SlideShare a Scribd company logo
A family’s good name needs protection just like any other
asset. Yet in today’s instant information digital world, it’s
more vulnerable than ever and poses a problem many
family offices aren’t equipped to deal with. It’s not only
their business that can be faced with reputational damage,
but their all-important family name too.
Reputation has always been a cornerstone for a family
office. In the past this was largely reliant on word-of-
mouth and one’s network. However, in today’s digital age
these factors have been replaced by mainstream media,
blogs, social media, regulatory announcements, and many
other uncontrollable content vehicles that are available
online. A reputation attack now has an instant global
audience and can decimate a previously respected family
office’s name and reputation overnight. While we have
all been taught not to believe everything that we read,
it would be foolhardy to underestimate the role of the
internet on public perception.
Many family offices have devoted time and resources to
developing their brands online, investing millions into
advertisements, sponsorships and promoting their profile
globally. However, all too often family offices neglect to
apply the same resources to safeguarding their online
reputation and privacy, which leaves them vulnerable and
ill prepared to deal with a crisis.
REPUTATION:
THE CORNERSTONE OF A FAMILY OFFICE
1. SUMMARY: ONLINE REPUTATION
MANAGEMENT AND THE IMPACT
ON FAMILY OFFICES
of internet users see online search as
the most trusted source of information
about individuals and companies
65%
2. REPUTATIONAL RISKS:
THREATS AND VULNERABILITIES
The digital world provides a host of new pitfalls
when maintaining the online reputation of a family
office; it also presents opportunities for organisations,
individuals, journalists and even criminals to access
information about the family’s principle interests and
activities. This information can be used for a vast
variety of unwanted, unlawful or damaging purposes
– this can include anything from exposing your
engagement and relationships with controversial or
sensitive individuals, organisations or businesses,
to extortion, fraud and in some extreme cases even
kidnapping.
Social Media and Viral Negative
Content
When a business is intertwined with a family name,
responsibility for a reputation is more closely tied to
individuals.
Social media is ubiquitous and woven into everyday
life. Used responsibly, it can be a relatively secure
medium to communicate with friends and family.
Family offices must be particularly conscious about
limiting their personal online presence, promoting
selective sharing and careful social media use.
Everyone makes mistakes, but for some, their mistakes
are almost guaranteed to have a greater impact. Social
media usage should be treated with extreme caution;
over-exposure and irresponsible use can lead to severe
reputation damage of the individual/s in question and
possibly the entire family office.
Online Media and Search Results
Negative or defamatory results on the first page of
Google – for example, unflattering press coverage or
libellous accusations – can cause serious problems
for a company’s image. As well as damaging the
relationship with customers and clients, potential
partners and investors doing cursory research may
think twice before associating with a company whose
integrity is being called into question.
Exposed Personal Information
Revealing too much can potentially leave you
exposed to a number of threats. Most executives and
families are aware of the obvious physical security
issues which can emerge as a consequence of
exposed personal information. However, many are
less likely to make the connection between exposed
personal information and business continuity and
security. Phishing and spear-phishing attacks are
emails which appear to be from businesses that you
know, attempting to gain access to confidential data.
The more personal information that is available
to the hacker, the more tailored (and ultimately
effective) the phishing attempt can be.
Typically, executives and family principals are the
weakest link in cyber-security because they have
access to the widest set of information and are most
visible to the outside world for targeted attacks.
Connections and Network
As recent headlines have made clear, your online
profile is only as secure as the people you’re
connected to via social media. There isn’t much an
individual can do to stop their online connections
inadvertently giving away personal details;
and, despite negative media attention, sensitive
information contained within online datasets
that users haven’t opted into are still likely to be
available. At ReputationDefender, we can offer advice
on how to significantly reduce the level of risk to
your family’s exploitable, personal information.
Family
Family members are, without question, one of the best
routes for malicious individuals to access personal
information. It only takes one weak link in the chain
– perhaps a younger member of the family who is less
tech savvy and aware – to circumvent another family
member’s continued efforts when it comes to online
privacy. Compounding the issue, it is now easier than
ever before for the family members of high-profile
business people to be identified and subsequently
targeted. These family members often have less
protection in place and may not realise the value of the
data and information they share online, knowingly or
otherwise. Such valuable information can be used to
create a detailed profile of the targeted individual, such
as where and when they go on holiday, their leisure
activities and behaviours, and who they socialise and
relax with. At ReputationDefender, we use penetration
testing to offer strategic advice and stop the flow
of harmful leaks that may originate from unaware
members of the family.
3. IMPACT: FOR A FAMILY
OFFICE
The level of impact of a damaged reputation
on a family office can be debated, scrutinised
and questioned. However, it can’t be denied; it
poses a real risk and shouldn’t be dismissed.
There are multiple consequences of a
reputational crisis for a family office, some of
which are unique to the industry.
Loss of Brand Value and Revenue
An online reputation event can take multiple forms,
whether it’s a poorly worded statement going viral, an
unfortunate association made public, or an unfair and
inaccurate article featuring prominently in the search
results. Whatever the issue is, the damage can have far-
reaching and long-lasting consequences for a business
and its associates. A negative reputation event is not
limited to short term profits and stock value; it can
instigate the start of a downward spiral. Businesses
including family offices risk losing 22% of business when
potential customers find one negative article on the first
page of their search results.
Trust
Running and being part of a family office often carries a
personal attachment and is a unique and difficult task.
It requires gumption and the trust of customers and the
people who work for you and with you. Unless these key
demographics like you and can trust you, it is unlikely
that they will continue to do business with you. A breach
in trust can cripple your growth, putting off potential
partners and investors and impeding future projects
“Wall Street will forgive you
for an uninsured earthquake
loss or a terrorism event,
but it will not forgive you
for operational failures
that affect your reputation,”
said John Kerns, leader of
Beecher Carlson’s national
financial services practice.
Businesses including family offices
risk losing 22% of business when
potential customers find one
negative article on the first page of
their search results.
22%
Damage to the Family Name
Arguably, the greatest impact of a reputation attack
will be felt by family principles. A family name
is a unique asset for family businesses. Not only
does it indicate ownership, but it also conveys a
reputation. Unfortunately, this means that if that
reputation is damaged, the effects will not be
focused solely on the business but on the family as
a whole.
Talent Acquisition and Retention
Like almost any other business, a successful family
office is reliant upon its employees. Having a
negative reputation will starve your family of the
kind of talent it needs and cripple your recruitment
endeavours. Research shows that 69% of job seekers
wouldn’t take a role with a company that had a bad
reputation, even if they were unemployed. Similarly,
84% would consider leaving their current role if
they were offered another role with a company that
had an excellent corporate reputation.
of job seekers wouldn’t take a role with a
company that had a bad reputation, even if
they were unemployed.
Overexposure
Typically, executives and family principals
are the weakest link in cyber-security
because they have access to the widest
set of information and are most visible to
the outside world, making them ideal for
targeted attacks.
Being a director of a family office requires
the individual to surrender ostensibly
innocuous personal information online,
such as addresses, DOB and next of kin.
In the wrong hands this information can
be open to exploitation and used to gain
further insights. Such data in the past has
been used to hack family office members
which has led to severe data breaches and
sensitive content exposure, decimating
the reputation of all involved. It also poses
a real risk to personal safety; private and
personal data can be stolen with much
more sinister intentions, including home
invasions and kidnapping.
69%
84%
would consider leaving their current role
if they were offered another role with a
company that had an excellent corporate
reputation.
4. ANALYSE AND MITIGATE: THE
EXPERT’S SOLUTION
Many family offices feel they have the internal resources
and knowledge to cover such projects as Reputation
Management and Personal Privacy Solutions, but often
that’s not the case. This misplaced sense of confidence and
security leaves the office and family principles vulnerable
to irreparable damage both on and offline.
ReputationDefender offers a comprehensive approach
backed up by years of experience. We know how would-be
reputation attackers, bloggers, trolls, journalists, criminals
and opportunists operate, how they access data, and
what they can do with it to harm you and damage your
reputation. We use tried and tested intelligence processes
with market-leading technologies to deliver in-depth,
bespoke intelligence reputation and privacy reports.
Our tailored analysis offers a comprehensive
understanding of the privacy and reputation risks you and
your family office are facing due to activity and behaviours
online. With the initial analysis completed, we can then
advise on the most effective strategies to mitigate the
risks and minimise any potential reputational damage and
privacy vulnerabilities.
Family Name and Individual Member Profile Analysis
and Mitigation Guidance: ReputationDefender will
analyse the online footprint for all family members as
well as the family/family office name. In doing so, we will
highlight current and potential future online security
and reputational risks. We will demonstrate how current
concerns could potentially translate to future risk and will
provide a written report designed to outline ways you can
reduce these risks and services that have been created to
protect against such issues.
Profile Review and Monitoring: Once analysis has been
carried out and necessary changes have been made,
ReputationDefender will provide an updated review to re-
evaluate the previously perceived risks as well any new, or
re-emerging threats, concerns or risks.
Periodic Profile Review and Alerts: Over the following
weeks and months, ReputationDefender we periodically
review and re-analyse the online profiles of family
members, the family name and/or office to ensure all
bases are still covered. Alerts to any emerging threats or
concerns will be provided as well as insight into how best
to manage and mitigate any risk moving forward.
5. SOLUTION: HISTORICAL EVENT
OR POINT OF CRISIS
If your family office is suffering from historical or more
recent reputation damage, it can be overwhelming or even
seem irremediable. The situation will not mitigate itself
and not acting upon it lends credibility to the event. The
relevance, authority and legitimacy of the event needs
to be challenged strategically and digitally through the
search engines to remedy the situation.
Our Defender Elite Technology is a proprietary technology
comprised of many parts. The technology focuses on what
Google sees as ‘important’ when ranking a web asset at the
top or bottom of the search results.
Generally, the two areas Google
prioritises are:
The credibility/authority a web asset has given
its history/origin (i.e. if the origin site gets
updated, or receives lots of traffic), as well as
how the content on the page relates to the search
being made.
How users engage with the search results and the
path Google sees each unique individual follow.
Often, web assets that rank in the top 5 positions
on Google do so because users click those pages
first and spend a generous amount of time (5, 10,
15+ minutes) reading/digesting the information.
Patterns are then developed based on volume and
read by Google to indicate whether a web asset
should be promoted or demoted in the search
rankings.
This technology focuses specifically on user
engagement and the path unique searchers
follow when searching for your family group. We
work hard to show Google that a greater volume
of interest and activity is occurring on sites that
we want to promote, while sites we are seeking
to suppress show an overall lower percentage of
interest. Our technology contributes to sustaining
these patterns; changing a pattern overnight
isn’t a viable solution because there needs to be
consistency regarding the new pattern.
Identify
Identification of welcome and
unwelcome content appearing in the
search results under consideration,
incorporating any client feedback or
suggestions. Secondary identification
of priorities for promotion and
demotion, based on client feedback.
Bolster Positive Content (Optional)
•	 As necessary, creation of new content to provide supplemental
ranking strength to pre-existing welcome materials.
Sometimes the positive sites in the search profile are not
authoritative enough, or of sufficient diversity, to produce
satisfactory results with technological promotion alone.
•	 In these cases, we create new sites, according to client
specifications, that meet the necessary criteria for authority
and diversity.
Analyse
Identification of the specific balance
of factors that are contributing to the
ranking of both welcome and unwelcome
content. Research conducted on each
of the individual sites appearing in the
top pages of the search results, as well
as on the ordering of the sites. Initial
estimation of the factors influencing the
search results under consideration and
the specific interventions required to
alter the balance of factors.
Deploy
Promotion of welcome items and demotion of unwelcome items
using our proprietary and patented technology and methods. In
most engagements, we begin at a moderate pace and then increase
pressure as the search registers change. A measured approach
allows for the best balance between cost and impact. For crisis
engagements, we begin more aggressively, although there is a
natural limit to how fast we can apply pressure without creating
unnatural looking trends.
Reassess & Refine
•	 Continual assessment of the effectiveness of the
engagement, based on the most current data.
•	 Refinement of the technological framework (as required) to
increase its efficacy.
•	 Real-time incorporation of any new positive or negative sites
into the remediation strategy.
•	 Testing of the level of support necessary to create the
greatest likelihood of permanent positive change.
Build Technology
Creation of a custom technological
framework for the unique search profile
discovered in the analysis stage.
01
03
02
04
06
05
CONCLUSION:
PROTECT WHAT MATTERS
All business including family offices must be proactive
when it comes to protecting their reputation.
For a family office, however, the risks are even greater.
Managing the reputation of a wealthy family is far from
straightforward. There are many pitfalls, but there are
also a number of proactive steps that can be taken to
mitigate risk. A well-organised private family office,
operating with clear policies and procedures, is far
more likely to be strategically prepared when facing
reputation issues.
Effective online reputation management and privacy
control are not only a safeguard against professional
damage; they will help protect your legacy and those
that matter most to you.
The World Economic Forum has
concluded that over 25% of a
company’s market value is, on average,
directly attributable to its reputation.
The importance of a positive online reputation cannot be underestimated. Contact one of our
experienced family office account managers today and discover how ReputationDefender®
can help you
take control of your online reputation.
Tel: +44 (0)800 131 0700 Email Address: hello@reputationdefender.com
ReputationDefender’stermsofusegovernthepurchaseofallreputationmanagementproducts:www.reputationdefender.com/user-agreement
Copyright © 2019 ReputationDefender LLC. Patent www.reputationdefender.com/about-us/patents
25%

More Related Content

What's hot

Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?Werkshop Marketing
 
Social Networking and Staffing
Social Networking and StaffingSocial Networking and Staffing
Social Networking and Staffing
Ramon Thomas
 
Social Media Policies Presentation Christy Season
Social Media Policies Presentation   Christy SeasonSocial Media Policies Presentation   Christy Season
Social Media Policies Presentation Christy Season
SMC Columbia
 
Social Media 101- LAAMA
Social Media 101- LAAMASocial Media 101- LAAMA
Go Getters Presentation Final 7 20 11
Go Getters Presentation Final 7 20 11Go Getters Presentation Final 7 20 11
Go Getters Presentation Final 7 20 11CourtneyBergk
 
Youth law fair presentation
Youth law fair presentationYouth law fair presentation
Youth law fair presentationemilyensign23
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating PresentationShanika Robinson
 
Social Media, Employment, and Brain Injury
Social Media, Employment, and Brain InjurySocial Media, Employment, and Brain Injury
Social Media, Employment, and Brain Injury
Paul Smith
 
TwitterTools4Recruiting
TwitterTools4RecruitingTwitterTools4Recruiting
TwitterTools4Recruiting
Dennis Smith
 
Leadership & Social Media Aicpa Leadership Academy
Leadership & Social Media   Aicpa Leadership AcademyLeadership & Social Media   Aicpa Leadership Academy
Leadership & Social Media Aicpa Leadership Academy
Tom Hood, CPA,CITP,CGMA
 
Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draftravichar
 
Who Trumps How: How Growing Your Networks Can Help You Succeed
Who Trumps How: How Growing Your Networks Can Help You SucceedWho Trumps How: How Growing Your Networks Can Help You Succeed
Who Trumps How: How Growing Your Networks Can Help You Succeed
Maya Townsend
 
Ppt social networking
Ppt social networkingPpt social networking
Ppt social networking
Geetika Khosla
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
keegan333
 
Future of friends 2020
Future of friends 2020Future of friends 2020
Future of friends 2020
Tigsy
 

What's hot (17)

Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?Social Media: All Risk and No Reward?
Social Media: All Risk and No Reward?
 
Social Networking and Staffing
Social Networking and StaffingSocial Networking and Staffing
Social Networking and Staffing
 
Social Media Policies Presentation Christy Season
Social Media Policies Presentation   Christy SeasonSocial Media Policies Presentation   Christy Season
Social Media Policies Presentation Christy Season
 
Fost Presentation
Fost PresentationFost Presentation
Fost Presentation
 
Presentation
PresentationPresentation
Presentation
 
Social Media 101- LAAMA
Social Media 101- LAAMASocial Media 101- LAAMA
Social Media 101- LAAMA
 
Go Getters Presentation Final 7 20 11
Go Getters Presentation Final 7 20 11Go Getters Presentation Final 7 20 11
Go Getters Presentation Final 7 20 11
 
Youth law fair presentation
Youth law fair presentationYouth law fair presentation
Youth law fair presentation
 
Social Media and Dating Presentation
Social Media and Dating PresentationSocial Media and Dating Presentation
Social Media and Dating Presentation
 
Social Media, Employment, and Brain Injury
Social Media, Employment, and Brain InjurySocial Media, Employment, and Brain Injury
Social Media, Employment, and Brain Injury
 
TwitterTools4Recruiting
TwitterTools4RecruitingTwitterTools4Recruiting
TwitterTools4Recruiting
 
Leadership & Social Media Aicpa Leadership Academy
Leadership & Social Media   Aicpa Leadership AcademyLeadership & Social Media   Aicpa Leadership Academy
Leadership & Social Media Aicpa Leadership Academy
 
Safe Use Of Social Networks Final Draft
Safe Use Of Social Networks   Final DraftSafe Use Of Social Networks   Final Draft
Safe Use Of Social Networks Final Draft
 
Who Trumps How: How Growing Your Networks Can Help You Succeed
Who Trumps How: How Growing Your Networks Can Help You SucceedWho Trumps How: How Growing Your Networks Can Help You Succeed
Who Trumps How: How Growing Your Networks Can Help You Succeed
 
Ppt social networking
Ppt social networkingPpt social networking
Ppt social networking
 
Public service announcement
Public service announcementPublic service announcement
Public service announcement
 
Future of friends 2020
Future of friends 2020Future of friends 2020
Future of friends 2020
 

Similar to Reputation: The Cornerstone of a Family Office

ReputationDefender - Family Office Reputation Management
ReputationDefender - Family Office Reputation ManagementReputationDefender - Family Office Reputation Management
ReputationDefender - Family Office Reputation Management
ReputationDefender
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Taylor Van Sickle
 
Invasion of privacy
Invasion of privacyInvasion of privacy
Invasion of privacy
GHULAMFATIMA24
 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for Dummies
Liberteks
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your Organization
EyesOpen Association
 
What I found in my data: True data security stories
What I found in my data: True data security storiesWhat I found in my data: True data security stories
What I found in my data: True data security stories
DataGravity
 
December 2016 Printed Newletter
December 2016 Printed NewletterDecember 2016 Printed Newletter
December 2016 Printed Newletter
Yigal Behar
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Lecture no 12.pptx ethical issues in business
Lecture no 12.pptx ethical issues in businessLecture no 12.pptx ethical issues in business
Lecture no 12.pptx ethical issues in business
eligiblerana
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
seadeloitte
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
Declan Winston Ramsaran
 
see attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docxsee attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docx
bagotjesusa
 
These are 4 discussions posts responses, I need one response per p.docx
These are 4 discussions posts responses, I need one response per p.docxThese are 4 discussions posts responses, I need one response per p.docx
These are 4 discussions posts responses, I need one response per p.docx
randymartin91030
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
Eric Swenson
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
Eric Swenson
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
CR Group
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Morgan
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
jayceewong1
 
Social Media and HR - Friend or Foe?
Social Media and HR - Friend or Foe?Social Media and HR - Friend or Foe?
Social Media and HR - Friend or Foe?
BurCom Consulting Ltd.
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
Jamie Proctor-Brassard
 

Similar to Reputation: The Cornerstone of a Family Office (20)

ReputationDefender - Family Office Reputation Management
ReputationDefender - Family Office Reputation ManagementReputationDefender - Family Office Reputation Management
ReputationDefender - Family Office Reputation Management
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Invasion of privacy
Invasion of privacyInvasion of privacy
Invasion of privacy
 
Cybersecurity for Dummies
Cybersecurity for DummiesCybersecurity for Dummies
Cybersecurity for Dummies
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your Organization
 
What I found in my data: True data security stories
What I found in my data: True data security storiesWhat I found in my data: True data security stories
What I found in my data: True data security stories
 
December 2016 Printed Newletter
December 2016 Printed NewletterDecember 2016 Printed Newletter
December 2016 Printed Newletter
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Lecture no 12.pptx ethical issues in business
Lecture no 12.pptx ethical issues in businessLecture no 12.pptx ethical issues in business
Lecture no 12.pptx ethical issues in business
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
see attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docxsee attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docx
 
These are 4 discussions posts responses, I need one response per p.docx
These are 4 discussions posts responses, I need one response per p.docxThese are 4 discussions posts responses, I need one response per p.docx
These are 4 discussions posts responses, I need one response per p.docx
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
Social Media And Business Risks | Cyberroot Risk Advisory (CR Group)
 
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forumBlake Lapthorn's In-House Lawyer and Decision Makers' forum
Blake Lapthorn's In-House Lawyer and Decision Makers' forum
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Social Media and HR - Friend or Foe?
Social Media and HR - Friend or Foe?Social Media and HR - Friend or Foe?
Social Media and HR - Friend or Foe?
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 

More from ReputationDefender

Who We Are
Who We AreWho We Are
Who We Are
ReputationDefender
 
Our Partner Services
Our Partner ServicesOur Partner Services
Our Partner Services
ReputationDefender
 
Your Privacy Demands Unparalleled Protection
Your Privacy Demands Unparalleled ProtectionYour Privacy Demands Unparalleled Protection
Your Privacy Demands Unparalleled Protection
ReputationDefender
 
Reputation: A Cornerstone for High-Profile Individuals
Reputation: A Cornerstone for High-Profile IndividualsReputation: A Cornerstone for High-Profile Individuals
Reputation: A Cornerstone for High-Profile Individuals
ReputationDefender
 
ReputationDefender - VIP Reputation Services
ReputationDefender - VIP Reputation ServicesReputationDefender - VIP Reputation Services
ReputationDefender - VIP Reputation Services
ReputationDefender
 
The Individuals Guide to Online Reputation Management
The Individuals Guide to Online Reputation ManagementThe Individuals Guide to Online Reputation Management
The Individuals Guide to Online Reputation Management
ReputationDefender
 
ReputationDefender - Google Autocomplete Remediation
ReputationDefender - Google Autocomplete RemediationReputationDefender - Google Autocomplete Remediation
ReputationDefender - Google Autocomplete Remediation
ReputationDefender
 
ReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands Protection
ReputationDefender
 
ReputationDefender - Search Remediation for Business
ReputationDefender - Search Remediation for BusinessReputationDefender - Search Remediation for Business
ReputationDefender - Search Remediation for Business
ReputationDefender
 

More from ReputationDefender (9)

Who We Are
Who We AreWho We Are
Who We Are
 
Our Partner Services
Our Partner ServicesOur Partner Services
Our Partner Services
 
Your Privacy Demands Unparalleled Protection
Your Privacy Demands Unparalleled ProtectionYour Privacy Demands Unparalleled Protection
Your Privacy Demands Unparalleled Protection
 
Reputation: A Cornerstone for High-Profile Individuals
Reputation: A Cornerstone for High-Profile IndividualsReputation: A Cornerstone for High-Profile Individuals
Reputation: A Cornerstone for High-Profile Individuals
 
ReputationDefender - VIP Reputation Services
ReputationDefender - VIP Reputation ServicesReputationDefender - VIP Reputation Services
ReputationDefender - VIP Reputation Services
 
The Individuals Guide to Online Reputation Management
The Individuals Guide to Online Reputation ManagementThe Individuals Guide to Online Reputation Management
The Individuals Guide to Online Reputation Management
 
ReputationDefender - Google Autocomplete Remediation
ReputationDefender - Google Autocomplete RemediationReputationDefender - Google Autocomplete Remediation
ReputationDefender - Google Autocomplete Remediation
 
ReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands ProtectionReputationDefender - Your Privacy Demands Protection
ReputationDefender - Your Privacy Demands Protection
 
ReputationDefender - Search Remediation for Business
ReputationDefender - Search Remediation for BusinessReputationDefender - Search Remediation for Business
ReputationDefender - Search Remediation for Business
 

Recently uploaded

5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
balatucanapplelovely
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 

Recently uploaded (20)

5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...The effects of customers service quality and online reviews on customer loyal...
The effects of customers service quality and online reviews on customer loyal...
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 

