Survey: Small Businesses Rely on Website, Facebook, LinkedIn for Branding

branding survey

You may have heard advice about using Twitter or Pinterest for branding. It seems there’s always a new flavor of the week in social media and the multiple channels can become a bit overwhelming.

Well, a recent survey suggests many small businesses may simply be forgoing all this and sticking with one or two tried and true channels to brand their businesses.

It might surprise you that these most popular channels don’t include Pinterest or Twitter. In many cases, they don’t even include blogs.

Branding Survey Says Small Businesses Use a Few Trusted Tools

A survey of 529 Canadian small business owners each employing between 2 and 100 people found 52 percent rely mostly on their company website for branding.

And what other channels are small businesses relying on after their company website?

Well, a recent breakdown of the study by PC World suggests 35 percent of these businesses rely on Facebook for branding with just under that (33 percent) relying on LinkedIn.

Other social channels aren’t even close.

Other Branding Efforts

According to the breakdown:

  • 19 percent of small businesses surveyed use Twitter for branding.
  • 11 percent use Google Plus.
  • 10 percent use a blog or forums.

Use of services like Pinterest and Instagram are even lower.

In fact, the study conducted for American Express Small Business Services by Rogers Connect Market Research suggests many of these businesses understand the need for digital channels but still rely on very traditional approaches.

In an official release, American Express Small Business explains:

A full 60 per cent of business owners rely on the actions of their employees to communicate their brand to their customers and almost half (45%) of these report it being effective. Furthermore, 32% of small business owners leverage events to help increase brand awareness.

What is your small business doing for branding?

Brand Photo via Shutterstock


Warning: array_slice() expects parameter 1 to be array, boolean given in /home/smallbi/public_html/wp-content/themes/smallbiz-5-0/single.php on line 205



Survey: Small Businesses Rely on Website, Facebook, LinkedIn for Branding

branding survey

You may have heard advice about using Twitter or Pinterest for branding. It seems there’s always a new flavor of the week in social media and the multiple channels can become a bit overwhelming.

Well, a recent survey suggests many small businesses may simply be forgoing all this and sticking with one or two tried and true channels to brand their businesses.

It might surprise you that these most popular channels don’t include Pinterest or Twitter. In many cases, they don’t even include blogs.

Branding Survey Says Small Businesses Use a Few Trusted Tools

A survey of 529 Canadian small business owners each employing between 2 and 100 people found 52 percent rely mostly on their company website for branding.

And what other channels are small businesses relying on after their company website?

Well, a recent breakdown of the study by PC World suggests 35 percent of these businesses rely on Facebook for branding with just under that (33 percent) relying on LinkedIn.

Other social channels aren’t even close.

Other Branding Efforts

According to the breakdown:

  • 19 percent of small businesses surveyed use Twitter for branding.
  • 11 percent use Google Plus.
  • 10 percent use a blog or forums.

Use of services like Pinterest and Instagram are even lower.

In fact, the study conducted for American Express Small Business Services by Rogers Connect Market Research suggests many of these businesses understand the need for digital channels but still rely on very traditional approaches.

In an official release, American Express Small Business explains:

A full 60 per cent of business owners rely on the actions of their employees to communicate their brand to their customers and almost half (45%) of these report it being effective. Furthermore, 32% of small business owners leverage events to help increase brand awareness.

What is your small business doing for branding?

Brand Photo via Shutterstock


Warning: array_slice() expects parameter 1 to be array, boolean given in /home/smallbi/public_html/wp-content/themes/smallbiz-5-0/single.php on line 205



Social Media Tips for Being Socially Savvy on a Budget

social media business tips

[Click for full size infographic]

For small business owners, social media is a great way to connect with customers, potential customers, build brand awareness and spread news quickly. According to the 2013 Social Media Marketing Industry Report, 86% of marketers report that social media is important to their businesses.

But the average small business owner has limited time and money to spend on social media. A recent survey by Zoomerang states that 59% of small businesses spend less than $100 on social media (42% spend nothing), and 74% don’t employ anyone to manage their social media. And those who do employ social media for their business often don’t know where to start.

You can easily capitalize on the marketing potential of social media even with limited resources. You just need to make sure you put your resources in the right places. Below are some tips on how to focus your social media efforts in a way that will resonate most with your customers.

Start with Facebook

With 9 million pages for small businesses, Facebook is the most popular platform among small business owners.  And for a good reason - Facebook is the place their customers are most likely to be. Not only is Facebook the most popular social media site, it is also the most addicting. According to the aforementioned industry report, 23% of Facebook’s users check their account five or more times every day.

Facebook is very effective for generating business â€" according to Social Media Quickstarter, 51% of people who “like” brands are more likely to buy a product after becoming a fan:

social media business tips

Image: Social Media Quickstarter

Small business owners should spend the majority of time and money on designing a Facebook fan page. Make it visually dynamic with quality graphics and photos, which humanize your brand image by spotlighting the people in your business and giving customers a glimpse into your business’s inner-workings.

A few tools that will make sure you get the most out of Facebook:

  • Use Name Vine to check domain names, Facebook and Twitter extensions in a matter of seconds to see if your desired vanity URL is available.
  • Facebook Social Media Plug-Ins let you see what your friends have liked, commented on or shared on sites across the Web.
  • Use an app like Pagemodo to customize your page.

Limit Your Focus

Beyond Facebook, be smart about which social media sites you choose to invest in. If you try to maintain a presence on too many sites, you may find yourself overwhelmed and unable to keep up.  Outdated and abandoned social media accounts can hurt your brand image. When you fail to respond to customers’ comments and inquiries on these sites, they will think that you don’t care about their input.

