GoDaddy Launches Get Found, Google Takes Hit on Motorola Sale

There’s big news every week that can affect your business. The Small Business Trends editorial team makes sure you get it all. Here’s our weekly roundup:

New or Rebranded Services

GoDaddy launches Get Found. GoDaddy launches Get Found as a new feature. It’s actually an evolved version of a technology GoDaddy acquired last year. We now see it put to use so large and small business can get attention on the Web.

Microsoft renames SkyDrive. Microsoft’s cloud service will soon be called OneDrive. The change is the result of an infringement suit filed by UK broadcaster BSkyB.

Acquisitions

Google Takes $9.5 Billion Hit on Motorola. In case you haven’t heard yet, Google has announced intentions to sell Motorola to Lenovo. And the company took a big hit on the deal when you consider what the company paid for this business in the first place. But there’s another side to the story.

ThinkHR Acquires HR That Works. Actually the two companies claim it’s more of a merger. HR That Works Founder Steve Phin takes a position on the ThinkHR management team and a lot of the two companies’ resources are combined.

Social Media

Twitter is planning eCommerce move. The microblogging platform is apparently in talks with payment processing startup Stripe to handle the back end. But PayPal was also reportedly considered.

Is Tumblr traffic leveling out? Of course, we’re talking about active users here, not accounts, which sources say are still increasing. Still, Tumblr says reports trying to count their active users are missing the mark.

Now, animate your Pinterest with GIFs. They are popular files on many sites including social media these days. And now Pinterest has decided to support them too. So how will this change the site’s dynamic?

Grants

Get your Google grants. If you’re a non-profit, that is. Amanda DiSilvestro provides more information on the funding that’s available from the tech giant and how your non-profit can access it.

12 grant recipients celebrate. These businesses received $250,000 each, a combined $3 million in funding, from Chase’s Mission Main Street Grants. But they’ll also be traveling to Google headquarters in California for a course to help market their businesses better.

Security

There’s a new contender for worst password. In this  case, making the list is no honor. It indicates your password was weak enough to have already been guessed by hackers. Fortunately, there are some suggestions for making your pass code stronger.

Linksys offers cameras for your small business. If you’re responsible for security at your business, these cameras may interest you. Small Business Trends publisher Anita Campbell has more on the new Linksys products.

Finance

Dealing with Chinese currency fluctuation. If your small business deals with Chinese partners or vendors, be aware. Fluctuations in the exchange between the two currencies can add to the costs. Small Business Trends publisher Anita Campbell reports on some solutions.

Profiles

Speedzone Performance built from a passion for premium parts. We profiled this Florida business in our first Small Business Spotlight sponsored by iCIMS, provider of talent acquisition solutions for growing businesses.

Reading Photo via Shutterstock



How To Deal With The Extra Cost of Chinese Currency Fluctuations

It’s the Chinese New Year, and 2014 is the year of the Horse.

If your small business works with Chinese companies, there are some things to know.

Although we often think of Chinese currency as the Yuan, the official name is the Renminbi (RMB).  Use of RMB currency is growing.

According to November and December SWIFT data, the RMB has broken into the top ten most-used currencies for payments.

But if you do business with China, exchanges between the dollar and this Chinese currency may bring risks.

According to Alfred Nader, vice president of corporate strategy and development at Western Union Business Solutions, there are some things you can do to decrease the financial risk of currency fluctuations. Here are three strategies:

Pay Chinese vendors and partners in RMB instead of U.S. dollars.

“Our research shows that one in five Chinese suppliers add roughly 3-4% to invoices to cover FX risk, which is eliminated with RMB payments,” says Nader. Knowing this, U.S. businesses can look to negotiate a discount with their Chinese suppliers by asking if they want to be paid in RMB, he adds.

Lock in exchange rates for as long as 9 months.

This creates stability on small business’ balance sheets.  When you know your expense levels, you can more accurately forecast.

Use the offer to pay in RMB to open a dialogue.

You can initiate a conversation to change terms and improve business relationships, when you raise the currency issue.  By meeting the other side partway, you begin an important and potentially profitable dialogue.

Chinese currency photo via Shutterstock



The 7 Best WordPress Alternatives

Once upon a time, blogging platforms like WordPress were only used for blogging. Now, WordPress is commonly implemented for easy, user-friendly website design. But these days, WordPress isn’t the only game out there.

Below are the best established and up-and-coming WordPress alternatives, both for blogging and websites.

1. IM Creator

IM Creator bills itself as “a simple & elegant website builder,” and includes mobile-friendly templates that are a far cry from the early days of WordPress templates, which were flat, clunky and difficult to customize. Templates fall into categories like Architect, Wedding, Hotel and Restaurant and use visual imagery that fit each genre.

wordpress alternatives

The site offers ample support, including “how to” articles and manuals for those wanting a bit more technical detail but who, perhaps, don’t have that level of knowledge.

And while designing a site is free, IM Creator also offers white-label services for companies (marketing agencies, as an example) that want to provide their clients with branded website, hosting, email and domain services.

2. SilverStripe

SilverStripe is actually two animals. Its content management system (CMS) is used for building websites, intranets and Web applications. It is open source, which means, of course, it’s free to use.

wordpress alternatives

For most small business owners, that’s all you’ll need from SilverStripe. But if you’re more technical and looking for more complexity in your content management system, its Framework platform might fit the bill. The benefits of using Framework, according to the website are that it “reduces the overhead associated with common programming tasks, and enables developers to write code in a logical and structured manner.”

3. Tumblr

Tumblr is designed for blogging and social sharing. Stripping away all the scary backend of a blog platform, Tumblr makes it dead simple to share a blog post, video, photo, link or audio file.

wordpress alternatives

Its simplicity, combined with the fact that users spend on average 154 minutes a day on Tumblr, make it a resource worth considering to reach a wider audience (especially if that audience is between 18 and 34 and male).

4. Google Sites

For those die-hard Google fans, Google Sites offers a simple, no-frills solution to website creation. If you’re looking for fancy marketing copy and rich, visual images, you’re in the wrong place. Google assumes if you’ve stumbled upon its unpublicized Sites page, you’re already accustomed to the spartan attitude that is Google.

wordpress alternatives

The templates aren’t frou-frou, but there are interesting add-ons like maps and blogs (using Google properties, naturally).

5. Blogger

Another Google property, this one focused on blog development, is Blogger. Consider it Google’s response to the massive popularity of WordPress. An obvious benefit of staying in the Google family is that Blogger uses Google Analytics without having to visit a separate site entirely.

wordpress alternatives

Blogger, whose hosted blogs are all hosted on Blogspot domains, also ties in seamlessly with Google+, as would be expected. Bloggers can view and respond to blog comments through Google+ rather than having to log into the blog backend. AdSense publishers like Blogger because Google’s ad platform is integrated into the blogging platform.

6. GetHiFi

Unlike the other WordPress alternatives listed here, HiFi is more targeted to the small marketing agency who designs or updates websites for its clients. It still requires a designer and/or a programmer to customize its visually rich templates, but after that, anyone, technical or otherwise, can easily update content through the CMS.

wordpress alternatives

HiFi promises that, even if you don’t know what SEO (search engine optimization) stands for, it can help ensure your site is search engine friendly. If you do know what SEO is, you can edit the meta descriptions yourself, which is easy enough to do.

7. Ghost

Consider Ghost the antithesis to WordPress in that it removes the clunkiness (“What do I do with this plugin? No idea.”) that many less technical bloggers experience with WordPress and focuses instead on writing and publishing.

wordpress alternatives

The premise is that bloggers can write in Markdown, a text-to-HTML conversion tool, and see a preview of what the post will look like.

Interestingly, the platform is free, but Ghost charges for its server. In fact, Ghost charges based on the number of blogs, as well as the total traffic of all blogs (one blog with 10,000 or fewer views a month is $5 monthly).

* * * * *

Bottom line:  With more blogging and WordPress alternatives available, it’s easier for small businesses to find exactly what they’re looking for, based on their technical skill level, how much support they need, budget and type of site they want to publish.  There are alternatives for those who want more of a blog approach (Blogger) to those who want more of a website presentation (IM Creator).

Pondering Photo via Shutterstock

More in:

Lenovo Is Buying Motorola from Google. Here’s Why it Matters To Small Businesses.

Google bought Motorola in 2011 for about $12 billion dollars. Google recently announced that it’s selling Motorola to Lenovo for $3 billion dollars. Why does this matter?

Google is a master at engineering simple and fast software - that does amazing things. Think Gmail, Google (search) and other awesome tools we use and love. However, Google is not the leader in making hardware - Lenovo does that quite well.

From this purchase expect to see Lenovo enter the phone business - not just selling computers anymore.

While Apple still reigns in creating smartphones, it’s got stiff competition from Samsung. Lenovo’s entry to the marketplace could cause even more serious competition.

What does this mean to you?

It means that we small business owners have a continued wider selection of smart phones, with amazing features to pick from. Here’s the key areas you need to focus on when buying a smart phone.

