SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
WHY SECURITY MATTERS
for marketers
As marketers we’re focused on
GROWTH
GROWTH
Chapter one:
Why you should care about security.
If you collect data from customers, you are responsible for
ensuring their protection
Bryan Eisenberg
Websites are being attacked every second
Insecure websites are more frequently targeted
•  Most of these attacks are aimed to
steal user information, or compromise
a website.
•  Looking at different attack types you
can see what some of the most
common attacks are – http is most
prominent.
•  50% of attacks come against insecure
websites.
Businesses of Every Size Are Being Targeted
•  Betty’s Tea is a UK based café chain
and was targeted in May 2015
•  As a result of the attack: 120,000
customer names, email addresses
and encrypted passwords were
stolen.
A Story about Sony
•  Sony was hacked in November, 2014 and personal employee details including
names and salaries were leaked
•  47,000 records were stolen, and the outrage started immediately, and is still
ongoing
A Story about Sony
17 MILLION ATTACKS PER DAY
Every Attack Ties into Value
•  According to PwC, every website SMB
website hacking incident costs
between $92,000 - $165,000 on
average.
•  McAfee found almost 90% of small- and
medium-sized business in the US do
not use data protection for company
and customer information, and less than
half secured company email to prevent
phishing scams.
7-year olds can even hack networks
Most Websites Don’t Have Security
Only 20% of website are secure!
Brands have the opportunity to stand out for proactively
addressing it and those who do not will very soon be far
behind. Align your brand with the changing consumer
mindset and be a leader in customer security.”
Bo Holland, CEO AllClearID
Chapter two:
How website attacks happen.
There are two primary types of website attacks
MAN-IN-THE-MIDDLE DDOS
Man-in-the-Middle Attacks
What is a Man-in-the-Middle Attack?
•  A Man-in-the-Middle attack happens when a hacker places a small file on your
website, and steals incoming user data.
•  These files can go undetected for weeks, months, or years due to their small size.
Visitor
Hacker
Website
DDoS
What is a DDoS Attack?
•  A DDoS (Distributed Denial of Service) attack happens when a hackers uses multiple
computers to flood traffic to a website.
•  Incoming traffic volume is so large and so sudden, there is no option but for your
website to go down.
Website
What can we do to prevent these attacks?
Chapter three:
All about SSL & WAF.
What is SSL?
Visitor
Hacker
Website
•  SSL stands for Secure Sockets Layer, and is a way of encrypting traffic between a
website and the visitor.
•  As a result of traffic being encrypted, hackers cannot steal private or customer
information from Man-in-the-Middle attacks.
Benefits of SSL
Trust
SEO
Website
Enhancements
Benefits of SSL
A padlock displays in the URL bar for secure websites
– increasing visitor and consumer confidence that
their information is safe.
Trust
SEO
Website
Enhancements
Benefits of SSL
Trust
SEO
Website
Enhancements
Benefits of SSL
Trust
SEO
Website
Features
Benefits of SSL
“If your in a competitive niche, then it can give you
an edge from Google’s point of view. With the
HTTPS ranking boost, it acts like a tiebreaker. For
example, if all quality signals are equal for two
results, then the one that is on HTTPS would get the
extra boost that is needed to trump the other
result.”
Google’s Gary Illyes, said:Trust
SEO
Website
Enhancements
Benefits of SSL
Trust
SEO
Website
Enhancements
HTTPS is “moderately correlated to higher search rankings”
Source:
http://backlinko.com/search-engine-ranking
Benefits of SSL
Trust
SEO
Website
Enhancements
Have you seen pages like this?
Benefits of SSL
Trust
SEO
Website
Enhancements
Using HTML5, your website can incorporate features that
utilize the visitors device information, such as:
•  Geolocation
•  Video and Microphone
•  Device Motion/Orientation
•  Fullscreen
Without SSL, none of these will work in Chrome or Firefox.
What is a WAF?
•  WAF stands for Web Application Firewall and forms a protective ring around your
website to weed-out bad traffic, and allow good visitors to come through.
Website
Website Visitor
Hacker
Hacking Recovery Plan
1.  Check with I.T. and/or your website host to determine root cause, and impact
2.  Create scenarios and playbooks for every type of hacking incident (loss of user
information, website downtime, etc.)
3.  Communicate with affected internal stakeholders
4.  Communicate with external customers, prospects, and other affected parties
5.  Ensure you have contact details for key team members
Chapter three:
Next Steps.
Create a Hacking Recovery Plan
1.  Check with I.T. and/or your website host to determine root cause, and impact
2.  Create scenarios and playbooks for every type of hacking incident (loss of user
information, website downtime, etc.)
3.  Communicate with affected internal stakeholders
4.  Communicate with external customers, prospects, and other affected parties
5.  Ensure you have contact details for key team members
Want to secure your website today?
Click here to start a free trial of the HubSpot Website Add-on.
Jeffrey Vocell (@jvocell)
Product Marketing Manager
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Utilizing Facebook for Business
Utilizing Facebook for Business Utilizing Facebook for Business
Utilizing Facebook for Business 6S Marketing
 