To effectively narrow your social media focus, determine which social networks your customers frequent. One recent study found that the average social media user has accounts on only two social media sites and many users have narrowed their usage down to one site. You can determine which platforms your customers prefer by sending a quick survey.

Once this is figured out, maintain a consistent brand identity by matching your company’s designs, graphics and logos across all platforms.

Post Effectively

After setting up your social media accounts, it’s time to determine how to interact with your customers and how often to do so. Most small business owners don’t have the time to spend hours posting on Twitter and scrolling through Facebook comments. Fortunately, you don’t have to post constantly to reach a large audience; there are many ways to tailor your posts for optimal reach and engagement.

It is recommended that businesses post one to four times a day on Facebook and five to ten times a day on Twitter. These posts should occur during business hours (8 AM to 8 PM) as this is when most people visit social media sites. It may be difficult for small business owners to post this frequently, but fortunately, Facebook allows you to schedule posts to be published at a later date.

To further save yourself time, push content to all of your social channels at once by using a tool like HootSuite. Take your Facebook page, Twitter feed and any other social channel you have and publish to all of them at once from a single interface.

In addition to scheduled posts, make an effort to respond to customers’ posts on your pages. Considering that the highest percentage of customers prefer to receive special offers and discounts (see infographic image, top of page), use social media as a platform for publicizing discounts. You can even offer exclusive special offers to your social media customers.

Social media might seem intimidating for the overworked and underfunded small business owner, but with the right tools and strategies, social media can be an easy and effective way to reach your customers.

Follow these tips and you’ll be socially savvy in no time.




Black Hat 2013 opens with testy keynote, smart device hacks

LAS VEGAS -- Prior to Wednesday's opening keynote by National Security Agency Director General Keith B. Alexander, Black Hat conference founder Jeff Moss commented that he hadn't seen the sort of tension that now exists in the security community since the "encryption wars" of the early 1990's.

That tension was evident not only in the mixed audience reaction to Alexander's talk, but it was also evident in the nature of several zero-day vulnerabilities being announced at Black Hat 2013, the sixteenth annual U.S. gathering of security researchers and corporate security practitioners .

Researchers Lucas Apa and Carlos Penagos

Researchers Lucas Apa and Carlos Penagos can wirelessly attack a factory's control system from 40 miles away.

While Alexander in his address sought to allay the existing suspicions of a standing-room-only collection of security experts by delivering what he called "the facts," new suspicions arose; hours before Alexander took to the stage, U.K.-based The Guardian released the latest leaked information from Edward Snowden, offering the first information about a previously unknown secret Internet surveillance program.

As The Guardian reported, this program, called XKeyscore , gives analysts access to what leaked agency documents claimed were "nearly everything a typical user does on the Internet." While Alexander claimed that every move the NSA makes to monitor electronic communications is subject to clear governmental oversight, The Guardian's story indicated that XKeyscore operations required no such oversight, even if the two specific programs Alexander was discussing did.

From the back of Alexander's keynote room, a heckler shouted, "You lied to Congress. Why would we believe you're not lying to us right now?" Alexander responded by encouraging the heckler to read the transcript of his congressional testimony. And, on the whole, Alexander's message was well-received, or at least warmly applauded, by most of the audience.

Hackable smart devices

While Alexander defended U.S. surveillance of American citizens, claiming it's a necessity in a world threatened by what he called "terrorists among us," SeungJin "Beist" Lee showed attendees the possibilities of another sort of surveillance: how cameras and microphones on smart TVs (there were more than 80 million sold worldwide last year, according to Lee) can be turned into state-of-the-art snooping devices by malicious hackers.

"I don't care about being watched," said Lee, an independent researcher based in Korea, "but I worry about my family and my girlfriend."

In a separate session, Tom Ritter, Doug DePerry and Andrew Rahimi, all researchers at San Francisco-based security firm iSEC Partners, demonstrated the downsides of femtocell devices, which are used to boost cell phone reception in homes and offices.

The devices, which offer up to six cellular device users a connection that is then backhauled to the carrier's network over the Internet using an SSL connection, run an embedded version of Linux that the research team was able to root. The researchers' modified femtocell box makes it possible to intercept and record traffic traveling to and from any phones associated with the device.

"Your phone will associate with a femtocell automatically and without your knowledge. This is not like joining a Wi-Fi network -- you don't have a choice," Ritter said. "In fact, there may be some of you with phones that are connected to our network right now." Referring to notices posted on the doors leading into the session room, he noted: "The signs out front are not just for show. You might want to put your phone in airplane mode."

The iSEC team's research centered on femtocells used on the Verizon network, meaning the vulnerability could be exploited against as many as one in three American cellular customers, according to the speakers. Ritter noted that Samsung, the manufacturer of the femtocell device that the researchers modified, has since provided a patch for the vulnerabilities his team used to gain root access to the device.

The trio then performed live demonstrations in which voice traffic, text messages and the data transmission of a digital image were intercepted and played back to the audience.

Though it was possible to patch the compromised femtocell units, the team said they felt the overall approach was flawed, insofar as it puts a piece of hardware with direct access to the provider's network into the hands of potentially malicious actors. They prefer an approach that uses the Wi-Fi capabilities within phones to handle these sorts of calls. Meanwhile, smartphones will pair with whatever cell tower or femtocell device is currently sending the strongest signal. While some phones will display a small icon indicating the phone is paired with a femtocell, many, including iPhones, will give no indication.

Long-distance factory attacks

Several sessions at Black Hat 2013 focus on attacks against the embedded control devices used to operate valves, sensors and the like in industrial settings. One creative and disconcerting set of related vulnerabilities uncovered by two researchers at IOAactive Inc., allows attackers to manipulate radio-controlled devices at distances spanning up to 40 miles.

"There are some cryptographic problems, some problems with the communications among the devices, that allow you to break into the network of these industrial wireless sensors," said Lucas Apa, a security researcher and consultant who worries about the implications of these vulnerabilities for the oil fields of his native Argentina. "We were looking for a new way to compromise these facilities. We found these devices and some of them have strong radio signals, so you are able to communicate with them from a distance of 40 miles away."

According to Apa and his co-presenter Carlos Penagos, a senior security researcher and consultant for Seattle-based IOActive, the way that keys are handled in these devices is different from typical key management in business networks. Generally speaking, these devices use IEEE's IEEE 802.15.4 standard, laying proprietary security controls on top of the lower-level protocols.

Unlike the attacks shown in many other sessions, these vulnerabilities are not patched yet. "This impacts a lot of facilities around the world," Penagos, said.

"We are talking about generating big monetary losses or causing explosions," Apa added. Because of these risks, the researchers will not be releasing details of the workings of their attacks.

"This is bad," Apa bluntly said.




Black Hat 2013 keynote: Alexander details NSA surveillance programs

LAS VEGAS -- Opening the Black Hat 2013 hacker confab with a widely anticipated keynote, Gen. Keith B. Alexander, commander of U.S. Cyber Command and director of the National Security Agency, spoke about two specific NSA surveillance programs -- tied to Patriot Act Section 215 and FISA Section 702, respectively -- and sought to provide clarity about the kinds of information the agency is really collecting.

The assumption is that people are out there just wheeling and dealing … while nothing could be further from the truth.

General Keith B. Alexander,
commander, U.S. Cyber Command

"The issue that stands before us today is: What can we do next? How can we start this discussion of defending our nation, while protecting our civil liberties and our privacy? The reason I'm here is because you may have some ideas of how we can do it better and we need to hear those ideas," he said. "But equally important, from my perspective, is that you get the facts. There's a reason why some of this information is classified and is stuff that we just don't put out there. How do we come up with a program to stop terrorism and to protect our civil liberties and privacy? This is perhaps one of the biggest issues facing our country today."

The speech came just hours after U.K.'s The Guardian newspaper revealed the existence of XKeyscore, an Internet intelligence-gathering tool that is reportedly capable of compiling emails, online chats and Web browsing data from virtually anyone. The story was based on documents provided to The Guardian by former Booz Allen contractor and fugitive whistleblower Edward Snowden.

General Alexander told the crowd: "We need to hear from you, because the tools and the things we use are very much the same as the tools many of you use in securing networks. The difference, in part, is the oversight and compliance that we have in these programs. That part is missing in much of the discussion. I believe it's important for you to hear that and for you to understand what NSA [National Security Agency] analysts need to do [in order] to do their job to defend this nation, and the oversight regime that we have within courts and Congress, and within the administration. I think you need to understand that to get the full understanding of what we do and what we do not do. I think it's important to take a step back and go back to the beginning."

Alexander went on to describe how the events of September 11, 2001, changed the nation's approach to intelligence gathering, noting that the 9/11 Commission's findings indicated the intelligence community failed to connect the dots to uncover the terrorist plot.

He also pointed out that more than 6,000 NSA employees have gone to Afghanistan and Iraq, and 20 cryptologists lost their lives there in service to their nation.

Oversight of NSA data gathering

Alexander explained the oversight process involved in the NSA surveillance programs. "Our government, Congress, the administration and the courts all joined together to come up with programs that would meet our Constitution and help us connect those dots in terrorist plots," he said. "I think it's important to understand the strict oversight that goes into these programs, because the assumption is that people are out there just wheeling and dealing … while nothing could be further from the truth."

He spoke about Cisco Systems Inc.'s NetFlow protocol, which is used widely among enterprises to capture and analyze network traffic, and why the NSA isn't interested in collecting all the information it can.

"We couldn't afford to and don't want to collect everything. If your intent is to go after terrorists, how do you do that? We have two programs to do that: one that helps us connect the dots in the least intrusive way that we can, and one that allows us to go into content," he said.

Alexander strove to make clear that Section 702 Authority is for foreign intelligence purposes and applies only to communications of "foreign persons who are located abroad, and it requires a valid, documented foreign intelligence purpose such as counter-terrorism," he explained. "We're not targeting any U.S. citizens anywhere in the world."

Another point he made is that communications infrastructure providers and other private companies aren't just voluntarily providing the NSA with information; NSA compels them to do so with court orders.

"Where all three branches of our government come together -- think about the lawful intersecting program we have here -- I think this is a standard for other countries, because we have the court overseeing it, we have Congress overseeing it and the administration," Alexander said.

And although some may perceive the Foreign Intelligence Surveillance Act (FISA) court as a "rubber stamp," Alexander strongly disputed that notion.

"I'm at the other end of that table with federal judges, and anybody here who's been up against a federal judge knows these are people with tremendous legal experience," he said. "They want to make sure what we're doing comports with the Constitution and the law.

"I've been in front of that court a number of times," Alexander added, "and I can tell you from the wirebrushings I've received. … They are not rubberstamping."

Information collection

What types of information is the NSA collecting on calls and what can analysts really see? According to Alexander, it's not nearly as intrusive as we've been led to believe.

"You have the date and time of the call, the calling to and from number, the duration of the call, and we also put in the origin of the metadata, but this does not include the content of the communications. This does not include your phone calls and emails or mine. No SMS text messages. There are no names in the database, no addresses, no credit cards and no locational information is used," he said.

And he likened the database to a lockbox. "The controls on this database are greater than any other data repository in the government and the oversight is insane. There are only 22 people at NSA who can approve that number," he said. "And they have to prove that number meets a standard set by the court. Then, and only then, is that number added to a list that can be queried. Only those numbers on that list can be queried into that database. Only 35 analysts at NSA are authorized to run queries, and they have to go through three separate different training regimen and pass a test to be able to make queries," he said.

