5 tips for executing a great newsjack

29
5 KEYS TO A GREAT NEWSJACK How One PR Pro Used Common Tools to Execute a Newsjack & Win Huge Media Coverage ANTHONY HARDMAN SecureState Public Relations Expert

Post on 14-Sep-2014

6.501 views

Category:

Business


0 download

DESCRIPTION

Newsjacking - the practice of leveraging a breaking news situation to promote your brand - can pay big dividends for savvy PR pros. Here are 5 tips on executing a successful newsjack - using common PR tools. Includes real-life examples.

TRANSCRIPT

Page 1: 5 Tips for Executing a Great Newsjack

5 KEYS TO A GREAT NEWSJACK

How One PR Pro Used Common Tools to Execute a Newsjack & Win Huge Media

Coverage

ANTHONY HARDMANSecureState Public Relations Expert

Page 2: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Anthony HardmanPublic Relations Expert,SecureState

@ahardman

www.linkedin.com/in/anthonyhardman

@SecureState

Page 3: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

SecureState is a global management consulting firm focused on information security, and is one of just 11 companies authorized to investigate credit card holder data breaches.

The significant data breaches suffered by leading retailers at the end of 2013 generated significant news coverage and represented an important opportunity for SecureState.

Anthony Hardman is the company’s only public relations employee. Here is how he pulled off an amazing newsjack with common PR tools – all by himself.

Page 4: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Focus on standing out.

“The first key to earning media attention is determining what

you can add to the story that no one else is talking about.”

Page 5: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Start with the people you know.

“I pulled up all my media contacts who I thought would be interested

in the story and started making phone calls. When you have an

existing relationship with a reporter, it’s okay to call.”

Page 6: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

In under 30 minutes, two TV stations had committed to on-site interviews, and one of them also booked an in-studio interview for that night’s newscast.

Page 7: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Page 8: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Target confirmed to ABC News Friday that the additional personal information discovered stolen in the pre-Christmas breach "was obtained through the normal course of Target's business," which is to say both in-store and online.

Ken Stasiak, CEO of information-based security firm Secure State, said it's common to see security breaches at retailers right before and after the holiday season. Stasiak said companies often don't want to add security to their payment system if it hinders customers from making a purchase.

"They don't want the system to go down," for security reasons, said Stasiak. "They want the money if the security gets more lax during the busy season, it's just the fact of the matter."

Stasiak said that customers with compromised credit cards can almost always have fraudulent charges removed and be issued a new card. The real headache comes when additional data about a customer is stolen and identity theft becomes an issue.

Page 9: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Mine your media database.

“The next step was firing up my Agility media database and creating a targeted list of contacts to whom I could

distribute my pitch.”

Page 10: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

“In cases where time is limited,such as a newsjack, a mass email is appropriate …but be selective about

the recipients.”

Page 11: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

The emails sent to the lists created in the Agility platform

resulted in coverage in the LA Times, numerous trade

publications and an interview for SecureState’s CEO on PBS

NewsHour.

Page 12: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Page 13: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Target disclosed the security breach Thursday, saying the thieves had purloined customer names, card numbers and a security code encrypted in the magnetic strip. The theft enables the culprits to make phony credit cards, make fraudulent purchases or siphon money from bank accounts.

The data breach underscored the evolving sophistication of cybercriminals and the persistent vulnerability of retailers and consumers despite dozens of past incidents at major retailers.

“How do you get 40 million credit cards and no one knows about it?” said Ken Stasiak, chief executive of SecureState, which investigates cybercrimes. “That's a hell of a lot of credit cards. There should have been someone inside the company who spotted this much sooner.”

The Target attack appeared to be well thought out and executed with great precision.

The Minneapolis retailer said the hack occurred between Nov. 27, just before the annual holiday shopping frenzy, and Dec. 15. The breach affects people who bought goods at any of Target's 1,797 stores nationwide, but doesn't affect those who made purchases online.

Page 14: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Page 15: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Respond to journalist queries.

“I knew I had struck media relations gold when I

responded to a query on ProfNet from the Associated

Press.”

Page 16: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

The resulting story - Tips for Consumers Worried about the Target Breach - hit the AP national wire, and was picked up in media outlets from coast to coast.

Page 17: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Page 18: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Q: How did the breach occur?

A: Target isn’t saying how it happened. Industry experts note that companies such as Target spend millions of dollars each year on credit card security, making a theft of this magnitude particularly alarming.

Experts disagree about how the breach might have happened.

Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes the breach may have been an inside job.

But thefts of this size are too big to be the work of company employees, says Ken Stasiak, founder and CEO of Secure State, a Cleveland-based information security firm that investigates data breaches like this one. Stasiak says that such breaches are generally perpetrated by organized crime or an overseas, state-sponsored hacker group.

Stasiak’s theory is that the hackers were able to breach Target’s main information hub and then wrote a code that gave them access to the company’s point of sale system and all of its cash registers. That access allowed the hackers to capture the data from shoppers’ cards as they were swiped.

James Lyne, global head of security research for the computer security firm Sophos, says something clearly went wrong with Target’s security measures.

‘‘Forty million cards stolen really shows a substantial security failure,’’ he says. ‘‘This shouldn’t have happened.’’

Page 19: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Page 20: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Experts disagree about how the breach might have happened.

Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes the breach may have been an inside job.

But thefts of this size are too big to be the work of company employees, says Ken Stasiak, founder and CEO of Secure State, a Cleveland-based information security firm that investigates data breaches like this one. Stasiak says that such breaches are generally perpetrated by organized crime or an overseas, state-sponsored hacker group.

Stasiak's theory is that the hackers were able to breach Target's main information hub and then wrote a code that gave them access to the company's point of sale system and all of its cash registers. That access allowed the hackers to capture the data from shoppers' cards as they were swiped.

Page 21: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Page 22: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Q: How did this happen?

A: Target has said that the breach was caused by malware that affected its U.S. stores.

Ken Stasiak, founder and CEO of SecureState, a Cleveland-based information security firm that investigates data breaches like this one, says it's likely that the perpetrators infiltrated Target's main information hub with malware and from there were able to access the store point-of-sale systems. Once the malware was in the POS systems, it could collect credit and debit card numbers as the cards were swiped.

Stasiak notes that retailers routinely collect personal information such as addresses, emails and phone numbers through things such as rewards cards when sales are made, so that information is also contained on POS systems just like credit card numbers.

Page 23: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Leveraged owned media.

“Two internal experts wrote related blog posts. I published and promoted them through every channel I could, which included social media and a news release promoting the

content.”

Page 24: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

The news releases SecureState has issued are the second-largest referrer of visitors to the company’s web site, behind search engines.

Page 26: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

“When you’re one person, you have to be agile and you have to use what you have.” – Anthony Hardman

For an in-depth discussion of Anthony’s tactical approach, read our related blog post:

5 Tips for Pulling Off a Newsjack with Common PR Tools

Page 27: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

Anthony HardmanPublic Relations Expert,SecureState

@ahardman

www.linkedin.com/in/anthonyhardman

@SecureState

Page 28: 5 Tips for Executing a Great Newsjack

THE KEY TO NEWSJACKINGAnthony Hardman, SecureState Public Relations Expert

http://www.prnewswire.com/products-services/agility/

Page 29: 5 Tips for Executing a Great Newsjack