Tag Archives: Educate

How Well Do You Know Your Target Audience? Five Points

Situation: A CEO and her team manage a growing and profitable company. She is interested in what others have done to expand their market presence and penetration. In discussion, other CEOs have been curious about her company’s marketing capabilities, and how well her team knows their customer base. The essential question that they ask is “How well do you know your target audience?”

Advice from the CEOs:

  • Become a thought leader:
    • This is Inexpensive because the company is already a leader in its field.
    • Marketing through thought leadership allows the company to get its message out with fewer resources than push marketing efforts.
    • Thought leadership adds credibility and educates the customer.
  • Qualify the need and/or the perception of the need. If there is no need, there is no sale.
    • It’s perfectly acceptable to ask clients about their challenges and needs.
    • Ask them to measure the need on a 1-10 scale.
    • Ask the client to play out the scenario without an adequate solution.
    • Ask the prospect how they have worked with others offering similar services to your company’s and how did that go?
  • Ask your customers to help.
    • Develop a Customer Advisory Board to test a new product or concept – a “Blue Ribbon Panel”.
    • Write a paper together with them to highlight the findings.
  • Use common sense, but:
    • Set measurable goals and listen to enough people to get more directed feedback.
  • The company’s internal staff is also a target audience.
    • Integrate departmental cultures to assure that they don’t clash.
    • Conduct collaborative off-sites to encourage cooperation and support.
    • Create processes for all departments and staff.

[like]

How Do You Handle Demands for Faster Delivery? Four Options

Situation: A company’s clients are demanding increasingly faster response times, particularly in areas that historically have not been considered mission critical. Clients also want faster answers to technical questions. Is this a common occurrence, and would you adjust pricing in response? How do you handle demands for faster delivery?

Advice from the CEOs:

  • If clients are demanding faster delivery, it’s entirely reasonable to tier your rates for different levels of service and delivery. Create cost / ROI breakdowns for different options, and let your clients make a business decision about the level of responsiveness that they need.
  • When brining on new clients, do a worst case down time analysis for the prospect as part of your evaluation process, then provide price options and let the prospect evaluate what is important to them. This is similar to different price / deductible levels with health or car insurance.
  • You will need to educate your current client base on what you are doing for them, and when they are reaching the upper levels of service provision under their current contract.
    • When you provide remote service, communicate what you have done.
      • Email individualized update reports to client contacts.
      • When you meet clients face to face, have a printout of service provided and toot your own horn about your service and delivery.
  • Be aware of the needs of clients who have distributed locations across time zones. A two-hour response time on the West Coast at 8:00 in the morning, translates to a half day for an East Coast location because they can’t call you until 11:00am Eastern time.

[like]

What Is Changing The Game in Network Security?

Interview with Philippe Courtot, CEO, Qualys

Situation: Companies experiencing security breaches and data theft are regularly in the headlines. Those launching these attacks are increasingly well organized and very creative. What is changing the game in network security and how can you respond?

Advice from Philippe Courtot:

  • The movements from enterprise software to Software as a Service (SaaS), and from mainframes to PCs to mobile devices increase the challenges of protecting enterprise environments. Therefore, a cohesive technology platform is imperative.
  • Companies are sensitive to the possibility of attack at any time. There are three principal attack vectors: breach through web applications, breach through email and browsers, and breach by device. Between PCs, iPhones and Android devices, the PC is the most closely linked to the corporate intranet while often the most vulnerable because users are lax about updating their systems and applications.
  • Attackers often target a company executive or high level administrative assistant to access the user’s profile and passwords.  In one type of attack called spear fishing, the attacker creates emails tailored to the person targeted appearing to come from a colleague or friend. When the target clicks on the email, a small piece of code is inserted in the computer, which can give control to the attacker. Another way to gain control of a computer is through physical access. An attacker can learn about a pending vacation via Facebook or twitter, providing an opportunity for home invasion. Once the attacker has access to the computer, they can plant a control program on the system. When the user returns, the attackers can make fast, brief forays inserting additional code or taking data from the enterprise network. They may use the information themselves, or sell it to others.

Given these new realities, how does a company prevent attack?

  • First, the company must thoroughly analyze and understand their vulnerabilities which are all potential entry points for an attacker. Once vulnerabilities are mapped, work on a schedule to remediate them.
  • Second, you must educate all users about the threats. This is especially critical for any personnel who have access to secure company data.
  • Third, invest in and build additional defenses to shield all remaining vulnerabilities. Make sure that employees are drilled on the defenses and that they are used. One growing trend is the use of two factor authentication, requiring employees to carry token generation devices with them to use in addition to their password. These tokens can be delivered by smart phone.

You can contact Philippe Courtot at [email protected]

Key Words:  Network, Security, Breach, Data, Theft, Response, Mainframe, PC, Mobile, Enterprise, Environment, Criminal, Government, Attack, Vector, Social Network, Email, Browser, Web, Application, Device, Spear Fishing, Executive, Assistant, Profile, Password, Vulnerability, Educate, Defense, ID

[like]