Alexander said fewer than 300 numbers were approved in 2012. Those queries resulted in 12 reports to the FBI and involved less than 500 numbers. The intent of this program is to identify a terrorist actor and to pass that intelligence to the FBI. The NSA's goal isn't to complicate things for the FBI by "giving them as many numbers as we can; it's to give them the right number," he said.

Alexander's keynote received mixed response

At various points throughout the speech, Alexander was heckled by loud, sporadic outbursts from the audience, including some derogatory terms and expletives. One listener shouted, "I'm saying I don't trust you. … You lied to Congress. Why would we believe you're not lying to us right now?"

Alexander cautioned people to listen to the facts and not be quick to believe everything reported in the press.

"This is the greatest technical center of gravity in the world," Alexander said. "I ask that you all look at those facts and read the congressional testimony. Look at what we're talking about here, because this is our nation's future. This is what we've done with these programs. In my opinion, that's not bull; those are facts. And what we see coming at our country is more of the same. So the question we have is: What do we do now? Let's begin that discussion by putting the facts on the table. … How do we defend this country? That's the question. We're trying to defend the country and protect civil liberties and privacy."




Black Hat 2013 attendance nears 7,500, tops 2012

LAS VEGAS -- This year's Black Hat was attended by nearly 7,500 people, according to Trey Ford, Black Hat's general manager.

"We get a pretty good representation from around the world, and every year we review where government representatives are coming from," Ford said. "Ignoring the U.S. and Canada, coming in at No. 10 was Denmark with 33 people; Norway: 38; Singapore: 43; followed by Brazil, Republic of Korea, and Germany: 73; Israel: 75, Australia: 76; Japan came in at No. 2; and Sweden is No. 1, with 91 people. It's interesting to see who's interested in security."

Overall, Black Hat 2013 attendance was up by 8% compared with last year's event. Ninety-eight new tools were introduced, and the event offered 11 content tracks of (up from nine last year).




Tech Thursday (8/1): News from Infusionsoft, Newtek, Brother and Collaborate.com

It’s Tech Thursday from Smallbiztechnology.com. Each week we take a quick look at business and technology news and updates for the small business community and share them with you in a quick and simple round-up. Enjoy!!

Infusionsoft Announces 2014 “Battle of the Apps” Contest

Developers Compete for “Kick Apps Champion” Title and $20,000 in Prizes

Infusionsoft, creator of the all-in-one sales and marketing software for small businesses, announces its 2014 Battle of the Apps contest. In its second year, the competition showcases Infusionsoft’s growing community of developers and the apps or integrations they design to enhance the Infusionsoft user experience. The prizes include thousands of dollars in cash, free marketing to Infusionsoft’s user base of 55,000 small businesses, stage time at Infusionsoft’s annual user conference and other cool prizes. The deadline for submission is Jan. 17, 2014.

Applicants will be judged on: customer benefit, design, functionality, utility and innovation. Three finalists will be selected by a panel of Infusionsoft executives and outside industry experts to present their submissions at ICON14, one of the world’s largest gatherings of small business owners and entrepreneurs. The attendees will then vote to help decide who will be named the Kick Apps Champion.

Learn more about the rules and submission deadlines here.

Small Businesses Underutilizing Social Media

The Small Business Authority Finds Independent Business Owners Are Lax About Security Concerns

NEW YORK,  - Newtek Business Services, NASDAQ: NEWT, The Small Business Authority ®, with a portfolio of over 100,000 business accounts, announced today the findings of its SB Authority Market Sentiment Survey, a monthly window into the concerns of independent business owners. Based on a poll of over 2,000 respondents, one of the key findings from the July survey is 57% of business have a Twitter or Facebook account.

The findings from last year compared to this year show 10% more business owners are using social media. Additionally, only 30% of those polled are concerned about Twitter or Facebook using their clients’ data.

For more on the results of this survey, click here.

Brother Announces Å'Web Conferencing in a Box’ for better SMB collaboration

OmniJoinTM Web Conferencing in a Box Combines High Quality Brother Hardware and Services at an Affordable Price

BRIDGEWATER, N.J. - Brother International Corporation, a leader in small business technology, has announced the launch of its OmniJoinTM Web
Conferencing in a Box (item #WCB400). The new offering bundles a HD webcam, compact USB speakerphone and four months of OmniJoin™ basic web conferencing service  in a comprehensive kit.

OmniJoin™ web conferencing has been available since June 2012 as a standalone service, facilitating meetings in the telehealth, education and general business markets. This new bundle marries this advanced cloud-based service with high quality Brother hardware, at an affordable price. The combination offers customers a powerful meeting experience:

  • Feels like a ‘face-to-face’ meeting with synched audio and video, HD image quality and high-fidelity sound
  • Clearer communication with noise reduction, echo cancellation and multi-party VoIP
  • Seamless post-meeting sharing through cloud recording and storage capabilities
  • Peace of mind with secure, encrypted communication, to protect business assets whether meeting in the office or remotely
For more on this news release, click here.

Introducing Collaborate.com: The First Mobile Collaboration Platform for Distributed Business Teams

Mobile-First Approach Uniquely Addresses the Everyday Project Management Challenges Facing Today’s Mobile Workforce

 

BOSTON, Mass. - Kibits Corp. has today introduced Collaborate.com, the first mobile collaboration platform to let distributed teams work together on the many fast-paced projects that dominate the workday. Available for iPhone™, iPod Touch™, Android™, and the Web, Collaborate.com provides a unified document sharing and task management environment for today’s mobile workforce. With Collaborate.com business managers can acquire, configure, and deploy a complete team collaboration environment - including seamless integration with popular cloud services from Box™, Dropbox™, Evernote™, Google Drive™, and Apple iCloud™ - in just minutes.

Built for business teams that are not desk-bound, Collaborate.com has been adopted by a diverse range of businesses from automotive dealers to real-estate agents, from large animal veterinary clinics to personal security services, and by distributed teams within small businesses and large enterprises alike. Collaborate.com helps keep teams on the same page and accelerates decision making across many real-world use-cases, including field sales force management, field service issue resolution, warehouse inventory control, and more.

For more on this new product, click here.

 



Tech Thursday (8/1): News from Infusionsoft, Newtek, Brother and Collaborate.com

It’s Tech Thursday from Smallbiztechnology.com. Each week we take a quick look at business and technology news and updates for the small business community and share them with you in a quick and simple round-up. Enjoy!!

Infusionsoft Announces 2014 “Battle of the Apps” Contest

Developers Compete for “Kick Apps Champion” Title and $20,000 in Prizes

Infusionsoft, creator of the all-in-one sales and marketing software for small businesses, announces its 2014 Battle of the Apps contest. In its second year, the competition showcases Infusionsoft’s growing community of developers and the apps or integrations they design to enhance the Infusionsoft user experience. The prizes include thousands of dollars in cash, free marketing to Infusionsoft’s user base of 55,000 small businesses, stage time at Infusionsoft’s annual user conference and other cool prizes. The deadline for submission is Jan. 17, 2014.

Applicants will be judged on: customer benefit, design, functionality, utility and innovation. Three finalists will be selected by a panel of Infusionsoft executives and outside industry experts to present their submissions at ICON14, one of the world’s largest gatherings of small business owners and entrepreneurs. The attendees will then vote to help decide who will be named the Kick Apps Champion.

Learn more about the rules and submission deadlines here.

Small Businesses Underutilizing Social Media

The Small Business Authority Finds Independent Business Owners Are Lax About Security Concerns

NEW YORK,  - Newtek Business Services, NASDAQ: NEWT, The Small Business Authority ®, with a portfolio of over 100,000 business accounts, announced today the findings of its SB Authority Market Sentiment Survey, a monthly window into the concerns of independent business owners. Based on a poll of over 2,000 respondents, one of the key findings from the July survey is 57% of business have a Twitter or Facebook account.

The findings from last year compared to this year show 10% more business owners are using social media. Additionally, only 30% of those polled are concerned about Twitter or Facebook using their clients’ data.

For more on the results of this survey, click here.

Brother Announces Å'Web Conferencing in a Box’ for better SMB collaboration

OmniJoinTM Web Conferencing in a Box Combines High Quality Brother Hardware and Services at an Affordable Price

BRIDGEWATER, N.J. - Brother International Corporation, a leader in small business technology, has announced the launch of its OmniJoinTM Web
Conferencing in a Box (item #WCB400). The new offering bundles a HD webcam, compact USB speakerphone and four months of OmniJoin™ basic web conferencing service  in a comprehensive kit.

OmniJoin™ web conferencing has been available since June 2012 as a standalone service, facilitating meetings in the telehealth, education and general business markets. This new bundle marries this advanced cloud-based service with high quality Brother hardware, at an affordable price. The combination offers customers a powerful meeting experience:

  • Feels like a ‘face-to-face’ meeting with synched audio and video, HD image quality and high-fidelity sound
  • Clearer communication with noise reduction, echo cancellation and multi-party VoIP
  • Seamless post-meeting sharing through cloud recording and storage capabilities
  • Peace of mind with secure, encrypted communication, to protect business assets whether meeting in the office or remotely
For more on this news release, click here.

Introducing Collaborate.com: The First Mobile Collaboration Platform for Distributed Business Teams

Mobile-First Approach Uniquely Addresses the Everyday Project Management Challenges Facing Today’s Mobile Workforce

 

BOSTON, Mass. - Kibits Corp. has today introduced Collaborate.com, the first mobile collaboration platform to let distributed teams work together on the many fast-paced projects that dominate the workday. Available for iPhone™, iPod Touch™, Android™, and the Web, Collaborate.com provides a unified document sharing and task management environment for today’s mobile workforce. With Collaborate.com business managers can acquire, configure, and deploy a complete team collaboration environment - including seamless integration with popular cloud services from Box™, Dropbox™, Evernote™, Google Drive™, and Apple iCloud™ - in just minutes.

Built for business teams that are not desk-bound, Collaborate.com has been adopted by a diverse range of businesses from automotive dealers to real-estate agents, from large animal veterinary clinics to personal security services, and by distributed teams within small businesses and large enterprises alike. Collaborate.com helps keep teams on the same page and accelerates decision making across many real-world use-cases, including field sales force management, field service issue resolution, warehouse inventory control, and more.

For more on this new product, click here.

 



Big Business Tactics Small Businesses Can Use

big business tactics

I’ve always adhered to the idea of making my business look bigger than it is. I’m not trying to misrepresent my company, but I know the resources that will give my one-woman shop more gloss and make me appear more professional to potential clients.

Don’t buy into the idea that as a small business, you’re limited to your personal capabilities. Software is getting more affordable. And DIY is “in” right now in a major way. The lines blur between “big” and “small” business when it comes to tools and techniques like these.

Take advantage of what’s available to you right now, and start living large.

Customer Relationship Management Software (CRM)

I’m guilty of thinking CRM just works for giant corporations with multiple people accessing the same customer data. I’m also guilty of thinking my small business couldn’t afford it. But plenty of small business CRM programs (such as Insightly) are reasonably priced, and also cater to the needs of solopreneurs and boutique-sized businesses.

If you have customers, you need to track data about them. That’s what CRM does. I, for example, keep notes when I have phone calls with clients (I’m terrible at remembering what we’ve talked about), and I like linking emails to those conversations, or assigning tasks.

