Most leaders are not aware of the range of risks that lurk behind the shiny pull of many Social Media sites and activities. Many can be mitigated if identified in the planning stages, through training, policy, or through changes of internal process. Monitoring can catch others; early detection can lessen [More]
Must you be everyone's friend? Or perhaps from a practical perspective, must you accept everyone's LinkedIn connection request? The answer for most people, and for many reasons, is a resounding no. It is true that accepting a connection request yields numerous benefits, particularly around increased access and transparency: More of [More]
Are you unrealistically optimistic? Most marketers are, and it is not particularly healthy. Think about it: a marketer's job is usually focused on generating leads. About great design. Attracting attention. Building. It's other people who have to worry about delivering the product or service, headcount, logistics, and the vagaries of [More]
Consider this scenario: you get a phone call from a key client or a distraught family member: "didn't you get my email?" They are clearly upset that you "ignored" them: they see evidence that they are not your priority. You are not unresponsive. You don't care. Or maybe, your spam [More]
In the traditional channels, there have long been built-in checks-and-balances to prevent abuse. With so few TV and Radio stations, newspapers, and magazines, these channels developed policies for who they would accept as an advertiser. And as journalists, their reporting was both objective and fact-checked. It was hard for fringe [More]
With seven-digit penalties, many marketers are looking carefully at how they are addressing the Canada Anti-Spam Law (CASL) and similar legislation in other parts of the world. Unfortunately, many are making a critical error that may later haunt them - and cost. They are assuming that an email "double-opt-in" constitutes Express [More]
Every organization owns intellectual property: in fact, this recorded knowledge is often key evidence of expertise, capability, and fit. So if it is that valuable, how do you protect it from being stolen? Before answering that question, it is useful to distinguish between content that you want to be widely [More]
What do you do when you are disappointed with a product or service that you have purchased? Most people turn to the web: a quick check on Google solves many problems. And a few choice words on Twitter or Facebook can let everyone know about the experience. From an organization's [More]
Are you an information thief? Have you ever plagiarized, pilfered, or "borrowed" someone else's knowledge or reputation? And has someone ever done this to you? Thanks to Google, we have the entire internet in front of us; it is too easy to use others' information without their knowledge or permission [More]
No CEO wants to be known as a hypocrite. But unfortunately, many are precisely that - here's why. There is an interesting conundrum that many companies face when expanding beyond their borders. A key reason for their success at home has been that they could take advantage of the homegrown [More]
Each week, get Randall’s 60-second nugget on translating digital knowledge to action. Curious? Read 600+ past articles.
Δ