Thursday, July 31, 2014

In Cyber Security — You Snooze, You Lose



  • Spring of 2007- Estonia is brought to a standstill as ping floods and DDoS (distributed denial of service) attacks crash the websites of the parliament, banks, ministries, and media. The level of sophistication of the digital onslaught is unprecedented.
  • Titan Rain- Code word for one of the biggest cyber-espionage cases in history, it refers to a series of coordinated attacks labelled an Advanced Persistent Threat. Hackers infiltrated computer networks for years and stole ‘classified’ data from Lockheed Martin, Sandia National Labs, NASA...
  • Heartbleed- A malicious bug that attacks vulnerabilities in OpenSSL encryption software to steal logins, passwords, and secure keys. It affected the servers of the world’s most popular sites — Google, Facebook, Pinterest, Instagram, Yahoo!, etc. Most worryingly, it impacted mobile (iOS + Android) devices & hardware. The full extent of its damage is unknown.

I wish the above were from a film script titled, Dark Dawn over Cyberia. But these are real, reported incidents. Even more alarming is that cyber-attacks are getting stronger, bigger, faster, sneakier, and stealthier.
Cyber-crime costs the world economy up to $575 billion per year, according to a McAfee-CSIS report. Across continents, it erodes the GDP of countries and undermines technology, innovation, employment, trade and reputation.

Everyone Online Is at Risk

For banking, insurance, military, and healthcare companies, cyber security is a lifeline. But in today’s hyper-connected world, it’s not just the regulated industries that are exposed to danger.
Most of us work in always-on, social business environments. Our day-to-day spans geo-locations, time zones, and technologies. We log in to several social networks on different devices, access data from various websites and servers, and collaborate with people worldwide in real time. Truth be told, we are constantly at risk. And here’s the really scary part:

Being Prepared Is Best Practice

According to The Economist’s Cyber Incident Response Report, 75% of businesses have suffered a security incident in the past two years. While that usually causes loss of productivity and business-critical data, it’s only the tip of the iceberg.
The damage is doubled if the story gets out and snowballs into a full-blown PR and media crisis. Makes sense why 57% companies prefer not to report breaches, unless legally required.
It’s the loss of control, customer confidence and, occasionally, brand equity that makes cyber security a top priority. More than IT, it is now business strategy. Given the unpredictability of cyber-attacks, however, 100% prevention is a pipe dream.

Failing to Plan Is Planning to Fail

Risk mitigation is our best defence. Awareness, education, and understanding are our best weapons against cyber-crime. Prepare to shield your business:

I.   Strategy

Make security a part of your digital strategy. Design an Attack Response, Remedy, and Recovery Action Plan. Include what-if scenarios, what to do, who to contact, etc. Share it with all in the organization. Should a breach occur, have a contingency policy ready with a detailed crisis management and damage containment process.

II.   Personnel

Despite installing protection software, most incidents are picked up by alert staff. It is imperative to have a dedicated team of cyber watchdogs to ensure security across the enterprise. Train employees to consider vigilance a virtue with regular risk assessments, virtual scans, and security drills woven into workflows.

III.   Infrastructure

Investing in reliable enterprise social software is an important step in averting an online security crisis. Using a cobbled set of standalone, consumer-grade tools can create problems of non-compliance and expose your company to many risks:
  • Multiple individuals with admin-level access to social media pages
  • Access management in multiple places (i.e. within each individual network) making account adds, moves, and changes inconvenient and prone to error
  • Inability to enforce review and approval of messages prior to posting
  • Poor or no auditing ability; lack of archiving capabilities; limited or no automated scheduling
  • Incompatibility between new-old versions; separate upgrades for every piece of the puzzle
On the other hand, a holistic, enterprise-grade social relationship platform from a security-certified vendor provides robust data architecture and a secure work environment through:
  • Ability to monitor, moderate, and enforce controls at scale
  • Configurable user-based roles linked to your organization’s active directory
  • Embedded ‘intelligent’ routing and workflow approvals
  • Automated reviewing and compliance processes
  • Smarter monitoring of risks via volumetric & influencer-based alerts, and a ‘kill switch’
  • Enterprise-level security protection (SOC 1 + SOC 2 Type II SSAE16 certifications)
When choosing an enterprise technology partner, use this checklist to ensure the highest standards of compliance and risk management:

For more information on managing / mitigating risks, download the enterprise guides to 

social compliance

social governance,

and crisis management.


