Almost Half of U.S. Declared Drought Disaster Area: Small Business Loans Available

This summer, the U.S. has faced its worst drought in over 50 years. Farmers and other small businesses that depend  on the weather, are facing financial hardships because of it.

The U.S. Department of Agriculture (USDA) declared drought disaster areas in nearly half of the nation's counties last week (see July 23, 2012 USDA map below).

drought disaster map - U.S.

This means that agriculture businesses and other drought-affected businesses in those 1,430 counties, which reach across 32 states, can apply for financial assistance from either the USDA or the U.S. Small Business Administration, depending on the type of business:

Agricultural businesses â€" The USDA's declaration makes low interest loans available to farmers and ranchers in drought-affected areas.

Non-agricultural businesses â€" The SBA announced that it will offer financial assistance in the form of disaster loans to certain businesses that need help because of the lack of rainfall. The SBA announcement noted that it's not always obvious which businesses are eligible for assistance:

Counted among the eligible are businesses that provide seed for crops and feed for livestock, nurseries, small businesses engaged in aquaculture, and most private, nonprofit organizations of any size.   While those involved in food-producing businesses obviously are hurt financially by the lack of rainfall, some effects are less obvious. For example, serious drought also decreases water levels in lakes, which means recreational boating businesses lose money because people aren't renting houseboats or jet skis.

Through the SBA's disaster assistance program, affected small businesses and private non-profits are eligible to apply for up to $2 million in SBA Economic Injury Disaster Loans, which are working capital loans to help cover operating expenses such as rent and monthly overhead that would have been paid if the drought had not occurred.

The SBA loans include 4% interest for businesses and 3% interest for non-profits, with terms up to 30  years.

In addition, USDA Secretary Vilsack announced taking other steps to assist farmers and ranchers, including opening up conservation areas for haying and grazing by livestock.

Small businesses can visit the USDA's drought assistance section of its website to see maps showing which counties have been declared disasters.  Or contact SBA's disaster assistance Customer Service Center at (800) 659-2955 or email disastercustomerservice@sba.gov to find out if their county has been declared a drought disaster area.

Companies that fit the requirements for disaster loans can apply for assistance using SBA's Electronic Loan Application.

 




Telecom jackpot: How privatisation made fortunes

For Alan Gibbs and friends, the 1990 Telecom privatisation was the deal of a lifetime. A new book* out today tells how fortunes were made, reports Chris Barton.

"And there it was: the greatest coup of my business career, the chance to make serious money," crows Alan Gibbs as he pulls off the sale of the century, taking state-owned enterprise Telecom off the government's hands in 1990. Three years later he and business partner Trevor Farmer get their big payday when they stump up about $200 million for 112 million Telecom shares. They immediately sell 67.5 million shares for $256 million, making a cool $56 million profit. Plus, having bought at $1.81 and sold at $3.80 per share, the balance of their shares is worth about $170 million. An asset sale deal close to heaven.

It's all gleefully recounted in Serious Fun: The Life and Times of Alan Gibbs, in which author Paul Goldsmith casts Gibbs as the deal broker extraordinaire. Gibbs celebrates the $4.25 billion sale of Telecom to a consortium made up of US companies Bell Atlantic and Ameritech, merchant bankers Michael Fay and David Richwhite, plus Gibbs and Farmer, by taking his new boat, Laissez Faire, on its maiden voyage circumnavigating New Zealand.

The "powerful beast", which can cruise at 30 knots, leaves Auckland at 2pm on a Thursday and enters Wellington Harbour at 5pm Friday, flying the skull and crossbones.

Gibbs can't resist firing a triumphant shot (a blank) from the brass cannon he had mounted on the bow.

Serious money, serious fun, with guns, fast boats, tanks, art and absolute faith in the free market to guide him along the way. Gibbs is so enamoured of Austrian neoliberal economist Friedrich Hayek that he has HAYEK as his personalised number plate. "He was a horseman of the Apocalypse, but a cultured one," writes Goldsmith. "Minimalism appealed to him, both in art and when it came to the role of the state. At the same time, it was Gibbs' habit to turn up at fancy dress parties dressed as a cowboy, gleefully twirling his six-shooter."

Goldsmith doesn't tell us exactly how much Gibbs and Farmer made out of their remaining Telecom shares, but we can guess. Gibbs was confident the share price would go up, so unlike his partners in the 10 per cent stake - Fay and Richwhite, who sold relatively early in the game and walked away with $274 million - Gibbs and Farmer waited it out. Like predators poised for the kill.

"Predators seek to incur the least possible risk while hunting," writes Goldsmith, comparing the law of the jungle with the behaviour of successful, risk-averse businessmen. On a 1987 trip to Zimbabwe and Kenya, Gibbs found the great African plains a revelation. He was fascinated by the way gazelle accommodated to living in constant peril. "The competition for survival in nature was absolute and unsentimental: the strong survived; the weak were eaten." Goldsmith extends the metaphor to the New Zealand business ecosystem of the 70s - predator-free, with the natural process disrupted by government regulation and protection, allowing "plenty of fundamentally unsound businesses to limp along." Until, according to Goldsmith, Gibbs restored the balance. "Gibbs had emerged since 1979 as one of the larger local predators, at a time when old protections were starting to lose their power."

In truth, Gibbs could confidently wait for Telecom's shares to rise because he had already done considerable culling. In 1991 there was talk that Ameritech and Bell Atlantic, which paid $4.25 billion for 100 per cent of Telecom, but were required to reduce their combined holding to 49.9 per cent in three years, had paid far too much. The initial float didn't go well - getting just $2 a share for the first tranche. "The idea we couldn't get more than peanuts above what we'd paid the government was pathetic," says Gibbs.

To make matters worse, Clear Communications had entered the market and was eating Telecom's lunch - making inroads into its lucrative toll call business.

Telecom's chief executive at the time was Peter Troughton, who had reduced staff numbers from 23,000 in 1988 to 12,500. Gibbs, who as chief executive of Forestry Corporation in 1986 had chainsawed staff numbers from 7070 to 2770, wanted Telecom staff cut to 6500. Troughton resigned somewhat abruptly in February 1992, shortly after proposing an advertising campaign to deal with Clear. The way Gibbs tells it, the campaign featured "a big Goliath figure" grunting as he climbed a hill with a huge rock called Clear on his shoulders. "I said you must be crazy; the country would laugh itself stupid to think that Telecom is a poor giant carrying a terrible burden."

Gibbs, who was on the Telecom board, was worried enough about the company's stagnant share price to confront top Ameritech and Bell Atlantic executives with his concerns. The message delivered with Richwhite and former treasury official Rob Cameron was typically blunt: "You're an embarrassment to yourselves and the world; you're going to lose your shirt which is ridiculous because this company is worth megabucks." It wasn't long before Gibbs' restructuring plan was in place, including "some financial engineering to gear the business up a little" - returning $400 million of capital to shareholders. In 1993 Telecom announced staff numbers would be reduced to 7500 over four years - a thousand short of Gibbs' target, but still enough to push the share price past $3.

Responding to critics about the staff cuts, Gibbs gave his usual free market justification. "It's not me that's tough on Telecom, it's the consumers; they want and demand cheap calls. If we hope to remain a profitable business we have to give them what they want." But what Gibbs really wanted was a high share price. Which he duly got.

In 1995 Telecom's after-tax profit passed $600 million - helped by an advertising campaign featuring 'Spot' the Jack Russell terrier. As Goldsmith notes, toll calls were still incredibly lucrative since there was virtually no additional cost for calls once the infrastructure was in place. "With cheap calling weekends, they gained two dollars in revenue for every dollar they gave away on price."

Telecom's toll call competitor Clear was bogged down in court battles to establish rights to interconnect with Telecom's network to allow it to properly compete in a market heavily tilted in favour of the incumbent. The imbalance was a situation Gibbs wanted to last as long as possible - so he wasn't backward in telling National Party ministers that, since the state had just taken $4.25 billion for the business, any change to the light-handed regulatory regime would be "tantamount to theft."

Nineteen ninety five was also the year Telecom's share price broke the $6 mark. That's when Gibbs started to sell his remaining shares - exiting in early 1997 and getting $7.40 a share for his last significant parcel. In other words, a gain of well over $300 million for Gibbs and Farmer. Gibbs' timing wasn't quite as good as Ameritech and Bell Atlantic, which exited in 1998 at $8.85 a share. But for sheer chutzpah and bulldozer will, Gibbs' greatest coup is hard to beat.

Especially when you learn that Gibbs and friends also got a merchant banking fee of $52 million and had engineered the deal so there was virtually no risk.

The sticking point in the negotiations with the American partners had been how Gibbs and his friends were to get a slice of the action. The breakthrough came when the New Zealand gang of four agreed to buy 10 per cent of the shares at the purchase price - with $20 million paid on settlement day and the remainder, which turned out to be around $400 million, three years later.

As Gibbs describes it in Serious Fun, it was a dream deal: "We'd own the shares, but didn't have to pay for three years; we'd put down $20 million, but that would represent only part of our merchant banking fee; we'd have to pay interest, but dividends would probably cover that, and unless something went badly wrong, in three years time the shares would be worth a hell of a lot more than the original purchase price."

There was, of course, a chance things could go wrong. Despite Gibbs' best efforts to ensure otherwise, the share price might go down during the three years of deferred payment. Gibbs had that covered too. Freightways (Gibbs and Farmer) and Midavia Holdings (Fay and Richwhite) would buy their shares through Carla Nominees, a company with only $100,000 capital - and the four would give no personal guarantees. Gibbs also secured the $20 million down payment against the shares. Bizarrely, Bell Atlantic and Ameritech's lawyers forgot to do the same for the balance - the $400 million. In effect the deal was an option and the only risk for the gang of four was Carla's $100,000 capital.

That was the way Gibbs liked his deals - low risk, with little of his own money up front, and with a slice of the action assuring maximum returns. Investment analyst and Herald columnist Brian Gaynor worked briefly for Gibbs in 1987, managing his portfolio - a period he describes as the most boring of his career because of Gibbs' extreme conservatism. At the time, as well as his investments in Freightways and Ceramco, Gibbs' portfolio comprised a $100 million cash pile and just $1.2 million in shares which he worried about incessantly. His goal was to never be in a position where he couldn't write a cheque for $20 million which could be cashed the next day.

While it's difficult not to see Serious Fun's retelling of the Telecom deal as serious avarice, Gibbs insists that's not what drives him. In a public stoush with Jim Anderton in 1993 he explained that greed - the insatiable desire for something - was quite different to "the pursuit of one's own long-run self interest". Invoking libertarian free market ideology, Gibbs says the key to running a successful business is to provide the things people want. "That's how I do my bit for my fellow man. I don't pretend to do my bit out of the goodness of my heart. That would insult people's intelligence. I do my bit out of my own self-interest."

Insulting people's intelligence or not, Gibbs via Goldsmith devotes some effort to justifying the greater good of the Telecom sale - irked in particular by some Gaynor columns in the Herald arguing the government sold Telecom cheaply and should not have sold the entire company. In 1999 Gaynor pointed out that since privatisation Telecom had paid $5.5 billion in dividends and its total value had risen from $4.25 billion to $16.6 billion. "More than 80 per cent of this $12.3 billion increase in value has gone to overseas investors," wrote Gaynor. "The New Zealand government has allowed a small group of investors, mainly offshore, to make enormous profits. With just a little foresight these profits could have been kept for the benefit of domestic investors and taxpayers."

Goldsmith counters by pointing out that many of the gains came from vigorous cost cutting and restructuring "driven by determined men such as Gibbs and Roderick Deane," Telecom's chief executive from 1992 until 1999. "The profits that investors enjoyed had to be grasped; they didn't fall naturally like ripe peaches from a tree."

Gaynor later pointed out that the Ameritech/Bell Atlantic, Fay/Richwhite, Gibbs/Farmer syndicate had indeed grasped profits - walking away with a realised capital profit of $7.2 billion, and more than half of Telecom's $4.2 billion in dividends from 1991 to 1998.

More importantly, Gaynor shows during the syndicate's stewardship, the key policy of extracting funds through capital repayments and high dividends weakened Telecom's balance sheet. In 1990, before the privatisation, shareholder funds were $2.5 billion, representing 58.7 per cent of total assets, and total borrowings were only $1.2 billion. By March 1998 shareholder funds had dwindled to $1.1 billion, representing 20.7 per cent of total assets, and borrowings were $2 billion.

Gaynor's columns also noted that Telecom's capital expenditure during the mid-1990s was relatively low. "In the six years ended March 1998, dividend payments exceeded capital expenditure by $3.8 billion to $3.3 billion," he wrote. "These are extraordinary figures for a company that is supposed to be at the cutting edge of new technological developments."

Goldsmith takes a different view, citing total profit of $4.9 billion, dividends of $5.19 billion and capital investment of $5.13 billion over the nine years (1991-99) Gibbs was involved with Telecom. "No other New Zealand company reinvested on anything like that scale or [had] as high a percentage of profitability through the 90s." As a result, he says, New Zealand developed "one of the most advanced networks in the world." He cites a series of indicators to show how much telecommunications improved since privatisation. "By any measure, Telecom had been a highly successful company during the 1990s following its privatisation."

Not surprisingly, there is no mention of Clear Communications' bitter court battles with Telecom over interconnection agreements. Nor the Herald story in 2007 when ex-wife Jenny Gibbs found she couldn't get broadband to her mansion-cum-art gallery on Auckland's exclusive Paritai Drive. Nor that Telecom largely maintained its monoply status throughout the 90s. Goldsmith claims the company lost a lot of value in recent years for a host of reasons - "not the least of which was government intervention in the third term of Helen Clark's Labour government." No mention that shareholder value had been transferred to consumers' benefit. Or that competition had begun to operate as it should in a properly functioning free market.

Serious Fun's half-hearted rebuttal of Gaynor's criticisms is surprising - the book's only chink in its laissez faire ideological armour. But beneath the libertarian propaganda there is a more honest appraisal of recent history - how Gibbs' time at Forestry Corporation gave him an insider's view of state-owned enterprises, of how to unlock their hidden value and realise the super profits that "only occurred at times of discontinuity."

Gibbs spotted his opportunity early in 1990 when he did his hallmark one-page analysis of what Telecom might be worth. "It was a lovely, fat company, with huge margins and a lazy balance sheet. It was obvious if you could keep the margins it would be a fantastic business." Like an alpha predator, he went for the throat.

Timeline

* 1987: Telecom split off from NZ Post Office as a state-owned enterprise

* 1990: Sold to US companies Bell Atlantic and Ameritech for $4.25 billion. The buyers agree to cut their shareholding to 49.9 per cent over three years and sell shares to the public. Fay, Richwhite and Freightways (Gibbs/Farmer) to buy 5 per cent each within three years

* 1991: 30.9 per cent of Telecom shares sold in share float

* 1993: Freightways and Fay, Richwhite lift their Telecom stake to 5 per cent each, paying $1.81 a share. Gibbs and Farmer sell part of their holding, making immediate $56m gain

* 1997: Gibbs sells last signicant Telecom stake at $7.40 a share

* Serious Fun: The Life and Times of Alan Gibbs by Paul Goldsmith (Random House NZ, $45). Out today.

By Chris Barton | Email Chris

Tech Thursday (8/2): Survey Reveals Which Cloud Apps Are Winning Over SMB\'s; Revamped GrouponWorks.com for Merchants; Panasonic Launches Compact and Fast Document Scanner

Survey: Consumerization of IT Drives Adoption of Cloud-Based Business Applications


Groupon Debuts Revamped GrouponWorks.com for Merchants

 

Panasonic Launches Compact and Fast Document Scanner

 

 

Survey: Consumerization of IT Drives Adoption of Cloud-Based Business Applications

 

Employee productivity gains motivate small and mid-sized businesses to accelerate adoption of cloud-based applications despite IT concerns 

 

AUSTIN, Texas â€"  Spiceworksâ„¢, Inc., the world's largest social network for IT professionals, today announced the results of a new study sponsored by EMC highlighting the use of cloud-based file-sharing, e-mail and productivity applications by small and mid-sized businesses (SMBs). Responses underscore how the consumerization of IT is manifesting itself in the daily lives of SMBs and the new challenges IT departments are forced to address as the line between personal and professional technologies blurs. The report, “The Spiceworks Cloud Barometer,” is available for download here [link to be added in final version]

The results reveal the ongoing struggle between IT departments and the users they support. For example, cloud-based file sharing services, such as Dropbox, Box, and others, are easy to use and employee-friendly. However, IT departments remain concerned about the security, compliance and reliability challenges these services can present.

Survey highlights include:

Despite IT concerns, employee demands drive widespread cloud-based file sharing deployments within SMB environments.

  • Thirty-three percent of the IT professionals surveyed say employees are using file-sharing services at the office on their own with most selecting Dropbox (87 percent). However, vendor preference isn't as clear for the 28 percent of respondents who have or plan to approve a file-sharing vendor in the next six months. While Dropbox still leads with 28 percent, 10 percent prefer Box and, due to the large number of cloud services available, the majority of respondents (37 percent) would select a different solution altogether.
  • North American SMBs are more likely to have an IT-approved vendor for file sharing than their peers in EMEA, 25 percent versus 12 percent respectively.
  • More than 75 percent of respondents highlighted data accessibility as the primary advantage of file-sharing services. However, 73 percent also cited a lack of control and security issues as their single biggest concern.

On-premise e-mail solutions continue to be preferred by SMBs, but hosted e-mail is gaining ground.

  • Fifty-two percent of those surveyed have deployed an on-premise e-mail solution, while 42 percent have chosen a hosted environment. An additional six percent plan to migrate to hosted e-mail within the next six months.
  • Microsoft dominates the on-premise e-mail market, but Google holds a commanding lead among cloud-based providers. According to the survey, 34 percent of those with a hosted environment are using Google, while 16 percent have selected Microsoft Office 365. Fifty percent of respondents have selected another hosted option, which includes hosted instances of Microsoft Exchange.

Cloud-based productivity suites offer end-user and IT benefits but SMBs have been slow to adopt.

  • Thirty-five percent of survey participants are currently using or plan to use a cloud-based productivity suite for word processing, spreadsheets and other tasks. However, 64 percent are not currently using nor plan to use a cloud-based offering.
  • For those that have deployed or are planning to deploy a cloud-based productivity suite, Google Apps (48 percent) and Microsoft Office 365 (43 percent) are the clear favorites.
  • North American companies are more likely to adopt cloud-based productivity suites, with 38 percent currently using or planning to adopt in the future, versus 30 percent of respondents in EMEA.

“The two million IT professionals in Spiceworks are managing the transition to cloud computing each day,” said Adam Weinroth, executive director of Vendor Marketing at Spiceworks. “Many of the complex technologies once reserved for IT departments have been simplified, so today's tech-savvy employee can install their own cloud-based applications in minutes. This wave of consumerization is forcing IT departments and technology vendors to rethink the way they design, build and implement technology solutions.”

 

Groupon Debuts Revamped GrouponWorks.com for Merchants

 

 

CHICAGOâ€"(BUSINESS WIRE)â€"Today Groupon (http://www.groupon.com) (NASDAQ: GRPN) launched a new GrouponWorks.com (http://www.grouponworks.com), redesigned to better showcase merchant successes and Groupon's toolkit of marketing products and services to the thousands of businesses that visit the site every week.

The site features hundreds of case studies and video testimonials from merchants that have used Groupon as a marketing solution to help attract new customers and grow their businesses. The merchant stories are easily sortable by business type, topics of interest or geographic location in order to help users see relevant experiences applicable to them.

“When we were going through a very challenging time, Groupon was there for us,” said Carolyn Franks, owner of Zoomars Petting Zoo in San Juan Capistrano, Calif. “After running a deal with Groupon, we went from 200 visitors a week to more than 2,000. Groupon saved our zoo.” To see her story, visit http://www.grouponworks.com/case-studies/zoomars-petting-zoo.

The site also presents Groupon's comprehensive suite of marketing products and services that merchants can utilize to grow their businesses. These include: Groupon Featured Deals,Groupon Now!, real-time location based offers, Groupon Rewards, an easy-to-use rewards program and Groupon Scheduler, an online scheduling application for appointment-based businesses. In addition, the site highlights available merchant resources such as the Groupon Merchant Center, an innovative dashboard providing customer insights, feedback and performance measurement across Groupon campaigns.

“GrouponWorks.com ties together Groupon's entire suite of merchant products, services and resources and helps business owners select the tools that meet their needs,” said Sanjay Gupta, VP of Merchant Marketing, Groupon. “Best of all, visitors can listen to merchants-in their own words-share unique accounts of how working with Groupon had a positive impact on their businesses.”

 

 

Panasonic Launches Compact and Fast Document Scanner for Small and Medium-Sized Businesses

 

KV-S1046C Enables SMBs to Effectively Digitize Paper-Based Documents


Secaucus, NJ â€" Panasonic, a provider of document imaging and scanner solutions, introduced the KV-S1046C document scanner, ideal for small and medium-size office settings, including reception areas at healthcare facilities, banks and other businesses. The feature-rich device has a fast scanning speed of 45ppm*, and is capable of scanning documents of various sizes and thicknesses, helping reduce the number of devices needed to digitize data.

The KV-S1046C document scanner is designed to combine paper documents along with up to three hard embossed cards, such as a driver's license, in a single batch by using the mixed card batch guide. This practical and time-saving capability is useful in reception areas at small healthcare practices, at the point of patient check-in. The scanner also features a mode for scanning long papers, such as electrocardiograms.

