The Secret of Life is …..

Blond woman making a shhh gesture with her hand on her lips

Are you the kind of person who fills up your free time quickly with busy work?

Beware of the Gerbil Wheel Trap!

stress-and-sleep

If you had a snow day recently or the President’s Day holiday- how did you spend your time?

Instead of taking the opportunity to breathe, relax, unwind, reflect, I’m betting many of you filled your day with chores.

True confession- I used the extra time to gather paperwork for my taxes.

Yet remembering the ‘Gerbil Wheel Trap’ on my snow-bound day, I had a lovely phone chat with a friend I hadn’t heard from in a while.

Balance your week with Relaxation and Renewal

Here in the Washington DC area, and in our culture as a whole, we tend to be overly focused on being ‘productive’. That may come from fear. If we don’t look busy we may lose our job.

What a trap that is!

In a society that rewards productivity, we feel guilty taking time to relax, unwind. And in so doing we dismiss relaxation and renewal as being equally valuable.

Only when we feel we’ve ‘earned’ our time off, we give ourselves permission to relax. As we keep finding ways to stay busy, we miss so many opportunities to connect with ourselves and others in deeper ways.

If we take our cues from nature, Winter reminds us that it’s OK to slow down, go within, hibernate, and be still.

Winter crescent moon

The Secret of Life – Enjoy the Passage of Time

One of my favorite song lyrics is from James Taylor- “The secret of life is enjoying the passage of time.” I’ve remembered that phrase over the years. This simple phrase may help you have a life in balance.

When I find myself overly focused on my work or my to-do list, I look for ways to relax and renew. I know that in relaxing I find balance. With time away from work I come back with greater energy and often see things from a fresh perspective.

Next time you get a break from an unplanned snow day or an extra work holiday, give yourself permission to relax, recreate, renew yourself.

Nourish your soul as well as your body. The world needs more joyful, relaxed people

**

Linda J. Ferguson is a Job and Life Coach and author of two books on spiritual living.

Learn more about her work and books at www.lindajferguson.com

Mindfulness as a Competitive Strategy

Mindfulness

One emerging trend we’re noticing in our work is the number of companies using meditation and mindfulness practices to increase individual and group productivity, improve well-being and health, and reduce stress in the business environment.

Moreover, recent neuroscience research demonstrates at the brain’s molecular level that meditation and mindfulness, even if practiced for just 20 minutes per day, can have dramatic effects on brain function as measured by brain scans and brain function testing. Continue reading “Mindfulness as a Competitive Strategy”

Emerging Crisis Management Risk: the “Internet of Things”

diverse-friends-using-digital-devices-and-the-internet

How hackers used a fridge to conduct a cyber crime campaign

It’s clear that an increasing number of the things we use every day can and will be connected to the ‘net. However, the same connectivity that allows us to turn down our thermostat or click off the TV while we’re away from home also leaves room for hackers to attack.

Their efforts are keeping them far more than a step ahead of your average business, and one of the newest tactics is taking advantage of the “Internet of Things” – our connected DVRs, televisions, routers, and, in a recent incident uncovered by security experts at Proofpoint, Inc., even a refrigerator, to power nefarious online activity:

The attack that Proofpoint observed and profiled occurred between December 23, 2013 and January 6, 2014, and featured waves of malicious email, typically sent in bursts of 100,000, three times per day, targeting Enterprises and individuals worldwide. More than 25 percent of the volume was sent by things that were not conventional laptops, desktop computers or mobile devices; instead, the emails were sent by everyday consumer gadgets such as compromised home-networking routers, connected multi-media centers, televisions and at least one refrigerator. No more than 10 emails were initiated from any single IP address, making the attack difficult to block based on location — and in many cases, the devices had not been subject to a sophisticated compromise; instead, misconfiguration and the use of default passwords left the devices completely exposed on public networks, available for takeover and use.

Cyber crime is a profitable business, a fact which motivates hackers to constantly explore new avenues of attack, but, as with many other aspects of crisis management, many organizations fail to see the costs associated with not preparing before they’re paying dearly to recover.

At this point it’s safe to assume you will be hacked at some point. Whether it’s through your fridge, a phishing email, or just someone with a silver tongue and some knowledge of social engineering, the difference between a troublesome situation and one that costs you big time in terms of lost trust, reputation, business and time will be how much you cared beforehand.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

Jonathan Bernstein’s Crisis Management Advice for Sochi Sponsors

Team-leader-preparing-a-crisis-speach-with-teammates

What are major sponsors like Coke and McDonald’s doing to prepare for trouble related to the Games?

