Cyber Reputation Management and Control

BAM!  There it is.

Right in your face one morning when you check your social feed as news.

That nasty little something that someone, a bot, or a person, or maybe both left for you overnight. It is a digital take down. A bad blog post. A social media meme that is being unanswered or purposely pumped up to discredit you, your company or organization or your brand. Or maybe it is a false allegation. Or paid fake bad reviews that your competitors put up.

Face it. The Internet is a hostile place for your reputation and your brand, whether that is personal, corporate or government. The control and management of your reputation start and end with you. As we enter 2015, it is worth paying attention to, in fact it is important to take stock of your online reputation, the management of it and the control of it. It is yours. Not anyone else.

The — Internet, social media, the cloud, mobility, bring your own device, artificial intelligence, autonomous computing etc etc — all are really cool buzz words. All come with prices to pay that include the constant need for personal, corporate and government level cyber security, reputation management and reputation control.

Our top 10 List of Ways That Cyber Security, Social Media and Reputation Management and Reputation Control all mesh together.

  1. Social Media — is the entrance point for viruses, malware, malformed links, phishing and learning enough about someone to turn around and destroy their reputation.
  2. Mobility — allows for instant access to social media, email, sms, cloud and phone, and video, as ways to tear down a brand or reputation. It can happen anywhere, at any time, by anyone around you holding a smartphone or smart watch or smart glasses.
  3. Cloud — allows people to store information quickly and easily. This can be for phishing, for cyber crime, for reputation destroying or extortion. Images and videos, poems and documents and your complete online profile can be easily harvested by smart people and or bots and then turned around against you. What information are you allowing out or putting out to make it easier to be attacked? Or easier to have your reputation tarnished or that of your brand?
  4. Bring Your Own Device (BYOD) — While fun and easy for users and your employees BYOD brings a whole fruit basket worth of cyber security and reputation management and control issues along with it. BYOD allows users and employees to access the internet and social media channels without approval or notice from the employer. A reputation can be destroyed in an instant with a recorded conversation, a video, an errant email or sms, or worse corporate espionage and cyber crimes can be instituted easily with BYOD.
  5. Artificial Intelligence — The name alone. What does it mean? How can artificial intelligence (AI) bots or autonomous computing affect your cyber security and reputation management and control? In so many ways we are just beginning to understand.
  6. Lazy People — Sorry but many times the malware or the phishing or the destruction of reputation starts with someone simply being lazy, not having security and privacy settings attended to, and or worse letting someone else use their login credentials.
  7. Your Competition — They have access to the same tools you do. They can buy hackers, they can buy reputation destruction; they can attempt to steal your trade secrets; they will try to insert bad people into your organization at every level. (See 8 below.)
  8. Bad People — No good, no ethos or morals. These people do not care if they harm you. They seek to. These come in the form of social media contacts or email phishing all the way through HR, interviewing, shadowy financiers and content theft propagators from online goods. They will use any and every tool out there to disrupt your business, to destroy your reputation.
  9. Posting stupid pictures of yourself — on to any website regardless of how safe you *THINK* it is.
  10. Not checking the health and welfare of your own digital reputation and brand.

Copyright © 2010-2015 Digijaks, LLC

#cybersecurity The Gift everyone needs for the Holidays!

Happy Holidays.

It is, as is so commonly mentioned in the media: “That Time of Year Again.” Yup. Packages. Shiny New Things. Cool Toys for the Kids and kid-adults alike.

It is also the time of year of increased cyber crime attempts aimed at retailers.

Add also the time of year when more families and organizations introduce new varieties of malware, ad-malware, viruses, worms, bad bots and devices that phone “home” into our homes, workplaces and civic spaces.

How? Because many devices are coming pre-loaded with malware. How many parents look into the workings of a cheap tablet before handing it off to the kids? How many people are checking new apps to see the permissions being requested on those new devices and old ones too?

How many companies are not checking to see if their employee’s new devices are safe to be brought into the workplace, let alone to be allowed access to networks? 

Do you know what your connected devices are doing this holiday season? Perhaps it is not just calling the North Pole, but indeed calling “home” with your life information. This applies to talking teddy bears, connected fridges, Iot devices of every stripe, but not to mention your phone, tablet, smartwatch, car.

Reputation Control for Kids by Social Media, Search Results

In Digijaks daily course of business with reputation management we come across a lot of people (adults) who have seen their life get turned upside down because of something appearing in search results that negatively affect them. This happens so much, and so often it has created a whole industry to deal with it. Search results leading to problems to people happen for many reasons. I recently wrote about this problem on the Huffington Post as it relates to adults.

But this same correlation exists for kids, for families and the same problems may arise, but with lifelong implications. Imagine being an 11 year old who innocently posts a picture or a quote or a poem or a location, thinking nothing of it. Fast forward 6 years to college applications. You can be very sure college admissions officers are carefully looking at social media, at search engine results and other digital mediums to find reasons to say no. The same is true for private high schools; and employers, the military and many others.

We all need to work with our kids to help them understand the direct linkage between social media use and search results that can and will last a lifetime. This affects a lifetime of Reputation Management and Reputation Control efforts that need to start at a young age.

Basic steps:

  1. Have a family discussion, and make it more than one time; about the critical relationship between posts on social media, search results and your children’s future.
  2. Be constantly on the lookout for pictures, quotes, links to offensive material and other social media faux paus that might be innocent in nature but can lead to lifelong difficulties.
  3. Set up Google Alerts in your family’s name, your name, and your kids name. This will alert you when posts from social media land in search results, and also when other websites pick up that material.
  4. Set up a family social media plan that includes rules and guidelines for what your family feels is appropriate, ethical or morally ok to be posted onto the internet.
  5. Remember that nothing that gets posted on the Internet is only in one place. Once posted, it will be replicated on multiple servers, and therefore can keep coming back in search results even if the original post is taken down.
%d bloggers like this: