Big data is now omnipresent. It is embedded into our day-to-day lives as the hard-wired DNA that fuels our business processes and decisions. Data-driven cultures went mainstream in 2016, with organizations scrambling to establish data strategies that enabled all employees to make better informed decisions. Yet despite all of the hype, the majority of organizations still have a long way to go before realizing the potential that big data holds.
Have you ever thought about the future of your title or position? Are you sure your company is ready for the data-dominated future?
Digital is everywhere and digital will be everywhere and data will be everywhere. And even beyond. The quote of a data-driven company is stressed often through social media or other channels and in daily business. A company has to be data-driven to understand the relation between different channels and actions, even between departments and profit.
Business customers are increasingly raising questions about the security provisions that suppliers have in place to protect customer data that is supplied to them via the Internet or stored online in the cloud. Customers are increasingly insisting on having onerous rights of audit in agreements with their suppliers to enable the customer to monitor and check the supplier’s compliance with such security provisions.
For example, under the UK’s Data Protection Act (DPA) customers (data controllers) are required to take appropriate technical and organisational measures to prevent the:
- unauthorised or unlawful processing of personal data; and
- accidental loss, destruction or damage to personal data.
In order to comply with these duties and avoid substantial fines, customers need to ensure that their suppliers have adequate security measures in place to prevent data protection breaches from occurring.
Due Diligence and Auditing
When dealing with government departments or customers who process financial data, customers often want to carry out due diligence on a supplier’s security systems at the pre-contractual stage. This will include ensuring that the customer has the right to check the supplier’s security measures and the supplier’s on-going compliance with the security provisions set out in any terms and conditions during the term of the agreement.
Information Security Officer
Both suppliers and customers should consider appointing an information security officer to assess their cyber risks. Once appointed the information security officer will be able to deal with any security issues when they arise, at the pre or post-contractual stage. Without an information security officer many organisations will lack sufficient knowledge or understanding of actual cyber security risks. Customers will be unable to carry out a proper due diligence and suppliers will be unable to respond adequately to customer queries. This will result in the customer and supplier spending unnecessary time on the negotiation of the supply agreement.
Hackers are increasingly accessing online data (in particular online payment details) and using new methods to do so. An information security officer once appointed could monitor and detect such problems, keep up to date on the latest security countermeasures, deal with queries (not just in the contracting process but also from concerned data subjects – customers) and report to management on a regular basis.
Notification and Response to Cyber Breaches
Both suppliers and customers need to have obligations to inform each other of security breaches (such as hacking) in order for both parties to deal with the issue in a timely manner. If there is a slow rate of detection the potential for the scope of the data breach (and fines) increases. Also, once a party has been notified of the breach, the incident needs to be quickly contained to limit any further potential damage.
One of the most common causes of security breaches is the use of inappropriate passwords such as the use of “password”. Both the supplier and the customer should have adequate systems in place to monitor and prevent the use of such passwords. Systems and procedures should also be in place for the regular changing of passwords to minimise the risks of a security breach via misuse/use of unsuitable passwords.
These are just some of the general security issues that customers and suppliers should consider when entering into an agreement which involves the transfer of personal data to a supplier. There are many other issues which also need to be taken into account depending on the business sector in which the customer operates and the types of data that the supplier is processing.
image courtesy of Sam Howzit
With YouTube being the second largest search engine in the world (and it doesn’t hurt that they’re owned by Google), video marketing is perhaps the most widely ignored acquisition vehicle for most small-to-medium businesses. Various studies have shown that any time the prospect can “see” what they would get, it increases the likelihood of conversion by 3x or more.
For any product marketer where the experience is what you’re selling, this means that YouTube is probably THE most important marketing vehicle you have at your disposal. So how do you get started and what makes you effective?
Here is a quick summary of questions and answers that I usually get…
Q. Does the content need to be current? Is it hurting me to have videos of last year’s event?
A. Not at all. As long as the content is representative of the upcoming experience (i.e. you’re not making major modifications to the conference), it works perfectly for your marketing as-is.
Q. How do we optimize our videos for YouTube?
A. There are three simple steps to this process:
First, you’ll want to figure out what search phrase is the best match for your video content. I like to use the Google AdWords Keyword Tool to help see how many people are searching for terms related to my content so I can pick the very best one. For this example, I typed in “remodeling show and expo” and then searched for volumes and related terms. Since the phrase “remodeling show” is the highest-volume relevant term, that’s the one I would select to optimize.
Next, make sure that phrase is part of everything related to your video:
- Actual file name (remodeling_show_decorator_pavilion_2011_video.mov)
- YouTube title (Highlights from the Remodeling Show 2011 Decorator Pavilion)
- YouTube tags (remodeling, expo, show, decorator, 2011)
- YouTube description (One of the most popular booths on our expo floor at the Remodeling Show 2011 was the Decorator Pavilion, sponsored by Joe’s Decor… blah blah blah)
- Link back to related content on your show blog and include that website URL in your description too
Finally, make sure you’ve edited your content down to three minutes or less. You’re even pushing it at three minutes. Optimal time is 90 -120 seconds for any kind of promotional experiential product video on YouTube. You want to “tease” viewers with the experience – they won’t want to re-live the whole thing on YouTube.
Q: Do I need a high-quality video camera?
A. No, actually video quality from an iPhone or iPad is excellent. All you’ll need is a microphone and adapter so you can make sure you’ve got great sound quality. The mic runs about $25 and the adapter runs around $25. For $50 per person and some quick training on holding still, your staff can make their own video that’s perfect for YouTube. YouTube isn’t about fancy – it’s about being genuine.
Q: What does success look like in the analysis view?
A. The answer to this usually depends on your objectives. For most of us, the most important metrics is that they watched most of or all of the video we posted. My secondary objective lies with engagement.
All standard engagement metrics are already calculated for you in the YouTube Analytics interface.
The metric that shows you if they watched the whole video or not is the “audience retention” report. However, it should be noted that this report will only populate after you have a minimum of 25 views. After you reach 300 views, a second report is enabled that allows you to benchmark against other similar content.
Amazing Apps for Android
Whatever your personal experience of Android, there is no doubt that it, and smartphone use in general, generate some pretty amazing statistics. e.g. what does it say about the world today that 35% of 35-44 year olds played Angry Birds in the last 30 days? With 300M+ Android phones in the market and hundreds of thousands of daily sign ups the platform is shaping everything from the way we communicate to how we spend leisure time and process information.
It might be relatively easy to enter the market as a developer using the tools available (and Android has helped an enormous new market to flourish in its wake) however despite the fact that Google Play alone has over 450,000 apps available the top 10 apps account for an enormous 43% of usage.
courtesy of StartApp