Fresh Ideas from BurrellesLuce

Syndicate content
Fresh Ideas from BurrellesLuce. Although we’re at the forefront of PR - leading innovation in media monitoring and measurement - we don’t know it all. That’s why we are out there exploring and learning alongside you. Fresh Ideas from BurrellesLuce gathers our resident experts and industry insider guest bloggers to share their thoughts on media, public relations, and marketing and provide you with a place to share ideas about what matters most to you. Together we can ensure breakthrough communications.
Updated: 2 hours 19 min ago

Adulting as A New Professional

Jan 25, 2017

By: Whitney Welker*

As a recent college graduate, it would be a lie if I said that working in the ‘real’ world turned out to be everything I thought it would be. You know what I’m talking about. The whole ‘oh now my life is magically all together’ scenario. You land the perfect job and all of a sudden you have all this free time for friends, perhaps a hobby, oh and of course you meet your soul mate almost immediately {retch}. At least that’s what we are led to believe; that all of our problems will be solved by our first job. WRONG.

One of the first things I learned out of college was that everything I’d need to know about doing my job to the best of my ability wasn’t necessarily going to be things I learned in the classroom.  All of those ‘real life’ scenarios, case studies and pitches that we worked on so diligently meant very little now. Yes, while in college I learned intangible skills to prepare me for landing a job, and I most definitely learned more about the industry, but there was so much more to learn.

As a result, I started looking to my coworkers for examples and advice. To give a little background, with my job I am a marketing department, of one, for the region I support, so it’s pretty safe to say that learning by brainstorming and picking the brains of my coworkers was going to be my best option. Learning from your coworkers can actually be one of the best things as well. They have been in the industry longer than you, so use that experience to help yourself succeed.

Another thing that I learned was not to try and tackle the world in a day. This will never work. I find myself making a To Do list for the day with about 25 things on it. Let’s be honest, all of those items are not going to get done today. So I learned to make a weekly To Do list, and a daily To Do list. This way I can take the time to focus on the tasks that I need to get done that day instead of worrying about a project that I have more time to work on. Sounds like college multitasking again, right?

Working with others is probably the biggest obstacle for me in the ‘real’ world. You don’t realize this as much in college because although you have group projects to work on, those only last, at most, a semester. When you are in the workplace, this ‘group project’ can last years. With so many moving parts in a company I find myself speaking with multiple departments on a daily basis. This means MANY ‘group projects’. It was vital for me to begin learning more about my co-workers’ personalities so that we could succeed as a whole. This means learning when is the right time of day to contact someone. Do they like to have their coffee before talking business? Do they prefer an email over face-to-face or phone conversations? All of these traits, and more, need to be identified so that you can make the most of your time and theirs.

In all, my first job has been great. I love my company, coworkers and job duties. I’m very thankful for the opportunities I have been given, and still look to expand my knowledge about the industry on a daily basis. I believe that when you stop learning, you stop producing. So stay inquisitive and know that although the world after college is tough, you can succeed if you try your hardest every day.

Do you have tips for new communications professionals embarking on their first “adult job” that you’d like to add? We’d love to hear from you!

 

*Whitney Welker is a Marketing Analyst for a utility company. She enjoys the diversity of her role as she not only creates marketing pieces, but also handles customer communication and website content. In her free time Whitney likes to spend time at her family farm and traveling with her friends.
Twitter: https://twitter.com/whitneywelker15
LinkedIn: https://www.linkedin.com/in/whitney-welker-311a93a5

Cyber Security: Fighting Back Against Threats

Nov 29, 2016

By Sydney Rodgers*

Theresa Payton is a notable expert on leading cyber security and IT strategy. As former White House CIO from May 2006 until September 2008, she is one of the leading security specialists in the nation. Payton is the CEO of Fortalice Solutions and co-founder of Dark Cubed. Both companies provide security, risk and fraud consulting services to various organizations.

