Archive for ‘April, 2012’

Enter our Super Easy Facebook Contest; Win an iPad!

Just a quick note to let you know about a super easy contest Trackur just launched on Facebook. How easy? Super easy! Just tell us the last time you “Googled” your own name. That’s it! Tell us the last time you checked on your Google reputation and you might just win a brand new Apple iPad. Check out the contest entry page for further details and rules. Good luck! Click Here to Enter!

FCC to Discourage Smartphone Theft, Reputation Damage

What would you do if you were using your smartphone (or tablet) when someone snatched the smartphone out of your hands and took off running? This terrifying scenario represents a real threat smartphone and tablet owners face every day, whether they know it or not.  While smartphone and tablet owners don’t know when criminals will strike, they do know smartphones and tablets are hot ticket items – in demand by the best and worst of us. Smartphone thefts are on the rise in communities across America and unfortunately many of these crimes are much more violent than the one described

Losing at Winning : An Online Contest Fail

A few weeks ago, I was informed via Twitter that I’d won a contest that I wasn’t even aware that I’d entered.  Pretty cool, right? Wrong. I received a Tweet from a traffic notification account that I’d won two free lift tickets to Copper Mountain, and to email the admin at goI70 to claim my prize.  I was pretty excited, I lived and worked at Copper Mountain just out of college, and loved every minute of it.  It was the perfect transition from college life to the real world, giving me the opportunity to have one last hurrah before joining

21 Tips to Keep Your Smartphone–and Reputation–Safe

Years before digital smartphones were in demand; analog cell phones were all the rage. One analog cell phone (I still own) that caused quite a stir was a small, lightweight, clamshell cell phone, the Motorola Star-Tac.  Yesterday’s cell phones were built and used solely to make and receive mobile phone calls. The smartphone features you’ve come to love e.g., texting, instant messaging, checking email, using the internet, listening to music, taking pictures, and using mobile apps, existed only as ideas. Let’s fast forward to today where mobile phones are changing the way you receive daily information. Today’s smartphone owners expect

10 Reputation Rules for Online Communication

This post is the last part of a 4 part series about consumer privacy, data security and what this means to your reputation. Over the last three posts, I’ve shared ways to better understand and guard your data, privacy, and online reputation. Learning how to establish your reputation without revealing too much private information can be extremely challenging since there are so many digital places, social tools and conversations you can engage in online. The main way to get a handle on how you “show up” online is to be mindful of what you can control:  what you say and

Hone Your Ninja Skills With Trackur

With nearly 45,000 registered users, Andy and I often find ourselves having some very interesting conversations.  Often positive, sometimes with constructive criticism, and nearly always candid, these conversations cover an abundance of topics.  One of our favorite things to discuss with Trackur customers, is how they’re using Trackur.  As with many of our updates and improvements, some of the best suggestions for alternative uses for Trackur have come directly from our customers.  Who better to turn to for product development than the people who use the product day in and day out?  Often, we hear ideas, tips, and tricks that

How to Prevent a Data Security Breach from Wrecking Your Online Reputation

This post is the third part of a 4 part series about consumer privacy, data security and what this means to your reputation. The first 24 hours of a data breach is vital. Every second private data is left exposed or compromised threatens your privacy, can damage your reputation and translate into less (business) opportunities. When a data breach happens, you (or your data security team) will need to analyze what happened, note who you need to inform, identify legal concerns, and take the necessary steps to resolve and regain data security. Most IT people are well aware that a data

How to Prevent Your Private Reputation From Being Tracked

This post is the second part of a 4 part series about consumer privacy, data security and how what this means to reputation management. So many people participate in online conversations without much thought.  We send and receive public and private information (data) through digital platforms several times a day.  We share and engage in online activities trusting that our private information, preferences and interests (data) are protected and not at risk. The truth is consumer privacy, data security & your reputation all have risks, known and unknown. Consumer privacy and data security are two of our most basic digital

What the FTC’s New Consumer Privacy Report Means to Reputation Management

This is part one of a 4-part series Consumer Privacy, Data Security & Reputation Management. Please subscribe to our blog so as not to miss parts 2-4. On March 26, 2012 the Federal Trade Commission (FTC)–the only federal agency that handles competition and consumer protection concerns–issued a final Consumer Privacy report. The Protecting Consumer Privacy in an Era of Rapid Change report opens with a clear call to action: “With this report, the Commission calls on companies to act now to implement best practices to protect consumer’s private information. These best practices include making privacy the “default setting” for commercial data

4 Things Employers Can Do To Build Trust & Avoid A Slippery Social Media Slope

By design, social media platforms encourage a culture of sharing, which if you think about it, isn’t a bad thing for business. Introducing your organization’s core values and creating opportunities to share them inside and outside of the organization will help to do more than just polish your reputation – it creates new ideas and opens up new opportunities.  The key is to empower employees with ongoing social media training, tools, and information (e.g., social media policy) trusting that what is said and done online will be a plus for your organization. An organization should aim to build business relationships