See the video below.
See the video below.
That nasty little something that someone, a bot, or a person, or maybe both left for you overnight. It is a digital take down. A bad blog post. A social media meme that is being unanswered or purposely pumped up to discredit you, your company or organization or your brand. Or maybe it is a false allegation. Or paid fake bad reviews that your competitors put up.
Face it. The Internet is a hostile place for your reputation and your brand, whether that is personal, corporate or government. The control and management of your reputation start and end with you. As we enter 2015, it is worth paying attention to, in fact it is important to take stock of your online reputation, the management of it and the control of it. It is yours. Not anyone else.
The — Internet, social media, the cloud, mobility, bring your own device, artificial intelligence, autonomous computing etc etc — all are really cool buzz words. All come with prices to pay that include the constant need for personal, corporate and government level cyber security, reputation management and reputation control.
Our top 10 List of Ways That Cyber Security, Social Media and Reputation Management and Reputation Control all mesh together.
- Social Media — is the entrance point for viruses, malware, malformed links, phishing and learning enough about someone to turn around and destroy their reputation.
- Mobility — allows for instant access to social media, email, sms, cloud and phone, and video, as ways to tear down a brand or reputation. It can happen anywhere, at any time, by anyone around you holding a smartphone or smart watch or smart glasses.
- Cloud — allows people to store information quickly and easily. This can be for phishing, for cyber crime, for reputation destroying or extortion. Images and videos, poems and documents and your complete online profile can be easily harvested by smart people and or bots and then turned around against you. What information are you allowing out or putting out to make it easier to be attacked? Or easier to have your reputation tarnished or that of your brand?
- Bring Your Own Device (BYOD) — While fun and easy for users and your employees BYOD brings a whole fruit basket worth of cyber security and reputation management and control issues along with it. BYOD allows users and employees to access the internet and social media channels without approval or notice from the employer. A reputation can be destroyed in an instant with a recorded conversation, a video, an errant email or sms, or worse corporate espionage and cyber crimes can be instituted easily with BYOD.
- Artificial Intelligence — The name alone. What does it mean? How can artificial intelligence (AI) bots or autonomous computing affect your cyber security and reputation management and control? In so many ways we are just beginning to understand.
- Lazy People — Sorry but many times the malware or the phishing or the destruction of reputation starts with someone simply being lazy, not having security and privacy settings attended to, and or worse letting someone else use their login credentials.
- Your Competition — They have access to the same tools you do. They can buy hackers, they can buy reputation destruction; they can attempt to steal your trade secrets; they will try to insert bad people into your organization at every level. (See 8 below.)
- Bad People — No good, no ethos or morals. These people do not care if they harm you. They seek to. These come in the form of social media contacts or email phishing all the way through HR, interviewing, shadowy financiers and content theft propagators from online goods. They will use any and every tool out there to disrupt your business, to destroy your reputation.
- Posting stupid pictures of yourself — on to any website regardless of how safe you *THINK* it is.
- Not checking the health and welfare of your own digital reputation and brand.
Copyright © 2010-2015 Digijaks, LLC
It is, as is so commonly mentioned in the media: “That Time of Year Again.” Yup. Packages. Shiny New Things. Cool Toys for the Kids and kid-adults alike.
It is also the time of year of increased cyber crime attempts aimed at retailers.
Add also the time of year when more families and organizations introduce new varieties of malware, ad-malware, viruses, worms, bad bots and devices that phone “home” into our homes, workplaces and civic spaces.
Malicious Adware Uses Certificates to Disable Security Products https://t.co/ijllAbzIXr
— Alan W. Silberberg (@IdeaGov) November 23, 2015
How? Because many devices are coming pre-loaded with malware. How many parents look into the workings of a cheap tablet before handing it off to the kids? How many people are checking new apps to see the permissions being requested on those new devices and old ones too?
Do you know what your connected devices are doing this holiday season? Perhaps it is not just calling the North Pole, but indeed calling “home” with your life information. This applies to talking teddy bears, connected fridges, Iot devices of every stripe, but not to mention your phone, tablet, smartwatch, car.
Skype, WhatsApp, and Yelp access your data hundreds of times, but nobody knows why https://t.co/xMvvlCrafF
— Digijaks (@Digijaks) November 24, 2015
A few weeks ago I wrote this piece about #IOT Cybersecurity and how it affects personal and brand reputations. I got a lot of criticism for basically speaking the truth. I appreciate all the tweets, emails and Linkedin posts engaging on this piece, including all the people who attempted to say I was wrong.
But the points raised in that piece are simply the opening salvo in a multi front disruption. The disruption is NOT IoT. The disruption is to switch from product leading first with security as an afterthought in the rush to go to market. What needs to change is the mindset to build in design security from the beginning,
Last week I sat on a panel at the California Cyber Security Task Force meeting. The panelists were all cybersecurity experts, from across the field, including homeland security, penetration testers, strategy and policy. When it came time to talk about #IOT Internet of Things, we were all asked what people thought about the current state of cybersecurity in IoT.
The answer from the entire panel was: THERE IS NO SUCH THING AS CYBERSECURITY AS OF YET IN THE INTERNET OF THINGS.
Think about that for a second. Or maybe longer. Sure there are a few Iot devices that do offer some level of security. But often, as was raised by one of the other panelists, that is simply writing a marketing statement to the effect of “We take your security very seriously.”
But most IoT devices do not provide any real security, and many are simply copies off other IoT devices that also have no security. Then you have to add in the problem of the unsecured devices talking and sending your data to other non secure devices and or third party companies.
The disruption has to be the switch from rush to market with little to no thought about security — to one where security is built in from the design level up and where devices are not put on the market without first being hack tested every which way to be able to prove their security credentials. Otherwise, we are all simply at very real risk. In part because of the inattention or even stupidity of others who do not think this is important; or in the rush to market skip cybersecurity completely — or just write a lame #fail marketing statement about how they value your security.
Alan W. Silberberg, CEO of DIGIJAKS
In Digijaks daily course of business with reputation management we come across a lot of people (adults) who have seen their life get turned upside down because of something appearing in search results that negatively affect them. This happens so much, and so often it has created a whole industry to deal with it. Search results leading to problems to people happen for many reasons. I recently wrote about this problem on the Huffington Post as it relates to adults.
But this same correlation exists for kids, for families and the same problems may arise, but with lifelong implications. Imagine being an 11 year old who innocently posts a picture or a quote or a poem or a location, thinking nothing of it. Fast forward 6 years to college applications. You can be very sure college admissions officers are carefully looking at social media, at search engine results and other digital mediums to find reasons to say no. The same is true for private high schools; and employers, the military and many others.
We all need to work with our kids to help them understand the direct linkage between social media use and search results that can and will last a lifetime. This affects a lifetime of Reputation Management and Reputation Control efforts that need to start at a young age.
Reputation. Is hard to get, hard to maintain, hard to control; especially in an era of hacking by governments and criminals alke.
Cybersecurity is something many people long put off as a back burner decision, or lower funded priority, but in actuality is a critical need, now at the forefront of many leaders’ thinking due to the sheer number and audacity of the hacks from 2013 forward. There is a distinct triangulation between reputation control and cyber security and search results. The more things get hacked, the more information flows onto websites, both for sale, and for free, and the more the search engines index these results. Digijaks’ CEO Alan W Silberberg has written about this triangulation before as it relates to cyber security and how we all need to look at the this inter-relationship, and it’s effects on all of us.
The recent OPM hacks were so huge, the numbers are simply staggering that it is hard to process for most people, especially “regular people” who feel this does not affect them or their friends or family.
But in addition to the 21+ million social security numbers that were stolen in the OPM hack, so were over 1.1 million sets of people’s fingerprints. People who serve the US Government in all sorts of capacities, some secret, some not. So in addition to the notion of identity theft through the means we have become unfortunately accustomed to, like credit, social security and personally identifiable information (PII) — we now have to contend with the theft of biometrics.
It means every citizen, whether they believe the OPM hacks relate to them or not, have to start taking on steps to protect themselves. When a nation state can combine vast databases of personal information with biometrics for some of those same people; it means that nation state, or proxies or vendors it sells to could become one of us through surreptitious methods. It means identity theft is potential on a massive scale, as is exploiting people through their information in security clearance documents or medical records.
It means the push to make encryption weaker or illegal should actually be reversed to become a push to make encryption a standard for citizens; and one that is supported by our Government ln light of attacks and theft of information from tens of millions of US Citizens. The US Government through the Congress should adopt stringent laws making it hard not to encrypt personal information.
It means, think about what information you put in the cloud. Think about what information you put in social media. What information you never put into digital form. It means think about carrying a second and or even third form of identity in case you are ever challenged with not being you.
We all want it, work for it and strive for it throughout lives and careers.
We all have one. It us up to us to define it, scale it and defend it.
Which one is more valuable? Which one brings more of the other?
This is a two sided question. To some people, money is everything. To others, their reputation is everything, with money or without. While most people might reflexively think that money is more important, others will emphatically state that reputation management is paramount.
Some recent studies weigh in on the side of reputation. Reputation expert Michael Fertik recently weighed in on the issue in the UK’s Guardian Paper.
Digijaks CEO Alan W. Silberberg feels that money and reputation are completely intertwined; and that this effectively goes along with the associated correlation between social media and reputation management.
Money and Reputation are intertwined in ways most of us can barely recognize yet. Pretty soon, if not already, major banks are/will be assessing their clients not just based on assets under control, but on social indicators, and online reputation.
How many times have people searched you during or before routine financial meetings? Have you thought about this yet? 2015 definitely marks the year in which most of us need to start recognizing the distinct correlation between money and reputation — whether online or offline.
When it comes to reputation management and control, there are many techniques that can be employed, depending on the person, the brand, or the situation.
What works in a digital crisis environment does not always translate to a long term digital branded environment. The same is true in reverse.
An older article from 2013 examined this correlation and there has been a ton of blog posts and other material written about it, but still very few understand or practice this type of specific tactical methodology to achieve their long term strategic goals for search and or social media. Here is an example from my own search results.
Note in order: 1. Twitter 2. Linkedin 3. Huffington Post (As I am a blogger and have a byline) So what does this say about the correlation between social media, search and reputation management and control? It very clearly shows the relationship, and the importance of using your social media accounts strategically and tactically with regard to keyword use, placement, and brand labeling. It also shows that even with a fully optimized website like Digijaks and being an active blogger; the social media platforms take up the top chunks of search real estate. This is with taking a strategic approach. Especially with the constant changes in search engine algorithms. But what happens when you do the opposite? When you do not think about this correlation and how it affects your personal, corporate or government brand on a daily basis, you open yourself and brand to reputation crisis, to reputation smears or outright destruction.
Social Media is the first and most basic step one must take to protect one’s brand and reputation. It needs to be used carefully, proactively and with keywords, brand image and search results always in mind.
Individuals, Companies, Governments and Brands need to pay careful attention to the correlation between search, social media and reputation control and management. If it is left to the Internet, you will not be happy with the results. Take control of your reputation. Take control of your brand reputation management, and start with social media. There are many other steps. But start there. Digijaks offers boutique solutions for high impact individuals, brands and organizations to deal with the combination of cyber security, social media and reputation management and control. We see and hear all kinds of stories. Alan W. Silberberg, CEO of Digijaks
Digijaks has created proprietary technology and processes that enable us to excel at Reputation Control and Management, and sometimes a picture is worth more words.
This is such a case.
Digijaks excels at Cyber Reputation Control and Management because we have developed a multi-tiered system that does not just focus on one element. Indeed we look at SEO, Search and Social Media as one group of data. People, events and traditional media are another. It is only when you look at both groups together in a holistic way, that your digital presence become holistic. Even when a typo is entered into search.
Note in the picture above, Digijaks is ahead of the biggest competitor in the space. TWICE.
Digijaks is privately owned and operated. We are competing in an industry that is not short on either venture capital or major players. Yet, our solution puts us on top, on top of all of that.
The marketplace is made up of well funded players and new and old companies. When you can own your space, own the digital real estate and the placement in search; against companies known only for doing that exact thing? That is exactly what Digijaks has done.
Being a start up CEO can be challenging; disruptive and demands the best of people to rise up to the occasion, every day. Looking at the above picture just gives me pride in what I have invented, and in the work that our team has done to get to this point. Thank you to everyone involved with Digijaks!
Now ask yourself. Is it time to engage Digijaks for your company?