• Russ Fradin
    Russ Fradin on July 29, 2014

    Why Employee Advocacy Matters

    Employee advocacy is an emerging new marketing strategy where companies empower their influential employees to authentically distribute brand approved content, create original content, and in turn earn recognition and rewards for their activity and participation.
  • Suddenly typing stopped being a job or a career and it became a skill every entry-level employee needed to have. Eventually it worked its way up the corporate ladder and eventually even senior executives would type at least some of the own communications. Social media is a lot like typing.

    In the mid-twentieth century, you would find groups of women working side by side in what was known as a typing pool. Good professional typists could churn out 70 - 90 words a minute, which may not sound like an accomplishment on a computer keyboard, but try to do that on a manual typewriter without the keys locking up.

    These women controlled company communication. If they didn't type it, it didn't get disseminated. Only women took typing in highschool, and most executives were men, so few executives could type.

    Then along came word processors, and the women who embraced the new technology became even more important. They had job security. Well, at least until the arrival of the desktop computer.

    While most senior executives never learned how to use computers, younger managers did. Instead of waiting around to get the information typed and disseminated, they simply typed it themselves. If you could type, you could get your ideas in front of more people. Assuming they were good ideas, you moved ahead.

    Suddenly typing stopped being a job or a career and it became a skill every entry-level employee needed to have. Eventually it worked its way up the corporate ladder and eventually even senior executives would type at least some of the own communications.

    Social media is a lot like typing. As Facebook and Twitter burst on to the business scene, there was a feeling that this was something that you hired a specialist to do. Typically, someone young, who knew how to use that "Facebook stuff" was hired so business leaders could focus on the serious elements of business. But just like the advent of the personal computer, the role of social media is changing. Today, social media is not a job function, but a mandatory skill for every employee..

    Forget the excuses:

    You don’t have time to learn? Guess what, the senior manager who was passed over for the job I got at Carrier thought he didn't have time to learn to type either. While he was waiting for a secretary to type his report, my proposal was on the desk of the general manager.

    Social media is for young people. Seriously? Would you let a 17 year old manage your ad budget? Of course not, that is real money. Well, so the time spent on social media. If you want to know if the resource is being spent well you have to get in the game. You have to know enough to direct the activities.

    The change has come. Up and down the corporate ladder people are embracing social media, some more often than others, but any good CEO knows social media is now a required part of their skill set, just like typing.

    Campaign settings are pretty basic, but many times we overlook a basic thing and wonder why things aren’t going as smoothly as we anticipated. Here’s a quick rundown of his idea of the basics.

    Do you have the right campaign settings?

    Andrew Lolk has an interesting illustration about the importance of this topic when he says, “Compare it to running a marathon, but you forgot to put on your shoes. Yes, you can do your best to walk ahead, but you’ll never go full speed and you definitely won’t  finish first.” He has written A Guide to Optimal Campaign Settings for AdWords in 2014 for Savvy Advertisers over on Search Engine Journal to explain the way he approaches this foundational topic.

    Campaign settings are pretty basic, but many times we overlook a basic thing and wonder why things aren’t going as smoothly as we anticipated. Here’s a quick rundown of his idea of the basics:

    1. Focus on one network at a time: don’t include search and display together.
    2. Always include the search partner network when starting a new AdWords campaign.
    3. Target the languages the demographic in your location targeting speak.
    4. Use specific areas within the area you want to target.
    5. Stick to manual CPC bidding and potentially enhanced bidding.
    6. Ensure your ads show every time users search for your keywords.
    7. Apply ad scheduling that fits your business objectives.
    8. Rotate your ads so you can make a cost-benefit analysis including ALL important metrics — not just one.
    9. Work smart and let Google worry about misspellings, plurals, and close variants.
    10. The optimal campaign settings are determined by your goals and circumstances.

    I think the most important tip to keep in mind is #10. Your online marketing strategy in all its forms is optimal when it is specific to your goals and circumstances, because then you are speaking to the people most apt to respond at the times they are most apt to listen.

    Because of the way Facebook’s News Feed Algorithm works (or has until this week), a clickbait rolling stone headline will gather a very large amount of moss indeed. Or to put it another way, every time one of your friends clicks on one of those articles, it becomes more likely to show up in your feed.

    Fed up with seeing those blatant clickbait headlines in your Facebook news feed? You know, the “this cute kitten / starving puppy was attacked/ rescued / cuddled by a baby / chihuahua / alligator. You won’t BELIEVE what happens next!!!” ones (if you’re still not sure, spend a few happy minutes with this clickbait headline generator). If nothing looks familiar, you have super-intellectual friends – well done!

    Apparently, a few Smart Cookies are making megabucks from these sites; this is how it works. They dredge the internet, and other “viral” type sites like Reddit, for content which ticks the shareability buttons, come up with alluring headlines*, and republish that content onto their own websites with the clickbait titles added. Then, they feed those links into Facebook, often with an initial advertising budget to start pushing them into people’s news feeds as Boosted Posts, and wait for the traffic to start flooding in.

    Because of the way Facebook’s News Feed Algorithm works (or has until this week), a clickbait rolling stone headline will gather a very large amount of moss indeed. Or to put it another way, every time one of your friends clicks on one of those articles, it becomes more likely to show up in your feed. If you click too, you’re passing on the joy to your friends. So with that initial investment in a boosted post, the article gets traction throughout Facebook and starts sending lots of traffic back to the original Smart Cookie’s website….which they can then monetise by selling ad space on the basis of all those zillions of page views.

    So basically, the Smart Cookies have been exploiting Facebook to deliver traffic to their own sites, for their own reasons.

    Strangely enough, Facebook aren’t very keen on this, and have now announced that they intend to knock the whole thing on the head.  For one thing, someone else is cashing in on their customer base; for another, all those lovely clicks are departing Facebook and landing on the Smart Cookies’ websites; and for a third thing, some users possibly find those headlines annoying. We’ll leave it to you guess which of those three things are the official reason for the algorithm change they’ve just announced which will reduce the visibility of these articles…

    Here’s the full official release if you’d like to read a slightly less snarky view of the whole story: News Feed FYI: click baiting

    * alluring in the way that a carrier bag of cheap chocolate is alluring. It’s hard to ignore but will leave you feeling kinda nauseous and grubby if you go there.

    Schools are becoming places were kids are connected to the internet the minute they step in the classroom. With so many people and devices accessing the internet it's important for schools to have the proper security protocols in place to protect their students.

    The task of keeping a business network secure can be a daunting one, full of its own challenges and setbacks. Now imagine the added complexities of network security when the organization involved is a school or university. Education has become a prime target for cyber attackers. According to one security institution, 15% of all recorded security breaches have occurred at an educational facility. The number of incidents are on the rise as well. 2012 had the highest number of cases of compromised records in higher education since 2006. With these incidents on the rise and attackers more willing than ever to go after schools, the importance of network security for education cannot be overstated.

    (Tweet This: One study says 15% of all security breaches happened at an educational facility. #security #education)

    Schools and universities face a number of challenges that businesses and other organizations don’t have to encounter. Whereas companies have their employees to monitor and grant access to, schools have to worry about teachers and students, who can range anywhere from five-year-olds to full adults. In the case of schools with young children, those kids often don’t have the same legal obligations or face the same legal ramifications if they should, intentionally or accidentally, access a network without authorization. Students also tend to not understand the security threats out there related to the internet and are more likely to use unsecured networks, download infected files, or expose devices to malware. School structure can also be a major problem, with many institutions of higher learning using a decentralized approach that creates multiple networks that need protection. Schools are also dealing with students bringing more of their own mobile devices to class, which itself can present many security issues. Couple all these challenges with shrinking budgets, and it’s easy to see how things can quickly get out of control. All of this underscores the need for an effective network security strategy.