Visual and Audio Marketing

Even if you don’t quite have the budget for TV or radio ads, you can still get your face (or voice) out to the masses. Podcasts are easy to set up and record, and are hugely popular with the small business segment.

Video’s another great option for the budget-conscious entrepreneur. You don’t have to spend thousands of dollars to have a professional-grade video produced. Anything from your camera phone to a nice digital camera that shoots video can create commercials, video blogs, or customer interviews you can share on YouTube, your site, and social media.

Project Management Software

Again, I assumed I needed a bigger staff to really benefit from project management software. And while I’m pretty satisfied using Google Calendar to assign tasks for myself, it’s so much easier to assign tasks to others on my team, as well as see the status of what everyone’s working on with the right software.

Promotional Items

While I’m not a huge fan of pens with logos on them, you shouldn’t overlook promotional items as a category. Small businesses typically won’t need tens of thousands of a given item, so you can order smaller products that cost more per unit, but pack a better punch.

Legend has it that once upon a time, when Amazon pretty much sold just books, the company would send little freebies with orders, like branded bookmarks and travel mugs. Those are probably collectors’ items by now. Find something your audience will value, and they’ll actually use.

Email Marketing

I’m still surprised at how many small businesses don’t use email marketing, or who are settling for sending text emails directly from their provider, rather than through email marketing software (such as MailChimp, InfusionSoft, Constant Contact, etc.)

With a cost ranging from $0 to under 50 bucks a month, there’s really no excuse for your business not to be marketing through email.

Social Media Monitoring

Sure, your company’s on social media, but are you actively monitoring what’s being said about your brand or your industry?

Don’t let the big social media monitoring brands like Radian6 scare you off. You don’t have to spend a gajillion dollars to track activity on social media. A simple search on the social site of your choice, or a social media platform that lets you save searches for specific keywords, will help you connect to people who are interested in your brand, or who fit the demographic you want to connect with.

Whether your business is big or small, you want to instill confidence in your clients. When you choose to invest in smart marketing and operations tools, your customers will feel good about investing in you.

Big Small Concept Photo via Shutterstock




The Ten Step Checklist Every Business Needs For Better Security (Infographic)

In 2012, nearly 40% of small businesses fell victim to some sort of a security breach.  Even more staggering is the fact that nearly 60% of those will be forced to close their doors within six months of an attack. Fortunately small businesses can protect their business, customers, employees and assets for very little cost and without having to follow long, hard to understand processes.

Monica Hamilton, Director of Small Business Product and Solutions Marketing at McAfee, recently shared in their blog, a ten step checklist that all small businesses should have when it comes to keeping their business safe. It’s ten simple steps, and they are outlined in the infographic below:

There you have it! Ten simple steps to follow, and revisit quarterly, to make sure you don’t end up being one of the 40 percent who has a security breach in 2013 and beyond!



Tenable launches standalone vulnerability scanner

Tenable has launched a standalone version of its Passive Vulnerability Scanner (PVS).

Previously only available as part of Tenable's SecurityCenter and SecurityCenter solutions, PVS allows real-time monitoring of both IPv4 and IPv6 traffic on networks.

Using network sniffing technology, PVS is an ideal solution to monitor systems sensitive to disruption by traditional scanning, such as mobile, virtual and cloud apps that may not be present during scheduled scans.

Ron Gula, CEO of Tenable, said: “A hacker only needs one pathway into your network; not knowing what an unmanaged device is doing on your network is a security blind spot. By offering PVS as a standalone product, we are opening up the availability of our products to thousands of security and compliance professionals.

“As innovations such as BYOD and virtualisation gain traction within the organisation, more and more transient devices are being brought into the organisation and onto corporate networks. If a company is only scanning for these devices monthly, they do not have an accurate picture of their network weakness.”

PVS also complements Tenable's Nessus active scanne by monitoring network traffic detecting apps, services, protocols, hosts that are not present or evade active scanning, according to the company.



The Ten Step Checklist Every Business Needs For Better Security (Infographic)

In 2012, nearly 40% of small businesses fell victim to some sort of a security breach.  Even more staggering is the fact that nearly 60% of those will be forced to close their doors within six months of an attack. Fortunately small businesses can protect their business, customers, employees and assets for very little cost and without having to follow long, hard to understand processes.

Monica Hamilton, Director of Small Business Product and Solutions Marketing at McAfee, recently shared in their blog, a ten step checklist that all small businesses should have when it comes to keeping their business safe. It’s ten simple steps, and they are outlined in the infographic below:

There you have it! Ten simple steps to follow, and revisit quarterly, to make sure you don’t end up being one of the 40 percent who has a security breach in 2013 and beyond!



The Ten Step Checklist Every Business Needs For Better Security (Infographic)

In 2012, nearly 40% of small businesses fell victim to some sort of a security breach.  Even more staggering is the fact that nearly 60% of those will be forced to close their doors within six months of an attack. Fortunately small businesses can protect their business, customers, employees and assets for very little cost and without having to follow long, hard to understand processes.

Monica Hamilton, Director of Small Business Product and Solutions Marketing at McAfee, recently shared in their blog, a ten step checklist that all small businesses should have when it comes to keeping their business safe. It’s ten simple steps, and they are outlined in the infographic below:

There you have it! Ten simple steps to follow, and revisit quarterly, to make sure you don’t end up being one of the 40 percent who has a security breach in 2013 and beyond!



5 Ways to Win Your Share of the Federal Government’s Year End Budget

the federal budget

September 30th marks the end of the federal government’s fiscal calendar, which means that the year-end buying season is upon as we continue through this fourth and final quarter. So, how can you make sure that your company is considered by government procurement officers and end users who use your product or service (and influence buying decisions)?