“One of the biggest challenges for SMBs is document management and digitizing existing paper materials,” said Joseph Odore, product manager for document and imaging solutions at Panasonic. “With the introduction of the KV-S1046C document scanner, we are helping end-users provide fast, accurate customer service, while lowering the cost of handling documents and reducing the space needed to store them.”

Double-Feed Skip Function

The scanner is equipped with a highly reliable ultrasonic sensor that prevents double-feeding problems. When scanning stops due to documents, such as envelopes or sticky notes, that trigger the sensor, users can simply press the ‘Skip' key to resume scanning.

Image Capture Plus and Kofax® VirtualReScan® (VRS) Elite Software

The KV-S1046C document scanner comes standard with Panasonic's Image Capture Plus software, an application that transfers image data scanned by a Panasonic high-speed document scanner to a PC in the form of an image file. Using thumbnails, the intuitive software lets users edit scanned images, including switching and/or deleting pages. It also allows users to choose settings that facilitate complex scanning processes, and it serves as a powerful tool for efficiently processing routine business work, such as filing large amounts of paper found in tight office spaces.

In addition, Panasonic's KV-S1046C-V document scanner is certified with Kofax® VirtualReScan® (VRS) Elite software that automatically applies proper scan settings and cleans scanned images. This improves the accuracy of optical character recognition (OCR) and handwriting recognition (ICR) software, reduces file sizes and minimizes document preparation tasks and manual activities that can potentially cost organizations time and money.

Simplified Maintenance and Low Power Consumption

The clamshell design of the KV-S1046C scanner allows full access to the entire paper path for simplified paper jam resolution, scan glass cleaning and roller replacement.  This innovative design minimizes the need for technician support. The scanning section of the device uses LEDs for its light source to lower power consumption during the scanning process. In addition, in order to conserve energy, the power consumption is suppressed to a 1 Watt maximum during sleep mode. Finally, the power automatically turns off after a pre-selected duration of time to cut down on electricity use.

Pricing and Availability

The KV-S1046C high-speed document scanner is available immediately through authorized Panasonic resellers starting at $1,295 MSRP (KV-S1046C-V starts at $1,425 MSRP), and it comes with a Three-Year Advance Exchange Warranty. 

 



Indiegogo Offers Crowdfunding With Fewer Regulations

Crowd-sourced fundraising sites have taken off in recent years, helping individuals and startups raise money for new projects or ideas. But on many of these sites, users need to create a goal amount and a deadline, and also face an arbitrary application process to even be considered by investors.  In most cases, if the goal is not reached by the deadline, the user doesn't receive any of the money they raised.

Indiegogo

But now a new crowdfunding site, Indiegogo, offers a different type of crowdfunding platform where anyone can sign up, and users can keep all the money raised even if it doesn't match up with their original goal.

Indiegogo is an online tool that anyone can use to help fund almost any type of project. To set up a campaign, users need only to tell people about their project and what their money will go toward. They can also offer added perks to potential investors to help persuade them to help their cause.

Tech startup EnergyBuddy first started using Indiegogo because it needed a way to fund its first production order up-front. After the product, a gadget that helps families and businesses monitor energy use, was turned down by Kickstarter for unknown reasons, the company signed up with Indiegogo. CEO, Kevin Strong, says they've been very happy with the results:

“In terms of using Indiegogo versus other crowdfunding sites, the benefits are that there's no approval process required, and it's easy to get answers to questions from a real person!”

Indiegogo began in 2008 to help independent filmmakers fund their projects, and then it expanded and started serving all other industries in 2009.

Those interested in raising money through Indiegogo can sign up and begin a campaign immediately. All you need to start a crowdfunding campaign is a valid bank account. There is no fee or application process, though Indiegogo charges a percentage of your earnings once your campaign is completed.




6 Ways to Stand Out Using Your Differentiators

Where do you shop for most of your goods and services? No doubt you have several options.

stand out from the crowd

You can purchase goods from larger retailers, buy or consume food from chain stores and restaurants, or patronize local small businesses. Very often, you have the luxury of choosing any and all of these. Take, for example, the pet store market. Many towns now feature large national chains at one end of town and smaller, independently owned pet stores at the other.

With so much choice, commoditization and budget-driven buying behavior, how can this small business owner stand out? For many consumers, even in a budget-conscious economy, the answer lies in the customer experience.

Small businesses are in a unique position to create valuable customer experiences. Their products and services are often niche and business operations are agile and unconstrained by big business rules and processes. When was the last time you called a small business and got put through to an automated call center?

These seemingly small things come together to create a hugely competitive value proposition.

Here are some things you can do to focus your sales, marketing and operational efforts to create a unique customer experience and capitalize on your small business value:

1. Understand Your Differentiators

To deliver a unique and memorable customer experience, it is key to understand what differentiates you from your competition and to frame your marketing around these differentiators.  Even if you're selling a service in a highly competitive space, there is always something that should differentiate your business.

Take, for example, the saturated home painting business. How can you differentiate yourself from the other contractors in your community? Yes, price is important, but what else have you got to offer? Do you supervise all projects? Can you guarantee a start and finish date? Do you have customer testimonials that explain how you've gone above and beyond to help customers? Your value-add is starting to emerge â€" and this can differentiate you.

Talk to your employees â€" what are they hearing from customers about why they do business with you? Don't be afraid to solicit feedback from your customers too â€" if anyone knows what your differentiators are, it's your customers!

Freelancers and independent contractors can also use differentiators in this way â€" think about ways you can make yourself indispensable to your client's team and critical to their success.

Above all, be an advocate for your differentiators in  everything you do.

2. Be True to Your Values

Your core business values drive such things as your work ethic, your interaction with and commitment to your customers and employees, and, of course, your dedication to delivering fine products and services.

These values are important because they embody how you do business and what your customer comes to expect of you.

3. Be Your Own Brand Advocate

How you advocate on behalf of your business is a critical part of being a successful small business owner. Your brand isn't just your logo or store frontage, it represents how you fold your differentiators and values into everything you do â€" how you deliver your products and services, how you conduct operations, your relationships with suppliers, what community marketing efforts you take part in, etc. Don't ignore all these elements that come into play to create your customer experience.

4. Don't Forget Your Employees

It's not enough that you advocate for your business, it helps if your employees are equally invested and actively extending and reinforcing your brand message and core values. Every time anyone in your business communicates with a prospect or customer, it counts. Conduct regular training sessions, appoint a trainer or have new employees shadow you.

Set employee performance goals that align with your business objectives and values. For example, if one of your business differentiators is reliability and agility, think of goals that reward individuals who are always one step ahead of customer expectations or deliverables.

6. Evangelize!

Last but not least, be sure to roll all of the above into your marketing messages. Develop customer testimonials, craft succinct statements that explain not just who you are but why you're different and what customers can expect from you.

How are you creating a unique experience for your customers?

Stand Out From The Crowd Photo via Shutterstock




Politics helped kill cable

Any future move to provide another internet cable out of New Zealand will probably need a "significant proportion" of local funding to succeed, says Pacific Fibre co-founder Rod Drury.

Pacific Fibre planned to lay a 12,950km fibre cable between Auckland, Sydney and Los Angeles.

The project would have cost an estimated $400 million.