This year’s Sochi Games are the most tense in many years for reasons related to everything from human rights violations in Russia to the frighteningly real chance of a terrorist attack. Our own Jonathan Bernstein sat down with CCTV America’s Michelle Makori to discuss the crisis management plans they have (or at least should have) in place:

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

Have I Found the Perfect Website Layout?

Person designing a website layout

Amie Valpone’s Healthy Apple comes close

Amie Valpone photo

Clearly, when it comes to website layout, no one-size-fits-all exists. But some are ‘more perfect’ than others. Here’s one that gets raves for achieving a whole lot in an efficient, very effective way: TheHealthApple.com. Kudos to the designer, Zesty Blog Consulting and the owner, Amie Valpone, for working together on this first-rate website design. They clearly teamed up to express Amie’s passion and business offerings with a design that works behind the scenes, too.

Healthy Apple may not be all that you want or need, but I’d like to point out the components that make it especially:

  • captivating,
  • user-friendly,
  • sticky,
  • SEO optimized,
  • social media optimized, and
  • of tremendous value to the visitor.

When considering changes to your site, consider each of these:

  1. Awesome header photo, together with the brand name “Healthy Apple” and tagline “Your guide to clean eating” accomplishes the 2-3 second rule: visitors immediately know what this site is about, and they get a quick, positive first impression.
  2. In the next 2-3 seconds, this site gives the visitor reasons to stay – reasons that are important to the visitor (not a description of what the site is about). These reasons are: a.) the enticing title of the blog post OR b.) the free download offer. By this time, if the visitor isn’t interested, they know they’re on the wrong site. No wondering what it’s about.
  3. The free download offer is positioned above the fold, and is clean, asking only for an email address. It uses the word Free (very powerful – many, many people search using the word Free.) This is the perfect ‘call-to-action’ that builds the email database. I would add a note underneath: “Your privacy is important to us. We NEVER share your information.”
  4. Amie personalizes the Home page by including her picture next to the link to her Facebook page and Like button. I think this is simple and brilliant. It creates a connection and first level trust.
  5. This site does not over-use links to social media. The Home page makes it easy to share on Facebook, with links to other platforms nearby (Twitter, Pinterest, etc.)

Now, scroll down and explore the rest of the Home page:

  1. The blog content contains a plethora of keywords which are presented in the body as links, bolded and underlined. Search engines clearly understand what is important on this site and will be recognized in search engine results pages (SERPs) because of it.
  2. In the blog posts, Amie consistently refers to other posts for related information. VERY user-friendly and promotes intense ‘stickiness’ (visitors stay on the site.)
  3. On the right, another very friendly picture of Amie and a short bio – this further connects the visitor and builds her credibility as a Subject Matter Expert (SME) and builds trust.
  4. Beneath that, quick links to her media presence. Visitors increasingly learn that she is recognized by the industry as a SME. A glance at the Media page will blow you away – she’s everywhere in the media! I would consider adding a media kit – downloadable information and pictures for the media to use when quoting her.
  5. Further to the right, quick links to an extensive list of more compelling content – with EXCELLENT TITLES that include keywords. This is absolute search engine CANDY – especially ‘Categories’ and ‘more apples’.
  6. ‘more apples’ is a friendly heading, used instead of ‘Previous Posts’ or something similar. The list is fabulous – visitors will find everything they’re looking for, Amie gives enormous content value, and search engines will bring new traffic. With this list on the Home page, it’s clear that the target audience will share, if they’re in that mode. (See the ‘share’ buttons on the lower left – excellent placement.)
  7. At the bottom, short intro to recipes – more keywords and phrases, as well as pleasing content for the visitor.

User-Friendly

Not surprisingly, TheHealthyApple.com was built in WordPress. It can be easily changed and updated by Amie or anyone on her staff. The ‘About’ tab is second from left at the top, and the information about Amie is complete and engaging. Notice that the links to blog posts are repeated on this page. In fact, the entire right side is repeated on all pages of this site, with only the content in the left column changing. So visitors have easy access to all of Amie’s posts. Very user-friendly.

I could go on and on, but want to point out one last, important item. Amie invites comments, and answers them immediately. This encourages user-engagement and Brand Ambassador-ship (her audience tells others about her site.) Her audience enjoys asking Amie questions, and actually getting genuine, meaningful answers. I strongly suspect that the comments are moderated, meaning that they do not post until she approves them, then has the opportunity to answer instantly. This gives her control over the quality and appropriateness of the comments.

What would you add to enhance this site? Do you have other examples of close to perfect layouts?

For more resources, see the Free Management Library topic: Marketing and Social Media.

.. _____ ..

ABOUT Lisa M. Chapman:

The Web Powered Entrepreneur

Ms. Chapman’s new book, The WebPowered Entrepreneur – A Step-by-Step Guide is now available at:

Lisa M. Chapman serves her clients as a business and marketing coach, business planning consultant and social media consultant. She helps clients to establish and enhance their online brand, attract their target market, engage them in meaningful social media conversations, and convert online traffic into revenues. Email: Lisa @ LisaChapman.com

Yahoo’s Crisis Management after Hack Lacks Key Ingredient

Data-breach-unsecured-warning-sign-concep

VP Jay Rossiter’s message to stakeholders was missing something important…

Late last month, Yahoo joined the ranks of organizations to have been hit by hackers in 2014. Never good at any time, the fact that the company has already been under fire about an extensive downtime for its Mail service in December, as well as a Flickr outage that left users floundering, means this incident brought an extra dose of reputation damage.

While Yahoo is staying mum on exactly how many were affected, here’s what senior VP Jay Rossiter had to say about the situation in a blog post:

Security attacks are unfortunately becoming a more regular occurrence. Recently, we identified a coordinated effort to gain unauthorized access to Yahoo Mail accounts. Upon discovery, we took immediate action to protect our users, prompting them to reset passwords on impacted accounts.

Based on our current findings, the list of usernames and passwords that were used to execute the attack was likely collected from a third-party database compromise. We have no evidence that they were obtained directly from Yahoo’s systems. Our ongoing investigation shows that malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts. The information sought in the attack seems to be names and email addresses from the affected accounts’ most recent sent emails.

What we’re doing to protect our users

We are resetting passwords on impacted accounts and we are using second sign-in verification to allow users to re-secure their accounts. Impacted users will be prompted (if not, already) to change their password and may receive an email notification or an SMS text if they have added a mobile number to their account.

We are working with federal law enforcement to find and prosecute the perpetrators responsible for this attack.

We have implemented additional measures to block attacks against Yahoo’s systems.

What you can do to help keep your accounts secure

In addition to adopting better password practices by changing your password regularly and using different variations of symbols and characters, users should never use the same password on multiple sites or services. Using the same password on multiple sites or services makes users particularly vulnerable to these types of attacks.

We regret this has happened and want to assure our users that we take the security of their data very seriously.

For more information, please check our Customer Care help page.

By Jay Rossiter, SVP, Platforms and Personalization Products

While the explanation of steps taken and the re-securing process are easy to follow for even the average user, can you spot the missing ingredient in Yahoo’s crisis communications?

If you said compassion, you’re on the ball. Not once did Rossiter express compassion for the stress, concern and confusion that affected users undoubtedly experienced. He came close with the “regret” statement, but fell short of actually commiserating with his constituents, a mistake that undoubtedly hurt Yahoo’s overall crisis management efforts.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

1. The Grant Proposal Team & 2. Compensation for Grant Writers

Business colleagues going over a grant proposal

#1
We’re All in This (Proposal) Together!

by Jayme Sokolow

Sybil F. Stershie, president of Quality Services Marketing, tells her clients that there are three important points that organizations should learn. “One, mission matters. Two, the people behind the mission matter. And three, passion for the mission can’t be taken for granted.

Once engaged doesn’t mean always engaged.” She recommends three approaches to develop committed and satisfied employees. I will add a fourth element and apply them to proposal development:

• Proposal teams must feel connected to the organizations that employ them.
• Proposal members must feel connected to fellow team members.
• Permanent staff and consultants must feel connected to each other.
• Proposal teams must involve young people if they want them to stay, learn, and advance in their professions

The alternative to a proposal-generating environment that embraces these four elements is a destructive process that begins with the inability to build successful proposal teams and ends with people leaving because they do not feel connected.

That is not a staffing problem. It is an organizational problem.

Find ways to connect everybody in your proposal team and you are more likely to produce competitive proposals. It may not be easy, but it is simple.

=-=-=-=-=-=-=-=-=-=-=-=-=-=
Dr. Jayme Sokolow, founder and president of The Development Source, Inc.,
helps nonprofit organizations develop
successful proposals to government agencies.
Contact Jayme Sokolow.
=-=-=-=-=-=-=-=-=-=-=-=-=-=
Look for Jayme’s ebook on
Finding & Getting Federal Government Grants.
It’s part of
The Fundraising Series of ebooks
They’re easy to read, to the point, and inexpensive ($1.99-$4.99)
Order Jayme’s Book on Federal Grantsmanship before February 14,
and get $1.00 off the sales price – use coupon code JA55U
=-=-=-=-=-=-=-=-=-=-=-=-=-=

#2
The Ethics of Percentage-Based Compensation for Grant Writers – Part II

by Lynn deLearie.

So, it is very clear that fundraising professional ethics do not allow percentage-based compensation, but WHY not? Why is this so strongly discouraged?

I did more research on the AFP websiteD and found the three primary principles underlying the AFP standard:
1. “Support for a nonprofit organization in any form is a voluntary action for the public benefit.
2. The seeking or acceptance of charity revenues should not result in the personal benefit of any employees, contractor, or representatives of a charitable organization.
3. Donor attitudes can be unalterably damaged in reaction to undue pressure and the awareness that a commission will be paid to a fundraiser from his or her gift, thus compromising the trust on which charity relies.”

I think the most relevant point – and perhaps most compelling for your prospective nonprofit client, is related to donor trust, especially with foundations as the donor.

The vast majority of foundations are aware of and subscribe to the ethical strictures banning commission/percentage compensation. Since grant applications specify for what the funds are needed, and grants are awarded for the uses specified in the grant applications, should grantors learn that a percentage of their funds was used for purposes other than those agreed to by “contract,” the grantor could demand the return of some or all of the grant monies.

In addition, should an NPO use grant funds for any purposes other than those agreed to by “contract,” the word will get around to other foundations … and future foundation funding may well dry up.

In the end, it is up to you whether you wish to accept percentage-based compensation. I continue to adhere to the AFP code of ethics… and I did not take that prospective client.

Footnote “D” — http://www.afpnet.org/Ethics/EnforcementDetail.cfm?ItemNumber=4013&token=2085)

=-=-=-=-=-=-=-=-=-=-=-=-=-=
Lynn deLearie Consulting, LLC, helps nonprofit organizations develop,
enhance and expand grants programs, and helps them
secure funding from foundations and corporations.
Contact Lynn deLearie.
=-=-=-=-=-=-=-=-=-=-=-=-=-=
Look for Lynn’s ebook on Grants & Grantsmanship.
It’s part of
The Fundraising Series of ebooks
They’re easy to read, to the point, and inexpensive ($1.99 – $4.99)
Order Lynn’s Book on Grants and Grantsmanship before February 14,
and get $1.00 off the sales price – use coupon code NZ95K
=-=-=-=-=-=-=-=-=-=-=-=-=-=

If would like to comment/expand on either of the above pieces, or would just like to offer your thoughts on the subjects of this posting, we encourage you to “Leave a Reply” at the bottom of this page.

What kind of a Tough Leader are you?

Annoyed-business-partners-arguing-during-meeting

Alan Frohman
Articles, books and experience identify at least two types of tough leaders. Each is demanding, but in very different ways. The first type is described in these terms:
Critical
Judgmental
Lacks compassion
Micromanaging
Disrespectful

They rarely view themselves that way. But that is how their people describe them. They see themselves as being on top of things, focused on getting the job done right, and usually wondering about whom they can really trust. The people who work for them do not feel valued or appreciated. They can be called “Theory X, tough bosses, authoritarian, directive, pacesetting and task managers.”
These types of leaders can be recognized by their typical work challenges: over busy because they do not delegate, distant relationships with direct reports because they do not invest the time to build a strong bond with them, limited risk-taking and innovation below them because their reports are nervous about how their boss will react, and no strong successors because those people fled.

The second type is described in these terms:
Expects the best from me
Gets me to do my best
Challenges me to excel
Sets clear, demanding and achievable goals
Provides critical feedback in a respectful way

People working for them usually feel that they are growing significantly, are stimulated by the work and their colleagues, and go the extra mile without hesitation. These leaders view their jobs as unleashing the energy of their organization, channeling it in the most productive ways (usually through a clear, compelling vision among other ways), and reducing the obstacles to the progress and growth of people working for them. They can be called “Theory Y, participative, consultative, democratic, and high performance managers”.
Signals that you see from this type of leader are: high spirit and energy in the group, a sense of confidence and optimism regardless of the challenge, a cohesiveness and teamwork that seem natural, and ease of communication between the boss and the direct reports.

