• Skip to main content

Code Red

Security PR Network

  • Home
  • Services
  • Our team
  • Resources
    • Blogs
    • Ebooks
    • Podcast
    • Videos
    • Webinars
  • Testimonials
  • About us
    • Contact
    • Partner up

PR Blogs

CSAN shows opportunities in Cyber Security in the Netherlands

9 August, 2018 By benelux

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”1_2″][et_pb_image admin_label=”Image Blog 1000 px wide” _builder_version=”3.11.1″ src=”https://coderedpr.wpengine.com/wp-content/uploads/2018/08/csan.jpg” alt=”csan” title_text=”csan” /][/et_pb_column][et_pb_column type=”1_2″][et_pb_text use_border_color=”off” border_color=”#ffffff” border_style=”solid” _builder_version=”3.11.1″]

The National Coordinator for Security and Counterterrorism (NCTV) of the Netherlands published it’s Cyber Security Assessment Netherlands 2018 (CSAN 2018) report. In it, the CSAN re-emphasizes and underscores the need for Dutch organizations to invest in digital security. Cyber Security vendors should stand shoulder to shoulder with the NCTV in raising awareness about the risk Dutch organizations and society are exposed to, as well as about the solutions available to mitigate these.

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.11.1″]

By Paul Zeebregts, Zeekhoe Communicatie

According to the CSAN, “the scope and severity of digital threats facing the Netherlands are still considerable and continue to evolve”. The NCTV finds that Dutch security remain under constant threat of digital attacks. “The Dutch economy and broader Dutch society have become entirely dependent on digital resources. Attacks and outages can have major consequences, potentially disrupting society itself”, says the CSAN.

Download the Cyber Security Assessment Netherlands 2018

For Cyber Security vendors, the CSAN offers insights into the opportunities that lie in the Dutch marketplace. “The digital threat is permanent, as cyber attacks are profitable, simple to execute and involve little risk for attackers”, the CSAN states. “In light of recent geopolitical developments, state actors are expected to continue using such digital attacks and may even opt to do so on a greater scale.”

Cybercrime continues
Professional criminals continue to be a major threat to Dutch society, according to CSAN. “Cyber attacks with a major societal impact can be perpetrated with relatively few resources. Perpetrators can carry out attacks without any need for large-scale capabilities; they can simply purchase them externally. This became clear in January, when the DDoS attacks plaguing several banks turned out to have been carried out with a simple bought-in attack.”

Lack of basic measures
Cyber Security vendors can profit from the fact that, according to the CSAN, many organizations in the Netherlands fail to implement the basic measures needed to repel cyber attacks. “This concerns basic measures such as the timely installation of updates or prevention of flaws in configurations. For example WannaCry and BadRabbit exploited known vulnerabilities and could have been prevented if the necessary security updates had been installed. Insecure products and services make life easier for attackers. As the recent period has shown, organizations could have prevented incidents and mitigated damage by ensuring that their basic security was properly in place.”

Cyber Security vendors: take heed!

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Mergers and Acquisitions Communication, part II: Looking Inward

9 March, 2018 By Dan Chmielewski

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text background_layout=”light” use_border_color=”off” _builder_version=”3.0.106″]

mergers and acquisitionsIn part I of this series of blogs on Mergers and Acquisitions Communications, I discussed several external questions on communicating being acquired by, or acquiring a, company were addressed. When there are mergers and acquisitions, sometimes the most important public is overlooked when preparing communications plans – employees. If you leave communicating the acquisition to Human Resources alone, you’ve made a grave mistake. PR professionals can help craft answers to the questions everyone has from either side of an acquisition.

By: Dan Chmielewski, Director at Madison Alexander

Internal Questions
Many of the external questions about mergers and acquisitions will also be shared with an internal audience. To make it easy, the internal questions are broken down to “us” and “them” categories (and some of those questions are also the same, where the answers might be different).

In many cases, the answers are specific to the particular individual, so small group meetings or even individual meetings between employees and managers should be held to address more specific, individual questions.

Create specific plans if the elimination of a product line is planned or certain individuals are targeted for layoff. Human Resources and Sr. Management need to work together to communicate these intentions following mergers and acquisitions to those affected and offer appropriate severance packages and/or bonus packages to keep employees on until the deal closes.