But on Wednesday, the company announced it had failed to raise enough capital to go ahead.

Drury said yesterday that during negotiations the company discovered a "whole lot of political stuff", including tensions between the United States and China over investment.

Security issues over Chinese involvement in telecommunications infrastructure made headlines this year when it was revealed the Australian Government had banned Huawei from tendering for its national broadband network.

Asked if the United States had security concerns over potential Chinese involvement in Pacific Fibre, Drury replied:

"What I will say is you start connecting cables and those are the sort of national concerns that all governments would have.

"But that's why it was important we had a significant portion of New Zealand funding into the project. If you can't get New Zealand funding you have to look offshore and then you start getting more into these sort of issues.

"It would have been much easier if we had the cable largely New Zealand funded ... but we didn't."

Drury said it was unlikely another private company would get a cable project like Pacific Fibre's off the ground.

While he was not advocating Government funding for the cable project, he had hoped other funding vehicles in New Zealand would have got on board.

"A frustrating thing about being in a small country is you can't get everyone together and make it work," he said.

One possible investor could have been the $19 billion New Zealand Superannuation Fund.

But a fund representative this week said it undertook extensive due diligence on Pacific Fibre, but was unable to "gain enough confidence" in the opportunity.

Although Chinese-backed company Axin flagged its intentions last year to build a 3000km cable between Australia and New Zealand, it has not since revealed any significant progress.

Pacific Fibre chairman Sam Morgan said on Wednesday there was "plenty of talk but very little walk" from other players who spoke about a cable project but his team were the only ones who "put their money where their mouth is".

By Hamish Fletcher | Email Hamish

Idea that grew like Wildfire

If Victoria Ransom had listened to her father, it's unlikely she would have founded a Silicon Valley software company thought to be worth hundreds of millions of dollars.

Tech giant Google announced this week it had bought Ransom's company Wildfire - a start-up that helps companies promote themselves on social media networks such as Facebook and Twitter - in a deal reported to be worth US$250 million ($309 million).

Born and raised in Scotts Ferry near Bulls, Victoria Ransom started Wildfire in 2008 with her partner, former professional snowboarder Alain Chuard.

The pair met at Macalester College in Minnesota over a decade ago and went on to work as investment bankers in New York.

After two years in finance, they started an adventure tourism company. When making software that would allow their company to run promotions on Facebook, Ransom and Chuard soon discovered that was a viable venture in itself, eventually launching it as the first Wildfire product.

Victoria's father, John Ransom, said yesterday he initially tried to dissuade his daughter from branching into software.

"We knew how busy they were ... when she [told us their plan] we said 'look, leave it alone, you've got enough on your minds without trying to build software as well'," he told the Herald.

But the pair stuck with the idea and four years later were bought by Google in what Ransom called a fairytale. "She's come from a very modest background ... it's a fairytale if you knew what Scotts Ferry was, a tiny settlement of about 40 households."

Ransom would love his daughter to return home to live but says she's likely to stay in California. "I think they're pretty comfortable where they are, they're bound to stay with Google for a time."

By Hamish Fletcher | Email Hamish

Congress should encourage bug fixes, reward secure systems

Any article on the law should include a disclaimer at the top: I am not a lawyer, a Congressman or a lobbyist, nor do I play one on the Internet. Take everything you read here with a largish block of salt. If you need legal advice, this is not it.

Software [In]securityThat said, when it comes to the law, computer security has always had a law enforcement aspect even as it consistently lags behind the technical cutting edge. Advancements in software design and the advent of geographically distributed systems and applications put the law even further behind than usual over the last five years or so. Sniffing packets and hacking protocols is so last decade! What about smart phone hacking, infrared snooping and online banking fraud?

The U.S. Congress has become more serious about looming cyber security risks and has recently pushed to fill the cyberlaw void with a series of bills. (For what it's worth, an analysis by Randy Sabett shows that Congress has been relatively active on cybersecurity since 2003, debating and rewriting but not passing any bills.) Reaction in the technical community to the latest batch of bills has been decidedly mixed. So, where do we stand and what can we expect?

A very brief history of U.S. computer law

The Comprehensive Crime Control Act of 1984 was the first body of law to include a section on cybercrime (Section 1030). It was rewritten in 1986, and computer law in the United States officially began with the Computer Fraud and Abuse Act of 1986 (CFAA, aka 18 U.S.C. Section 1030). The CFAA defines six types of computer crime, mostly centered on unauthorized access to a computer. Network security issues (especially remote access over a network to someone else's computer) make up a majority of the coverage.

The Electronic Communications Privacy Act (ECPA) also was introduced in 1986. It focuses on network attacks, including unauthorized network sniffing and other forms of data interception.

For more about the CFAA and ECPA, see Mark Rasch's excellent introduction to computer security law.

The network-centric focus of early statutes began to fray with the advent and growth of malicious code. The CFAA was amended in 1992 to address perpetrators of malicious code and denial-of-service attacks. Even with this amendment, however, computer security law to this day focuses an inordinate amount of attention on network security, ignoring many aspects of modern computer security (including software security and content protection).

The Digital Millennium Copyright Act (DMCA) was enacted in 1998 "to amend Title 17, United States Code, to implement the World Intellectual Property Organization Copyright Treaty and Performances and Phonograms Treaty, and for other purposes." Not surprisingly, the focus of the DMCA is copyright protection. It restricts production and distribution of technology that circumvents copyright protection mechanisms (including digital rights management, or DRM, systems). It also directly addresses copyright infringement on the Internet by laying out penalties. The DMCA and its European equivalent, the EU Copyright Directive, are not without controversy. Many people believe these laws go too far to uphold the rights of copyright holders, to the detriment of innovation and creativity. Computer security practitioners also worry about doing their jobs under the DMCA when it comes to security analysis and penetration testing.

To conclude my very brief legal history lesson, it's important to note that computer security law is evolving through case law that sets precedents. Precedent-setting can involve extending existing bodies of law, such as wire fraud law, to apply to computer security. If done incorrectly (for example, using the wrong analogy to existing law), it can sometimes do more harm than good.

Congress and the Senate make cyber sausage in 2012

In April 2012, the controversial Cyber Intelligence Sharing and Protection Act (CISPA) passed the U.S. House of Representatives (248 for, 168 against). The vote was bipartisan, though more Democrats voted against the legislation, and more Republicans voted for it.

The CISPA was problematic enough to cause seriously negative reactions in the privacy community, especially from the American Civil Liberties Union and the Electronic Frontier Foundation (EFF). Some opponents interpreted portions of the bill as allowing Internet service providers to turn over their network traffic to the government as part of an "information sharing" program. Critics likened this to wiretapping. The EFF circulated a petition signed by prominent security experts that stated, "We take security very seriously, but we fervently believe that strong computer and network security does not require Internet users to sacrifice their privacy and civil liberties." President Obama threatened to veto the bill if it passed the Senate unmodified.

Two competing bills were introduced in the Senate: Sen. John McCain's (R-Ariz.) Secure IT bill and Sen. Joe Lieberman's (I-Conn.) Cybersecurity and Internet Freedom Act. Debate and markup proceeded, and by the end of July pressure was mounting to pass something. Republican opposition to the original Lieberman bill centered on its provisions directing the Department of Homeland Security to create mandatory performance standards, then assess the security of power companies, utilities and other firms that operate critical infrastructure for security problems and create performance standards. These were deemed too restrictive and were addressed in a subsequent markup. Opposition from civil liberties groups around the wiretapping issue was also addressed.

The compromise bill includes seven major provisions:

  1. Establish the National Cybersecurity Council to lead cybersecurity efforts.
  2. Allow private industry groups to identify voluntary security controls and practices to mitigate particular risks (subject to approval by the council).
  3. Create a voluntary program for the owners of critical infrastructure that involves some hurdles for membership but provides incentives including liability limitations and priority assistance as a set of rewards.
  4. Rely on existing regulators and standards, especially with regard to particular industry verticals.
  5. Permit information sharing between the government and the private sector while preserving the privacy and civil liberties of users.
  6. Require certain critical infrastructure providers to report serious cyber incidents.
  7. Require the government to improve federal civilian networks through reform of the Federal Information Security Management Act (FISMA).

The compromise bill, the Cybersecurity Act of 2012 (.pdf), is likely to come up for a vote before the August recess. Of course, you can read a copy of the bill for yourself.

We (still) live in a glass house

In my view, the Cybersecurity Act as currently envisioned does little to address the pressing need for security engineering, software security and built-in security. Instead, it focuses on reactive information-sharing about the inevitable attacks that will occur against systems riddled with vulnerabilities. In a nutshell, this new bill is old-school security come home to roost.

I believe that cybersecurity policy must focus instead on solving the software security problem -- fixing the broken stuff instead of simply watching the broken stuff and reporting when it is attacked. We must refocus our energy on fixing the glass house we find ourselves in. We must identify, understand and mitigate computer-related risks. We must begin to solve the software security problem.

To date, when it comes to software, Apple Chief Information Security Officer David Rice said it best in his book Geekonomics: "Unfortunately, the blunders of government are matched almost equally by the blunders of the market itself, if not more." I believe that the government can and should play a role in building more secure systems. The U.S. government should develop incentives for vendors to build security in and break the endless loop of feature creep and bloatware. The government should publicize security failures so that we know what is really happening and we can learn from our mistakes. Perhaps the government should even grant tax credits for creating better, more secure software.

Equally important is what the government should not do. The government should not legislate cybersecurity excessively. The CFAA has done little to deter the explosive growth of cybercrime. Frankly, the target-rich environment filled with broken software makes it far too easy and too tempting to misbehave criminally. The government should not pretend that its buying power can single-handedly move the software market -- it can't. The government should not build any more overly bureaucratic taxonomies for security evaluation (such as the Common Criteria or the Pentagon's Trusted Computer System Evaluation Criteria) or for security certification and accreditation, such as FISMA. The market does not care.

When bits are money, the invisible hand will move to protect the bits. Of course, the invisible hand must be guided by the sentient mind and slapped hard to correct the grab reflex if and when it occurs. There is an active role for government in all of this, not just through regulation, but also through monitoring and enforcing due process and providing the right incentives and disincentives. In the end, somebody must pay for broken security and somebody must reward good security. Only then will things start to improve. Washington can and should play an important role in this process.

Acknowledgements

Small portions of this article appeared originally in Online games & the law on the Darkreading website and in Separating the threat from the hype: What Washington needs to know about cyber security in America's Cyber Future: Security and Prosperity in the Information Age from the Center for a New American Security (June 2011). Thanks to Randy Sabett at ZwillGen PLLC for helpful commentary on an early draft.

About the author:
Information Security is pleased to welcome Gary McGraw and his [In] security column as a regular feature. McGraw is chief technology officer at software security consulting firm Cigital Inc. He is a globally recognized authority on software security and the author of eight best-selling books on this topic. Send comments on this column to feedback@infosecuritymag.com.

This was first published in August 2012



Start Out Selling Your Services: The First 5 Days

How many times have you sat down at your desk in the morning and wondered: what’s next?  Where will I find clients?  Now, that I have my own business, how am I going to persuade people to buy?

days of the week

Once the long process of starting a business is over, your idea is ready for the big world.  You have all the paperwork done, equipment delivered and hundreds of other things are done.  You are left with one thing only having Read More

From Small Business Trends

Start Out Selling Your Services: The First 5 Days



External Storage Devices: A Secure and Portable Way To Store Your Files

In the race to provide the best Cloud-based file storage, external storage has been put on the back burner. But a large chunk of the consumer market still prefers storage devices. There are three reasons a small business might choose external storage over Cloud-based storage:

  1. Security. Even if your Cloud provider promises all the security in the world, once your data is out there, it's vulnerable. An external hard drive is the only way a small business owner can truly remain in control of all business data. There is, however, one loophole. An external hard drive or external hard drive can easily be lost or stolen, with its data left open for viewing. This makes encryption and complex passwords extremely important.
  2. Accessibility. While Cloud-based file storage requires an internet connection, external file storage goes everywhere with youâ€"as long as you remember to take it. This is convenient on airplanes and in hotels with expensive wi-fi charges.
  3. Reliability. Sure, your Cloud-based provider will promise 100% uptime, but anyone who has ever dealt with cable and phone service providers know there's no such thing. When your Cloud-based file storage is unusable, your files may be held hostage, as well, especially if you're away from the computer where your original copies of all of your files may be stored. An external hard drive ensures you'll always be able to get to your important files.

The key is to find a storage device that has all the features you need to safeguard your documents. A hard drive that is lightweight, durable, high capacity, and, perhaps most importantly, secure. External hard drives range in price from hundreds of dollars to thousands of dollars, but SMBs might be interested to know that more expensive doesn't necessarily equal better.

  • Drobo specifically tailors its project to the need of SMBs, with a weight of only three pounds and a capacity of 3TB. The standout thing about Drobo's external storage is that it incorporates RAID storage, which automatically protects data even in the event of a hard drive crash. This external drive will be available in September with prices starting at $650.
  • Seagate's Backup Plus Portable Drive offers 1TB of storage with USB 3.0 compatibility allowing for fast transfer speeds. Seagate's drive is also ultra-portable, weighing only .44 pound and measuring 4.86″ X 3.19″ X .6″. The 1TB version begins at $140.
  • Western Digital puts your data in your pocket with its mini drive. WD's My Passport compares to the dimensions of a passport, weighing in at .51 pounds and measuring .820″ X 4.4″ X 3.2″. The best part about My Passport is its capacity with its ability to hold 2TB of files, photos, and media. The 2TB version retails for $170-$200.

But if you're still on the fence about choosing an external hard drive vs. Cloud-based file management. Western Digital's software now includes the ability to auto-save your content to popular Cloud-based file management software Dropbox, combining the power of both hardware and software.

“By combining access to Dropbox and personal cloud storage into a single intuitive mobile app, WD is empowering consumers with the flexibility and control of anytime, any-device management of their growing libraries of digital content,” said Jim Welsh, executive vice president for WD's branded products and consumer electronics groups.



Looking For A Way To Add Enticing Content To Your Social Streams To Get More Views? Check This Out!

As a small business owner, you should constantly be looking for ways to get people to your website and social media sites in order to expose your products and services.  One of the ways to do this is by creating exciting and informative content that you're customers will be interested in. You've probably tried blogging, but as we all know, that can be very time consuming and quite a task if it's not something you are completely comfortable with.  How else can you create content that will entice potential customers to your site and social media sites? Here's how:  Compose a new social media channel for publishing interesting and relevant stories to your site.

