Tag Archives: Tech

A Few Best Practices for B2B Social Media

Are you like so many others who have had trouble succeeding in the social media realm? We all know that social media marketing is a must-have component in any communications strategy, but without a game plan to drive growth and engagement you are unlikely to succeed. Social media strategy is incredibly important to keep your profile front and center in your prospects’ view and in reaffirming your expertise with current customers.

Platforms
Facebook, Twitter and LinkedIn should be your primary platforms in distributing content, getting your message across, and building relationships with followers. These three have been found to be the most used social sites by B2B firms, and this is where you will need to be the most competitive and most active.

Frequency and Timing
You should aim to post at least once every week day, and don’t forget weekend’s if you see that’s when your followers (or would be followers) are most active. Posts for Facebook, Twitter and LinkedIn for any one day do not have to be different articles. It’s fine to use one article across all social platforms per day, but do take the time to customize your actual posts – each platform has a slightly different style and of course, length for content. This will allow you to maintain your clout in your follower’s feed when they tend to be most active.

FollowerWonk offers many services, including graphs of follower data.

So how do you find out when to post for the biggest impact on growing your social profile and influence? There are many third-party applications available that are both free and paid that allow for in-depth analysis of your follower activity across different social platforms. Buffer has put together a comprehensive list of many of these applications here.

RELATED: Content Is Still the King!

Content
Social content should not just be all about you. Try to keep self-promotional content to about two days per week, or no more than around 25 per cent of your posts. This can be promoting your company’s product or services, or a particular section of your website. Posts about you at an industry event, depending how you craft them, can fit under industry news.

Thought leadership posts are another way to establish credibility and authority over the issues that your clients or prospects care about. While still self-promotional, showcasing your or your firms expertise in a niche industry or subject demonstrates proficiency in your services and give a sense of authenticity to your target audience.

Industry news articles, especially when you add commentary versus a simple retweet, share or like, should be the majority of the social content that you post. Try to keep up with trending topics and news coverage so your posts are “fresh” and relevant – basically no more than about one week old. This will allow you to stay on top of current events and move with the news cycle to maximize the attention your posts receive.

Stay tuned for more of these B2B think pieces, including information on video marketing, content curation, and much more!

Gain some good insights from this piece? Check out some of our other content here.

Contributions from Fran Lowe.

Balbix: Predicting Data-Breaches Before They Happen

WannaCry and Petya are the names of two particularly damaging types of ransomware. Ransomware is a type of malware that infects computer systems, encrypts the data on those systems and doesn’t relinquish it until a ransom is paid. My fellow 10Fold colleague Kory Buckley recently wrote a blog on the topic.

Many of the organizations that were affected with these latest ransomware versions had adequate network security measures in place, including firewalls and antivirus, but the attack still managed get though most defenses. Much of that has to do with how the security stack around endpoint protection is configured. Balbix, a San Jose, CA-based network security company believes they have developed an innovative solution that will help organizations better protect potential endpoint vulnerabilities. And they’re doing it using advances in artificial intelligences (AI).

On June 6, Balbix emerged from stealth with the industry’s first predictive breach-risk platform that is able to predict and prevent an attack before it happens.Balbix was founded by Gaurav Banga, former CEO of Bromium, with the mission to measure risk and give enterprises the confidence they need with increasing their cyber-resilience.

In addition to launching their security platform, the company announced $8.6 million in investor funding from Mayfield.

How does Balbix work?

Balbix has built the market’s first platform to use predictive analytics and Artificial Intelligence to automatically measure breach risk and calculate resilience. Balbix also uses specialized sensors across the enterprise to continuously discover and monitor all devices, apps and users across hundreds of potential attack vectors. These sensors allow security teams to visualize their breach risk and quickly prioritize operations and projects.

The Balbix’s platform features:

  1. Comprehensive risk heat-map: Balbix has created a system that automatically monitors and analyzes the enterprise network 24/7/365 across hundreds of attack vectors. This helps overburdened security teams prioritize mitigation projects by identifying areas of highest risk and surfacing actionable insights.
  2. Predictive risk analytics: Balbix predicts breach scenarios by analyzing indicators of risk, factors that point to the future likelihood of occurrence of security incidents, e.g., user clickthrough behavior indicating high phishing risk. In contrast, existing products rely on indicators of attack or compromise based on security events that have already happened.
  3. Effectiveness of mitigations and cyber-resilience: Balbix can compute the effectiveness of security mitigations already implemented and help prioritize planned security projects. The system also measures organizations’ cyber-resilience – the ability to limit the impact of security incidents.

In a recent eSecurity Planet article, Balbix founder and CEO, Gaurav Banga said, “AI and automation offer two key advantage in security: they’re very good at dealing with large vectors of data across hundreds of dimensions, and they provide the ability to understand and report the level of confidence in any conclusions reached in order to avoid false positives. Because of these two advantages, AI, when correctly implemented, can provide super-powers to cyber defenders, who now have the ability to come to the best conclusions given large amounts of fuzzy security data from their operating environment.”

In my eyes, Balbix is a network security company to watch. But don’t just take my word for it, read a few of the following stories to see what the media are saying about the company.

  1. eSecurity Planet
  2. eWeek
  3. Dark Reading
  4. SiliconTap
  5. Beta News
  6. FinSMEs
  7. Silicon Angle
  8. VMBlog
  9. SDxCentral
  10. IT Pro Portal
  11. FOX News
  12. IT Business Edge
  13. Channel Partners
  14. Virtual Strategy Magazine

Enjoy your read? Check out our other content here.

Howdy ya’ll! Greetings From Austin, Texas…

What are we doing in the Lone Star State, you ask? Well, we’re excited to officially announce the opening of our newest 10Fold office! That’s right, we’ve expanded our footprint (or cowboy boot print, we should say) beyond California to Austin, where you can find us located in the heart of downtown at the corner of 6th Street and Congress Avenue, just steps from the Texas State Capitol (map here).

There are many things that attracted us to Austin, primarily the booming local tech scene, coupled with an extremely talented pool of PR professionals. Oh, and of course the amazing BBQ, craft beers, incredible live music, endless sunshine, beautiful Texas wildflowers, etc. are all added bonuses!

We invite you to keep an eye on our blog, as our Austin team will be sharing updates regularly on the agency’s growth, local market trends, the latest hotspots, etc.

We could not be more enthused about the prospect of Austin. If you’re a University of Texas student looking for a summer or fall internship, a PR practicioner exploring your next career opportunity, or an emerging technology company in need of PR and marketing services, we’d love to have a conversation!

Feel free to reach out to us by visting our contact us page.

Network Breaches Are No Match for Veriflow

Based in San Jose, California, Veriflow provides a preventative solution for network administrators who worry about security vulnerabilities from change induced errors. The practical application of this service allows for network administrators who may not be knowledgeable in certain technologies to easily monitor changes in the network. Where Veriflow differs from its peers is the basis of its design; a mathematical formula called formal verification, which continuously evaluates changes and ensures they won’t bring harm to the network.

President and CEO James Brear is a proven industry executive with an impressive history of success. Annual revenues under James rose consistently with his leadership at Procera Networks, totaling nearly 1110% in total growth from the start of his tenure and gathering several awards. This led to the successful acquisition of the firm by Francisco Partners for $240M in 2015. Co-Founder Brighten Godfrey leads the technical research and development for the firm. He holds a Ph.D in computer science and is an expert in mathematical formal verification, which checks the validity of code as it is written.

Veriflow has been awarded several accolades for its unique services, including Innovation Challenge Winner and a silver medal from the Network Products Guide. The firm has also been able to attract investments from the Department of Defense, Menlo Venture Capital, and NEA Technologies.

For more information about Veriflow and their services browse through coverage 10Fold has helped them acquire here and here, and watch how Veriflow’s products work here:

Meet the Data Integration Leader SnapLogic

Headquartered in San Mateo, California, SnapLogic is a unified application and data integration platform service. Pre-built data integration greatly simplifies solving complex problems based on data of several different formats. Built for the modernized data center, SnapLogic supports cloud and big data architecture allowing customers to solve their problems faster and with greater efficiency. Guarav Dhillon, who began as an early investor in SnapLogic, has led the firm since 2009 as CEO after realizing its potential. Before SnapLogic, Dhillon co-founded and led software enterprise Informatica, overseeing its rapid expansion during his role as CEO and creating billions of dollars’ worth of value for stockholders and customers.

SnapLogic has a range of high profile customers due to their innovative business approach, including Verizon, Adobe, CapitalOne, GameStop, and AstraZeneca. A host of impressive accolades have also been placed on the firm since their inception, among them being 2016 Stratus Awards for Cloud Computing Honors Companies Worldwide, 2016 Gold and Silver Winner of Stevie American Business Awards, DBTA 2016 100- The Companies that Matter Most in Big Data to name just a few.