At the recent Public Relations Society of America (PRSA) International Conference, Payton compared potential security risk to connecting a talking Barbie to unknown WIFI sources. According to Interstate Technology & Regulatory Council (ITRC), in 2015 over 169 million personal records were exposed due to breaches. With the internet playing such a large role in daily life I wanted Payton’s insight on how to structure your brand. Below Payton gives us tips on how to expand your assets without putting them at risk.

 

How does someone determine their most valuable assets?
Your most valuable asset(s) is that information that you absolutely cannot afford to lose. It’s the most critical asset that you need to safeguard and protect either for yourself or your organization.  Lots of digital assets are considered valuable but the top 3 digital assets that cyber criminals target before and during a large event are:

  1. The schedules of notable people and their security detail assignments;
  2. Ability to spoof or fake credentials online or in person; and/or
  3. Stealing personally-identifiable information or the right credentials to access payment information and bank accounts

 

What trends do you see in breaches of security?
Over the course of my career, one item rings true over and over again. Today’s technology, by design, is open so it can be easily updated. That open design also means that a breach is inevitable, but how you plan to respond to one is not. If you create and store data, there will be cyber criminals waiting to pounce to copy it, take it, post it, ransom it, or destroy it. Offensive strategies with defensive mitigating controls work, but a purely defensive strategy is a losing strategy. For every defense you put in the path of a cyber criminal, just like a squirrel after an acorn, they will relentlessly try to circumvent your defenses to grab it.

As we live in today’s world, it would be completely negligent to only think in terms of physical or digital security as two separate entities. We discussed this in great detail at the White House that a security strategy must dovetail the two together, physical and digital, and that a one sided approach was doomed to fail.

 

What things should someone take into consideration when looking into cyber security?
An area often overlooked or widely misunderstood is the use of open source intelligence, also known as OSINT, as part of the overall strategy. 70% of data breach victims indicate that they were alerted they had a breach from someone outside their own organization. That stunning statistic reinforces why every company should target your own organization, as if you are the adversary. This approach helps you identify the information leaking out of your vendor’s connections to your data, through your own employees, or technology, before cyber criminals use that same intelligence to launch an attack against your organization.

Digitally, you can use OSINT tools to identify everything you can about the technology and people that work at your organization. You can also use OSINT to see if your sensitive data has leaked online. Physically, you can use an OSINT technique to digitally geo fence a specific and physical land area and monitor the digital traffic occurring that mentions the location. In the case of fighting terrorism, private sector companies and law enforcement can geo fence critical infrastructure, significant events, and venues and then monitor to identify terrorist capabilities, sympathizers, motivation, flash points and intentions through various OSINT tools.

 

What apps would you suggest someone use to monitor their protection?
Some apps that I use everyday are: Privacy Badger and Ghostery to protect my online browsing from 3rd party marketing firms and other snoops. I also use Threema to protect sensitive text messages.

 

Should there be differences in cyber security for personal and professional?
How you think about protecting your privacy and sensitive digital assets in your personal and work life are the same. Most of the principals that you apply in your personal life should go to the office with you and vice versa. Please make sure you are familiar with the tighter restrictions at work that are typically agreed to within employee agreements that you have signed so you don’t unknowingly break rules or put your company’s most sensitive assets at risk.

 

Follow Theresa Payton on Twitter @trackerpayton. And check out Fortalice Solutions.

*Sydney Rodgers is a student at Southeast Missouri State University. She has always been interested in the communication process and social interaction and is currently studying public relations. In her spare time Sydney likes to keep up with current events and is AVP of Communication for her Public Relations Student Society chapter.
Twitter: https://twitter.com/SydSpksSuccess
LinkedIn: https://www.linkedin.com/in/sydney-rodgers-5a6305127

Connect with Us

  • facebook
  • twitter
  • linkedin
  • rss
  • Google+
  • YouTube

BurrellesLuce Newsletter: