360 likes | 397 Views
Hear Chris Abraham of Abraham Harrison LLC and Jay Jaffe of Jaffe Associates about how to look after your online reputation and why it is important to do so. Be sure to register now!As the saying goes, your good name is everything. Every individual, and brand, needs to know what their online reputation is and how to protect it. When your online reputation is in disrepair, whether because of bad behavior on your, or your brand’s, part, or because of intentional attacks by competitors or someone with a grudge, you sometimes have legal recourse. But you always have tactics you can undertake online to protect your reputation.Find out how to determine what your online reputation already is, how to promote and maintain a good reputation, and how to protect and defend it in the future. We’ll cover issues like:* What are people saying about me online? And Why Should I Care?* Crisis Management* Proactive Steps to Defend Against Future Attacks* How to activate Google and other search engines in your favorand more.
E N D
How to Protect and Defend Your Brand Reputation Online How to Protect and Defend Your Brand Reputation Online (please use Twitter hash tag #ormd for questions) Chris Abraham President and COO cabraham @ abrahamharrison .com @chrisabraham Daniel Krueger Director of Client Services dkrueger @ abrahamharrison .com @d13vk US +1 202 657 4769 UK +44 20 8144 5671 DE +49 30 7012 5980 Site www. abrahamharrison .com Blog www. marketingconversation .com
Online Reputation Management Defined <ul><li>Online reputation management , or ORM , is the practice of consistent research and analysis of one’s personal or professional, business or industry reputation as represented by the content across all types of online media. It is also sometimes referred to as online reputation monitoring, maintaining the same acronym. Online Reputation Management Defined <ul><li>Online reputation management , or ORM , is the practice of consistent research and analysis of one’s personal or professional, business or industry reputation as represented by the content across all types of online media. It is also sometimes referred to as online reputation monitoring, maintaining the same acronym.
AKA Search Engine Image Protection (SEIP) Also known as Search Engine Reputation Management (SERM) </li></ul> AKA Search Engine Image Protection (SEIP) Also known as Search Engine Reputation Management (SERM) </li></ul>
Online Reputation Management Defined <ul><li>ORM partly formed from a need to manage consumer generated media (CGM) Online Reputation Management Defined <ul><li>ORM partly formed from a need to manage consumer generated media (CGM)
The Cluetrain Manifesto speaks to the ease with which one may initiate and amplify conversation online … The Cluetrain Manifesto speaks to the ease with which one may initiate and amplify conversation online …
You need to participate, engage, communicate! </li></ul> You need to participate, engage, communicate! </li></ul>
Google Alerts & Tweet Beep <ul><li>Google Alerts are your friend Google Alerts & Tweet Beep <ul><li>Google Alerts are your friend
Learn Google search arguments </li><ul><li>“ chris abraham” Learn Google search arguments </li><ul><li>“ chris abraham”
. Chris-abraham </li></ul><li>www.google.com/alerts </li></ul>
. Google Alerts & Tweet Beep <ul><li>Google Alerts provides alerts via email as well as via an RSS feed
. Create alerts for products, services, and the members of your staff and competitors </li><ul><li>Google Reader, etc </li></ul></ul>
. Mandatory Alerts and Monitoring <ul><li>We at Abraham Harrison, LLC, don't generally do steady-state reputation monitoring.
. That said, we all have loads of Google Alerts set up for everything.
. We have recently been using SM2 by Techrigy for Social Media monitoring.
. Don't forget Google/Yahoo! News, Regular Search, etc! </li></ul>
. Mandatory Alerts and Monitoring <ul><li>Negative conversation can still start on message boards
. <ul>Countermeasure: Decoys, Chaff, Flares </ul><ul><li>A countermeasure is a system (usually for a military application) designed to prevent sensor-based weapons from acquiring and/or destroying a target.
. Preemptive action of countermeasures is directed to generally prevent lock-on of a threat sensor to a certain target. It is based on altering the signature of the target by either concealing the platform signature or enhancing the signature of the background, thus minimizing the contrast between the two. </li></ul>
. <ul><li>Reactive action of countermeasures is directed toward break-lock of a threat already homing in on a certain target. It is based on the tactics of signature imitation, augmentation, or reduction.
. One or more of the following actions may be taken to provide softkill :
. - Reduction of signature </li><ul><li>Going stealth or going offline </li></ul><li>- Augmentation of signature </li><ul><li>Duck decoys, squid ink, anti surface-to-air missile flares and chaff </li></ul></ul><ul>Countermeasure: Decoys, Chaff, Flares </ul>
. Preemptive Countermeasures: Inoculation <ul><li>Chris Abraham Blog