Find recent coverage of SnapLogic here and here, and learn more about the product and services SnapLogic provides in this video:

 

10Fold- Security Never Sleeps- 104

Following Snowden’s Legacy, Contractor Accused of Stealing NSA Files

“Political motivations still unknown”

Stock prices of NSA contractor Booz Allen Hamilton took a nosedive Friday as reports of one of its contractors leaked that a former employee had been charged with two felony accounts of theft of government property and unauthorized removal of classified documents by the Department of Justice. The accused, Harold Martin Thomas III, faces up to 11 years in jail for his alleged crimes. Booz Allen also bears the weight of the formerly employing the highly controversial Edward Snowden, whose leaks to the public in 2013 revealed a mass United States surveillance program.

Expose Retaliation for BuzzFeed

“Retaliation for defamation articles against hacker group OurMine”

Interactive media site BuzzFeed was compromised Thursday by hacker group OurMine, bringing down articles and deleting information related to their members. The massive cyberattack came after BuzzFeed published stories that OurMine, which focuses primarily on the digital accounts of tech CEO’s, venture capitalists and celebrities, may be a lone Saudi Arabian teenager.

Mac Malware Monitor Your Webcam, Microphone

“New malware can penetrate even airtight Mac devices”

Malicious software that targets user’s microphone and webcam access is nothing knew, the NSA and cybercriminals alike have had programs for years that are capable of such feats. However, Mac devices have largely been a different, due primarily to the hardwired light indicating that webcams or microphones are active allowing users to notice their activation. This perceived safety may no longer be the case, according to researcher Patrick Wardle, His team’s analysis at Synack has examined several examples of malware being able to monitor microphone and webcam feeds without activating this light.

eCommerce Sites Lose Customer Data to Web Malware

“MageCart responsible for several incidents”

Cybercriminal campaign ‘MageCart’ has been the culprit of several hacking events involved with the loss of customer data and other sensitive information. MageCart has been active since at least March of this year, targeting other sites such as Powerfront and OpenCart.

10Fold- Security Never Sleeps- 104

Following Snowden’s Legacy, Booz Allen Contractor Charged with File Theft

“Could face up to 11 years in prison”

Former Booz Allen Hamilton employee Harold Thomas Martin III is accused by the Department of Justice of theft of government property and unauthorized removal of classified documents. Stock of the NSA contractor firm took a dip as the news broke. This further scars the company’s reputation that is already bearing the weight of the Edward Snowden revelations of 2013, bringing to light the mass United States government surveillance program that proved very controversial to the public. Whether the intentions of Martin are political is yet to be seen.

Expose Retaliation Hits BuzzFeed

“Hacking group targets interactive media site”

Hacking group OurMine seems to have targeted BuzzFeed, odd considering the group often sets its sights on digital accounts of CEO’s, venture capitalists, and celebrities. The attack on BuzzFeed focused on manipulating the text or completely deleting certain articles related to the groups reputation, in which the website exposed that OurMine may be a solo hacker teenager from Saudi Arabia.

New Malware Can Monitor Webcam, Microphone

“New piggyback virus can access software”

Malware used for covert surveillance is far from new. The NSA has several programs that can monitor voice or video without the notice of a laptops user. However this is not the case with Apple products, as they have a hardwired indicator that notifies the user when the webcam is on. Now this may no longer be the case. Researcher Patrick Wardle explains that a new piggyback virus is able to access webcam and speaker functions without any notification to the user.

eCommerce Malware Stealing Card Data

“Powerfront, OpenCart among affected”

Researchers are monitoring a cybercriminal campaign that have been plaguing several eCommerce sites since at least March of this year. Dubbed ‘Magecart’ by RiskIQ, the malicious software attacks the payment sources of the internet commerce sites, stealing customer personal information and card data.

10Fold- Security Never Sleeps- 103

Hack Claims from Guccifer 2.0 Denounced by Clinton Foundation

“Widely believed to be political in motivation”

Guccifer 2.0, the hacker who claims responsibility for the Democratic National Committee leaks that aimed to expose corruption within its ranks, claims to have breached the servers of the Clinton Foundation and attained documents that could be damaging to Hillary Clinton’s presidential campaign, despite denial from the Clinton Foundation itself. The hacker posted screenshots of spreadsheets online, claiming that they were documents from the institution and that: ‘… her staff don’t even bother about the information security.”

The political motivations of the cyber-attack remain obvious, as the hacker made clear favorable reference to Julian Assange, founder of WikiLeaks and outspoken opponent of Hillary Clinton.

Report Claims that Email Provider Yahoo Assisted in Spying on U.S. Citizens

“Raises questions of why Yahoo did not fight the order”

A program developed by Yahoo Inc. last year reportedly allows the U.S. Federal government to search through email databases for certain phrases. Anonymous former employees narrowed government agencies involved to either or both the National Security Agency or the Federal Bureau of Intelligence.

