• Like
5 Tips for Executing a Great Newsjack
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

5 Tips for Executing a Great Newsjack

  • 6,294 views
Published

Newsjacking - the practice of leveraging a breaking news situation to promote your brand - can pay big dividends for savvy PR pros. Here are 5 tips on executing a successful newsjack - using common …

Newsjacking - the practice of leveraging a breaking news situation to promote your brand - can pay big dividends for savvy PR pros. Here are 5 tips on executing a successful newsjack - using common PR tools. Includes real-life examples.

Published in Business , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
6,294
On SlideShare
0
From Embeds
0
Number of Embeds
26

Actions

Shares
Downloads
42
Comments
0
Likes
12

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. 5 KEYS TO A GREAT NEWSJACK How One PR Pro Used Common Tools to Execute a Newsjack & Win Huge Media Coverage ANTHONY HARDMAN SecureState Public Relations Expert
  • 2. Anthony Hardman Public Relations Expert, SecureState @ahardman www.linkedin.com/in/anthonyhardman @SecureState THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 3. SecureState is a global management consulting firm focused on information security, and is one of just 11 companies authorized to investigate credit card holder data breaches. The significant data breaches suffered by leading retailers at the end of 2013 generated significant news coverage and represented an important opportunity for SecureState. Anthony Hardman is the company’s only public relations employee. Here is how he pulled off an amazing newsjack with common PR tools – all by himself. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 4. Focus on standing out. “The first key to earning media attention is determining what you can add to the story that no one else is talking about.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 5. Start with the people you know. “I pulled up all my media contacts who I thought would be interested in the story and started making phone calls. When you have an existing relationship with a reporter, it’s okay to call.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 6. In under 30 minutes, two TV stations had committed to on-site interviews, and one of them also booked an instudio interview for that night’s newscast. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 7. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 8. Target confirmed to ABC News Friday that the additional personal information discovered stolen in the pre-Christmas breach "was obtained through the normal course of Target's business," which is to say both in-store and online. Ken Stasiak, CEO of information-based security firm Secure State, said it's common to see security breaches at retailers right before and after the holiday season. Stasiak said companies often don't want to add security to their payment system if it hinders customers from making a purchase. "They don't want the system to go down," for security reasons, said Stasiak. "They want the money if the security gets more lax during the busy season, it's just the fact of the matter." Stasiak said that customers with compromised credit cards can almost always have fraudulent charges removed and be issued a new card. The real headache comes when additional data about a customer is stolen and identity theft becomes an issue. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 9. Mine your media database. “The next step was firing up my Agility media database and creating a targeted list of contacts to whom I could distribute my pitch.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 10. “In cases where time is limited,such as a newsjack, a mass email is appropriate …but be selective about the recipients.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 11. The emails sent to the lists created in the Agility platform resulted in coverage in the LA Times, numerous trade publications and an interview for SecureState’s CEO on PBS NewsHour. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 12. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 13. Target disclosed the security breach Thursday, saying the thieves had purloined customer names, card numbers and a security code encrypted in the magnetic strip. The theft enables the culprits to make phony credit cards, make fraudulent purchases or siphon money from bank accounts. The data breach underscored the evolving sophistication of cybercriminals and the persistent vulnerability of retailers and consumers despite dozens of past incidents at major retailers. “How do you get 40 million credit cards and no one knows about it?” said Ken Stasiak, chief executive of SecureState, which investigates cybercrimes. “That's a hell of a lot of credit cards. There should have been someone inside the company who spotted this much sooner.” The Target attack appeared to be well thought out and executed with great precision. The Minneapolis retailer said the hack occurred between Nov. 27, just before the annual holiday shopping frenzy, and Dec. 15. The breach affects people who bought goods at any of Target's 1,797 stores nationwide, but doesn't affect those who made purchases online. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 14. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 15. Respond to journalist queries. “I knew I had struck media relations gold when I responded to a query on ProfNet from the Associated Press.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 16. The resulting story - Tips for Consumers Worried about the Target Breach - hit the AP national wire, and was picked up in media outlets from coast to coast. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 17. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 18. Q: How did the breach occur? A: Target isn‟t saying how it happened. Industry experts note that companies such as Target spend millions of dollars each year on credit card security, making a theft of this magnitude particularly alarming. Experts disagree about how the breach might have happened. Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes the breach may have been an inside job. But thefts of this size are too big to be the work of company employees, says Ken Stasiak, founder and CEO of Secure State, a Cleveland-based information security firm that investigates data breaches like this one. Stasiak says that such breaches are generally perpetrated by organized crime or an overseas, state-sponsored hacker group. Stasiak‟s theory is that the hackers were able to breach Target‟s main information hub and then wrote a code that gave them access to the company‟s point of sale system and all of its cash registers. That access allowed the hackers to capture the data from shoppers‟ cards as they were swiped. James Lyne, global head of security research for the computer security firm Sophos, says something clearly went wrong with Target‟s security measures. „„Forty million cards stolen really shows a substantial security failure,‟‟ he says. „„This shouldn‟t have happened.‟‟ THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 19. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 20. Experts disagree about how the breach might have happened. Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes the breach may have been an inside job. But thefts of this size are too big to be the work of company employees, says Ken Stasiak, founder and CEO of Secure State, a Cleveland-based information security firm that investigates data breaches like this one. Stasiak says that such breaches are generally perpetrated by organized crime or an overseas, state-sponsored hacker group. Stasiak's theory is that the hackers were able to breach Target's main information hub and then wrote a code that gave them access to the company's point of sale system and all of its cash registers. That access allowed the hackers to capture the data from shoppers' cards as they were swiped. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 21. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 22. Q: How did this happen? A: Target has said that the breach was caused by malware that affected its U.S. stores. Ken Stasiak, founder and CEO of SecureState, a Cleveland-based information security firm that investigates data breaches like this one, says it's likely that the perpetrators infiltrated Target's main information hub with malware and from there were able to access the store pointof-sale systems. Once the malware was in the POS systems, it could collect credit and debit card numbers as the cards were swiped. Stasiak notes that retailers routinely collect personal information such as addresses, emails and phone numbers through things such as rewards cards when sales are made, so that information is also contained on POS systems just like credit card numbers. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 23. Leveraged owned media. “Two internal experts wrote related blog posts. I published and promoted them through every channel I could, which included social media and a news release promoting the content.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 24. The news releases SecureState has issued are the second-largest referrer of visitors to the company’s web site, behind search engines. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 25. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 26. “When you’re one person, you have to be agile and you have to use what you have.” – Anthony Hardman For an in-depth discussion of Anthony’s tactical approach, read our related blog post: 5 Tips for Pulling Off a Newsjack with Common PR Tools THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 27. Anthony Hardman Public Relations Expert, SecureState @ahardman www.linkedin.com/in/anthonyhardman @SecureState THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 28. http://www.prnewswire.com/products-services/agility/ THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert