Crisis Management Lesson: You Are Always on Camera

Learning from the case of the delivery driver and the auto dealership

These days, it’s pretty safe to assume you’re always on camera. Whether it’s a cell phone, spy cams that can appear to be just about anything, or, as in this case, a plain old security camera, someone’s watching.

When pizza delivery guy Jarrid Tansey delivered $42 worth of pizza to a car dealership in Westport, Massachusetts, he assumed the $50 he was handed included his tip and headed back to run another route. Employees at the car dealership evidently felt no tip was deserved, though, and called to have him bring the $7 back. When he returned an ugly exchange ensued, and it was caught on tape for the world to see:

As a result, the car dealership was flooded with a deluge of angry calls, social media messages, and online reviews, along with an incredible amount of negative coverage by the media.

Some five days after the incident, the dealership released the (slightly odd) statement below:

“On behalf of the owner who was not present during the taping of this video and management we will like to publicly apologize for the actions that led to this situation, this embarrassing video gone viral on the Internet, was not released by any employee of F and R Auto Sales. In addition to this apology the owner and proprietor will like to offer a cash donation to the delivery man in the video. The actions of the female led to her termination and the other gentleman that was belittling the man in the video was not an employee of F and R Auto Sales and had no permission or authorization to release any security footage from F and R Auto Sales. We are currently straightening out matters on that behalf.”

Although showing you’re taking action against offending parties is an important part of crisis management, this just came off as less-than-genuine, not to mention hacked together, both factors we’re certain contributed to the serious legs this story’s had over the past couple weeks.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2015/01/29/unexpected-demand-for-wired-uk-giveaway-sparks-crisis/#sthash.hxzJtkAM.dpuf

Unexpected Demand for Wired UK Giveaway Sparks Crisis

a-giveaway-illustration

Predict the problems that come with your promos, or run afoul of your fans

You would expect Wired, a magazine focused on the world of tech, to be prepared for a promotional offer to go viral, but the ugly aftermath of a promotion from the UK shows it was anything but.

Wired offered new subscribers a “Misfit Flash” fitness watch, an item that typically costs about 5x more than the subscription itself, for free in the print version of its magazine, but after the deal was posted to deal sharing site HotUKDeals demand far outpaced the supply available.

After several days of delays and general unresponsiveness, the magazine began sending highly unsatifying responses to inquiring subscribers who were expecting their Misfit watch, including the one below:

Thank you for taking the time to contact us. I am sorry to report that we have run out of the gift.

Even though our offers are always subject to availability, we were supplied with a generous number of items to make sure WIRED readers would not miss out. While this promotion was only published in the printed copy of WIRED, one individual took the initiative to leak the offer on http://www.hotukdeals.co.uk.

As a result we received a large number of orders online after the offer was made public. We are looking into a solution and will be contacting as soon as possible.

Wired completely blew through the stock they had on hand, and put yet more bad communications into practice with its official statement to the BBC:

“The take-up has far surpassed anything equivalent run in the past, and the limited stocks – which were subject to availability as outlined in the terms and conditions – have run out. We have been working hard to find an alternative, and are pleased to offer a six-month extension to the subscription. Letters have been sent to those affected, which they will receive this week. For anyone not satisfied with this, a refund will be available.”

This is hardly an effective form of crisis management messaging, and all we got out of it was the impression of an utter lack of compassion and understanding from Wired for its audience. It may be a downer around the meeting table, but predicting ways promotions could backfire is absolutely essential to avoiding the reputation hit that comes with failing to live up to your word.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2015/01/27/branding-your-business-to-boost-reputation/#sthash.E1Ec5Y0Q.dpuf

Branding Your Business to Boost Reputation

diverse-people-thinking-planning-marketing-brand

Learning the basics of a must for crisis management, and business in general, today

One of the easiest ways to protect and grow your reputation is by getting online. From the ever-growing list of social media platforms to the reviews sites everyone uses, there are many opportunities to get out there and show people you’re an organization worth dealing with. We recently came across a great infographic from Media Mosaic that illustrates exactly how to get started and thought our readers would find it useful. Have a look:

Online Reputation Management for Business Branding #infographic

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2015/01/26/lance-armstrongs-unbelievable-interview/#sthash.O1mLYs95.dpuf

Lance Armstrong’s Unbelievable Interview

business-leader-interviewing-job-candidate

“I’d probably do it again.”

Lance Armstrong’s unabashed lying, and subsequent non-apology, marked his story as one of the biggest falls from grace in sports history. After a series of disastrous media appearances following the United States Anti-Doping Agency’s damning report on his abuse of performance enhancing drugs and other illegal practices meant to boost racing ability while avoiding detection he’s been largely quiet, and judging from a BBC interview published this week he really should stay that way.

Asked by reporter Dan Roan, “When it comes to the doping, would you do it again?”, Armstrong dropped a quote that probably left his PR people having an absolute fit just off camera – “If I was racing in 2015, no, I wouldn’t do it again because I don’t think you have to. If you take me back to 1995, when it (doping) was completely and totally pervasive, I’d probably do it again.”

I’d probably do it again. Immediately when we heard this quote, we thought of a post from the blog of “Mr. Media Training” Brad Phillips, who had posed the question “Is Lance Armstrong a Sociopath?” after his Oprah appearance in 2013, and we can again see the same personality at work here. Even after what was almost undoubtedly extensive coaching, after watching the fallout from his actions play out, Armstrong completely fails to show any real remorse or understanding that what he did was wrong.

From a crisis management standpoint he’s beyond all help, and as long as he continues to utterly fail to accept that showing sincere regret for what he’s done is the first step to repairing his reputation even the slightest bit that will continue to be the case.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2015/01/15/the-reputation-feedback-loop/#sthash.4txAEWn1.dpuf

The Reputation Feedback Loop

A-feedback-evaluation-on-a-tablet

Paying attention to reputation is key to prospering as a business today

Taking care of your reputation is more critical than ever thanks to the widespread use of the Internet and social media to share opinions, experiences, and info about businesses of all kinds. Not only is reputation management critical to prospering as a business, but it’s an important part of any crisis management plan.

In a post for The Proactive Report, Social Media Strategist Sally Falkow shared what she calls “The Reputation Feedback Loop”, something we believe every business should be utilizing. Check it out:

  1. Find out what is being said online about your brand, your employees and your executives. If you don’t already have a robust monitoring system in place this should be your first action.
  2. Listen to what’s being said and analyze the data. This is how you will get the first clues to a crisis that might be bubbling under the surface. If you can identify it early and act promptly it is possible to avert a full blown online crisis.
  3. Connect with your customers and other stakeholders online. Figure out where they’re active on social media.
  4. Be proactive. Every time a customer comes into your establishment reach out to them and ask for feedback on that visit. Ask them to rate your business and the employees they dealt with.
  5. Use a system that automates this process, so that it is not too time-consuming. Choose a system that’s easy for you to administer and make it quick and easy for the customer to rate and review you. It must be mobile-responsive.
  6. Use the negative feedback to improve any issues with the business, your product or your employees.
  7. Encourage any customer who gives you a 4 or 5 star rating to post it online, so you can build that trust factor.

The prevalence of online review sites and widespread use of social media are certainly double-edged swords. Without care, a few small hiccups can turn into a serious loss of business, but these same platforms present opportunities for you to take your reputation to the next level, boosting your bottom line and protecting against any threats that may appear.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2015/01/10/building-your-online-reputation/#sthash.4y8qeZd5.dpuf

Building Your Online Reputation

young-business-woman-checking-satisfaction-checklist-box

Establishing yourself on the ‘net takes time, so get started today!

Everyone wants a positive online reputation these days, but seem at a loss when it comes to getting the ball rolling. Although it absolutely takes work, it’s not as complicated as you might think, as you can see in this infographic from SiteName.com:

5 easy steps to start building online-reputation-management-infographic

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2015/01/05/another-cyber-threat-targets-ms-office-users/#sthash.jCOyaVYE.dpuf

Taking Care of Your Online Reputation

A-business-man-attracting-customers-to-himself-due-to-goodreputation

Getting serious about creating a name for yourself on the web

Reputation is your most valuable asset, and these days the ‘net is where it grows…or falters. Follow the advice in this infographic, created by ReputationRepair.org and you’ll have a solid start on building and maintaining your good name:

2015-Online-Reputation-Management-and-Reputation-Repair-Infographic

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2015/01/29/unexpected-demand-for-wired-uk-giveaway-sparks-crisis/#sthash.xGmQF9pz.dpuf

Another Cyber-Threat Targets MS Office Users

A-female-cyber-hacker-working-on-a-system

As long as cyber attacks remain profitable, hackers will be in business

We said 2014 was the “Year of the Cyber Attack”, but as you can see from our recent blogging 2015 is already making a serious run for the title.

The latest attack to come to light is hitting users through Microsoft Office, and results in the Dridex banking malware being installed on the affected system.

eWeek’s Sean Michael Kerner dug deeper into how this particular cyber attack works:

The Dridex banking malware is being used in a malicious spam campaign that is generating 15,000 emails a day, according to security firm Trustwave. The attacks, largely against users in the United Kingdom, are leveraging macros in Microsoft Office documents to infect users.

The way the attack works is that a user receives an infected Office document that includes a macro that triggers a download of the Dridex banking malware. Dridex steals user banking information and attempts to generate fraudulent financial transactions.

So far, Trustwave has not yet identified the group behind the new Dridex attack.

Microsoft Office exists on nearly every work PC, and it’s no rare thing to send and receive Word docs on a daily basis for most, making this a particularly tricky attack.

For this type of cyber-attack, as with so many others, the number one crisis prevention tactic is to educate your employees. If they know how to spot emails containing hack attempts before they ever download and open the programs inside, then they can simply trash them and report to the IT department, and you don’t have to deal with infected systems, stolen information, and all of the headaches that follow.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2015/01/02/crisis-management-musts-training-employees-to-be-cyber-safe/#sthash.JithP8Hd.dpuf

Crisis Management Musts: Training Employees to be Cyber-Safe

A-female-software-developer-signalling-a-breach-in-their-system

Reduce the risk of employee error allowing hackers through your security with training and education

You can have the best security systems in the world, but that all goes “POOF” if an employees allows the bad guys into the bank vault. Well, cyber crime is no different, and the scary thing is that, unlike with physical theft, people don’t even realize they’re helping someone attack your organization while they’re in the midst of doing so.

Luckily, there are assets online to help you train employees to help security rather than hinder, including StaySafeOnline.org. Here’s a preview of the type of helpful advice you’ll find there:

Talk to Your Employees About
  • Keeping a clean machine: Your company should have clear rules for what employees can install and keep on their work computers. Make sure they understand and abide by these rules. Unknown outside programs can open security vulnerabilities in your network.
  • Following good password practices: Making passwords long and strong, with a mix of uppercase and lowercase letters, numbers and symbols, along with changing them routinely and keeping them private are the easiest and most effective steps your employees can take to protect your data.
  • When in doubt, throw it out: Employees should know not to open suspicious links in email, tweets, posts, online ads, messages or attachments – even if they know the source. Employees should also be instructed about your company’s spam filters and how to use them to prevent unwanted, harmful email.
  • Backing up their work: Whether you set your employees’ computers to backup automatically or ask that they do it themselves, employees should be instructed on their role in protecting their work.
  • Staying watchful and speaking up: Your employees should be encouraged to keep an eye out and say something if they notice strange happenings on their computer.

A bit of training and regular reminders can turn your employees from ideal attack targets into defensive assets that help protect the well-being of your entire organization, and with the continued rise in cyber attacks you’re more likely than ever to need that protection. Don’t wait, train employees to be cyber-safe today.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2014/12/31/hackers-wreak-havoc-on-german-steel-mill/#sthash.clKehVrj.dpuf

Hackers Wreak Havoc on German Steel Mill

A-male-hacker-typing-with-his-keyboard-and-watching-the-system

Doing physical damage with virtual attacks

Hackers aren’t only after corporate secrets, customer data, and credit card numbers. Some attackers seek to create real, physical damage via the net as well. Take this report, from a BBC News article:

A blast furnace at a German steel mill suffered “massive damage” following a cyber attack on the plant’s network, says a report.

Details of the incident emerged in the annual report of the German Federal Office for Information Security (BSI).

It said attackers used booby-trapped emails to steal logins that gave them access to the mill’s control systems.

This led to parts of the plant failing and meant a blast furnace could not be shut down as normal.

The unscheduled shutdown of the furnace caused the damage, said the report.

The attackers reportedly used targeted “phishing” emails, as well as some smooth talking, to gain access to the steel plant’s systems, after which they were able to cause what appears to be purposeful damage.

Is it corporate espionage, an enemy state, or simply cyber-vandals getting their kicks in a nasty way? At this point there’s no way to tell. What it should be, for all of us, is a giant red warning flag.

Regardless of what type of organization you have, the reality is that you will be hacked at some point. Prepare now, including regular training for all employees on how to avoid and react, and make your crisis management capabilities that much stronger for when the time comes.

——————————-
For more resources, see the Free Management Library topic: Crisis Management
——————————-

[Jonathan Bernstein is president of Bernstein Crisis Management, Inc., an international crisis management consultancy, author of Manager’s Guide to Crisis Management and Keeping the Wolves at Bay – Media Training. Erik Bernstein is Social Media Manager for the firm, and also editor of its newsletter, Crisis Manager]

– See more at: https://staging.management.org/blogs/crisis-management/2014/12/27/backlash-over-facebooks-year-in-review/#sthash.nRYDWq3r.dpuf