The news is surprising, given the typical resistance to government mandates to enter customer accounts that tech firms generally uphold. However, Yahoo not only complied with the order, but dedicated its own resources and staff to assist with the operation.

TalkTalk fined £400K for mistakes that led to 2015 hack

“Actions first taken to clear its reputation of highly hacked service”

After the personal data theft of over 155,000 customers Telecom firm TalkTalk has been fined £400,000 for its security vulnerabilities in 2015. Well over 15,000 of those affected had bank information stolen and suffered serious ramifications for what Information Commissioner Elizabeth Dunham reported that even the most basic of security measures failed to be acted upon and “…(the company) could have done more to safeguard its customer information.”

Malware Infested-Ads Plaguing Spotify

“Free version of service seems to open malicious sites”

Malware seems to have worked its way into the Spotify servers and is continuously serving itself to the users who use the Spotify free product to stream music. The ads have been reported to open infected sites, causing potential harm to those that travel to them.

 

 

10Fold- Security Never Sleeps- 102

J&J Warns Hackers Can Infiltrate Insulin Pump

“Caution advised to patients as cyber vulnerabilities seem possible”

The insulin pumps in question retain a malfunction that could allow hackers to breach its defenses, causing an overdose of insulin. This news breaks while medical security remains of high concern following a series of stories that particular pacemakers and defibrillators exhibited bugs that may signal security vulnerabilities of their own.

Johnson &Johnson describes the potential risk as low as there have been no reported hacking attempts thus far, but is advising patients that there may be certain security flaws they could be subjected to and sharing advice on potential fixes for the issue.

Default Password Danger Shown with Massive Botnet Attack

“IoT devices used to target victims”

Weak default usernames and passwords assigned to internet connected devices seemed to be the target of the Mirai botnet that was responsible for the massive DDoS attack. In contrast to other botnets, this program employs IoT gadgets to select and attack its targets.

This same platform was used to bring down Security reporter Brian Krebs website with another massive DDoS cyber-attack, searching through devices with a list of easily guessable passwords such as ‘12345’ and ‘admin.’

“Zero-day” EMC Console Management Flaws

“Would allow attacker to end malicious programs”

Dell’s vApp manager for Unisphere for VMAX was revealed to have five zero day vulnerabilities, announced by digital security consultants Digital Defense. The web application is used to manage all of EMC’s storage platform, and vulnerabilities breached would allow hackers to send Adobe Flash Action Message Format messages from the server running the program.

Attackers may be able to completely shut down or gain total control of the storage platforms, providing grave cause for concern. EMC has patches available through security advisories on these potential breaches available to Dell EMC customers.

 

 

10fold- Security Never Sleeps- 101

Nearly Half of State Voter Registrations Attacked by Russian Hackers

“Four were cracked, leaving speculation on security of upcoming election”

As we covered in our last installment, cyber security threats from the Russians have been on the rise in this year’s voting season. We can see now that these fears may have some legitimacy, as Russian hackers were successfully able to enter several voter registration systems in the U.S.

James Comey, Director of the FBI released in his statement that “There’s no doubt that some bad actors have been poking around.” Among those attempted to be breached were what many political analysts consider to be this year’s electoral ‘swing states’, including Arizona and Illinois.

GAO Claims Issue at FDA Cybersecurity Systems

“Confidential health data potentially at risk”

Security firewalls and 80 other weaknesses were found in the Food and Drug Administration’s computer programs. This lack of proper security would allow hackers to breach confidential health information. The information was made public after the GAO, the Government Accountability Office, made 15 instructional changes to beef up security measures after an extensive audit undertaken to strengthen government agencies from potential cyber attacks.

Ransomware Spread Increases

“Weak desktop credentials biggest point of most common point of contact”

Stolen credentials for widespread remote administration application TeamViewer has been largely used to insert ransomware software ‘Surprise’, according to a research team in March. The number of attacks have increased significantly of late, adopted by more highly effective cybercriminals noting its success from their lesser-known counterparts.

The cyberattacks began long before the TeamViewer insertion via RPD servers, but started as crude password generator attacks. This recent development allows criminals to be far more effective in their theft and hacking techniques.

Tofsee Malware Now Distributed Via Spam

“Experts believe the new method is more profitable for hackers”

While malware program Tofsee has been around since 2013, its current spam distribution method is fairly new. The RIG exploit kit that recently oversaw the spread of the malware has stopped circulating, leaving spammers to employ their bots to pick up the slack. Cybercriminals often use Tofsee to engage in , including click fraud, cryptocurrency mining, DDoS attacks and sending spam.