The wireless carriers - AT&T, Verizon Wireless, T-Mobile, etc. Make sure you have wide coverage, fast service and great support.

The cell phone you have will be a huge factor in how successful your mobile productivity is. This is where Lenovo comes in. Can it innovate enough to make a smart phone (or more than one) that makes a difference? Can it offer the marketplace something that Apple, Samsung and other vendors don’t have?

The software (apps) - the apps on your cell phone and those you download are critical to adding customized productivity to your day to day work day.

NEVER forget about your mobile security - in fact be vigilant of all apps you download and links you click on.



ChewBacca malware hits retailers in 11 countries

A new point of sale-based Trojan called ChewBacca has been used to steal payment card and personal customer data from dozens of retailers across 11 countries, according to RSA.

The rapid spread and ‘success' of the malware was revealed in a 30 January blog by RSA senior security researcher Yotam Gottesman and has led to calls for retail organisations to encrypt or tokenise cardholder data to keep it secure.

Gottesman said ChewBacca, which was only discovered in mid-December by researchers at Kaspersky, is behind the theft of customer data from several dozen retailers in the US, Russia, Canada, Australia and seven other countries. So far the UK remains unscathed and RSA has found no links between ChewBacca and the recent hacks at major US suppliers Target, Neiman Marcus and Michael's.

RSA would not confirm the names of the retailers affected but said they been hit between 25 October and 15 December. RSA has contacted them to share the information it has gleaned.

RSA said the ChewBacca botnet is able to collect track 1 and 2 payment card data and confirmed, significantly, that it uses the Tor network to hide the identity of the criminals behind it. However before disappearing behind Tor - the free software which protects Internet anonymity, RSA spotted its controller logging in from a country in East Europe.

ChewBacca steals data in two ways: it uses a keylogger and a memory scanner, which targets systems that process credit cards such as POS terminals. This scanner looks for card magnetic-stripe data, then when it finds it, extracts and logs it. The malware includes a control panel that lets criminals review the stolen information.

After installation, the keylogger creates a file called ‘system.log'. Based on its current findings, RSA believes that deleting this file and rebooting will effectively remove ChewBacca from an infected system.

Rashmi Knowles, chief security architect for the EMEA region at RSA, told SCMagazineUK.com: “ChewBacca has been upgraded with Tor functionality, which enables anonymous communication, allowing IP addresses to be hidden. This version installs a Tor client on the victims' computer system, so all traffic from the cybercriminals' server to the cash register remains hidden.”

Knowles described the rapid spread of ChewBacca as “a wake-up call” for the retail industry and added that it's the latest example as to how “regulation like PCI does not make you secure.” She instead urged organisations to focus on the early detection of breaches to minimise damage and to consider encryption and tokenisation.

“An option is to examine where card numbers are being kept in plain text and look at encryption or tokenisation technologies,” she told SCMagazineUK.com. “Cyber criminals are always going to try to be a step ahead of company's defences so they have to be prepared.”

Security expert Richard Moulds, vice president of product strategy at Thales e-Security, echoed her call for encryption.

“The ChewBacca findings simply confirm something we already know - regular PCs and servers can't be secured,” he told SC.

“In-store point of sale terminals are particularly vulnerable because they handle highly sensitive cardholder data, they exist in large numbers so are hard to manage and yet are in notoriously insecure places - the retail store.”

Moulds backed the PIN protection system as PINs are encrypted directly in the card reader as soon as they are entered by the shopper and decrypted only when absolutely necessary.

“We should extend this approach to cover all cardholder data,” Moulds said. “Encrypt or tokenise cardholder data at the point of capture and decrypt only on a need-to-know basis and only in trusted environments.

“Encryption protects data wherever it goes. It's the difference between giving data its very own bodyguard rather than relying on bouncers at every doorway the data passes through.”



BAFTA film academy suffers website hack

BAFTA, which runs run the British film and TV 'Oscars', has had one of its websites attacked with usernames, emails and encrypted passwords possibly stolen.

The hack happened on 23 January but was only reported by BAFTA on 30 January, after it had notified users of the breach, moved the website to new secure servers and deleted all data from the site database. The charity says it does not know who the attackers are, or their motives.

The breach hit the BAFTA Guru website, which offers advice to budding film directors and those interested in the TV and games industries from well-known industry figures.

BAFTA has reported the hack to the Information Commissioner's Office (ICO) which in turn confirmed to SCMagazineUK.com:

“We have recently been made aware of this possible data breach. We will be making enquiries into the circumstances of the alleged breach of the Data Protection Act before deciding what action, if any, needs to be taken.”

The charity insists the hack did not affect its BAFTA Awards or the data of its BAFTA membership, which is held on a separate database. A spokesperson told SC that “investigations are currently underway” but declined to say how many people were affected.

BAFTA said in a statement that it has “moved the site to a new server and securely deleted all email addresses and passwords from the website database”, adding that “the new servers have been independently tested to ensure that they are secure. Routine security checks will also continue as usual.”

The charity added that it has “requested a full and immediate investigation by the companies that designed the site and managed the server on which the site was hosted”.

The Guru website was created by digital agency and software development company, Illumina Digital, working in partnership with branding agency The Council.

SCMagazineUK.com contacted Illumina Digital but a company representative said they were providing “no statement”.

BAFTA says it has no direct evidence that data has been stolen, but alerted its users so they could change passwords if they felt it necessary. It said: “Personal data entered by our users during the registration process for the site included first and last names, email addresses, age and encryption-protected passwords.

“We believe it's better to be safe than sorry. We have contacted everyone who has registered on the site to make them aware of the situation so they can take any precautionary measures. This may include changing their password on any website where they have used the same user ID and password. As an additional precaution, all email addresses and passwords registered with the site have been securely deleted.”

Security expert Mike Loginov, chief cyber security strategist for HP ESS, said that it was important for the site users to change their passwords given the prevalence of cyber crime attacks based on collecting this kind of data.

Loginov told SCMagazineUK.com: “This has the hallmarks of a criminal intelligence-gathering exercise where data is captured for future use or targeted ‘spear phishing' attacks where the information on key individuals is collated for further exploitation.

“BAFTA have recommended that users of the site change any passwords they might use on other systems that are the same as the ones compromised as a first step - that's an imperative.”



Snowden backlash: Germany\'s Merkel takes UK to task

German leader Angela Merkel openly attacks the UK and US's mass electronic surveillance programmes

In a speech to the German Parliament last week following her re-election, Merkel - whose own mobile phone was bugged by the Americans - criticised the mass data harvesting by the UK's GCHQ intelligence agency and America's NSA revealed by ex-CIA contractor Edward Snowden, according to reports in The Guardian and US media.

She said: “Does it make it right for our closest allies, like the United States or Britain, to access all imaginable data - arguing that it helps their own security and that of their partners? Our answer can only be - no, that cannot be right."

She added: "A programme in which the end justifies all means, in which everything that is technically possible is then acted out, violates trust and spreads mistrust. In the end, it produces not more but less security."

UK privacy expert Nick Pickles, director of Big Brother Watch, welcomed her stance - and warned that Germany's stronger view on data privacy is encouraging companies to store their data there and so harming the British economy.

He told SCMagazineUK.com: “Chancellor Merkel is absolutely correct to highlight how it is not right for every possible piece of information to be collected by intelligence agencies. It is neither consistent with our values as democracies nor a sustainable way of dealing with the new challenges the internet poses for security.”

And he warned: “What is clearly a concern is that Germany's legal framework is viewed as more robust by businesses, both in terms of protecting customers from the state but also citizens from corporate data collection. That differentiation, coupled with a more transparent and rigorous oversight regime, makes Germany more attractive and we are already seeing efforts to lure businesses there because of these issues. That hits the British economy and is one of many reasons why we need a root and branch review of surveillance law in the UK, to ensure citizens and businesses alike can have confidence that their privacy and security is not being compromised.”

Pickles said “we need a full and frank review of the British legal framework and the role of GCHQ in issues like encryption standards, so we can be confident that we are respecting the privacy of ordinary British people, allowing Parliament to consider what surveillance is reasonable and to protect our digital economy”.

In her speech, Chancellor Merkel stopped short of threatening to suspend Europe's free trade agreement with the US to achieve change, and she said Germany's close friendship with the US should not be damaged "through surveillance measures that obstruct our trusting communication".

Two days after she spoke last Wednesday, she met US Secretary of State John Kerry in Berlin.

Meanwhile the latest Snowden revelation, reported by Canadian news broadcaster CBC, is that the Canadian intelligence service used metadata obtained from the free WiFi service at a major Canadian airport to track the mobile devices of thousands of airline passengers for days after they left the terminal.

CBC said the electronic eavesdropping was part of a trial run for the NSA and other intelligence services, and quoted one Canadian authority on cyber security as saying the operation was almost certainly illegal.



Snowden backlash: Germany\'s Merkel takes UK to task

German leader Angela Merkel openly attacks the UK and US's mass electronic surveillance programmes

In a speech to the German Parliament last week following her re-election, Merkel - whose own mobile phone was bugged by the Americans - criticised the mass data harvesting by the UK's GCHQ intelligence agency and America's NSA revealed by ex-CIA contractor Edward Snowden, according to reports in The Guardian and US media.

She said: “Does it make it right for our closest allies, like the United States or Britain, to access all imaginable data - arguing that it helps their own security and that of their partners? Our answer can only be - no, that cannot be right."

She added: "A programme in which the end justifies all means, in which everything that is technically possible is then acted out, violates trust and spreads mistrust. In the end, it produces not more but less security."

UK privacy expert Nick Pickles, director of Big Brother Watch, welcomed her stance - and warned that Germany's stronger view on data privacy is encouraging companies to store their data there and so harming the British economy.

He told SCMagazineUK.com: “Chancellor Merkel is absolutely correct to highlight how it is not right for every possible piece of information to be collected by intelligence agencies. It is neither consistent with our values as democracies nor a sustainable way of dealing with the new challenges the internet poses for security.”

And he warned: “What is clearly a concern is that Germany's legal framework is viewed as more robust by businesses, both in terms of protecting customers from the state but also citizens from corporate data collection. That differentiation, coupled with a more transparent and rigorous oversight regime, makes Germany more attractive and we are already seeing efforts to lure businesses there because of these issues. That hits the British economy and is one of many reasons why we need a root and branch review of surveillance law in the UK, to ensure citizens and businesses alike can have confidence that their privacy and security is not being compromised.”

Pickles said “we need a full and frank review of the British legal framework and the role of GCHQ in issues like encryption standards, so we can be confident that we are respecting the privacy of ordinary British people, allowing Parliament to consider what surveillance is reasonable and to protect our digital economy”.

In her speech, Chancellor Merkel stopped short of threatening to suspend Europe's free trade agreement with the US to achieve change, and she said Germany's close friendship with the US should not be damaged "through surveillance measures that obstruct our trusting communication".

Two days after she spoke last Wednesday, she met US Secretary of State John Kerry in Berlin.

Meanwhile the latest Snowden revelation, reported by Canadian news broadcaster CBC, is that the Canadian intelligence service used metadata obtained from the free WiFi service at a major Canadian airport to track the mobile devices of thousands of airline passengers for days after they left the terminal.

CBC said the electronic eavesdropping was part of a trial run for the NSA and other intelligence services, and quoted one Canadian authority on cyber security as saying the operation was almost certainly illegal.



BAFTA film academy suffers website hack

BAFTA, which runs run the British film and TV 'Oscars', has had one of its websites attacked with usernames, emails and encrypted passwords possibly stolen.

The hack happened on 23 January but was only reported by BAFTA on 30 January, after it had notified users of the breach, moved the website to new secure servers and deleted all data from the site database. The charity says it does not know who the attackers are, or their motives.

The breach hit the BAFTA Guru website, which offers advice to budding film directors and those interested in the TV and games industries from well-known industry figures.

BAFTA has reported the hack to the Information Commissioner's Office (ICO) which in turn confirmed to SCMagazineUK.com:

“We have recently been made aware of this possible data breach. We will be making enquiries into the circumstances of the alleged breach of the Data Protection Act before deciding what action, if any, needs to be taken.”

The charity insists the hack did not affect its BAFTA Awards or the data of its BAFTA membership, which is held on a separate database. A spokesperson told SC that “investigations are currently underway” but declined to say how many people were affected.

BAFTA said in a statement that it has “moved the site to a new server and securely deleted all email addresses and passwords from the website database”, adding that “the new servers have been independently tested to ensure that they are secure. Routine security checks will also continue as usual.”

The charity added that it has “requested a full and immediate investigation by the companies that designed the site and managed the server on which the site was hosted”.

The Guru website was created by digital agency and software development company, Illumina Digital, working in partnership with branding agency The Council.

SCMagazineUK.com contacted Illumina Digital but a company representative said they were providing “no statement”.

BAFTA says it has no direct evidence that data has been stolen, but alerted its users so they could change passwords if they felt it necessary. It said: “Personal data entered by our users during the registration process for the site included first and last names, email addresses, age and encryption-protected passwords.

“We believe it's better to be safe than sorry. We have contacted everyone who has registered on the site to make them aware of the situation so they can take any precautionary measures. This may include changing their password on any website where they have used the same user ID and password. As an additional precaution, all email addresses and passwords registered with the site have been securely deleted.”

Security expert Mike Loginov, chief cyber security strategist for HP ESS, said that it was important for the site users to change their passwords given the prevalence of cyber crime attacks based on collecting this kind of data.

Loginov told SCMagazineUK.com: “This has the hallmarks of a criminal intelligence-gathering exercise where data is captured for future use or targeted ‘spear phishing' attacks where the information on key individuals is collated for further exploitation.

“BAFTA have recommended that users of the site change any passwords they might use on other systems that are the same as the ones compromised as a first step - that's an imperative.”



Book Review: “Made to Stick” from by Chip Heath and Dan Heath Show Us Why Some Ideas Survive and Others Die

Ever wonder why certain ideas survive and others die? “Made to Stick” by Chip Heath and Dan Heath show us exactly why certain ideas stick and why others just fade away.

The book explains how simplicity and emotion play a part in the success of ideas and how you, as a small business owner, can use these strategies to get your ideas to ‘stick’.

Check out my full video review here, or watch below:



Aly Saxe of Iris: PR Today Calls for Efficiency, Scalability and Accountability

It’s every business’ dream to get featured in national publications, popular websites and even television. But getting the attention of important outlets takes a great deal of effort to connect and interact with influential people that can make it happen. In today’s over saturated world of tweets, texts and email overload, it also takes a systematic approach to pull it all together efficiently…and repeatedly.

PR professional Aly Saxe, founder of the PR management platform Iris, discusses the challenges of modern public relations in the face of rising competition to get clients on the front page, and faster rising customer expectations to make it there.

* * * * *

modern public relationsSmall Business Trends: Can you tell us a little bit about your personal background?

Aly Saxe: My background is on the public relations agency side. I worked for a couple different agencies in their technology groups before starting my own B2B technology-focused agency in 2007. Started it in Phoenix, Arizona, and somehow managed to grow through those years into Silicon Valley areas, like Boulder, Dallas, Austin, a little bit more in Southern California. Also the Phoenix market, where we’re based.

Then in about 2011, as a small business owner, things got to be pretty painful with our processes and management and reporting, and that’s when Iris was born.

Small Business Trends: Iris is a cloud-based public relations management system. With the growth of social and the latest technologies, the noise that’s getting generated, it must be very difficult for companies to get the kind of attention that they need. Is that why you put together Iris?

Aly Saxe: That’s one of the big reasons. PR has definitely changed. There’s more urgency than ever for companies to be noticed. Especially small companies that are competing with large brands that have huge, or even unlimited, marketing budgets. Not to mention the news media landscape, as you know, Brent, has changed a lot.

Iris was created to really help on two fronts. One is to help PR teams within companies - small and large or agencies.  Iris helps companies manage everything that they’re doing. The pace of our day to day is so much faster than it’s ever been in keeping track of all the pitching we’re doing, all of the reports, all of the results that are coming in, the different campaigns we’re working on. It’s a lot to manage.

Small Business Trends: How does a system like yours that’s focused on public relations and promotions differ from marketing automation?

Aly Saxe: Marketing automation is an interesting comparison, because it is a somewhat newer category. It’s also a bit of a misleading category, because it’s meant to automate marketing processes but what a lot of those systems do is actually create a lot more work for the marketing department to manage those systems.

I would actually compare Iris more to CRM (customer relationship management). Not necessarily in functionality, but in the idea that it takes what a person would do with a Rolodex, spreadsheets and some notepads and actually build some process around that through a very smart tool.

Small Business Trends: How does this kind of system help your clients build the kind of relationships that they’re going to need to in order to get the word out?

Aly Saxe: It all comes down to influencers and relationships with those influencers. So whether they are a social evangelist, a blogger, a traditional reporter, an analyst, they’re all influencers that are important to the PR person, clients or company. The difference between now and five years ago is there are about ten times more now that we have to build relationships with versus previously.

The way that Iris helps is all of your interactions with those influencers are automatically captured in the software. So if your boss or your client were to say to you, ‘Hey, have you talked to so and so from Small Biz Trends recently? I’d really like to chat with them about what we have coming up.’ Instead of having to wrack your brain, go back to your email, go look in spreadsheets, find your notes and determine when the last time you spoke to them was, you could just pop into Iris and see your entire history with that person.

So there’s a huge benefit to having all of that relationship history in one place. Not just for you, but for your team as a whole.

Small Business Trends: Do small businesses understand that PR is more science than art and needs these kind of processes/systems?

Aly Saxe: I think they are savvier. They’re sophisticated in that regard. But I think that they’re also expecting their PR agencies or their PR teams to step up, and they’re kind of wondering why we haven’t.

I think that there is certainly a misunderstanding about the PR process, and there’s always expectation management, which PR people deal with a lot. But I think that we can curb those pains by showing the small business owners not only are we sophisticated, not only is there a science and a method to this madness, but here are the tools we use to help manage that method.

I think it can only help us prove that we’re not just out there waving our hands and producing a New York Times piece. There’s a lot of work that actually goes into that.

To that point, that was also part of the impetus of creating Iris. I would have clients come to my agency and say, ‘Well, what’s it going to take to get written up in The New York Times?’ And I kept giving them the qualitative answer,’Well, it’s going to take a really interesting news hook, or a trending story, or a great customer case study.’

The client didn’t want to hear it. It took me a long time to figure out that what the client wanted was a number. They wanted to know how many interactions do you have to have with The New York Times over what amount of time? Is it three months, six months, a year before they’re going to pay attention to us?

Once I figured out that they were asking a more sophisticated question, that’s when I started thinking about Iris and how I can deliver that answer?

And then I had to answer the question, how do I even determine that? One day I had a client that said, ‘What’s it going to take to get in The New York Times?’ This is a true story. I found four of my existing clients that had been in The New York Times recently, and I looked at what it took to get them in The New York Times. From how many months of pitching, how many pitches, how many news items we had to deliver and how many interviews before The New York Times wrote about them.

It took me an entire day, and that’s thousands of dollars in my agency’s world to deliver the answer to that client. Once I did, the client never asked again, and that’s when the light bulb went off.

Small Business Trends: Wow. That’s a cool story. It will only become more and more of a necessity to be able to answer that quickly just from a standpoint of knowing what it’s going to take and being able to deliver that quickly. Then help them execute it.

Aly Saxe: Exactly. I think the data is going to become more and more important. Again, you see other industries utilizing data to set benchmarks, to improve performance, to win business, to set industry standards. I think that in the PR industry, we’re going to start catching up to that and using data like this to do the exact same thing. I think most small business owners are looking for that data from their PR partners.

Small Business Trends: Where can people learn more about Iris?

Aly Saxe: The website is MyIrisPR.com.

This interview on systematic modern public relations strategy is part of the One on One interview series with thought-provoking entrepreneurs, authors and experts in business today. This transcript has been edited for publication. To hear audio of the full interview, click on the player above. 



Snapchat hack - a lesson almost learnt

Security stress testing needs to happen at the development stage says Grayson Milbourne, Director of Security Intelligence at Webroot, who looks at the lessons learned from Snapchat

A good thing about tech start-ups is how quickly they are able to learn from their mistakes.  Just weeks ago Snapchat, a popular photo messaging application founded by two Stanford University students, was hacked and details of more than four million user accounts were leaked online. Hackers claimed their motivation was to raise awareness of the vulnerabilities of the app. In response, two weeks later the company introduced a new way of verifying user accounts, in a bid to prevent hackers from recreating their stunt. While this was certainly a step in the right direction, this new feature has already been breached by a security researcher, thus highlighting an important lesson around app security for all start-ups.

It remains true that most start-up companies have a modest start. They are understaffed and with small budgets, but have a really great idea. Their main focus is to use the limited staff and resources available to do everything possible to make their dream a reality. Unfortunately, this most often means that proper security testing of their application falls to the side as a non-critical task. This is a serious problem, as most app vulnerabilities are best addressed at the development stage. Once an app is in operation, it becomes very difficult to mitigate lack of appropriate security measures, as we've just learnt from Snapchat.

Often, a lot of the vulnerabilities lay in the types of permissions requested by an app, which are decided during the development stage. The trouble with the permission systems is that many permissions are rather broad in scope - for example almost every app nowadays requires access to the Internet. In the case of Snapchat specifically, the app doesn't have an unusual number of permissions, but the way data is accessed and transmitted is what makes it so insecure. There are also other considerations - start-ups who design apps for iOS rarely come across this type of problem because Apple has a very thorough app review process, which includes code review for potential flaws. While great for security, it seriously slows the release of new iOS apps. Android on the other hand, has no formal review process, which is good for fast releases but less secure, as the responsibility for the security of apps falls on developers.

Although today's computer science degrees already put a strong emphasis on security in programming, humans are still prone to error despite their best attempts at designing and writing secure applications. Although start-ups are generally on a very tight budget, in today's security environment, stress testing new applications for security flaws needs to be part of the development cycle. It doesn't need to be expensive, as there are a number of tools available which analyse code looking for common vulnerabilities, but it does require a change in approach. Start-ups need to start putting security at the heart of their operation - or be prepared to face the consequences that cost Snapchat so dearly.