    For many schools, network security isn’t just an option, it’s a necessity. We’re long past the days where each classroom had a single computer; students now regularly have smartphones and tablets. Online access has also turned into a crucial tool for learning. To make sure important school data and files are protected, administrators need a stable security environment, which is where network security comes in. A well-managed network security system will feature measures where administrators can efficiently control and monitor what students and teachers access while online. While web filters can certainly play a role in restricting certain websites, network security can go much further by taking a more proactive approach in monitoring online activity and blocking sites that may lead to security compromises.

    This blocking action can go beyond the internet. Mobile devices have shown to be a major source for malware, and oftentimes, students will be using an infected device without even knowing it. Network security, often through network access control, can detect when a device has been infected. When this happens, the device is then blocked from connecting to the network and alerts IT about the infection. IT workers can then go and clean the infected part of the device, which not only protects the network but the user as well. Network security systems can also be robust and flexible, allowing for various types of devices to connect provided they’re able to pass the standards set by administrators.

    A good network security system found in schools will feature other security measures such as anti-virus protection, firewalls, encryption, password protection, and the latest upgrades and patches. All of these allow administrators to better monitor individual devices and authenticate them for use on the network. This evaluation before a device is granted access can be crucial for preventing attacks on network systems. With so many sensitive records and files, administrators need to know exactly who and what is accessing the network, which is why network access control is such a vital part of network security.

    Securing educational networks is not something that should be treated lightly. Security breaches aren’t a rare thing anymore, which can be seen by the more than 650,000 student records that were compromised a couple years ago at the University of Nebraska. Schools and universities that recognize the threats and the damage they can cause will be in a better position to protect their teachers and students. As more and more come to realize the importance of network security, they’ll be able to respond quickly to future attacks and threats.

    Could you do give up your connectivity 3 months and become a millionaire? Could you do it?

    So this image was posted on my company’s FB page a few weeks ago and received some blog-worthy buzz. Comments from the netheads included ‘Where do I sign up’, ‘Easy’ and ‘Anytime.’ Okay, but what about the true internet junkies out there who value their connectivity to the world wide web higher than most? Well their remarks about the post went something like this:  ‘Absolutely no. I would die,’ and ‘Are you out of your freaken mind?’  I’m not paraphrasing here, folks.

    I ask again. Could you do it?

    Before you think of your answer, let’s break it down right here and be made painfully aware of what we will live without.

    No cellphones. No social media. No computer access. No wi-fi. No connection with the global network for 3 months. That’s 13 weeks, 91.3 days, 2191.45 hours and 131,487 minutes. And if you make it to the end, you’ll get one million dollars. Cash.

    As much as I would like to buy a million dollars worth of organic chocolate and bathe in it for a year, I sincerely doubt I could not do it. I imagined myself as being one of those ‘Where do I sign up’ individuals and when the first three day rolls up I’ll know exactly how a 5 year heroin addict on his first day at a drug rehabilitation center would feel like.

    The first thing I do when I get up in the morning before even relieving myself is to log onto Facebook with my phone and browse the latest insipid statues updates and the endless assortment of baby pictures like a good Netizen.

    Yes, I hear you. It is one million dollars. There’s a lot you can do with a million bucks besides immersing ones self in delicious, herbicide-free chocolate. But let’s also recognize the ramification of interconnect disconnect.

    If your occupation requires you to use a computer, you wouldn’t be able to do your job, right? You might as well go live in the wild with all the furry little creatures. And what if you had one of those fancy smartphones that gives you the power taking pictures of ones self while posing? You would have to find another way to pursue self-exploration and to boast about it.

    This leads me to another question. What would we do if we didn’t have the internet and cellular phones? What if the 80’s said hell, I like how the world is right now? Think about it. Without the internet we wouldn’t be able to practice self-expression or be able to mold this digital interpretation of ourselves – it being true or not – on a global standpoint.

    Maybe on the more positive side, without using any instant messaging platforms like Whatsapp and FB messenger, we are forced to interact with actual human beings and not a portable device that has no soul. Good or bad? It depends on your perception of social interaction.  But that’s a different topic and this proves that this subject can be split into many others.

    So let the world now your thought before you decide to sign up for this crazy idea.