Reputation: The Cornerstone of a Family Office

  • 1. A family’s good name needs protection just like any other asset. Yet in today’s instant information digital world, it’s more vulnerable than ever and poses a problem many family offices aren’t equipped to deal with. It’s not only their business that can be faced with reputational damage, but their all-important family name too. Reputation has always been a cornerstone for a family office. In the past this was largely reliant on word-of- mouth and one’s network. However, in today’s digital age these factors have been replaced by mainstream media, blogs, social media, regulatory announcements, and many other uncontrollable content vehicles that are available online. A reputation attack now has an instant global audience and can decimate a previously respected family office’s name and reputation overnight. While we have all been taught not to believe everything that we read, it would be foolhardy to underestimate the role of the internet on public perception. Many family offices have devoted time and resources to developing their brands online, investing millions into advertisements, sponsorships and promoting their profile globally. However, all too often family offices neglect to apply the same resources to safeguarding their online reputation and privacy, which leaves them vulnerable and ill prepared to deal with a crisis. REPUTATION: THE CORNERSTONE OF A FAMILY OFFICE 1. SUMMARY: ONLINE REPUTATION MANAGEMENT AND THE IMPACT ON FAMILY OFFICES of internet users see online search as the most trusted source of information about individuals and companies 65%
  • 2. 2. REPUTATIONAL RISKS: THREATS AND VULNERABILITIES The digital world provides a host of new pitfalls when maintaining the online reputation of a family office; it also presents opportunities for organisations, individuals, journalists and even criminals to access information about the family’s principle interests and activities. This information can be used for a vast variety of unwanted, unlawful or damaging purposes – this can include anything from exposing your engagement and relationships with controversial or sensitive individuals, organisations or businesses, to extortion, fraud and in some extreme cases even kidnapping. Social Media and Viral Negative Content When a business is intertwined with a family name, responsibility for a reputation is more closely tied to individuals. Social media is ubiquitous and woven into everyday life. Used responsibly, it can be a relatively secure medium to communicate with friends and family. Family offices must be particularly conscious about limiting their personal online presence, promoting selective sharing and careful social media use. Everyone makes mistakes, but for some, their mistakes are almost guaranteed to have a greater impact. Social media usage should be treated with extreme caution; over-exposure and irresponsible use can lead to severe reputation damage of the individual/s in question and possibly the entire family office. Online Media and Search Results Negative or defamatory results on the first page of Google – for example, unflattering press coverage or libellous accusations – can cause serious problems for a company’s image. As well as damaging the relationship with customers and clients, potential partners and investors doing cursory research may think twice before associating with a company whose integrity is being called into question.
  • 3. Exposed Personal Information Revealing too much can potentially leave you exposed to a number of threats. Most executives and families are aware of the obvious physical security issues which can emerge as a consequence of exposed personal information. However, many are less likely to make the connection between exposed personal information and business continuity and security. Phishing and spear-phishing attacks are emails which appear to be from businesses that you know, attempting to gain access to confidential data. The more personal information that is available to the hacker, the more tailored (and ultimately effective) the phishing attempt can be. Typically, executives and family principals are the weakest link in cyber-security because they have access to the widest set of information and are most visible to the outside world for targeted attacks. Connections and Network As recent headlines have made clear, your online profile is only as secure as the people you’re connected to via social media. There isn’t much an individual can do to stop their online connections inadvertently giving away personal details; and, despite negative media attention, sensitive information contained within online datasets that users haven’t opted into are still likely to be available. At ReputationDefender, we can offer advice on how to significantly reduce the level of risk to your family’s exploitable, personal information. Family Family members are, without question, one of the best routes for malicious individuals to access personal information. It only takes one weak link in the chain – perhaps a younger member of the family who is less tech savvy and aware – to circumvent another family member’s continued efforts when it comes to online privacy. Compounding the issue, it is now easier than ever before for the family members of high-profile business people to be identified and subsequently targeted. These family members often have less protection in place and may not realise the value of the data and information they share online, knowingly or otherwise. Such valuable information can be used to create a detailed profile of the targeted individual, such as where and when they go on holiday, their leisure activities and behaviours, and who they socialise and relax with. At ReputationDefender, we use penetration testing to offer strategic advice and stop the flow of harmful leaks that may originate from unaware members of the family.
  • 4. 3. IMPACT: FOR A FAMILY OFFICE The level of impact of a damaged reputation on a family office can be debated, scrutinised and questioned. However, it can’t be denied; it poses a real risk and shouldn’t be dismissed. There are multiple consequences of a reputational crisis for a family office, some of which are unique to the industry. Loss of Brand Value and Revenue An online reputation event can take multiple forms, whether it’s a poorly worded statement going viral, an unfortunate association made public, or an unfair and inaccurate article featuring prominently in the search results. Whatever the issue is, the damage can have far- reaching and long-lasting consequences for a business and its associates. A negative reputation event is not limited to short term profits and stock value; it can instigate the start of a downward spiral. Businesses including family offices risk losing 22% of business when potential customers find one negative article on the first page of their search results. Trust Running and being part of a family office often carries a personal attachment and is a unique and difficult task. It requires gumption and the trust of customers and the people who work for you and with you. Unless these key demographics like you and can trust you, it is unlikely that they will continue to do business with you. A breach in trust can cripple your growth, putting off potential partners and investors and impeding future projects “Wall Street will forgive you for an uninsured earthquake loss or a terrorism event, but it will not forgive you for operational failures that affect your reputation,” said John Kerns, leader of Beecher Carlson’s national financial services practice. Businesses including family offices risk losing 22% of business when potential customers find one negative article on the first page of their search results. 22%
