The Public Relations Blog
We frequently blog about the latest public relations corporation communications, and marketing topics, tips, and trends. Our blog is one of the 100 Best Public Relations Blogs, according to FeedSpot. Please help yourself to our insights and be sure to subscribe to our weekly blog notifications.
In this episode, TCE Strategy’s Bryce Austin shares his expertise on cybersecurity and crisis communications. With host and Axia Public Relations founder Jason Mudd, he expands on data breaches and how to prevent them. He also talks about CISO, next-generation antivirus, password keepers, and multifactor authentication. Lastly, he and Jason discuss who’s responsible for promoting cybersecurity within your company.
Tune into this episode to learn more about cybersecurity and crisis communications.
Read More
Topics: crisis communications, On Top of PR, cybersecurity
You are human, and you make mistakes. As public relations, communications, and marketing employees, you constantly use a computer to do your job. You go through emails, write material, make content, and communicate with clients, coworkers, and media on a daily basis.
Consistently using your computer for your work only increases your chances of falling victim to a cyberattack. According to PurpleSec cybersecurity statistics, around 52% of data security breaches are caused by human error or system failure. Therefore, you must be as cautious as possible and actively on guard.
Read More
Topics: cybersecurity
As marketing, PR, and communications professionals, you may need to download something from the internet, such as a how-to inbound marketing guide, a webinar, an image, or an app.
Read More
Topics: cybersecurity
Vishing is another term for voice phishing, and it is the fraudulent practice of making phone calls or leaving voice messages impersonating reputable companies to convince individuals to reveal personal information, such as bank details and credit card numbers.
Read More
Topics: cybersecurity
Removable media is any type of storage device you can remove from a computer while the system is running. As marketing, public relations, and communications employees, the amount of files you have on your computer probably exceeds the amount of storage available. To store this excess data, you use a removable media device, such as a flash drive, SD card, or other hard drive.
Read More
Topics: cybersecurity
As marketing, PR, and communications employees, you use email constantly. This means you are vulnerable to the estimated 94% of ransomware that arrives via email, according to CSO Online. Ransomware is malware that encrypts your files, making any other files and systems that depend on them unstable.
You likely use email to send and receive sensitive company information. To protect this data, you need to protect yourself from fraudulent messages and scams.
Read More
Topics: cybersecurity
Nearly all marketing, PR, and corporate communications employees use a laptop for work. According to a survey by tech company Kensington, 10% of laptops get stolen in their lifetimes. And since nearly half of all laptop thefts occur in offices or classrooms, employees who work from laptops at the office must be especially weary.
Read More
Topics: cybersecurity
Emails lead to 91% of all cyberattacks — the same email where you may send personal information, such as your W2s, bank routing number, or social security number. Unencrypted emails can also expose confidential information about your company, such as its strategy plans and financial performance. So, before you hit “send” on that email, remember the following rules of thumb for protecting your sensitive information.
Read More
Topics: cybersecurity
Around 25% of corporate employees reuse passwords for all of their devices, logins, or accounts. Employees in corporate communications tend to use multiple websites and programs that require a password. While you might justify using the same password for those sites by saying it's better than forgetting them, thinking that way can compromise your personal and professional information.
Read More
Topics: online public relations, cybersecurity
Comment on This Article