Social Media & SEO - TopRank Online Marketing
Social Media & SEO - TopRank Online MarketingSocial Media & SEO - TopRank Online Marketing
Social Media & SEO - TopRank Online MarketingTopRank Marketing Agency
 
LinkedIn for Selling - How to Generate Leads Using LinkedIn
LinkedIn for Selling - How to Generate Leads Using LinkedInLinkedIn for Selling - How to Generate Leads Using LinkedIn
LinkedIn for Selling - How to Generate Leads Using LinkedInAmanda Leeman
 
Introduction to Search Engine Optimization
Introduction to Search Engine OptimizationIntroduction to Search Engine Optimization
Introduction to Search Engine OptimizationSite-Seeker, Inc.
 
What Every CMO Needs to Know About Content Strategy
What Every CMO Needs to Know About Content StrategyWhat Every CMO Needs to Know About Content Strategy
What Every CMO Needs to Know About Content StrategyMark Fidelman
 
The Future Of Social Media Monitoring Marshallsponder
The Future Of Social Media Monitoring MarshallsponderThe Future Of Social Media Monitoring Marshallsponder
The Future Of Social Media Monitoring MarshallsponderMarshall Sponder
 
Social Media Marketing and Internet Reputation Management for Car Dealers
Social Media Marketing and Internet Reputation Management for Car DealersSocial Media Marketing and Internet Reputation Management for Car Dealers
Social Media Marketing and Internet Reputation Management for Car DealersSocial Media Marketing
 
An Automotive Strategist's Look at Twitter
An Automotive Strategist's Look at TwitterAn Automotive Strategist's Look at Twitter
An Automotive Strategist's Look at TwitterChris Baccus
 
Social Media Marketing - Facebook, Twitter, LinkedIn
Social Media Marketing - Facebook, Twitter, LinkedInSocial Media Marketing - Facebook, Twitter, LinkedIn
Social Media Marketing - Facebook, Twitter, LinkedInHarsimran Singh
 
Digital Marketing Overview (for students)
Digital Marketing Overview (for students)Digital Marketing Overview (for students)
Digital Marketing Overview (for students)Chris Sietsema
 
Digital marketing slides
Digital marketing slidesDigital marketing slides
Digital marketing slidesdigitallincs
 
How to Promote Your Business Blog With HubSpot
How to Promote Your Business Blog With HubSpotHow to Promote Your Business Blog With HubSpot
How to Promote Your Business Blog With HubSpotHubSpot
 
Growth Hacking : Disrupt the Business with Mobile!
Growth Hacking : Disrupt the Business with Mobile!Growth Hacking : Disrupt the Business with Mobile!
Growth Hacking : Disrupt the Business with Mobile!Antonin Cohen
 
B2B Lead Generation using Google, AdWords, Facebook, LinkedIn, and Twitter
B2B Lead Generation using Google, AdWords, Facebook, LinkedIn, and TwitterB2B Lead Generation using Google, AdWords, Facebook, LinkedIn, and Twitter
B2B Lead Generation using Google, AdWords, Facebook, LinkedIn, and TwitterAsif Anwar
 
Online Branding
Online BrandingOnline Branding
Online BrandingVbout.com
 
Social Media and Search Engine Marketing
Social Media and Search Engine MarketingSocial Media and Search Engine Marketing
Social Media and Search Engine MarketingEddie Bluff
 
Anvil Webinar April 2012 - Advanced Social Media: How to Utilize Top Platforms
Anvil Webinar April 2012 - Advanced Social Media: How to Utilize Top PlatformsAnvil Webinar April 2012 - Advanced Social Media: How to Utilize Top Platforms
Anvil Webinar April 2012 - Advanced Social Media: How to Utilize Top PlatformsAnvil Media, Inc.
 

Was ist angesagt? (20)

ISD Web Marketing
ISD Web MarketingISD Web Marketing
ISD Web Marketing
 
SEO for Dentists
SEO for DentistsSEO for Dentists
SEO for Dentists
 
Utilizing Facebook for Business
Utilizing Facebook for Business Utilizing Facebook for Business
Utilizing Facebook for Business
 
Social Media & SEO - TopRank Online Marketing
Social Media & SEO - TopRank Online MarketingSocial Media & SEO - TopRank Online Marketing
Social Media & SEO - TopRank Online Marketing
 
LinkedIn for Selling - How to Generate Leads Using LinkedIn
LinkedIn for Selling - How to Generate Leads Using LinkedInLinkedIn for Selling - How to Generate Leads Using LinkedIn
LinkedIn for Selling - How to Generate Leads Using LinkedIn
 
Introduction to Search Engine Optimization
Introduction to Search Engine OptimizationIntroduction to Search Engine Optimization
Introduction to Search Engine Optimization
 
What Every CMO Needs to Know About Content Strategy
What Every CMO Needs to Know About Content StrategyWhat Every CMO Needs to Know About Content Strategy
What Every CMO Needs to Know About Content Strategy
 
The Future Of Social Media Monitoring Marshallsponder
The Future Of Social Media Monitoring MarshallsponderThe Future Of Social Media Monitoring Marshallsponder
The Future Of Social Media Monitoring Marshallsponder
 
Social Media Marketing and Internet Reputation Management for Car Dealers
Social Media Marketing and Internet Reputation Management for Car DealersSocial Media Marketing and Internet Reputation Management for Car Dealers
Social Media Marketing and Internet Reputation Management for Car Dealers
 
An Automotive Strategist's Look at Twitter
An Automotive Strategist's Look at TwitterAn Automotive Strategist's Look at Twitter
An Automotive Strategist's Look at Twitter
 
Social Media Marketing - Facebook, Twitter, LinkedIn
Social Media Marketing - Facebook, Twitter, LinkedInSocial Media Marketing - Facebook, Twitter, LinkedIn
Social Media Marketing - Facebook, Twitter, LinkedIn
 
Digital Marketing Overview (for students)
Digital Marketing Overview (for students)Digital Marketing Overview (for students)
Digital Marketing Overview (for students)
 
Digital marketing slides
Digital marketing slidesDigital marketing slides
Digital marketing slides
 
How to Promote Your Business Blog With HubSpot
How to Promote Your Business Blog With HubSpotHow to Promote Your Business Blog With HubSpot
How to Promote Your Business Blog With HubSpot
 
Growth Hacking : Disrupt the Business with Mobile!
Growth Hacking : Disrupt the Business with Mobile!Growth Hacking : Disrupt the Business with Mobile!
Growth Hacking : Disrupt the Business with Mobile!
 
2014 Digital Marketing Fundamentals
2014 Digital Marketing Fundamentals2014 Digital Marketing Fundamentals
2014 Digital Marketing Fundamentals
 
B2B Lead Generation using Google, AdWords, Facebook, LinkedIn, and Twitter
B2B Lead Generation using Google, AdWords, Facebook, LinkedIn, and TwitterB2B Lead Generation using Google, AdWords, Facebook, LinkedIn, and Twitter
B2B Lead Generation using Google, AdWords, Facebook, LinkedIn, and Twitter
 
Online Branding
Online BrandingOnline Branding
Online Branding
 
Social Media and Search Engine Marketing
Social Media and Search Engine MarketingSocial Media and Search Engine Marketing
Social Media and Search Engine Marketing
 
Anvil Webinar April 2012 - Advanced Social Media: How to Utilize Top Platforms
Anvil Webinar April 2012 - Advanced Social Media: How to Utilize Top PlatformsAnvil Webinar April 2012 - Advanced Social Media: How to Utilize Top Platforms
Anvil Webinar April 2012 - Advanced Social Media: How to Utilize Top Platforms
 

Andere mochten auch

GO BEYOND: STARE YOUR FEAR IN THE FACE AND BOLDLY GO FOR IT! [INBOUND 2014]
GO BEYOND: STARE YOUR FEAR IN THE FACE AND BOLDLY GO FOR IT! [INBOUND 2014]GO BEYOND: STARE YOUR FEAR IN THE FACE AND BOLDLY GO FOR IT! [INBOUND 2014]
GO BEYOND: STARE YOUR FEAR IN THE FACE AND BOLDLY GO FOR IT! [INBOUND 2014]HubSpot
 
The Definitive and Candid Guide to Successful Websites
The Definitive and Candid Guide to Successful WebsitesThe Definitive and Candid Guide to Successful Websites
The Definitive and Candid Guide to Successful WebsitesOne North
 
RELENTLESS SIMPLICITY [INBOUND 2014]
RELENTLESS SIMPLICITY [INBOUND 2014]RELENTLESS SIMPLICITY [INBOUND 2014]
RELENTLESS SIMPLICITY [INBOUND 2014]HubSpot
 
HOW iFARTED AND CAME OUT SMELLING LIKE A ROSE [INBOUND 2014]
HOW iFARTED AND CAME OUT SMELLING LIKE A ROSE [INBOUND 2014]HOW iFARTED AND CAME OUT SMELLING LIKE A ROSE [INBOUND 2014]
HOW iFARTED AND CAME OUT SMELLING LIKE A ROSE [INBOUND 2014]HubSpot
 
How to Turn Your Customer Base into a Revenue Engine [INBOUND 2014]
How to Turn Your Customer Base into a Revenue Engine [INBOUND 2014]How to Turn Your Customer Base into a Revenue Engine [INBOUND 2014]
How to Turn Your Customer Base into a Revenue Engine [INBOUND 2014]HubSpot
 
FEAR IS A LIAR [INBOUND 2014]
FEAR IS A LIAR [INBOUND 2014]FEAR IS A LIAR [INBOUND 2014]
FEAR IS A LIAR [INBOUND 2014]HubSpot
 
THERE'S NO SUCH THING AS CAN'T [INBOUND 2014]
THERE'S NO SUCH THING AS CAN'T [INBOUND 2014]THERE'S NO SUCH THING AS CAN'T [INBOUND 2014]
THERE'S NO SUCH THING AS CAN'T [INBOUND 2014]HubSpot
 
THE FENCES WE PUT UP [INBOUND 2014]
THE FENCES WE PUT UP [INBOUND 2014]THE FENCES WE PUT UP [INBOUND 2014]
THE FENCES WE PUT UP [INBOUND 2014]HubSpot
 
THE VERY FIRST INSTANT IN TIME [INBOUND 2014]
THE VERY FIRST INSTANT IN TIME [INBOUND 2014]THE VERY FIRST INSTANT IN TIME [INBOUND 2014]
THE VERY FIRST INSTANT IN TIME [INBOUND 2014]HubSpot
 
ALL YOU NEED'S A #HASHTAG AND A DREAM [INBOUND 2014]
ALL YOU NEED'S A #HASHTAG AND A DREAM [INBOUND 2014]ALL YOU NEED'S A #HASHTAG AND A DREAM [INBOUND 2014]
ALL YOU NEED'S A #HASHTAG AND A DREAM [INBOUND 2014]HubSpot
 
GSX physical event to virtual event
GSX physical event to virtual eventGSX physical event to virtual event
GSX physical event to virtual eventKenny Lauer
 
LEVERAGING LARGE-SCALE HUMAN HISTORY TO PREDICT THE ECONOMIC FUTURE AND HEALT...
LEVERAGING LARGE-SCALE HUMAN HISTORY TO PREDICT THE ECONOMIC FUTURE AND HEALT...LEVERAGING LARGE-SCALE HUMAN HISTORY TO PREDICT THE ECONOMIC FUTURE AND HEALT...
LEVERAGING LARGE-SCALE HUMAN HISTORY TO PREDICT THE ECONOMIC FUTURE AND HEALT...HubSpot
 
TWO LITTLE THINGS THAT MADE ALL THE DIFFERENCE [INBOUND 2014]
TWO LITTLE THINGS THAT MADE ALL THE DIFFERENCE [INBOUND 2014]TWO LITTLE THINGS THAT MADE ALL THE DIFFERENCE [INBOUND 2014]
TWO LITTLE THINGS THAT MADE ALL THE DIFFERENCE [INBOUND 2014]HubSpot
 
EASY IS THE NEW HARD [INBOUND 2014]
EASY IS THE NEW HARD [INBOUND 2014]EASY IS THE NEW HARD [INBOUND 2014]
EASY IS THE NEW HARD [INBOUND 2014]HubSpot
 
THE PENCIL AND THE KEYBOARD: HOW THE WAY YOU WRITE CHANGES THE WAY YOU THINK ...
THE PENCIL AND THE KEYBOARD: HOW THE WAY YOU WRITE CHANGES THE WAY YOU THINK ...THE PENCIL AND THE KEYBOARD: HOW THE WAY YOU WRITE CHANGES THE WAY YOU THINK ...
THE PENCIL AND THE KEYBOARD: HOW THE WAY YOU WRITE CHANGES THE WAY YOU THINK ...HubSpot
 
FIX YOUR WRITING [INBOUND 2014]
FIX YOUR WRITING [INBOUND 2014]FIX YOUR WRITING [INBOUND 2014]
FIX YOUR WRITING [INBOUND 2014]HubSpot
 
MOVE OVER BIG DATA - HERE COMES BIG CONTENT [INBOUND 2014]
MOVE OVER BIG DATA - HERE COMES BIG CONTENT [INBOUND 2014]MOVE OVER BIG DATA - HERE COMES BIG CONTENT [INBOUND 2014]
MOVE OVER BIG DATA - HERE COMES BIG CONTENT [INBOUND 2014]HubSpot
 
IGNITE: MAKING ROCKSTARS [INBOUND 2014]
IGNITE: MAKING ROCKSTARS [INBOUND 2014]IGNITE: MAKING ROCKSTARS [INBOUND 2014]
IGNITE: MAKING ROCKSTARS [INBOUND 2014]HubSpot
 
Price Optimization: The Secret to Butts In Seats and Making More Money [Webinar]
Price Optimization: The Secret to Butts In Seats and Making More Money [Webinar]Price Optimization: The Secret to Butts In Seats and Making More Money [Webinar]
Price Optimization: The Secret to Butts In Seats and Making More Money [Webinar]AudienceView
 
Website Redesign Checklist and Tips
Website Redesign Checklist and TipsWebsite Redesign Checklist and Tips
Website Redesign Checklist and TipsHub & Spoke
 

Andere mochten auch (20)

GO BEYOND: STARE YOUR FEAR IN THE FACE AND BOLDLY GO FOR IT! [INBOUND 2014]
GO BEYOND: STARE YOUR FEAR IN THE FACE AND BOLDLY GO FOR IT! [INBOUND 2014]GO BEYOND: STARE YOUR FEAR IN THE FACE AND BOLDLY GO FOR IT! [INBOUND 2014]
GO BEYOND: STARE YOUR FEAR IN THE FACE AND BOLDLY GO FOR IT! [INBOUND 2014]
 
The Definitive and Candid Guide to Successful Websites
The Definitive and Candid Guide to Successful WebsitesThe Definitive and Candid Guide to Successful Websites
The Definitive and Candid Guide to Successful Websites
 
RELENTLESS SIMPLICITY [INBOUND 2014]
RELENTLESS SIMPLICITY [INBOUND 2014]RELENTLESS SIMPLICITY [INBOUND 2014]
RELENTLESS SIMPLICITY [INBOUND 2014]
 
HOW iFARTED AND CAME OUT SMELLING LIKE A ROSE [INBOUND 2014]
HOW iFARTED AND CAME OUT SMELLING LIKE A ROSE [INBOUND 2014]HOW iFARTED AND CAME OUT SMELLING LIKE A ROSE [INBOUND 2014]
HOW iFARTED AND CAME OUT SMELLING LIKE A ROSE [INBOUND 2014]
 
How to Turn Your Customer Base into a Revenue Engine [INBOUND 2014]
How to Turn Your Customer Base into a Revenue Engine [INBOUND 2014]How to Turn Your Customer Base into a Revenue Engine [INBOUND 2014]
How to Turn Your Customer Base into a Revenue Engine [INBOUND 2014]
 
