Managers: Paying for PR-Lite?

Written by Robert A. Kelly


Please feel free to publish this article and resource box in your ezine, newsletter, offline publication or website. A copy would be appreciated at bobkelly@TNI.net. Word count is 1040 including guidelines and resource box. Robert A. Kelly © 2004.

Managers: Paying for PR-Lite?

As a business, non-profit or association manager, your public relations expenditure may give you names inrepparttar newspaper or product plugs on radio. But what about key stakeholder behavior change –repparttar 104534 kind that leads directly to achieving your managerial objectives?

Since that’s public relations’ strongest suit, shouldn’t you be getting that first, THEN incremental publicity exposure? Especially when persuading those important outside folks to your way of thinking can move many of them to take actions that help you achieve your department, division or subsidiary objectives?

Bounce this notion offrepparttar 104535 public relations team assigned to your unit: people act on their own perception ofrepparttar 104536 facts before them, which leads to predictable behaviors about which something can be done. When we create, change or reinforce that opinion by reaching, persuading and moving-to-desired- actionrepparttar 104537 very people whose behaviors affectrepparttar 104538 organization repparttar 104539 most,repparttar 104540 public relations mission is accomplished.

If they buy into it, you’ll have a simple blueprint that gets everyone working towardsrepparttar 104541 same external audience behaviors insuring that your public relations effort stays on track.

Considerrepparttar 104542 possible payoffs: customers starting to make repeat purchases; community leaders beginning to seek you out; welcome bounces in show room visits; membership applications onrepparttar 104543 rise; prospects starting to do business with you; fresh proposals for strategic alliances and joint ventures; higher employee retention rates, capital givers or specifying sources beginning to look your way, and even politicians and legislators starting to view you as a key member ofrepparttar 104544 business, non-profit or association communities

But, like everything else, there’s no free lunch in PR either, andrepparttar 104545 work looks like this. You need to find out who among your important outside audiences is behaving in ways that help or hinderrepparttar 104546 achievement of your objectives. And then, list them according to how severely their behaviors affect your organization.

Of course it’s unlikely that you haverepparttar 104547 facts and figures you need to pull this off because you aren’t real certain just how most members of that key outside audience perceive your organization.

There’s also a good chance you don’t haverepparttar 104548 budget to accommodate expensive professional survey work. So you and your PR colleagues (they should be quite familiar with perception and behavior matters) must monitor those perceptions yourself.

Meet with members of that outside audience and ask questions like “Are you familiar with our services or products?” “Have you ever had contact with anyone from our organization? Was it a satisfactory experience?” Stay alert to negative statements, especially evasive or hesitant replies. Watch carefully for false assumptions, untruths, misconceptions, inaccuracies and potentially damaging rumors. Any of which will need to be corrected, because experience shows they usually lead to negative behaviors.

How Protected are You? Safeguard Your Small Business from Computer Viruses

Written by Steven Presar


The fact is, every time you log ontorepparttar Internet, send an email message, open an attachment, or insert a floppy disk, you risk infecting your computer system. Computer viruses are out there just waiting to wreak havoc on your data, documents, programs, or whole computer system.

If you need proof, look no further than "Melissa" and "I love you," two email viruses that paralyzed computer systems aroundrepparttar 104533 world as recently as 1999 and 2000. Another virus named "Nimda" infected approximately 2.2 million computers in about a 24 hour period.

There are now estimates of over 58,000 different known computer viruses currently in circulation. The risk of damage to your small business computer system is increasing.

What different types of computer attacks do you need to be concerned about now?

~ Virus: A malicious code that altersrepparttar 104534 data on a computer and harassesrepparttar 104535 user by deleting data or altering operating system files, especially boot files.

~ Trojan Horse: A program that is not what it seems to be. A popular version pretends to be and anti-virus fix and instead delivers a virus.

~ Worm: A virus that is self-replicating, most often through email

~ Zombie: A dormant Trojan that is placed on a computer then waits for a command to do its damage.

So what to do?

1. Regularly backup everything that is of value that you have stored on your computer. A small business's biggest safeguard could simply be backing up your data. Some of today's viruses are so powerful, anti-virus software cannot clean infected files;repparttar 104536 software can only deleterepparttar 104537 infected files.

2. Use anti-virus software. Check for updates regularly. Scan allrepparttar 104538 files on your computer periodically.

3. Your Internet connection needs a firewall (a protective software layer that sits between your computer andrepparttar 104539 outside world).

Approximately 10 % ofrepparttar 104540 U.S. Internet users have fast cable modems or high-speed phone-based digital subscriber lines. The "always on" nature of these high-speed connections creates an open door for these computer attacks. Firewalls are essential for those connecting torepparttar 104541 Internet with high-speed connections.

Even dial-up connections may be at risk, so install a firewall. Your firewall will act as your safe gatekeeper between your computer system and Internet hackers.

Note that anti-virus software won't detect hacker intrusions but your firewall will. Your firewall won't detect viruses but your anti-virus software will -- so install both anti-virus and firewall software on your system.

If you are using Microsoft's new Windows XP operating system, you already have a firewall built in. If you're running an older version of Windows, consider installing Zone Alarm, which is free for individual and nonprofit use.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use