Your Marketing Problems Are Solved

marketing problems cartoon

Sometimes you underestimate what a cartoon is going to require when you first get an idea. The basic premise here was that someone combines parts of a lot of different social media into something that’s obviously not going to work, but they assume it covers all the bases.

But when you get into it and you start piecing it together, you realize you can’t put the + right before the emoticon because then they combine confusingly. And there’s no good way to work LinkedIn in that’s not awkward. And you need a place for the characters to use this Franken-word that’s commonly used, but that’s obviously not going to work.

When it’s all done, hopefully you’ve got a good cartoon. But mostly you’re just glad to have gotten it done.

P.S. Don’t forget to #Like+Pin:) this!



Yahoo reveals hackers tried to raid email accounts

Yahoo has urged customers to change their email passwords after confirming that hackers tried to gain access to Yahoo Mail accounts.

In a statIn a statement issued late on Thursday, the company detailed that hackers had used “malicious computer software” in a “coordinated effort to gain unauthorised access to Yahoo Mail" accounts, but stopped short of revealing when the attack had taken place. The attackers supposedly tried to get names and email addresses from victims' sent emails.

“Based on our current findings, the list of usernames and passwords that were used to execute the attack was likely collected from a third-party database compromise. We have no evidence that they were obtained directly from Yahoo's systems,” the company said on its Tumblr page.

“We regret this has happened and want to assure our users that we take the security of their data very seriously”. Yahoo is now working with US federal law enforcement to “find and prosecute the perpetrators responsible for this attack”.

This is the latest embarrassment for Yahoo. Marissa Mayer's company faced heavy criticism after mocking the brief Gmail outage last week, something the company later said “reflected bad judgement”.

The company revealed that a malware attack hit Yahoo's advertising servers earlier this month, an incident which could have affected hundreds of thousands of users.

Fujitsu UK's chief security officer David Robinson said that this latest attack should serve as a reminder to businesses that not only is the cyber threat real, but that it is increasingly coming from sophisticated criminals.

“Many businesses, and consumers, are still failing to see the reality of the situation we are now facing. The effort required to combat breaches is industrial. Companies are no longer fighting against individuals, but a sophisticated criminal industry, designed solely to access their data. This is why we describe organisations in two groups, those who have been hacked, and those who will be.” 

Ashish Patel, regional director at Stonesoft, a McAfee Group company, concurred with Robinson and said that Yahoo needs to look at the data shared with third-parties. 

“This latest attempt to hack Yahoo highlights the growing responsibility of businesses to do far more to protect users' data. If it is indeed the result of a third-party database compromise, Yahoo needs to have greater insight into the security systems of the third parties it is sharing data with to avoid a repeat performance and ensure it remains a trusted brand.

“Any organisation can be at risk to a cyber-threat, with information both an asset to be protected and a weapon to be used. Because of this, security teams within all industries need to assess their current protection, deploy appropriate measures and remain vigilant.”



Linksys Introduces Surveillance Cameras for SMB Premises Security

linksys surveillance

After re-entering the SMB market back in November of 2013, Linksys has launched more products for the small business market.

If you are concerned with or in charge of security in your business, the new Linksys products are designed for you.   These Linksys products include four surveillance camera models, including indoor and outdoor models.  Depending on the model, the camera features include night vision, weatherproofing, vandal-proof housing and zoom, pan and tilt features.  

Most of us have seen a  television show about how surveillance cameras may not actually record â€" or else the recordings are quickly written over, making them not quite as useful later in the event of a loss or crime.  Linksys deals with this issue via a new network video recorder.  The recorder can do remote and live monitoring, along with playback and recording.  Up to 8 terabytes of storage can be handled. You can also record up to eight video feeds simultaneously.

The suggested MSRP price of the cameras starts at $449.99 and goes up to $699.99, depending on the features.

The video recorder will be available starting in February at an MSRP of $799.99.

Linksys will be selling the products through dealers and distributors, and provides a locator on its small business site to find a distributor.

Linksys is headquartered in Irvine, California. It was founded in the late 1980′s and is currently owned by Belkin, which bought the brand from Cisco back in early 2013.

Today Linksys provides connectivity products including routers, switches and WiFi cameras.  The company’s surveillance products are an extension of its mission to assist businesses with security, both digital and on-premises, in a scalable manner suited to growth oriented small businesses.