Us/Internal

  1. Why are we buying this company?
  2. How will this company be integrated into our business?
  3. Does this acquisition affect the projects I am working on? How?
  4. Is my job safe? This is actually the top question for a number of employees and the leading source of “grapevine” rumors that can hurt.
  5. Will I be getting more responsibility?
  6. Will I be getting more resources/budget to handle additional responsibility?
  7. Are we looking to buy any other companies?
  8. Explain why this is a good deal for the company.

Them/Internal

  1. Why are we being acquired instead of going IPO?
  2. Why is this deal good for us?
  3. Who is the acquiring company? Tell me more about them?
  4. What will the new organizational structure be?
  5. Is my job safe? What is my career path?
  6. Am I still reporting to my boss?
  7. What changes will happen here?
  8. What happens to my product line?
  9. What happens to my customers?
  10. What does this deal mean to my options/compensation/benefits?
  11. When will this be completed?

Meet Dan at Code Red.

Read more blogs by Code Red PR Experts.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Mergers & Acquisitions Communications: The PR Challenge

9 February, 2018 By Dan Chmielewski

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text background_layout=”light” use_border_color=”off” _builder_version=”3.0.106″]

mergersWhen you work with start-ups and innovators, it’s typically a matter of time until a larger company decides to acquire them or they buy a smaller technology concern to grow. There’s a right way and wrong way to handle the announcement of mergers or acquisitions.

By: Dan Chmielewski, Director at Madison Alexander

In many ways, the communications to the internal audiences is more important than the external news. Mergers or acquisitions are always a reminder that audiences other than the media are often more important. Below, there’s a checklist of questions that must be addressed when announcing mergers or acquistitions even if the answers are not readily available, along with recommendations for the procedures involved in the announcement. Disclosure is always tricky in announcing mergers or acquisitions. Companies need to retain their best talent. It’s important to communicate to employees, partners, or suppliers disclosed early about the consequences of violating disclosures. Managing the grapevine is never easy. Proactivity is always the way to go and keeping disclosures to those who need to know is critical. Upon disclosing either party’s PR firm, it’s important to find out if client conflict exists. Ultimately, the acquiring party makes the decision on who is handling what.

External Questions

  1. What company are you acquiring?
  2. Why are you buying them?
  3. How is the deal being financed and how much is the deal through?
  4. When will the acquisition hit the company’s books (which quarter) and how will you report earnings going forward (for public companies only)?
  5. Why is this a good acquisition?
  6. Why is this good for the acquired company?
  7. What is your expectation of the potential revenue you will generate from the new acquisition?
  8. When will this deal close?
  9. Who will manage the new acquisition?
  10. How will this addition change your combined business moving forward?
  11. What is the business model moving forward? How will you integrate the two companies?
  12. Does this acquisition create new markets for you?
  13. Does this acquisition bring new products/technologies to the product set?
  14. Will any products be discontinued?
  15. Are you planning any job cuts to eliminate redundant positions/functions? How many? And where (where means both geographically and within company departments) will these cuts be made?
  16. What do you expect the new headcount to be?
  17. Will you be acquiring any other companies or products in the immediate future?
  18. Which companies will be the principal competition for the new combined company?

Every deal is unique. These questions are designed to get the communications process around mergers or acquisitions started. The questions can be added to or deleted if not relevant, and the recommended procedures are subject to change based on time and technology. Part II covers internal communications inside the organizations.

Part II covers internal mergers and acquisitions communication for organizations.

Meet Dan at Code Red.

Read more blogs by Code Red PR Experts.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

‘Tis the Season to be… Quiet? Times to stall PR efforts in certain regions

24 January, 2018 By benelux

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text background_layout=”light” use_border_color=”off” _builder_version=”3.0.98″]

season messagingAs the Netherlands grinds to a halt during the upcoming Carnaval week, I wondered if other countries and regions have similar times or events when PR efforts will fall on deaf ears. A quick poll among my fellow Code Red participants provided some interesting local insights.

