econsultancy's JUMP event

Vote for me at http://advice.perkettpr.com/err-on-the-side-of-caution/

Wednesday 7 July 2010

The First Thing Young Women Do in the Morning: Check Facebook [STUDY]

According to Mashable blog today:
Young women are becoming more and more dependent on social media and checking on their social networks, according to a new study released earlier today by Oxygen Media and Lightspeed Research. In fact, as many as one-third of women aged 18-34 check Facebook when they first wake up, even before they get to the bathroom.

What conclusions can we draw from this data?
It’s not just that young women are using Facebook religiously: it’s that they’re very open with what they post and who they accept as friends.
Combined, it can lead to a privacy mess.

When will networks, retailers and websites start to protect their users identity by implementing authentication.
www.liveensure.com


The First Thing Young Women Do in the Morning: Check Facebook [STUDY]

Monday 5 July 2010