Sprinklr CEO, Ragy Thomas on how brands can cope with risk and ensure compliance.



About the author:
amar trivedi social business strategyAmar Trivedi is a Management Strategy Consultant with international experience in Marketing and Communications across cultures, markets and brands. Passionate about helping companies achieve success via social business, he advises leadership teams to deploy social technology to build collaborative relationships, leverage content marketing, and create memorable customer experiences. A blogger, copywriter, storyteller, speaker, Amar champions fun, creativity and happiness in the workplace. He tweets as himself @Mr_Madness




This post was originally published on Sprinklr Experience Management Blog.

Thursday, March 27, 2014

Social Business: The Difference Between Survival and Extinction #socbiz




Social business used to be a buzzword.

Today, it’s a must-have survival tool. Consider this: As many as 93% of marketers now use social media for business, and 67% use social technology for marketing strategies.
Social business is a journey of change spanning the entire business model. It’s a people-centric movement founded on social relationships and focused on transparency, engagement, open information exchange and above all, human interaction. It permeates all levels and functions across the enterprise.

Why all the fuss about being a social business? Is it really such a big deal?

This isn’t hype. For starters, social business transformation offers three significant benefits:
1. Employee Engagement: Motivated, happy employees create happy customers. Their voice (i.e. content) is the marketing. The culture is the brand. When employees are empowered, tech-enabled and actively encouraged to engage through social, they become the company’s strongest advocates.
2. Enterprise-wide Collaboration: Social business success is defined by carving your own ecosystem, a network of networks, via:
  • Activating branded communities across social channels.
  • Identifying brand advocates– internal and external.
  • Building social capital, influence and thought leadership.
Social business puts the vital framework of technology and social relationships in place, which enables collaboration at scale.
3. Smarter Information Management: In a network of social business relationships, an idea for innovation, a new project, or a customer lead can come from anyone, anywhere, 24/7. An open “receive and share” culture optimizes resources (knowledge, talent, content) and streamlines business processes leading to marked improvements in productivity, problem-solving, insight generation and customer service.
According to ExactTarget’s 2014 State of Marketing survey, more than 60% of CMOs plan to increase spending on data/analytics and marketing automation technology this year. Social business is the evolution of social media, a logical next step for your business.

How do we get started? Where does social business begin?

Social business is a marathon, not a sprint. The transformation begins on the inside and gradually grows out. For that to happen, basically you need:
  • Social Infrastructure: For social relationships to flourish, a good, scalable infrastructure is critical. Your social technology should seamlessly integrate key functions (marketing, sales, CRM, IT, HR, R&D, CX), analyze data across various touch points via social listening, and intuitively generate insights from customer intelligence.
  • Social Employees: Training and empowering employees to leverage social technology should be embedded into workflows within the enterprise, community and beyond. While relationship-building skills are paramount, a flair for strategy, analytics and content marketing are invaluable as well. A good place to start would be to appoint a social strategist.

In a nutshell, social business is about future-proofing your business. It could be the difference between survival and extinction.

About the author:
amar trivedi social business strategyAmar Trivedi is a Management Strategy Consultant with international experience in Marketing and Communications across cultures, markets and brands. Passionate about helping companies achieve success via social business, he advises leadership teams to deploy social technology to build collaborative relationships, leverage content marketing, and create memorable customer experiences. A blogger, copywriter, storyteller, speaker, Amar champions fun, creativity and happiness in the workplace. He tweets as himself @Mr_Madness



Gratitude

It's true. We live in a conversation economy. I experienced it. A comment I wrote on Jeremy Epstein's blog led to a conversation which led to an invitation to write a blog on social business.

I consider myself privileged to share my thoughts on a subject I'm passionate about via Sprinklr - Experience Management | Social at Scale. I'm fortunate the blog post attracted intelligent comments from leading marketers and social business experts - from around the world.

A lot goes into producing a blog. To give credit where credit is due, I have many amazing Sprinklr-ites to thank for the above post. Many Thanks to:

  • Jeremy Epstein - for the invitation
  • Uyen Nguyen - for overall supervision
  • Jessica Rodriguez - for content distribution
  • Kara Lee - for content management
  • Brad Hess - for content coordination
  • Esteban Contreras - for social awesomeness :)
  • Darren Garnick - for editing and proofing

To sign-off on a smile, a cartoon from The Geekly Group: