privacy-image

What Brands Can Do to Circumvent Social Hacking

  |  February 21, 2013   |  Comments

Brands need to have three types of communications in place for when personal information gets hacked. Part one in a series on responsible digital marketing.

A simple heist. I went for an afternoon stroll in my grandparents' neighborhood (Mumbai, India) when I literally bumped into a young man on a bicycle. The "bump" slowed him down, I heard the words "thief," and saw a group of people chasing him - the young man was caught. The strategy used by these thieves was innocent: young men play ball, the ball enters your community, three young men enter your community to look for the ball, two men steal stuff, a small truck meets them on a distant road, and they are off!

It happens online too. You get a "connection" request on social media. (I used the word connection to imply no one particular social media channel - it could be Facebook, Twitter, Google+, or even LinkedIn.) It's from a brand you know. You join the forum and start paying attention to the discussions. You soon start noticing a couple of individuals who are actively involved on this brand's page and are receiving "affirmations" (likes/endorsements/retweets) from the brand. You now get a friend request to connect personally, you do, and you end up downloading something malicious.

Your personal information is harvested and the trouble begins.

The state of South Carolina lost a lot of consumer data to an international hacking cartel - more than 4.5 million records stolen. The People's Liberation Army of China (PLA) is being blamed for a coordinated hack on U.S. assets. My travel company sent me an affiliate offer with a malicious link.

Who is to blame? The cyber crooks instigating this crime? The consumer for being so gullible? Or is it the brand that gets the blame? Is it not guilt by association? After all, we don't expect this kind of behavior from friends of friends.

Usually, it's the brand that bears both the blame and the responsibility. It's well worth it for the brand to educate consumers about the perils of being phished or "pharmed."

Brands need to have three types of communications - before the event, to help circumvent the phish; during the event, to assist in reducing the impact; and after the event, to both assuage the consumer and prevent this malicious cycle.

The challenge lies in the messaging - most brands are unprepared, the messaging has not been approved, and it takes a significant amount of time to get the message out to the consumer.

An Rx for your brand. Get your team on board by educating them about the potential crime. Get your management team to understand the impact. Now write out a message to your consumers as if your brand has been compromised, choose the channels you are going to use to deploy this message, make your team aware of what has been done, and solicit management approval to execute. Do this now! As if you have been hacked.

You should also share this type of information with your consumers to make them more aware. Education might lead to prevention, your brand people will be more aware, and you are prepared to deal with the situation. I have seen brands wait for more than 72 hours to respond and by that time it's both ineffective and disengaging.

Brands should also "check out" the people they are endorsing so they don't create an implied connection of trust.

Was it enough? The state of South Carolina offered citizens one free year of credit monitoring and a ton of worry. Why wouldn't the hackers wait for the year to pass before making their moves?

My travel company started off their apology campaign by offering me a 20 percent off coupon to a restaurant. They ultimately ended up waiving six months of my membership fee - I am sure they had to do this for many and this was a real loss of revenue in addition to a loss of face.

Your brand can do a lot better and preempt this through education. Use your social media to raise awareness; it will get more of your consumers to pay attention to the message and the "responsibility" of your campaigns.

So did the gang get caught? The young man who got caught stealing the bicycle refused to divulge the names of those he was working with. So the cops used a combination of Google and Facebook to find a few "associates." Next they used the young man's SIM card to track calls made to a particular set of numbers. Using mobile tracking they raided a warehouse full of stolen merchandise. This cyber gang was selling merchandise on a major digital shopping network.

When the thief "bumped" into me we both fell. His fall helped us catch him and left me with a bruise and a lot of excitement. I thoroughly enjoyed being part of the investigative process. This is not my real job. I usually spend time with brands helping them both build up social engagement and consumer trust.

Tags:

ClickZ Live Chicago Join the Industry's Leading eCommerce & Direct Marketing Experts in Chicago
ClickZ Live Chicago (Nov 3-6) will deliver over 50 sessions across 4 days and 10 individual tracks, including Data-Driven Marketing, Social, Mobile, Display, Search and Email. Check out the full agenda and register by Friday, Oct 3 to take advantage of Early Bird Rates!

ABOUT THE AUTHOR

Sundeep Kapur

Sundeep Kapur has been assisting organizations with their converged channel marketing strategies since 1990. From direct marketing to digital to converged, he is a passionate teacher who works with businesses across multiple industries, helping them to enable technology and services to brand, and personalize and speak to consumers more effectively.

He is an industry-recognized expert who has delivered keynotes, run panels, and delivered "relevant, inspirational, and outstanding" education for organizations around the world.

Sundeep is also an avid user of social media, having leveraged words, pictures, and video into a conversational digital book. His daily dose of best practices can be found at www.EmailYogi.com, where he has more than 1,200 articles on best practices.

COMMENTSCommenting policy

comments powered by Disqus

Get ClickZ Social newsletters delivered right to your inbox. Subscribe today!

COMMENTS

UPCOMING EVENTS

Featured White Papers

IBM: Social Analytics - The Science Behind Social Media Marketing

IBM Social Analytics: The Science Behind Social Media Marketing
80% of internet users say they prefer to connect with brands via Facebook. 65% of social media users say they use it to learn more about brands, products and services. Learn about how to find more about customers' attitudes, preferences and buying habits from what they say on social media channels.

An Introduction to Marketing Attribution: Selecting the Right Model for Search, Display & Social Advertising

An Introduction to Marketing Attribution: Selecting the Right Model for Search, Display & Social Advertising
If you're considering implementing a marketing attribution model to measure and optimize your programs, this paper is a great introduction. It also includes real-life tips from marketers who have successfully implemented attribution in their organizations.

WEBINARS

Jobs

    • Internet Marketing Campaign Manager
      Internet Marketing Campaign Manager (Straight North, LLC) - Downers GroveWe are looking for a talented Internet Marketing Campaign Manager...
    • Internet Marketing Specialist
      Internet Marketing Specialist (InteractRV) - DallasInternet Marketing Specialist InteractRV - Anywhere Telecommute, USA SEM | SEO | Content Creator...
    • Tier 1 Support Specialist
      Tier 1 Support Specialist (Agora Inc.) - BaltimoreThis position requires a highly motivated and multifaceted individual to contribute to and be...