IoT Security Tips to Protect Your Small Business

IoT Security Tips to Protect Your Small Business by Drew Robb.  Available from<http://www.smallbusinesscomputing.com/tipsforsmallbusiness/iot-security-tips-to-protect-your-small-business.html> [Posted November 07, 2016]

This article examines the recent Internet of Things (IoT) attacks and offers expert tips on how to secure IoT devices.

Last month on October 21, millions of people could not connect to websites like Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud and The New York Times—due to what’s known as a distributed denial-of-service (DDoS) attack. The culprit? Tens of thousands of Internet of Things (IoT) devices that contain wireless sensors to connect to the Internet. Hackers compromised cameras, coffee makers, web cams, DVRs, surveillance cameras, routers, anything they could get their hands on. And they used these devices—without their owners knowing—to unleash a flood of overwhelming Internet traffic that took down all these sites.

“The latest DDoS attack used connected devices such as smart refrigerators and thermostats,” said Frank Scavo, president of Computer Economics. “They flooded the network with a large number of transactions, until these websites were unable to process legitimate transactions.”

Understanding the Need for IoT Security

The IoT is the subject of tremendous hype of late. Analyst firm Gartner predicts that by 2020, more than twenty billion devices will be connected to networks worldwide. The vision behind this includes: smart traffic lights that don’t leave you idling at a junction for several minutes when nothing is coming the other way; coffee makers networked to the front door or to your phone so coffee is ready and waiting upon your arrival; and fridges that send reminders to order grocery items in short supply.

The problem is that every wireless sensor and each networked device represents a possible entry point for an attacker. And if hackers can use them to bring down the Web, how difficult do you think it will be to use them to infiltrate a small business network?

Unfortunately, most of these IoT devices contain little in the way of security features. If even when they do, they’re neglected. People never change the factory set password—such as 0000 or 1234—when they are installed, so millions of devices end up with the same easy-to-hack password.

For example, a security conference called Black Hat Europe recently discovered a security vulnerability between IoT devices and Android phones. Belkin home automation devices—such as electrical switches, cameras, light bulbs, coffee makers, and air purifiers—could be used access the phones that program and control the devices.

“Hackers can use the IoT device to hop right into the network,” said Chris Coleman, senior engineering manager at VeeDog, a small business ransomware-prevention vendor. “Anyone using such devices in a small business could find their servers suddenly overcome by malware.”

He said that wireless Internet routers in small businesses are particularly prone to attack if they’re not well protected. But there are also known cases of business cell phones being hacked via the office coffee maker.

“A lot of devices out there have intelligent connections to the Internet that represent a real and persistent danger to your business,” said Coleman.

IoT Security Tips

We spoke to security industry experts who offered their best IoT security tips to help you prevent your business from falling victim to an IoT attack. Here’s what they had to say:

  • Software Updates: Keep the software for your computer network, servers, laptops, desktops, network switches, wireless routers, and any other devices up-to-date, particularly with the latest manufacturer security updates.
  • Strong Passwords: Never use default passwords for devices once you set them up. Change them and keep them secure. This means no sloppy password construction: like using your name, the actual word “password,” or other easy-to-hack terms. Remove Post-It notes stuck on screens or cubicles that serve as password reminders.
  • Wireless Security: Wireless devices use certain security methods, and some are easier to hack than others. Coleman recommends disabling Wi-Fi Protected Setup (WPS) and using only Wi-Fi Protected Access 2 (WPA2).
  • Home Security: Make sure that you and your employees take safe practices home, especially if any of you conduct business from home. The bad guys like to comprise home computers. They find the ones that connect to business networks, capture passwords, and quietly move into the business. From there, they can wreak havoc.

    “Hackers rely on security ignorance, and they take advantage of your business by mining for choice nuggets [e.g., data, usernames, passwords] in home computers,” said Coleman.

  • Data Backups: Invest in a data backup strategy, and make sure that you or designated IT person/team—knows how to restore your data in the event of disaster. If you lose a computer or a server that’s critical to your company survival, proper backup and restore procedures will help you turn a potential disaster into a mere nuisance.
  • Get IT Help: Hackers rely on ignorance. If you have an IT person in your business, hold her responsible for security and encourage her to gain expertise—fast. If you have enough personnel, appoint someone to solely look after IT security and justify it by the fact that the bad guys are hitting everyone right now. If you don’t have enough staff or in-house expertise, hire outside help to handle that responsibility.

    “Network consulting firms, security consulting firms, and managed service providers will assess your network, your website, and any connected devices that you have,” said Scavo. “They can help you decide what security measures you need to take to protect your company.”

  • DDoS Protection: If your website lies at the heart of your business, and it makes you a lot of money, consider securing additional protection against a Distributed Denial of Service attack. Attackers can either target you directly or you may just get caught in the crossfire when they go after your Internet Service Provider (ISP).

    “If you want to be sure you website cannot be shut down by a DDoS attack, your website needs to be hosted by special Internet hosting companies that specialize in DDoS mitigation,” said Stu Sjouwerman, CEO of security awareness training vendor KnowBe4. There is an industry that does this, but it’s not cheap. If you can’t afford it, call your ISP and ask how they mitigate against DDoS attacks. Find the ISP that has the best measures in place.

  • Credit Cards: Small business owners have complained about being forced to buy the latest credit card payment machines that include a chip reader. But the Smart Card Alliance believes this adds another layer of protection against hackers. Every IoT device serves as a potential entry point onto the network, and that includes credit card machines and bank accounts.

    “These recent DDoS attacks, one of which was more than four times the size of the largest reported attack last year, are comparable to the massive payments data breaches that have been in the spotlight over the past few years,” said Randy Vanderhoof, executive director of the Smart Card Alliance. “This is just the latest example of the IoT vulnerabilities that exist today, and it demonstrates why IoT security is so critical.”

  • Physical Security: Amir Sharif, co-founder and vice-president of business of Aporeto, a cloud security company, pointed out that even with all of the above safeguards in place and with top-of-the-line security practices in force, a business could still become a victim due to one insecure IoT point.

    Hackers could use an innocuous device sitting in the corner to unlock a company’s physical doors remotely. They could then send in a local person to install sophisticated snooping devices that map keyboard strokes, record voice data, steal video streams off of computers, and so forth. With that information they can silently siphoned bank accounts over a long period with what would appear to be a series of legitimate transactions. “Buy IoT devices only if you have a good business need for them,” said Sharif. “Buy devices from well-known companies that stand behind their product and provide some indemnity.”

  • Video Cameras:Surveillance technology has become incredibly affordable, and it’s been deployed by many small businesses. Increasingly these devices can connect to the Internet, and that poses a threat. “You should keep Internet-enabled devices—like video cameras—on a separate network from the primary business network that deals with customer financial transactions, like point of sale systems, intellectual property, or any form of regulated data,” said Chris Morales, head of security analytics at Vectra Networks.

    Mat Gangwer, chief technology officer at Rook Security, takes this a step further. He advises small businesses to keep all IoT devices off the corporate network except those that are absolutely needed. “It doesn’t require a huge IT budget to make an organization a little more secure, to make it a more difficult target,” said Gangwer. “Most hackers go after the really the easy targets.”

  • Security Technology: Of course, small businesses still need the usual security technologies place: anti-virus, anti-malware, firewalls, encryption and, especially these days, ransomware protection. VeeDog, for example, is designed for small businesses. It monitors the network data flow, flags suspicious files, and analyzes them for destructive or malicious intention. It disables any file verified as malware, and then it submits the malware file to the customer’s anti-virus provider so that it can distribute a fix to all their customers.
  • Educate Employees:Most breaches, hacks, and ransomware result from human error; someone somewhere within the organization got sloppy or lacked proper security education—or both. And it’s shocking how easy it is to trick employees. One company hired an outside organization to pretend to be its IT department. It sent employees emails asking for their user passwords. Out of 200 employees, 113 their passwords immediately.

    Opening email attachments or links from unknown or unverified senders is a poor practice, yet it remains an easy, viable way to gain unauthorized entry. Employees need training on how to spot suspicious emails.

    How can you tell if the email is NOT from your bank or from the IT department? Hover your cursor over the name shown as the sender. Hackers can make something look like a legit email yet when you put the cursor there, the actual email address shows up as something along the lines as nasty.hacker@aol.com.

    Security experts agree that ransomware attacks will only increase, which makes security awareness training a sensible defense. Employees learn the various tricks of the hacking and ransomware trade so they don’t get conned. Training programs also send out spoof email links to see how many employees click on them. They track the percentage, and the training helps to reduce the number over time. It’s shocking how many people, including bosses, get fooled.

Don’t Let IoT Fear Paralyze Your Business

Yes, our highly connected world can seem much too scary. One in 40 small businesses is at risk of a cyberattack, according to a Symantec report. This translates directly into dollars lost—the National Small Business Association found that, on average, cyberattacks cost small businesses more than $7,000.

“Businesses that have connected devices, such as smart-factory or smart-warehouse equipment, need to be aware of the threat and to make sure their devices have security protection,” said Scavo. “Otherwise criminals could take down your factory or your warehouse and demand ransom to get it back up and running.”

Such possibilities could cause some business people to yearn for the good old days when they never had to worry about hackers and malware. But it’s really not much different than moving from a tiny community where no one locks their doors to large city—where you have to change your habits and take sensible precautions.

“The risk is relatively small if a business takes basic steps to protect its network,” said Mike Bergman, senior director of technology and standards at the Consumer Technology Association.

Mankind successfully made the transition from a lower-crime agrarian existence into a higher-crime industrial world. The same can be done with the Internet of Things. Just as the benefits of industry were found to outweigh the many drawbacks, so it is with a more connected world.

“At the end of the day, we’ll see that the benefits IoT provides to the small business owners outweigh the cost,” said Sharif. “Life will go on.”

IoT Security Tips to Protect Your Small Business by Drew Robb.  Available from<http://www.smallbusinesscomputing.com/tipsforsmallbusiness/iot-security-tips-to-protect-your-small-business.html> [Posted November 07, 2016]

Top 11 tech tips for non-techies

Top 11 tech tips for non-techies  by Michael LaVista.  Available from <http://www.chicagonow.com/un-tech/2016/11/top-11-tech-tips-for-non-techies-and-my-mother/> [November 08, 2016]

If you’ve ever had a VCR blink 12:00 for months at a time, this post is for you.

For many, technology is a necessary evil, albeit an appealing one. Back in the day, you liked the idea of recording Magnum P.I., but you just didn’t have the time or inclination to figure out how to do.

More than ever before, technology is designed to make your life easier, but it takes some doing to get it working for you. Here are some things you can easily do today to get technology working for you, and to avoid some pitfalls even if you’re a little scared off by it.

Get your important documents in the cloud. Have you ever wondered what “The Cloud” really is? It’s just the new marketing term for the internet. If you use Gmail, your email and attachments are on servers that Google runs. That’s it. There’s really no reason to use Microsoft Word to create docs and save them to your desktop. My mom recently lost all of her documents because they were saved to her computer – and only to her computer. That meant when the hard drive died, so did her documents.

The easiest solution is to use Google Drive. It’s free, and has web-based programs that are more or less equivalent to Word, Excel and Powerpoint. They don’t have all of their functionality.  But if you’re like me, the last time you used Mail Merge in Word was for your wedding invites, and you only pretend to know what a Pivot Table in Excel is.

The best part?  Once they are in Drive, you can access them anywhere from any computer.

Get your photos in the cloud, too. I’ve met multiple people who lost their phones, and with them, all their photos. What? It’s really easy to have a backup plan. If you’re an iPhone user, just go into Settings and iCloud and turn Photos on. Voila! Your phone will start pushing your photos to the cloud. You can even go to iCloud.com and look at them. It might cost a few bucks depending on how many you have, but it’s probably worth it.

And when you get a new phone one day, the moment you activate it, all those photos will start flowing in.

Switch your email to something not tied to a service you pay for. I’m looking at YOU, people with comcast.net and sbcglobal.net addresses. What happens when you switch to Uverse? That old email goes away. Don’t tether yourself to your cable provider. Get an account on Gmail or Hotmail.

Don’t click on links in emails from people you don’t know. Here’s a tip on how to see if the link is legitimate. If it looks like an email from Wells Fargo, look at what’s up in the browser address bar when you click it. Does it say wellfargo.com? Or does it say login.banksite.ru? If it’s not the one you expected, what’s happening is that you put your correct user and password in the box and the fake site records the info, but returns an error that says that’s not the correct password. So you enter it again. They save it again. In the background, they now are able to log in to the real site as you.

Never. Ever. Download an attachment from somebody you don’t know…and if you get an email from a friend that is worded strangely as an attachment, don’t download it either. Email them back and tell them to change her email password because their account just got hacked.

A quick note–what does it mean to be “hacked?”  Most people think that when their emails get hacked that there is some person out there reading your emails now. That’s hardly ever the case. Generally speaking, and this is surprising to many, there are millions of programs out there just running through emails and passwords to try to guess it so they can a) get access to your contacts (to send an spyware attachment to them as you) and b) get into your account to send more spam.

Here’s a quick tip–Is your password “I love you” or “password1”? If so, you’re not alone. A study showed those are the 2 most likely passwords. Think you’re pretty clever with the old “child’s name birthday combo?” Yeah – they know about that one, too.

Log out. Ever check your email the hotel? Logged in to your friend’s computer to see pictures? If you don’t log out, the next person to show up on that computer is able to be you on the internet for long as they want.

Just Say No…to Email Requests.  When a store asks you for your email address during checkout, say “I prefer not to give it.” It might take practice – try it at home a few times. Do you really need marketing email from all those stores?

Advancing Googling. Did you know there are additional tools for Google? Try clicking here:

You can get results in a date range. This is useful if you are looking for something that would have more relevant results for last week versus last year.

You can also search only on a given site by adding “site:” and the site in front. If you want to see which pages on cubs.com are about tickets – search for this: site:cubs.com tickets.

Most of all, don’t be afraid to click around and try things. Most sites have advanced features like that. You can’t break them. Click around and find the hidden gems!

Top 11 tech tips for non-techies  by Michael LaVista.  Available from <http://www.chicagonow.com/un-tech/2016/11/top-11-tech-tips-for-non-techies-and-my-mother/> [November 08, 2016]

Why your company needs a social media policy

Why your company needs a social media policy by .  Available from <http://www.techrepublic.com/article/why-your-company-needs-a-social-media-policy/> [November 2, 2016, 4:00 AM PST]

Only 51% of employees report that their workplace has rules about social media use at work, according to a recent Pew Research Center survey—which means half of the workforce is potentially at risk for litigation and security breaches.

A social media policy is just as necessary for companies as discrimination, leave, and vacation policies, said Daniel Handman, a labor and employment litigator and a partner at Hirschfeld Kraemer LLP. Legal problems can arise for businesses if employees say something negative about the company, reveal confidential information, or say something positive about the company without disclosing their affiliation, he said.

“The most important issue is when an employee says something negative, which has been the subject of a tremendous amount of litigation,” Handman said.

The largest government player in social media law is the National Labor Relations Board (NLRB). The National Labor Relations Act, passed in 1935, allows all employees the right to engage in “concerted activities” for the “mutual aid and protection” of coworkers, which the board extends to social media activities. Therefore, any policy that prevents employers from their right to express such concerns would be considered invalid.

“If you work at McDonald’s and say, ‘The hamburgers are terrible,’ that’s not protected,” Handman said. “But if you say, ‘I’m getting lousy tips because the kitchen sucks,’ that is protected,” because it relates to a working condition that impacts coworkers, he said.

Risks and benefits

Seven out of 10 employees use social media at work, according to a recent report from Bambu by Sprout Social. Half of employees report using social media for up to an hour per day at work.

Full-time and part-time employees reported going on social media for a number of personal and professional reasons, the first of which were to take a mental break from their job (34%), and to connect with family and friends (27%), according to the Pew Research Center survey. But many also used social media to make or support professional connections (24%), get information to solve problems at work (20%), and build relationships with coworkers (17%).

While having an official social media presence can enhance an organization’s communication, recruitment, research, and client base, using social media at work for either professional or personal involves the following risks, according to SHRM:

  • The possibility for hackers to commit fraud and launch spam and virus attacks.
  • The risk of people falling prey to online scams that seem genuine, resulting in data or identity theft or a compromise of the company’s computer security.
  • A potential outlet for negative comments from employees about the organization.
  • Legal consequences if employees use these sites to view or distribute objectionable, illicit or offensive material.

In a recent survey report from Smarsh, nearly half of respondents cited social media as the communication channel with the highest level of compliance risk.

“Concerns about electronic communications policies, policy enforcement, and retention gaps remain high, indicating many firms are vulnerable to undetected fraud, errors, and potential regulatory enforcement penalties,” the report stated. Less than half of respondents said that they are mostly or completely confident that their current strategies will identify risks for the organization, the report stated.

Some experts also blame social media on falling workplace productivity. But these platforms are not the root cause, according to Aliah Wright, a social media expert at the Society for Human Resource Management (SHRM) and author of A Necessary Evil: Managing Employee Activity on Facebook, Twitter, LinkedIn…and the Hundreds of Other Social Media Sites.

“Companies need to treat the people they hire like adults,” Wright said. “You trust them to do the job you hired them to do. If their productivity slacks off, that’s a productivity issue, not a social media issue. If people are always at the coffee maker, you don’t get rid of the kitchen. Social media is not the problem—the problem is with time management, which can be corrected.”

Creating a policy

Company leaders should generally allow employees to use social media during work hours, said Wright. “Social media is ubiquitous for us—it’s our new telephone, and it’s not going anywhere,” Wright said. “Social media is the way in which we connect not just with friends, but with our Rolodex.”

But policies can make a difference in how often employees use these platforms, the Pew study found: At companies that do have a social media policy, 30% of workers said they use social media while on the job to take a break—compared to 40% of workers whose employers do not have such policies.

Many companies devised social media rules based on Walmart’s policy, Wright said, which the NLRB gave a stamp of approval to in 2012.

Social media policies should align with the company’s culture and industry, Wright said. Organizations should tap different divisions, including public affairs, legal, and marketing when composing social media policies, she added.

Wright recommends a social media policy include the following:

  • Names of those in the company who are allowed to speak on the company’s behalf on these platforms. If an employee is contacted via Facebook with a question or concern about the company, should they forward it to a certain company representative?
  • Guidelines for how inappropriate postings, which may include discrimination or threats of violence, will be responded to.
  • Training procedures, including informing employees what information is allowed to be shared. Since many people do not log off of social networks, informing them about multi-factor authentication options can also help protect information, Wright said.

Company leadership must ensure strong cyber protections are in place to secure data, Wright said. “If you’re not teaching employees about proper password hygiene, that could be blamed on you as a company,” Wright said.

Legal monitoring

About half of states now have laws on the books preventing employers from requesting passwords to personal social media accounts to get or keep a job.

However, “an employer can under the law monitor an employee’s use of technology, email, or the internet, so long as they advise the employee that they’re doing so,” Handman said. He recommends consulting with a lawyer before taking punitive action against an employee based on something that occured on social media, he said.

Some 32% of employees reported that their employer has policies about how employees should conduct themselves on the internet in general, according to the Pew survey.

But monitoring employee social media activity on a regular basis is unusual, Wright said. “I don’t think a lot of companies have time to play Big Brother,” she added. Some employ programs that monitor their brand and what employees post to promote it. “I don’t know any company that has enough dedicated staff to spy on employee social media,” she said.