No matter what you sell ­- from janitorial services to agricultural supplies - these marketing tips can help you secure federal fiscal year-end business.

1. Plan Ahead

Hopefully, you haven’t waited until now to think about how you can make the most of your federal year-end sales. It’s important to have built relationships with those influential government folks by way of integrated marketing efforts and effective marketing throughout the year - and sometimes longer. A strategy with a component of developing relationships and a foundation with government users and buyers can result in a solid return on investment when September comes.

Nevertheless, a carefully crafted marketing plan can help you undertake those final critical months of the year and help keep your business top-of-mind. Strategic planning between sales and marketing should start in June or sooner, with campaign execution starting in mid to late July.

2. Understand and Target Your Top Customers

Make sure your team is aware of and understands the latest federal happenings and directives. Use your knowledge of these mandates to frame your year-end strategy about how exactly your product or service can help. Showing your awareness and intimate understanding of what’s required of an agency can help you differentiate your small business - leading with specifics and a tailored approach versus a general marketing message.

Keep in mind that it’s also best to keep your purview small by focusing on your top three agencies. This is not the time to be all things to all people or explore new business in new markets.

3. Offer a Year-End Special

Although offering discounts isn’t always effective (particularly in a competitive market), you can distinguish your business in a few ways with a year-end special offer.

In general, ensure your specials align with your overarching year-end message. This could be as simple as offering a one-hour quote turnaround during the month of September.

4. Market Your Contracts

Having a GSA Schedule is great, but don’t ignore the other contracts in the lineup. Not everyone buys off the GSA contract. If you have other federal contracts, include them on your marketing materials. And if you are a sub-contractor, don’t forget to include information about your partner contracts, too.

5. Market to Procurement Officials

Keep in mind the procurement and contract officers. They’re responsible for spending the money within the agencies; they’re busy gathering quotes, processing paperwork and making sure the budget is used as efficiently and responsibly as possible.

If your budget allows, consider developing a sideline marketing campaign to specifically target contracting officers and procurement teams to help keep your business name and contact information top-of-mind.

Lead with a message that communicates how you can simplify the year-end buying process. Offer extended hours, one-hour quote turn-around or other value-adds to help ease the process of doing business with you. And be sure to update your website, email signature and other outbound marketing pieces with this information.

The fiscal year is coming to a close, but there’s still a wealth of opportunity for your small business to get its share of those year-end government dollars. Have other questions about government contracting? Check out your local Procurement Technical Assistance Center (PTAC), which provides local, in-person counseling and training services to businesses that want to sell products and services to federal, state and/or local governments.

Money Photo via Shutterstock




NSA chief defends surveillance programs at Black Hat

The director of the National Security Agency justified the mass surveillance and bulk data collection programs in an attempt to assure the public that its intentions are justified, legal and noble.

The morning address from General Keith Alexander at the Black Hat conference in Las Vegas was highly anticipated, both because Alexander, who also runs the US Cyber Command, rarely speaks publicly but mostly because of interest over how the privacy-conscious crowd that attends Black Hat would respond.

Alexander was deliberate and equanimous as he spoke, seemingly aware of the growing outrage that has resulted in the wake of NSA leaks by whistleblower Edward Snowden. The general was interrupted several times, mostly by the same person, but remained in control of the talk throughout and seemed to have the support of a large majority of the room.

"Our job is defending this country," he said. "Saving lives.

Throughout, Alexander leaned heavily on the wars in Iraq and Afghanistan, 9/11 and ensuing terrorism investigations to justify the agency's use of an expansive surveillance apparatus that monitors both call information (known as metadata) and online communications and content.

He said the programs have helped bust would-be terrorists, including someone plotting to blow up the New York subway system in 2009, though reports have argued this may not be the case.

He specifically addressed Patriot Act Section 215, which authorises the collection of call records, including the data and time of the call, the number calling and called, duration of the call and the origin of the metadata record -but not the content of the call. Some have found this information being potentially in the hands of the US government to be very troubling.

The program is designed, Alexander said, to intercept the communications of suspected terror associates communicating with someone inside the US. 

Later, he addressed FISA Amendments Act Section 702, which enables the so-called Prism program. Defending any technology companies that provide information to NSA under the program, he said: “They are compelled by a court order to comply.” He also said its goal is for foreign intelligence, not to target US citizens.

Alexander said the programs have received Congressional support and have retained judicial oversight. He hit back against contentions that the FISA court simply "rubber stamps" requests it receives, saying the court isn't one to be bulldozed, "even from a four-star general." 

Some, however, believe the problem with FISA goes beyond a rubber-stamp mentality. The ACLU and EFF, for example, have filed lawsuits challenging FISA amendments to learn whether the NSA's surveillance efforts are constitutional, but they have so far been rebuffed because FISA rulings are kept in secret.

The Black Hat crowd was largely supportive of Alexander, though there were some disruptions.

“We stand for freedom,” Alexander said at one point. “Bullsh*t,” an audience member responded. There was some applause, but not nearly as much as when Alexander answered an audience member at the end of his talk, when questioned on the general's allegiance to the US Constitution, he said: “I read the Constitution. You should too.”

Afterward, privacy researcher Moxie Marlinspike, who briefly disrupted the talk by asking Alexander “why he lied to Congress”, said he found the largely receptive, if not welcoming, reaction from the crowd to be “disgusting” but predictable.

“A lot of people here work in the defence industry, and that's where they get their paycheck from,” Marlinspike told SC Magazine US. He added that Alexander used the “same talking points” as the government has before to describe the surveillance programs, and the points were meant to justify their existence.

There remains many more questions than answers due to the immense secrecy shrouding the NSA's work, Marlinspike said.



Kaspersky to end hosted services this month

Kaspersky has confirmed that it will commence winding down its hosted security service this month.