Tools we'll describe here are just the thing you need â€" you can surf the web as you usually do, and when you stumble upon on a great news worth sharing, just add it to your ‘channel'. Piece by piece, by the end of the day you should have a complete, curated by you, virtual newspaper you fans and followers will be able to read.

Storify is one such application. It lets you curate your social networks feeds in order to build social stories, combining the media all over the Internet into a single homogeneous source. In your Storify editor, you can search through the social networks and social media to find some elements of a story or a topic you want to Storify. Facebook, Twitter, Instagram, YouTube and more â€" all of those sites are now your sources.

Once completed, you can curate (edit, get them together) the elements into a story, write your own narrative â€" explain what's important and why, add links to additional coverage etc. and share your Storify'd newspaper! You can share it directly or as an embedded element on a web site. You can sort stories by time, which will make adding tweets, photos and videos much easier to order, in chronological or reverse-chronological order. Sharing and commenting is now enabled on an element basis, so your readers can interact with the most interesting element of the story. Also, you are able to see the list of people who subscribe to you and who you subscribe to.

A similar service is Paper.li, a content curation service which enables you to publish newspapers based on topics you like. You might have stumbled on it in your timeline; most people use it as an automated service which picks up your tweets and if you get published in someones ‘Paper', you get a mention. There is a free and a paid version, where for $9/month you'll get the option to brand your Paper.li newspaper a bit more, remove advertisements and manage notifications.

So, if you want to try out the world of editing, picking out the right content and pleasing your readers, try out one of these tools.



Islington Council accidentally leaks data after posting information to mySociety website

Islington Council experiences a data leak, with sensitive information about residents posted online for two weeks.

According to the Islington Tribune, the names and addresses of 2,400 tenants were posted on the mySociety website when the council responded to a Freedom of Information Act request regarding the ethnicity and gender of people it had rehoused.

A spreadsheet containing the information was sent to the website 'WhatDoTheyKnow' which published it online, but the spreadsheet also contained tabs with the names, marital status and addresses of 2,400 residents. This data was online for two weeks before the council was notified of the error.

According to a statement by 'WhatDoTheyKnow' owner mySociety, in one file the personal data was contained within a normal spreadsheet, while in the two other workbooks the personal data was contained on four hidden sheets.

Tom Steinberg, founder and director of mySociety, said that all requests and responses sent via WhatDoTheyKnow are automatically published online without any human intervention, so the Excel workbooks went instantly onto the public web, where they only attracted seven downloads in total.

“Shortly after sending out these files, someone within the council tried to delete the first email using Microsoft Outlook's ‘recall' feature. As most readers are probably aware â€" normal emails sent across the internet cannot be remotely removed using the recall function, so this first mail, containing sensitive information in both plain sight and in (trivially) hidden forms remained online,” he said.

A recent Egress and SC Magazine survey revealed that 74.5 per cent of respondents had received an Outlook recall message. Tony Pepper, CEO of Egress, said that the recent problems at Islington Council were consistent with the challenges it sees on a daily basis across all sectors.

He said: “Organisations are failing to implement the right technology solutions in order to share information securely outside their networks and they are failing when it comes to educating their employees (the end-users) so that they understand how and when to send information securely.

“The fact that 74.5 per cent of people surveyed admitted to receiving an Outlook recall message is startling. It demonstrates that there is a huge amount of information being sent to the wrong recipients. Judging by the Islington Council example, these end-users may think that by sending the ‘recall' request they have prevented the information being shared, which is completely incorrect.”

Steinberg also admitted that on the 26th June, the date the workbooks went live, the Excel spreadsheets that contained a large amount of personal information in the tabs was included. However it did not receive any notification from Islington Council or anyone else that problematic information had been released not once, but twice, even though all emails sent via WhatDoTheyKnow make it clear that replies are published automatically online.

He said: “Had we been told we would have been able to remove the information quickly. It was only by sheer good fortune that [one of] our volunteers happened to stumble across these documents some weeks later, and she handled the situation wonderfully, immediately hiding the data, asking Google to clear their cache, and alerting the rest of mySociety to the situation. This happened on the 14th July, a Saturday, and over the weekend mySociety staff, volunteers and trustees swung into action to formulate a plan.”

He said that on Monday 16th July, it alerted both Islington Council and the Information Commissioner's Office about what had happened with an extremely detailed timeline.

“The personal data released by Islington Borough Council relates to 2,376 individuals/families who have made applications for council housing or are council tenants, and includes everything from name to sexuality. It is for the ICO, not mySociety, to evaluate what sort of harm may have resulted from this release, but we felt it was important to be clear about the details of this incident,” Steinberg said.



Olympics hit by SEO poisoining, as black hat hackers change tactics

Poisoning of Olympic-related search engine results has appeared, but big names and events are not the obvious targets.

According to Dave Ewart, director of product marketing EMEA at Blue Coat, black hat hackers have changed their tactics to target lesser known athletes and celebrities and have moved away from big events.

Ewart told SC Magazine that while search engine optimisation (SEO) poisoning is still the number one vector for spreading malware, there has been a move away from ‘poisoning' the results of big events to hitting more mundane targets.

He said: “They are hitting a lot more mundane search results and for celebrity searches, they hit more B-listers. This makes sense, as if there is something big happening to an A-lister then it would have less of an impact.”

Asked if he meant that targets would be medal winners from previous Olympics rather than the likes of Bradley Wiggins, Ewart said this was the case, as the SEO poisoning of a person such as Matthew Pinsent is more likely to beat a genuine result because they are not headline news.

Ewart said: “From the research we did, when Steve Jobs died, two per cent of the search results were malicious and when Whitney Houston died in February of this year, the poisoned results began on page 15 of a Google search, so increasingly it is where people are not looking.

“There is no real pattern emerging, but there is a bigger set of search terms around mundane things.”

Research released this week by Trend Micro said that as well as fraudulent websites that claim to sell Olympic tickets, there were a number of fake live streaming sites and when users searched for the keywords ‘watch London Olympics opening ceremony live', ‘watch London Olympics online' and ‘watch London Olympics 2012 live', these websites appeared as one of the top search results.

It said that analysis of the sites found that some of these redirected to fake live broadcasts of London Olympics 2012 and contained a link for buying cheap, albeit bogus, tickets, while other fake live streaming sites redirect to another site requiring an email address.



Your Small Business Should Hire A Dedicated Social Media Expert

On July 1, 2012 on this very site, Matthew Bellows talked about the importance of e-mail as a tool for converting warm sales leads. He noted that while social media is important, it is ultimately e-mail that will drive sales.

social mediaIt's a good point, and thus a worthwhile read for any marketer or salesperson operating in the world of business today.  It does not, however, change the fact that social media is a vitally important piece of your strategy.

For sales, e-mail may remain the most critical wrench in your business toolbox, but your specialized tools for social media can reach a different crowd entirely. Many of your customers lean heavily on their mobile devices and their electronics to keep them connected to the world, and are increasingly savvy about sales messaging. They don't want to be sold to so much as they want to be talked to, to have someone carry on a conversation that just so happens to be about your business philosophy and products.

Because this requires a different worldview than your usual sales or marketing team member has been trained to have, your company should have a dedicated social media expert.

The Ideal Expert

It's becoming increasingly trendy to staff your social media guru spot with someone young. That's wise to a point-the younger generations have grown up with social media and are very comfortable navigating it-but it should not be a mortal lock.

Instead, look for a deep understanding. Your expert-to-be should know the major platforms in and out, have at least a working knowledge of writing, video and webinars/podcasts and be able to grasp how SEO works.  If they're 22 or 40, every candidate and especially every hire should exhibit an active mastery of at least the basics of social media.

They also need to have one heck of a work ethic. Social media management is relatively easy to get started with and requires little time per post or update, but that time adds up fast. I would estimate that I spend about 30 hours a week on theBizEngine blog, Twitter feed, Facebookand various other platforms in order to promote our content and have conversations around small business.

It's critically important to do it and I thoroughly enjoy doing so, but it's not a gig for a part-time employee.

Above all, though, you need someone who knows their stuff. The only question is, what if you can't find someone?

Should You Outsource?

If you can't find a candidate who satisfies your requirements, you can outsource the work to a dedicated SEO company.

There are so many great companies out there who can really take your social media marketing efforts to the next level. In essence, all you will need to do is consult with these companies, keep abreast of the work they are doing on your behalf and be sure that everything is up to brand standards.

The question here is cost. Chances are good that you will pay at least as much per year for a quality social media firm as you would for an employee, and those who enjoy being in total control of what comes out of their company might not find that to be a palatable option.

If you don't want to have someone in-house and you have the revenue to make it a reality, though, outsourcing can be an excellent choice.

Either way, I believe a social media expert can make an enormous difference for your business. With their ability to reach wide swaths of people quickly and easily and a chance to make a lasting impact on customers past, present and future, they are essential. Just make sure you hire a great one.

Does your business have a dedicated social media expert?

Social Media Photo via Shutterstock




Total Defense launches mobile security suite

Total Defense has announced the launch of a security suite that enables businesses to secure and manage mobile devices.

According to the company, Total Defense Mobile Security Suite guards against current and emerging threats, and includes mobile device management to enable IT administrators to enforce security policies, password compliance and application restrictions and remotely remove malicious or non-compliant applications from devices. In addition, it allows remote locating and/or wiping of the device contents.

A cloud-based model is also offered to allow IT administrators to manage mobile security and remote management policies from a web-based console, while updates are deployed automatically.

Paul Lipman, CEO of Total Defense, said: “The days of accessing the internet from a protected corporate network are over. Workers access networks remotely through a multitude of devices, which have an increasing array of vulnerabilities, but without fortified security processes in place.”



Microsoft Introduces New Outlook

Email just got a whole new look with Microsoft's new Outlook. The company provides a fresh perspective on its popular email platform and the role of email in business communications. The e-mail application you use for business definitely makes a difference, especially in terms of usability. Here are some details on the new platform's features and other important news on e-mail for business today.

At the Speed of Business

Windows 8 is great. Microsoft has upgraded many of our favorite business features for Windows 8, including cloud services for Windows 8 and Windows Phone, new apps, new updates to SkyDrive, and the new Windows Office. But the software giant is also re-imagining e-mail with some interesting results. Outlook Blog

Should I stay or should I go? Though the old version of Hotmail will remain available, users can upgrade to the new preview version of Outlook starting now. You can either rename your existing hotmail account as a new @outlook.com account or just add a new alias to your existing account. The Verge

Hotmail not so hot. While you can elect to keep your same-old same-old hotmail account, be aware that Microsoft is gradually phasing out the Hotmail brand . It's hard to leave something familiar behind, but the new Outlook represents the future and the platform Microsoft will be supporting. GeekWire

Thanks a million. If you want to get a sense of how users are already responding to the new Outlook, just take a look at the amazing response. According to this report, the new platform saw an impressive one million signups within just six hours of launch. Hopefully the new e-mail product will live up to all it promises. The Next Web

An E-mail Evolution

The kids are alright. As talk of email upgrades abounds, it's a good time to think about the power e-mail still has as a marketing tool, even among groups thought of as being beyond its reach. For example, a recent survey shows a large number of young people in high school or college still prefer e-mail and mobile communication to social media sites like Facebook. Smallbiz Technology

Long live email. If you've heard email marketing is on the decline, well, think again. The practice is alive and well, despite the rise of social media and mobile communications. So, if your business's email campaigns are failing, it could be because you're not properly targeting customers who want the products and services you offer. Clickz

The check is in the mail. Email that is. Data suggests that not only is email outperforming social media in terms of sales conversions, but that by 2016  businesses will be spending an estimated $2.5 billion on email marketing alone. Marketing Pilgrim



Scope of Dropbox security breach is undetermined

Investigators analyzing the systems behind Dropbox have not yet determined the scope of the breach, according to the company, which acknowledged Wednesday that the investigation into how much access attackers had into the company's internal systems remains ongoing.

Since the investigation is still ongoing, I can't go into further detail.

Dropbox spokesperson

Responding to questions from SearchSecurity.com, a spokesperson for the San Francisco-based remote file storage service declined to comment any further than the company's July 31 blog post. Dropbox acknowledged on Tuesday that it believes attackers used passwords stolen from another website to gain access to a number of user accounts, including an employee storage account.

"Since the investigation is still ongoing, I can't go into further detail other than what we said in our blog post," the spokesperson said. "We're still monitoring the situation but have determined that a small number of users were affected.  We have contacted all the users where we have detected suspicious activity."

The Dropbox security breach announcement stated that the company would "continue to monitor the situation," but didn't address whether a computer forensics team was still investigating the scope of the breach to internal systems. Dropbox said it was adding features to bolster the security for users of the service, including an optional two-factor authentication service, a login activity page and automated systems to detect anomalous activity.

A company employee was among those targeted by attackers, who used stolen passwords to gain access to their Dropbox accounts. The employee's storage folder held a project file that contained account holder email addresses that investigators believe were used in a variety of spam and phishing campaigns. Affected users complained on a Dropbox forum that they received spam messages pushing online gambling sites.

The company hired an outside firm to investigate its systems. It has not said how it would address security internally or whether it needs to address its security policies.

Dropbox urged account holders to use strong passwords and consider using password management tools to avoid using the same password for multiple services. 

The focus of password breaches is often on encouraging account holders to use better password management practices, but experts say enterprises need to step up to better protect their user accounts. Organizations can begin by conducting a database inventory to determine what systems store usernames and passwords. Database management systems should be fully patched and the added step of database activity monitoring could help detect unauthorized access.

Password breach fallout
The attacks on Dropbox accounts came shortly after LinkedIn's massive password data breach. An attacker posted a file containing nearly 6.5 million passwords on a Russian hacking forum, requesting assistance from other hackers to crack the hashed passwords. LinkedIn was criticized for failing to salt its account holder passwords, a process that makes password cracking much more difficult.

The LinkedIn breach caused problems at a number of other online services. Google, Last.fm, Facebook and others reached out to affected users who may have used the same password for multiple accounts, a poor practice, say security experts.

news of the Dropbox security breach hacking forum. LinkedIn hashed but didn't breach cascaded to other services, including online dating service eHarmony, Google and Facebook. In some cases, the services reset accounts or warned users about the need for strong passwords and railed against using the same password for multiple accounts.