  • 5. Damage to the Family Name Arguably, the greatest impact of a reputation attack will be felt by family principles. A family name is a unique asset for family businesses. Not only does it indicate ownership, but it also conveys a reputation. Unfortunately, this means that if that reputation is damaged, the effects will not be focused solely on the business but on the family as a whole. Talent Acquisition and Retention Like almost any other business, a successful family office is reliant upon its employees. Having a negative reputation will starve your family of the kind of talent it needs and cripple your recruitment endeavours. Research shows that 69% of job seekers wouldn’t take a role with a company that had a bad reputation, even if they were unemployed. Similarly, 84% would consider leaving their current role if they were offered another role with a company that had an excellent corporate reputation. of job seekers wouldn’t take a role with a company that had a bad reputation, even if they were unemployed. Overexposure Typically, executives and family principals are the weakest link in cyber-security because they have access to the widest set of information and are most visible to the outside world, making them ideal for targeted attacks. Being a director of a family office requires the individual to surrender ostensibly innocuous personal information online, such as addresses, DOB and next of kin. In the wrong hands this information can be open to exploitation and used to gain further insights. Such data in the past has been used to hack family office members which has led to severe data breaches and sensitive content exposure, decimating the reputation of all involved. It also poses a real risk to personal safety; private and personal data can be stolen with much more sinister intentions, including home invasions and kidnapping. 69% 84% would consider leaving their current role if they were offered another role with a company that had an excellent corporate reputation.
  • 6. 4. ANALYSE AND MITIGATE: THE EXPERT’S SOLUTION Many family offices feel they have the internal resources and knowledge to cover such projects as Reputation Management and Personal Privacy Solutions, but often that’s not the case. This misplaced sense of confidence and security leaves the office and family principles vulnerable to irreparable damage both on and offline. ReputationDefender offers a comprehensive approach backed up by years of experience. We know how would-be reputation attackers, bloggers, trolls, journalists, criminals and opportunists operate, how they access data, and what they can do with it to harm you and damage your reputation. We use tried and tested intelligence processes with market-leading technologies to deliver in-depth, bespoke intelligence reputation and privacy reports. Our tailored analysis offers a comprehensive understanding of the privacy and reputation risks you and your family office are facing due to activity and behaviours online. With the initial analysis completed, we can then advise on the most effective strategies to mitigate the risks and minimise any potential reputational damage and privacy vulnerabilities. Family Name and Individual Member Profile Analysis and Mitigation Guidance: ReputationDefender will analyse the online footprint for all family members as well as the family/family office name. In doing so, we will highlight current and potential future online security and reputational risks. We will demonstrate how current concerns could potentially translate to future risk and will provide a written report designed to outline ways you can reduce these risks and services that have been created to protect against such issues. Profile Review and Monitoring: Once analysis has been carried out and necessary changes have been made, ReputationDefender will provide an updated review to re- evaluate the previously perceived risks as well any new, or re-emerging threats, concerns or risks. Periodic Profile Review and Alerts: Over the following weeks and months, ReputationDefender we periodically review and re-analyse the online profiles of family members, the family name and/or office to ensure all bases are still covered. Alerts to any emerging threats or concerns will be provided as well as insight into how best to manage and mitigate any risk moving forward.
  • 7. 5. SOLUTION: HISTORICAL EVENT OR POINT OF CRISIS If your family office is suffering from historical or more recent reputation damage, it can be overwhelming or even seem irremediable. The situation will not mitigate itself and not acting upon it lends credibility to the event. The relevance, authority and legitimacy of the event needs to be challenged strategically and digitally through the search engines to remedy the situation. Our Defender Elite Technology is a proprietary technology comprised of many parts. The technology focuses on what Google sees as ‘important’ when ranking a web asset at the top or bottom of the search results. Generally, the two areas Google prioritises are: The credibility/authority a web asset has given its history/origin (i.e. if the origin site gets updated, or receives lots of traffic), as well as how the content on the page relates to the search being made. How users engage with the search results and the path Google sees each unique individual follow. Often, web assets that rank in the top 5 positions on Google do so because users click those pages first and spend a generous amount of time (5, 10, 15+ minutes) reading/digesting the information. Patterns are then developed based on volume and read by Google to indicate whether a web asset should be promoted or demoted in the search rankings. This technology focuses specifically on user engagement and the path unique searchers follow when searching for your family group. We work hard to show Google that a greater volume of interest and activity is occurring on sites that we want to promote, while sites we are seeking to suppress show an overall lower percentage of interest. Our technology contributes to sustaining these patterns; changing a pattern overnight isn’t a viable solution because there needs to be consistency regarding the new pattern.
  • 8. Identify Identification of welcome and unwelcome content appearing in the search results under consideration, incorporating any client feedback or suggestions. Secondary identification of priorities for promotion and demotion, based on client feedback. Bolster Positive Content (Optional) • As necessary, creation of new content to provide supplemental ranking strength to pre-existing welcome materials. Sometimes the positive sites in the search profile are not authoritative enough, or of sufficient diversity, to produce satisfactory results with technological promotion alone. • In these cases, we create new sites, according to client specifications, that meet the necessary criteria for authority and diversity. Analyse Identification of the specific balance of factors that are contributing to the ranking of both welcome and unwelcome content. Research conducted on each of the individual sites appearing in the top pages of the search results, as well as on the ordering of the sites. Initial estimation of the factors influencing the search results under consideration and the specific interventions required to alter the balance of factors. Deploy Promotion of welcome items and demotion of unwelcome items using our proprietary and patented technology and methods. In most engagements, we begin at a moderate pace and then increase pressure as the search registers change. A measured approach allows for the best balance between cost and impact. For crisis engagements, we begin more aggressively, although there is a natural limit to how fast we can apply pressure without creating unnatural looking trends. Reassess & Refine • Continual assessment of the effectiveness of the engagement, based on the most current data. • Refinement of the technological framework (as required) to increase its efficacy. • Real-time incorporation of any new positive or negative sites into the remediation strategy. • Testing of the level of support necessary to create the greatest likelihood of permanent positive change. Build Technology Creation of a custom technological framework for the unique search profile discovered in the analysis stage. 01 03 02 04 06 05
  • 9. CONCLUSION: PROTECT WHAT MATTERS All business including family offices must be proactive when it comes to protecting their reputation. For a family office, however, the risks are even greater. Managing the reputation of a wealthy family is far from straightforward. There are many pitfalls, but there are also a number of proactive steps that can be taken to mitigate risk. A well-organised private family office, operating with clear policies and procedures, is far more likely to be strategically prepared when facing reputation issues. Effective online reputation management and privacy control are not only a safeguard against professional damage; they will help protect your legacy and those that matter most to you. The World Economic Forum has concluded that over 25% of a company’s market value is, on average, directly attributable to its reputation. The importance of a positive online reputation cannot be underestimated. Contact one of our experienced family office account managers today and discover how ReputationDefender® can help you take control of your online reputation. Tel: +44 (0)800 131 0700 Email Address: hello@reputationdefender.com ReputationDefender’stermsofusegovernthepurchaseofallreputationmanagementproducts:www.reputationdefender.com/user-agreement Copyright © 2019 ReputationDefender LLC. Patent www.reputationdefender.com/about-us/patents 25%