Few leaders are all black or all white, but we are likely to know both types. The first type of leader gets obedience at best from the people. People working for this leader operate out of fear and often a lack of respect and trust for their boss and sometimes each other due to the climate and example the leader sets. Anxiety runs high in those organizations. Performance can be high, but usually just for the short run. In fact, when there is a lot of pressure and urgency, sometimes this type of leadership is required.
What these leaders have to watch out for is people becoming passive, waiting to be told what to do and how to do it. Also, they are not likely to risk mistakes and therefore try fewer new ideas or to look for ways to innovate or improve things.

The second type of leader gets much more from his or her people in the longer run. People working for this leader are likely to be self-propelled to do their best. They often perform at levels that exceed everyone’s expectations, including their own. Mutual trust and respect are much more in evidence, again as a result of the climate and example the leader sets. There is a cost however, it is the time it takes to get people’s thoughts and ideas, listen to their questions and concerns, and to build alignment behind a direction. It has to be balanced with the urgency of the situation.

Have you seen either type of leader? What did the leader do and how did it impact you or others? Please share your story with us.

Psst….Your Non-Verbals are Speaking

Woman Presenting at a Meeting

see noJohn was a great manager, good at his job and easy to get along with. But every now and then, he had days when his patience was thin, and he seemed distracted. His team knew when he was having a bad day, even before interacting with him. How did they know? Chances are, they noticed his non-verbals.

Can you tell whether someone is having a good or a bad day – before they have even said a word? If yes, chances are you are tuned into their non-verbals. And just as you notice these signals in others, others can tell a lot about you by reading your non-verbals.

As a successful communicator, you will want to pay close attention to the non-verbal messages you are sending to be sure the right message is getting across.

For example:

• If your non-verbal behavior matches, emphasizes or even replaces your words or feelings (i.e. you smile and nod your head while stating agreement) it is likely to enhance your communication.

• If your non-verbal behavior is in disagreement with your words (you say “yes” while crossing your arms across your chest and frowning) it is likely to confuse your listeners.

• If your non-verbal behavior has no meaning (you wring your hands or twist your ring as you speak) it is most likely a mannerism, which could be distracting or confusing, and should be eliminated.

When we are confident and sure of what we are saying, we tend to display a strong match between what we say and how we say it. Our body language is more open. Our gestures are more emphatic and descriptive. Our faces are relaxed and expressive. When we are less sure of ourselves, there is more likely to be a mismatch between our words and our non-verbals. So we want to be aware especially of habits such as a frown or hand-wringing that can send a mixed or wrong signal.

How can you be sure your non-verbals are helping you to communicate? Try video recording a presentation or rehearsal, and see for yourself what your audience sees when you speak.

After all, as a successful communicator, you know that it is not only what you say but how you say it.

________________________________________________________________________

Author Gail Zack Anderson, founder of Applause, Inc. is a Twin Cities-based consultant who provides coaching and workshops for effective presentations, facilitation skills for trainers and subject matter experts, and positive communication skills for everyone. She can be reached at gza@applauseinc.net.

Web site: www.applauseinc.net

Blog: www.managementhelp.org/blogs

twitter: @ApplauseInc

Is Facebook Reading Your Private Messages?

A-facebook-user-trying-to-log-in-with-his-laptop.

The social media giant may need crisis management if latest lawsuit brings on the privacy hounds

Privacy is a hot-button issue in the online world these days, making the latest lawsuit to be filed against Facebook a potential doozy. According to the plaintiffs, Facebook has been violating the Electronic Communications Privacy Act by scanning the URLs found in private messages sent via the service.

This isn’t just a tin-foil-hat theory either, at least according to Swiss information security firm High-Tech Bridge, who found that Facebook robots accessed URLs sent within a private message, even when specifically restricted by backend coding on the destination page.

The plaintiffs not only allege that Facebook invades the privacy of “private” messages, but that it uses the information it finds there for profit.

Here’s a sample from the criminal complaint, filed December 30 in a California court:

“(The scanning) is a mechanism for Facebook to surreptitiously gather data in an effort to improve its marketing algorithms and increase its ability to profit from data about Facebook users”

Considering many experts claim the exodus from Facebook, especially among the younger generation, is due to privacy concerns, this case looks particularly bad for the social media giant’s reputation, and bottom line.

While Facebook is currently dismissing the claims as “without merit”, it should be interesting to see what crisis management strategies it employs should the case attract more public interest.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Erik Bernstein is Social Media Manager for Bernstein Crisis Management, Inc., an international crisis management consultancy, and also editor of its newsletter, Crisis Manager]