By: Paul Zeebregts, Director at Zeekhoe Communicatie

Here in the Netherlands, the festivities of ‘Carnaval’ are upon us. Carnaval, also known as ‘Mardi Gras’ or ‘Fat Tuesday’, is more than a one-day event in our region. Especially in the south of the Netherlands, which is traditionally Catholic, every year in late February or early March, depending on the timing of Easter, Carnaval is a pre-Lent celebration. For 4 days prior to the Wednesday that marks the start of Lent (also known as Ash Wednesday), the public in the southern Netherlands, Belgium and some parts of Germany, take to the streets (and bars!) in colourful and strange costumes, wearing wigs, make-up and masks for a massive party. There are parades in almost every town and city, and people are literally dancing in the streets. Most of all, Carnaval is supposed to be one big last brawl before Lent prohibits the consumption of food and alcohol. However, very few people observe Lent during the following 40 days.

It is virtually impossible to reach anyone during Carnaval in the southern Netherlands. Many people take days off for the celebration and some companies close their doors altogether. The rest of the country doesn’t partake in these festivities but does enjoy what they call ‘Spring Vacation’. They do so predominantly on the ski slopes of Germany, Austria, Italy and France, so where the streets in the southern Netherlands are packed, those in the north are half empty.

Carnaval, as you can imagine, is not a great time to publish your news in the Netherlands. As a PR agency, we strongly advise our clients to hold off with their press releases until the festivities have ended. In other regions, other times and events are also not suited for your PR campaigns, as a number of participants in the Code Red Network tell me.

Vernon Saldanha of Procre8 in Dubai, UAE: “Most tech journalists in the Middle East tend to be expats which is why our region seems to face an annual Christmas exodus. As such, December is a slow news month and unless a client has some very ‘significant’ news, I wouldn’t recommend making any announcements, arranging events, or pitching media round-tables.”

The Christmas slowdown is second only to the Muslim Holy Month of Ramadan which is observed in the region for obvious reasons, says Saldanha. “During this 40-day period of fasting, most businesses work shorter hours (to accommodate those that are fasting) and as such business does tend to grind to a snail’s pace. Ramadan does not follow the Roman calendar and depends on the sighting of the moon which is why it moves each year. I would recommend speaking to your PR agency at the start of the year and budget this slowdown in to your PR plans for the region.”

According to Virginia Frutos of Everythink PR Boutique in Madrid, Spain, the Christmas Season is especially long in her region. It runs the entire ‘Twelve Days of Christmas’, from December 24 to the day of the Three Wise Kings (January 6th). “The focus of PR is consumer’s and the seasonal topics. The same happens in the summer, when the vacation season is spread from July to September. If we are thinking about product launches or events during these times, it is a big NO in our market. However, if we want to talk about safe shopping (Christmas sales), security trends, Wi-Fi connections in airports, summer holidays and traveling… this can be the time to get the message across, specially through TV and radio.”

“If we consider general information newspapers, in the Christmas context we have a good opportunity to talk about what is coming in 2018. We’ll publish forecasts and insights in how cybersecurity/cybercrime/ransomware is going to be part of people’s daily life. This is an excellent time to talk about the future, such as the developments in the internet of things and visions related to robots, home automation, self-driving cars and, of course, how to optimize the security of this all!”

Elaine Banoub of Primary Communication in Surrey Hills, Australia, tells me the later in the year it gets, the worse the timing is for making a major PR announcement in Australia. “As a rule of thumb, the cut-off point for pre-planned announcements should be late November. Australian journalists will typically cover stories for January onwards from this time, so ideally any announcements made at the tail end of this period won’t be time-sensitive.”

Additionally, many Australian businesses close from around mid-December through till mid-January, says Banoub. “Any major PR announcements during this period can mean that it can get lost in the wash of holiday stories. And sometimes it can have a negative impact – announcing something not directly tied to the holidays during this period can give the impression that an organization/business is trying to hide something from the public. This may not be the case, but perception is everything in PR!”

Banoub points out that there are two major exceptions: “The first is if a client has a consumer campaign that’s directly tied to the holiday season. The second is when a client is releasing predictions for 2018. Towards the end of the year, the Australian media thrive on articles based around this kind of material; if it’s pushed out to the right outlets, it can deliver an end-of-year PR coup with good exposure for the brand.”

In the Nordics, the holiday season is also not the best time to share news, says Susan Rose of Susan Rose Communication in Stockholm, Sweden. “It would be a waste of good resources. The worst time to make a major PR announcement is the last week before Christmas until mid-January. In the summer, interest in news slows down from the start of Summer on June 21 until the middle of August. In July, however, NOBODY cares about any news.”

In Israel, some global holidays are observed, but Anat Messing of Wanaka PR in Ramat Gan, Israel, tells me the Jewish calendar offers its own unique holiday seasons. “At Christmas and New Year business is as usual. However, there are two seasons when things slow down significantly. The first is in September-October, when we celebrate three different holidays during a period of almost a full month. The second is one week in April, during Passover. Usually the market becomes very slow during these periods and many people travel in and out of the country. Sometimes, from September to October, people may leave for an entire month. Therefore, while it is not advisable to come up with important news during these times.”

Messing points out that these ‘slow times’ offer great PR opportunities as well. “It can be a good time to publish less important content. Also, many journalists are out of the office and by-lines or press releases can fill the gaps. That provides our clients with the opportunity gain valuable exposure they wouldn’t get on a regular business day.”

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Industry 4.0 and Blueprints for Security and Safety in Korea

23 January, 2018 By June Cha

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text background_layout=”light” use_border_color=”off” _builder_version=”3.0.98″]

industry 4.0Sectoral blueprints have emerged to cope with the industry 4.0 in Korea under the slogan “People-centric and participatory industry 4.0 to address both social issues and economic growth”.

By Kwon June, journalist of Security World

This plan lays out the big picture envisioned by the new government of Korea to support ‘innovative growth’, one of the core policies of the government, and to promote the ‘human-centered’ industry 4.0 that everyone can participate in and benefit from. Especially, it is meaningful in that it suggests the blueprints for the five-year term of Moon’s government to obtain the kind of transformation as well as achievements that can be understood by the people beyond general approaches through collaboration among ministries and Presidential Committee on The fourth industrial revolution.

The government’s response plan aims to complete the intelligent revolution project (12 tasks), secure technical competitiveness, create industrial ecosystems and cope with social changes, and suggests specific action tasks for these four sectors.

First of all, in the sector of ‘Intelligent Innovation’, 12 projects are proposed to intelligently guide the productivity and global competitiveness of industry, while increasing the quality of life and creating economic drivers. The target year for each project is set to 2022.

With regard to security and safety, it is included that sustainable smart city models and the autonomous control-based intelligent smart home are to be promoted to address urban issues and thus drive innovations in a life from households.

World-class cutting edge smart cities are planned on new sites, breaking from the conventional u-City initiatives merely focusing on facility management. Also, a ‘New Deal for smart urban rehabilitation’ is to be promoted based on smart technologies for solving urban problems by 2022. The plan also includes a strategy to upgrade the existing smart home, which has been widely applied for the remote control of home electronics and lightings to a new intelligent, autonomous technology.

Also, when it comes to ‘Transportation’, the plan proposes the expansion of intelligent traffic signal systems and the enhancement of traffic risk forecasting and an alert service that together will seek to reduce traffic congestion and accident rates by 10% and 5%, respectively.

In the ‘Vehicle’ sector, the drone market is expected to grow 20 times through a series of projects including the commercialization of autonomous vehicles for high-way use, promotion of industrial drones and introduction of autonomous ships. This plan also includes a series of plans to support the handicapped.

Especially, the initiatives to secure the competitiveness of the drone industry aim to foster industry-leading technology for autonomous drones, nurture industrial drones, and construct flight examination centers by regions.

For ‘Safety’ sector, smart facility management is to be fostered, especially focusing on worn-out facilities and artificial intelligence-based crime analytics; and the provision of safe, optimal routes are also featured. These measures aim to increase the crime detection rate from 83.99% in 2016 to 90% and reduce the maritime accident rate by 30% by 2022.

To this end, intelligent CCTV, AI-based crime analytics and autonomous patrol and tracking systems enabled by drone are to be promoted and evaluated in crime-prone areas.

Finally, in the ‘Defense’ sector, intelligent border surveillance is to be further disseminated and an AI-based intelligent command system will be introduced aiming to increase the unmanned surveillance rate by 25% by 2025, to cope with the expected reduction of troop resources.

For securing ‘Technical Competitiveness’, 2.2 trillion won will be invested in the R&D sector of intelligent technologies, while researcher-oriented R&D will be fostered to promote and gather creative and challenging researches.

To create ‘Industrial Ecosystems’, the government plans to introduce 5G for the first time in the world (By March 2019), foster big data centers in each core industry, introduce regulation sandboxes (2018~), redesign the regulatory system to propel innovation-friendly sectoral regulations, raise an innovation venture fund worth 10 trillion won and relax the eligibility criteria regarding government purchase (From 12% in 2016 to 15% by 2022) in industry 4.0.

Especially, sectoral big data centers and public big data centers will be set up for 10 major industries including finance and transportation to establish private/public sector data and thus to enhance the data basis, a necessary resource in the era of the industry 4.0. In order to make the data public for AI training and to foster the utilization of de-identified personal information, specific strategies will be developed by reflecting public opinion and will be prepared by the end of this year

This is seen as a policy that will establish concrete measures within this year without putting off pending, controversial issues pertaining to the de-identification of personal information to next year.

Finally, to cope with ‘Social Changes’, the government will nurture 4,600,000 experts in intelligence technology, while promoting versatility in professions and stabilizing job safety by, for instance, expanding employment insurance.

In particular, as threats posed by intelligent hacking increase, the government plans to enhance the cyber safety network by 2018 by, for instance, establishing cyber-threat big data centers and to establish the ethics charter on AI technology to prevent adverse effects and malfunctions of AI.

The comprehensive plan will be implemented as a package to support the linking of ‘technology, data, infra, promote diffusion and institutional improvement in order to go beyond the conventional support initiatives that merely foster technologies and focus on industrial support. The government will serve as a facilitator to improve the market environment and thus maximize the innovation capability of the private sector, while leading investment from the private sector through preemptive adoption in the public sector.

In addition, the government has developed a policy brand called ‘I-Korea 4.0’ to increase public accessibility to the relevant policies. I-Korea 4.0 is regarded as a policy befitting a new generation that carries on the legacy of the previous governments’ successful policies such as e-Korea (2002) and u-Korea (2006).

The word ‘I’ means Intelligence, Innovation, Inclusiveness and Interaction, and ‘4.0’ means that to cope with industry 4.0, the 4 I’s and 4 strategies.

Meanwhile, with regard to the sectoral key tasks, the task-specific strategies will be formulated by the ministries in charge and given shape through a series of public hearings and discussions led by Presidential Committee on The fourth industrial revolution and deliberations conducted by the Innovation Committee, Special Committee and the Whole Committee.

Click here for more blogs by PR Experts.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Cyber security threats to Australian businesses: the top 3

8 November, 2017 By Elaine Banoub

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row” background_position=”top_left” background_repeat=”repeat” background_size=”initial”][et_pb_column type=”4_4″][et_pb_text background_layout=”light” _builder_version=”3.0.85″]

Icyber securityn the era of the internet, protecting an organisation’s information has become just as
important as setting up business capital. Information is considered the lifeblood of a successful and profitable business. Throughout Australia, organisations are constantly adopting innovative cyber security and privacy safeguards to manage threats and achieve competitive advantages. With the increasing volume of data being produced and stored, SMBs and large corporations are now prioritising the adoption of security policies around how their information is stored and secured.

By Elaine Banoub, Primary Communication

Developing proper policies minimises risks and prevents incidents. With this in mind, we’ve identified three of the current biggest cyber security risks for Australian businesses.

1. Security is a moving target with the adoption of IoT
Cyber security breaches are likely to increase as connected devices proliferate the market. Gartner forecasts that 8.4 billion internet-connected devices will be in use worldwide in 2017, up 31 per cent from 2016, and will reach 20.4 billion by 2020.

Each of these devices presents a potential cyber security loophole in a wider IT infrastructure. Given their increasing reliance on internal computers and internet connectivity, everyday devices like factory equipment, mobile phones, cars, air conditioning and hearing aids could find themselves increasingly at risk of cyberattack.

This risk is particularly concerning for healthcare. Worries have been raised around the possibility of people having personal medical devices (such as pacemakers) hacked, particularly as they begin to feature more online integration.

It’s apparent that there needs to be an increased level of investment in IoT security as soon as possible. IT managers need to be taking stock of IoT devices in the office, and looking to minimise risk through any means possible.

2. Ransomware will continue as a growing threat
Ransomware is a surprisingly old technology, dating back to the late 1980s. But it’s only recently that the public have become widely aware of the threat it can pose to businesses and personal users alike. This year’s WannaCry ransomware strain affected hundreds of thousands of computers the world over, making huge headlines in the process.

While Australia was only minimally affected by the WannaCry strain, around a month later a different strain called “Petya” hit our shores. This was significantly more disruptive; unlike most ransomware, which typically relies on people inadvertently running malicious software, Petya was able to run legitimate IT administration tools, grabbing key passwords and data for system access in the process.

Three Cadbury factories and law firm DLA Piper had their operations knocked out as a result of the attack; although 11 successful attacks were initially reported, it’s quite possible that there were more successful attacks which went unreported for fear of reputational damage.

Ultimately, both WannaCry and Petya shone worrying spotlights on how easily system vulnerabilities can be exploited by those with malicious intent.

Ransomware attacks don’t necessarily steal data – but may irretrievably encrypt it, and render it useless in the process. Having key data wiped out can have dire consequences for any firm, potentially even leading to the end of the business. It could also lead to substantial reputational damage, undermining client trust.

The effects of ransomware are often compounded by lax or irregular back-up and updating procedures; losing some work during a ransomware attack is near-inevitable, but many businesses are not taking the necessary steps to secure their data for rapid restoration. Sometimes, the most obvious ways to prevent and recover from cyber security breaches are also the most overlooked. It cannot be assumed that everyone on staff is an IT expert, or even familiar with basic IT precepts. Staff need to be effectively educated on the importance of basic security techniques, such as passwords, not opening dubious emails or downloading from questionable sites. Additionally, regular updates and/or training sessions should be held when new threats are identified – this will help keep staff up-to-date and prevent issues arising.

An important facet of this is also regularly downloading updates for your software; these updates help plug cyber security gaps and exploits in your software. Part of the reason WannaCry was able to spread so readily earlier this year was because people simply weren’t updating their computers, and the ransomware was able to exploit a gap found in older versions of common programs.

3. Bring your own device (BYOD) is an issue that needs to be controlled
Bring your own device (BYOD) policies are rapidly increasing in popularity across a number of industries. This certainly has its pros and cons; With BYOD businesses can keep hardware costs down, while enabling staff to work more efficiently as they utilise devices they’re already familiar with, rather than having to work with office-mandated pre-sets. However, BYOD also contains an element of risk for cyber security. With devices also being used for personal purposes, it’s possible that the office network could accidentally become infected by outside threats as a result of staff carelessness. Disgruntled staff could potentially exploit their access to company data for nefarious purposes. Additionally, the risk of losing valuable information can be increased, as people are not necessarily always connected to a central server while working.

With that said, BYOD is very effective for some workplaces, and there are numerous ways to manage the risk; some companies utilise specific apps or web-based programs. This helps maintain the positive attributes of BYOD while also allowing a relatively closed system. Importantly, data can still be centrally controlled. Access to information can be adjusted in real time, in the event staff are abruptly terminated, or decide to move on to a new role.

Importantly, if a cyber security breach does occur, it will be much easier to determine the source.

Click here for more PR Blogs.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Common Mistakes US companies make in Launching their Cyber Security Company in Europe

23 August, 2017 By Dianne Canham

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”4_4″][et_pb_text background_layout=”light” text_orientation=”left” border_style=”solid” _builder_version=”3.0.69″]

cyber security companyWatch any rerun of the Eurovision Song Contest to appreciate the diversity of Europe. That’s why the task of launching a cyber security company into Europe is no easy exercise. The opportunities for cyber security companies are vast: particularly as the deadline for the EU General Data Protection Regulations looms closer; yet for every company that succeeds there are many that fail.

By Dianne Canham, éclat marketing

Ahead of our free webinar on this topic, presented by cybersecurity channel and PR experts on Thursday 24th August, here’s where a lot of companies go wrong:

· Viewing Europe as a single market

Europe is a hugely diverse area of 743 million people and a linguistic, economic, cultural and political region of massive contrasts. The first question you should ask yourself is where you want to focus your effort to get the best ROI. Careful research into the market is vital to understand any technical or regulatory challenges, as well as the market opportunity and challenges associated with the different regions. For a cyber security company, it’s usually best to start in one or two markets and establish a presence there rather than spreading your resources too widely.

· Assuming you can do it remotely

Whether you’re talking about recruiting the best channel partner or building a thought leadership position for your spokespeople, it isn’t possible to do this from the US. You will need local people on the ground who have the relationships and local knowledge to make things happen. A cyber security company seeking to become a successful brand in Europe must commit resource into the region. Attempting to do this with a team based in the US in a different time zone, without the local knowledge or local language capability is frankly ludicrous.

· Wrong timing

For many organisations knowing when to invest in Europe can be extremely difficult. Starting to build a profile and generating sales opportunities amongst

European CISOs and security professionals without having a channel or local sales resource to handle them will be counterproductive. Conversely, leaving it too late or assuming your channel partners will build your brand for your cyber security company is an equally naïve approach.

· Choosing the right people and support to launch your European operation

Getting the right local team in place is critical and ensuring that team has the local support needed to make an impact in the intensely competitive European market will usually be the difference between success and failure. Setting up a solitary sales person and seeing if they can sink or swim to test the market will usually result in failure. So, putting together a launch plan that includes the right level of investment in terms of brand building and local technical support is absolutely vital to success.

So, we’ve told you how not to do it. If you want to find out a better approach to launching your cyber security company in Europe, then join our webinar on August 24th at 9.00 PST/ Noon ET by registering here.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

Stand Out From the Crowd – Building Your Brand in the Middle East

9 May, 2017 By Louay Al-Samarrai

[et_pb_section bb_built=”1″ admin_label=”section”][et_pb_row admin_label=”row”][et_pb_column type=”4_4″][et_pb_text admin_label=”Text” background_layout=”light” text_orientation=”left” use_border_color=”off” border_color=”#ffffff” border_style=”solid”]

middle eastAccording to 2016 research by PwC, 85% of businesses in the Middle East reported they were victims of attacks with 18% saying they experienced more than 5000 attacks. As a consequence, security is close to the top, if not at the top of every CIOs priority list. However, with close to 300 IT security providers—including vendors, distributors, resellers and system integrators—in the Middle East, many offering over-lapping solutions and most claiming to be ‘best-in-class’, gaining a customers’ trust (and business) takes more than just having the right technology. While you may well have the industry’s leading solution, the technological edge alone may not be enough to set you apart from the crowd in this highly competitive market. Enter Public Relations!

By: Vernon Saldanha, Director at Procre8

A well-executed PR campaign can help you gain a competitive advantage—build the profile of your organization with your target audience, carve out a niche as an industry thought leader and firmly establish your organization as a leading IT security solution provider in the region. In parallel to building the organizations’ brand awareness, raising the profile and visibility of your regional executives, gives them a much-needed foot in the door, leading to easier introductory pitches and engagements with prospective customers.

With its many nuances and idiosyncrasies, the Middle East is indeed a peculiar market. In line with its geographic position, its culture too lies somewhere between the East and the West. With the need to play catch-up, there is a strong desire to adopt the very latest and greatest technologies. Yet, the region faces an acute shortage of technical resources and appealing stories aren’t those that focus heavily on outlining technical advancements and innovation, but rather those that accurately demonstrate the business benefits of a solution. With this in mind, let’s now dive into the four critical success factors when crafting a successful PR campaign in the Middle East.

Think Global, Act Local
Far too often, businesses tend to overlook the fact that the Middle East[1] is very different from many of the other western markets that they operate in. As such, yes, content is King, but I would take it a step further and highlight that localized content is king.

Take a corporate release announcing the launch of a new security solution, for example. Distributed in region, as is, without any edits, will result in almost no coverage. A piece that talks about the Middle East in general, might see good pick up in the UAE but in all likelihood, won’t get picked up by press in Saudi. So, if you really want to see good coverage in Saudi or Bahrain or one of the other markets for that matter, you will need to localize the piece not just for the Middle East but more specifically for the target market. A good rule of thumb is to ask yourself “How is this news/product launch/etc relevant for (enter specific Middle East country here)”!

One of the best ways to ensure the content is country relevant is by conducting surveys. While a lot of security companies do surveys, very rarely do they analyse the Middle East market specifically. Yes, getting data in the Middle East is hard but if you really want to have an impact, you need to find a way to get good local data, for each country you are focusing on. The flip side is that once you have the data, it serves as a platform for several PR campaigns. You can curate press releases, use the data as a hook for interviews, weave the results into thought leadership pieces, condense sections into blogs, create compelling social posts and so on.

Hosting local events in the region is another option. Again, most vendors have global events but there is definitely a need for more local events, roadshows, CEO round table, and expert days. If budget constraints are a challenge, you could opt to participate in an industry event hosted by the large regional publishing houses like CPI and ITP. This could not only act as a direct source for leads, but would go a long way in helping you build relationships with these publishing houses (more on that later).

What are you Tech-ing about?
You have all heard the saying, if a tree falls in the woods, does anyone hear it. Let me extrapolate that for the purposes of our discussion. If all we do is talk about ourselves—how our technology is best in class, how our solutions have these cool features, we, we, we (you get the idea!)—does anyone care? I would submit to you that the answer to that is no, particularly when you consider that there are over 300 security players in region all claiming the exact same thing!

Customers and particularly the media, are not so technically inclined, something that is reflected in the magazines. In fact, I can’t think of a single magazine that is solely technical. Editors and readers alike are more interested in business outcomes. How is a specific security technology going to help businesses improve their security posture?

To that end, there are three areas I would suggest you focus on from a PR perspective:

  • Thought leadership articles: These are vendor neutral, 800-1000 word pieces that talk about industry trends and the business impact of security technology
  • Case studies: I know it’s hard to get customers to talk about the security solutions they’ve deployed, but there is simply no better vehicle to build credibility (not to mention provide sales with a nice sales tool) than a good customer success story
  • Rapid responses: Not many regional executives are prompt or feel comfortable enough to comment on security developments as and when they happen. So with a little initiative and some guidelines around what you would/wouldn’t want to comment on, you can easily position your spokesperson as the defacto industry expert

Look Who’s Talking!
In addition to having good content, it is vital to have a good local spokesperson. I acknowledge that having a local spokesperson in place can be tough, especially for new entrants, but their value is undeniable. With the right media training, a regional spokesperson can help add the necessary local ‘flavour’ to your communications and help distill corporate communications such as product road maps and corporate strategy.

Also, the Middle East is all about relationships. A spokesperson that is affable can build a good rapport with journalists and get you a ton of mileage! It’s worth noting that while Arabic speaking capabilities aren’t essential, there are times, such as around GITEX, when the broader pool of Arabic media turn their attention to the regional technology industry. Securing interviews with these journalists will require a qualified Arabic spokesperson.

Taking it to Market(ing)
If you have strong regional content, speak business more than tech and have a good spokesperson to re-enforce the message, you’re already doing better than most of your peers and I can guarantee that you will see great results from your PR campaign. But (there always is a but, isn’t there!!) I would be remiss and quite honestly, a lousy PR professional, if I didn’t mention that marketing and PR are like two sides of the coin and the success of PR does depend, to an extent, on marketing and specifically the marketing spend with regional publishing houses.

There isn’t a way to sugar coat it but it really is an unspoken rule that you do need to support the magazines and publishing houses. I say support rather than advertise with because the good news is that you can be creative about how you go about spending the money. You don’t just need to take out a full page ad like most folks did a few years ago. You could choose to spend on digital – an EDM for example, or sponsor an event, or even participate in a CIO roundtable. There are a myriad of options, but the message I am trying to get across is that if you are thinking about investing in PR and are running the numbers, please make sure to build these marketing costs in to any calculation before kicking-off a PR campaign.

With these building blocks in place, you will no doubt be on the path to PR success! Just one last thought – while you can do a two to three month PR campaign around a product launch or an event such as GISEC or GITEX, if you really want to see results from PR, you need to make a long term commitment. Even if you have small budgets, work with the agency to craft a plan that will stretch the budget and ensure that you have a share of voice month over month rather than just a flash in the pan!

[1] For purposes of this blog, when I refer to the ‘Middle East’, I am talking about the – Bahrain, Oman, Qatar, Saudi Arabia and the UAE.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to Next Page »

© 2021 · Code Red Security PR Network