In an email to SC Magazine, Kaspersky confirmed its announcement from August 2012 that it was ceasing to sell Kaspersky Hosted Security (KHS), but that all existing customers would be fully supported through to August 2013.

Now it is passing users to partner Spamina after ‘an exhaustive study of the SaaS market'. “Spamina has proven to be extremely successful at providing their customers with industry-leading hosted email and web security services,” it said.

“Having integrated Kaspersky Lab's industry leading engine as a substantial component of our malware detection system, we ensure customers have the same high level of protection they've become accustomed to with KHS. In addition, Spamina offers additional valuable features such as email continuity, automatic email backup, optional webmail access, rules engines, great spam and malware filtering protection, cloud-based architecture, Kaspersky Lab's anti-virus engine as well as a partner console for easily setting trial accounts, activating licenses and manage your contract renewals from a single point console.”

Kaspersky confirmed that it and Spamina had developed a special migration offer for KHS customers, and it had also introduced Managed Service Provider to offer resellers the opportunity to offer Kaspersky's products to their end-users under a managed service, with monthly billing available.

Asked why this decision had been made to end its hosted security service, Kaspersky said: “Kaspersky Lab sees very strong market potential for its endpoint protection suites. We plan to allocate significant resources to the projects that will deliver the highest value to our partners and customers. This means that Kaspersky Lab's flagship B2B endpoint protection suite products will continue to be the main focus of the company's development efforts.

“Kaspersky Lab has maintained our KHS business for two years. The technology we've deployed is excellent and the satisfaction among our customers is high. We've always believed that we should provide our customers with the highest level of service quality while employing a channel strategy that rewards partners with a handsome profit margin.

“After careful analysis, we have come to the conclusion that KHS business model is not sustainable over time and that we have to invest our future efforts into areas where we will continue to build strong business relationships with our valuable channel partners.”

Commenting, Joel Smith, CTO of AppRiver, said that while there is still a market for hosted security, doing cloud was ‘not easy'. He said: “It requires a lot of management and you do not know until you are doing the service.

“I don't run into Spamina in the market, but this is a good revenue component for them, but users will need a service. Email is not security, but it is smart to think of it as one piece. The small-to-medium business will think of it as a piece of security; the small-to-medium enterprise will think of it as one and manage it as one also, they think that the inbox should be managed for them. Larger businesses will own their own email and take care of themselves.

“We see email as being an economy of scale and ramped up with cloud services. If a user does it in the data centre they end up with issues and more costs. If you are a pure play security provider, then it is different from other models. Some users will go with a pure play provider such as Symantec, but like Kaspersky it is not their core service.”

Asked if he felt that email was a declining sector, Smith said it was not as it facilitates work so much, but users do not want to manage it themselves.



Web application scanner and vulnerability assessment tool launched in beta

A cloud-based web application security assessment tool has been launched by High-Tech Bridge.

Combining automated vulnerability scanning and manual penetration testing, it said that the beta of ImmuniWeb brings ethical hacking within the reach of any small to medium business and users, while the hybrid approach significantly reduces the rate of false-negatives and eliminates false-positives in assessment reports.

It also claimed that its assessment results can be used to establish whether a full in-depth penetration test or source code review is required. It consists of three interconnected components: the ImmuniWeb Portal which is used to manage the security assessment process from configuration and secure online payment to report delivery; the Security Scanner which evolves with each security assessment; and a team of High-Tech Bridge web security experts who thoroughly monitor the scanner progress and behaviour.

Ilia Kolochenko, CEO of High-Tech Bridge, said: “Today many SMBs are unfairly prevented from securing their websites due to low budgets, lack of in-house technical skills or administrative restrictions. ImmuniWeb will enable SMBs to secure their websites in a simple, efficient and cost-effective manner.

“Website developers and owners want to know that they can rely on an assessment report to cover what the issues are and how to go about addressing them - they should not have to read complicated technical reports, full of security jargon. Details on how any detected vulnerability can be exploited and recommended fixes are provided by our security auditors in an easy-to-understand format, which is especially useful for individuals unfamiliar with web security.

“At the same time we strictly follow industry best-practises and standards, such as CVE and CWE Compatibility certifications, which we have recently obtained for ImmuniWeb.”



Web application scanner and vulnerability assessment tool launched in beta

A cloud-based web application security assessment tool has been launched by High-Tech Bridge.

Combining automated vulnerability scanning and manual penetration testing, it said that the beta of ImmuniWeb brings ethical hacking within the reach of any small to medium business and users, while the hybrid approach significantly reduces the rate of false-negatives and eliminates false-positives in assessment reports.

It also claimed that its assessment results can be used to establish whether a full in-depth penetration test or source code review is required. It consists of three interconnected components: the ImmuniWeb Portal which is used to manage the security assessment process from configuration and secure online payment to report delivery; the Security Scanner which evolves with each security assessment; and a team of High-Tech Bridge web security experts who thoroughly monitor the scanner progress and behaviour.

Ilia Kolochenko, CEO of High-Tech Bridge, said: “Today many SMBs are unfairly prevented from securing their websites due to low budgets, lack of in-house technical skills or administrative restrictions. ImmuniWeb will enable SMBs to secure their websites in a simple, efficient and cost-effective manner.

“Website developers and owners want to know that they can rely on an assessment report to cover what the issues are and how to go about addressing them - they should not have to read complicated technical reports, full of security jargon. Details on how any detected vulnerability can be exploited and recommended fixes are provided by our security auditors in an easy-to-understand format, which is especially useful for individuals unfamiliar with web security.

“At the same time we strictly follow industry best-practises and standards, such as CVE and CWE Compatibility certifications, which we have recently obtained for ImmuniWeb.”