Why your company needs a social media policy by .  Available from <http://www.techrepublic.com/article/why-your-company-needs-a-social-media-policy/> [November 2, 2016, 4:00 AM PST]

Grow Your Business: Using Social Media and Traditional Marketing

Grow Your Business: Using Social Media and Traditional Marketing by Dan Arens, Business Growth Advisor.  Available from <http://www.insideindianabusiness.com/story/33572146/grow-your-business-using-social-media-and-traditional-marketing> [Posted: Nov 02, 2016 4:59 AM CST  Updated: Nov 02, 2016 8:39 PM CST]

Who can forget the epic commercial of the tiny little Chihuahua saying “I think I need a bigger box?” That advertisement ushered in a new era of marketing for Taco Bell. The year was 1998. Since then, with the advent of social media, the world of branding has changed forever. How did it happen and what can we do about it?

Several decades ago a few television networks, film companies, magazine corporations, and newspaper publishers virtually controlled what consumers saw and heard. Consumer marketing companies had to ‘pay to play’ in the market if they were looking to introduce, secure, or build their product. If you wanted to market your product, it usually involved some form of media in order to establish your brand in the marketplace. Traditionally, advertising was the vehicle of choice. All of that has changed.

As technology advanced in the form of devices like the digital video recorder, the consumer began making a turn toward more selective viewing by skipping ads, which resulted in giving them the power to select what they wanted to see. The internet itself gave the consumer the opportunity to avoid having to read anything that was hardcopy related, such as a newspaper or a magazine. Branding was undergoing a sea change in the shifting of power from the consumer marketing companies to the ultimate decision maker, that of the individual consumer or customers themselves.

According to Douglas Holt, the author of How Brands Become Icons: The Principles of Cultural Branding, social media has played a pivotal role in our culture. It has taken society away from mass marketing to having a direct impact on societal groups, via social networks. The members of each social network have become the individual influencers for product purchases. Holt calls these individual groups crowdcultures.

As Holt points out, metrics compiled over the past ten years support the position that standard branding approaches are failing to deliver in the social media arena. He says “In YouTube or Instagram rankings of channels by number of subscribers, corporate brands barely appear. Only three have cracked the YouTube 500. Instead you’ll find entertainers you’ve never heard of, appearing as if from nowhere.”

Red Bull, a well known energy drink is a seemingly successful story of bridging the gap between traditional marketing and the utilization of social media. They are maintaining their presence with standard branding techniques, while they are also ranked number 184 on YouTube with slightly under five million subscribers. As a means of comparison, author Holt points out that Dude Perfect, a YouTube phenomenon that shows “trick shots and goofy improvised athletic feats” does much better than Red Bull. Dude Perfect is in position 81 with about 8 million subscribers.

Holt believes ‘crowdcultures’ are now the influencers and innovators in the branding process. With amateurs and individuals producing their own quality video content, consumer marketing companies are unable to compete. He cites Dove soap as an example of a company that used ‘crowdcultures’ and social media for initiating campaigns that supported cultural change in the beauty industry. Dove soap took the position of supporting “real beauty” as Holt says, they “tapped into this emerging crowd culture by celebrating real women’s physiques in all their normal diversity- old, young, curvy, skinny, short, tall, wrinkled, smooth. Women all over the world pitched in to produce, circulate, and cheer for images of bodies that didn’t conform to the beauty myth.” For a glimpse of what the crowd culture can do, go to www.YouTube.com and use the keyword Dove Soap.

While the traditional branding model was more from the top down in the use of advertising to promote and solidify a brand strategy, the social media approach is more along the lines of a bottom up approach for branding. The creativity developed by consumers (with or without the help of a marketer) appears to be a key in the success of a social media strategy.

It is clear the dynamics of product branding are very fluid at this time in the social media arena. It is also quite obvious that most businesses are being challenged with how to get involved. From a business growth perspective, author Holt suggests that you identify your current culture, look at alternatives that will “open up an opportunity”, identify some ‘crowdcultures’ that might work in your industry, strive to get the word out in that industry, and then continue to change your message as the culture changes.

Grow Your Business: Using Social Media and Traditional Marketing by Dan Arens, Business Growth Advisor.  Available from <http://www.insideindianabusiness.com/story/33572146/grow-your-business-using-social-media-and-traditional-marketing> [Posted: Nov 02, 2016 4:59 AM CST Updated: Nov 02, 2016 8:39 PM CST]

3 Ways To Make Your Email Marketing Work For You

3 Ways To Make Your Email Marketing Work For You by Lisa Manthei.  Available from <http://multichannelmerchant.com/marketing/3-ways-to-make-email-marketing-work-for-you-01112016/#_>. [Nov 01, 2016 1:23 PM ]

Email marketing is king; it’s used in more than 90% of organizations. Well-executed email marketing strategies can net 3,800% ROI, with 20% of companies reporting returns north over 7,000%. Even with the explosion of new marketing technologies, marketers will forever turn to email as a mainstay. But even though the current email marketing strategies have worked in the past, doesn’t mean they will continue to work the same in the future. The days of the stock-standard email blasts are nearing an end. It’s out with the old, in with the new.

So, let’s take a look at some of these new approaches you can use to revitalize your email marketing to drive success well into the future.

Blast the Blast

Many brands pour their time and resources into creating homogenous content and email marketing campaigns that appeal to the masses. For some organizations, these strategies really work. But organizations must continue to adapt and change with their customers, no matter how effectively traditional advertising has been proven to perform in the past. According to DMA, over 75% of email revenue is generated by triggered campaigns, rather than one-size-fits-all campaigns.

Consumers are turning to brands that provide meaningful and personalized experiences. Marketers who have adopted this personalized principle have noted a 760% increase in revenue. Personalized marketing matters, and proper execution requires three key actions:

1) Segment your customer base.
2) Provide dynamic content.
3) Utilize your email automation solution to create workflows that help ensure your sends are timely, relevant, and hyper-personalized.

Don’t Forget Mobile

We live in a fast-paced, constantly connected world. Gone are the days where leaving the office meant truly unplugging. Mobile has allowed us (read: forced us) to be constantly connected with the digital realm. The average person will check their phone 46 times per day. Second only to sending and receiving text messages, consumers most often check their phones to read and respond to emails.

Email marketing with a focus on mobile optimization is no longer a nice-to-have, but a need-to-have. Over 53% of emails will be opened on a mobile device. Take a moment to click into your mobile inbox. Note that you can only view the sender information, the subject line, and about the first 10 words of your email. These items absolutely the most crucial elements to email performance.

Marketers must craft an engaging or personalized subject line with an impactful first line in order to move mobile-readers to open their email. Make sure your email marketing campaign passes the mobile test. Send a test email to your own mobile device. Odds are that you have received a multitude of marketing emails in the last hour alone. Compare the subject line and first line to others in your inbox. Would you open it?

Video & Animated Content

Consumers have become accustomed to marketing emails littered with text and static content. It’s time to shake it up. Incorporate dynamic content into email marketing campaigns through the inclusion of video and animation. 2016 has been the year of the GIF. Many retailers have managed to effectively use these graphics via social media and email marketing campaigns. Video is another important component to add to your emails. Videos provide the opportunity to show consumers about the brand or promotion, rather than to simply tell.

According to Wistia, marketing emails that contain videos receive a 300% higher click-through rate than those without. Through the use of services like Vidyard’s Personalized Video feature, companies can now take video one step farther, and connect with email subscribers by weaving unique details into marketing videos.

The platform allows you to personalize a single video to deliver a unique, individualized experience to thousands of viewers. You can see some examples of their work here. This tactic takes care of both the personalization and the need to inject dynamic content into email marketing campaigns.

While the market is constantly evolving, email marketing is here to stay. As with every facet of marketing, marketers must constantly be changing and adapting to the new and now in email marketing in order to stay relevant and top-of-mind for consumers. These new approaches can help your email marketing campaigns work for you.

3 Ways To Make Your Email Marketing Work For You by Lisa Manthei.  Available from <http://multichannelmerchant.com/marketing/3-ways-to-make-email-marketing-work-for-you-01112016/#_>. [Nov 01, 2016 1:23 PM ]