Remove Internal Remove Measurement Remove Privacy Remove Reputation
article thumbnail

5 Trends Shaping Tech PR In 2018

ImPRessions - Crenshaw Communications

Privacy regulations. The GDPR privacy rule officially blazed into our lives in May. And it won’t be the last data protection or privacy regulation we’ll see. In July, the state of California passed its own data privacy regulations called CCPA , and other states are sure to follow. Big tech’s reputation challenges.

Trends 157
article thumbnail

Information Security is no longer a choice, but a must

Presspage

The world has shifted into a digital age, where our data (personal or corporate, internal or external) is constantly under the threat of cyberattacks. Data security at the user level Internal vulnerabilities can also be exploited by hackers, cybercriminals can misuse privileges to access the core files of an application.

Software 135
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Deborah Weinstein on the Challenges Confronting PR and Digital Marketing

Flack's Revenge

Far too many brands delegate, and relegate social strategy development and implementation to their ad agencies, internal marketing departments, even their PR intern, with a mandate to replicate, share, and spread commercial messages. Have you been recommending a change in strategy regarding social media? Why so many disciplines?

Marketing 244
article thumbnail

Future of PR and social media for International Air Transport Association crisis communications conference

Stuart Bruce

But why be afraid of big government when we freely provide our life story to social networks and give up our privacy to airlines in return for a bribe of a few more air miles. We can use it to measure and evaluate our success. Our notions of privacy and confidentiality will be challenged. Yes, it can benefit many people.

article thumbnail

Information Security is no longer a choice, but a must

Presspage

The world has shifted into a digital age, where our data (personal or corporate, internal or external) is constantly under the threat of cyberattacks. Data security at the user level Internal vulnerabilities can also be exploited by hackers, cybercriminals can misuse privileges to access the core files of an application.

article thumbnail

Controlled Chaos: 86 Comms Pros Explain How Communications Work Has Changed

Sword and the Script

Clients now expect PR people to also be search experts, content experts, working knowledge of Google Analytics, knowledge of all sorts of tracking tools to measure effectiveness, while filming, producing, and editing video and managing multiple social media accounts.”. More internal comms. More internal comms. Additional duties.

article thumbnail

3 Things You Don’t Know About Social Media Monitoring

Waxing UnLyrical

But with more and more monitoring platforms gobbling up big data, and as individuals become increasingly concerned about their personal privacy rights online, social media privacy training and social media surveillance training have become equally critical. Let’s focus on employee privacy in the workplace. In the U.S.,