FEAR IS A LIAR [INBOUND 2014]
FEAR IS A LIAR [INBOUND 2014]FEAR IS A LIAR [INBOUND 2014]
FEAR IS A LIAR [INBOUND 2014]
 
THERE'S NO SUCH THING AS CAN'T [INBOUND 2014]
THERE'S NO SUCH THING AS CAN'T [INBOUND 2014]THERE'S NO SUCH THING AS CAN'T [INBOUND 2014]
THERE'S NO SUCH THING AS CAN'T [INBOUND 2014]
 
THE FENCES WE PUT UP [INBOUND 2014]
THE FENCES WE PUT UP [INBOUND 2014]THE FENCES WE PUT UP [INBOUND 2014]
THE FENCES WE PUT UP [INBOUND 2014]
 
THE VERY FIRST INSTANT IN TIME [INBOUND 2014]
THE VERY FIRST INSTANT IN TIME [INBOUND 2014]THE VERY FIRST INSTANT IN TIME [INBOUND 2014]
THE VERY FIRST INSTANT IN TIME [INBOUND 2014]
 
ALL YOU NEED'S A #HASHTAG AND A DREAM [INBOUND 2014]
ALL YOU NEED'S A #HASHTAG AND A DREAM [INBOUND 2014]ALL YOU NEED'S A #HASHTAG AND A DREAM [INBOUND 2014]
ALL YOU NEED'S A #HASHTAG AND A DREAM [INBOUND 2014]
 
GSX physical event to virtual event
GSX physical event to virtual eventGSX physical event to virtual event
GSX physical event to virtual event
 
LEVERAGING LARGE-SCALE HUMAN HISTORY TO PREDICT THE ECONOMIC FUTURE AND HEALT...
LEVERAGING LARGE-SCALE HUMAN HISTORY TO PREDICT THE ECONOMIC FUTURE AND HEALT...LEVERAGING LARGE-SCALE HUMAN HISTORY TO PREDICT THE ECONOMIC FUTURE AND HEALT...
LEVERAGING LARGE-SCALE HUMAN HISTORY TO PREDICT THE ECONOMIC FUTURE AND HEALT...
 
TWO LITTLE THINGS THAT MADE ALL THE DIFFERENCE [INBOUND 2014]
TWO LITTLE THINGS THAT MADE ALL THE DIFFERENCE [INBOUND 2014]TWO LITTLE THINGS THAT MADE ALL THE DIFFERENCE [INBOUND 2014]
TWO LITTLE THINGS THAT MADE ALL THE DIFFERENCE [INBOUND 2014]
 
EASY IS THE NEW HARD [INBOUND 2014]
EASY IS THE NEW HARD [INBOUND 2014]EASY IS THE NEW HARD [INBOUND 2014]
EASY IS THE NEW HARD [INBOUND 2014]
 
THE PENCIL AND THE KEYBOARD: HOW THE WAY YOU WRITE CHANGES THE WAY YOU THINK ...
THE PENCIL AND THE KEYBOARD: HOW THE WAY YOU WRITE CHANGES THE WAY YOU THINK ...THE PENCIL AND THE KEYBOARD: HOW THE WAY YOU WRITE CHANGES THE WAY YOU THINK ...
THE PENCIL AND THE KEYBOARD: HOW THE WAY YOU WRITE CHANGES THE WAY YOU THINK ...
 
FIX YOUR WRITING [INBOUND 2014]
FIX YOUR WRITING [INBOUND 2014]FIX YOUR WRITING [INBOUND 2014]
FIX YOUR WRITING [INBOUND 2014]
 
MOVE OVER BIG DATA - HERE COMES BIG CONTENT [INBOUND 2014]
MOVE OVER BIG DATA - HERE COMES BIG CONTENT [INBOUND 2014]MOVE OVER BIG DATA - HERE COMES BIG CONTENT [INBOUND 2014]
MOVE OVER BIG DATA - HERE COMES BIG CONTENT [INBOUND 2014]
 
IGNITE: MAKING ROCKSTARS [INBOUND 2014]
IGNITE: MAKING ROCKSTARS [INBOUND 2014]IGNITE: MAKING ROCKSTARS [INBOUND 2014]
IGNITE: MAKING ROCKSTARS [INBOUND 2014]
 
Price Optimization: The Secret to Butts In Seats and Making More Money [Webinar]
Price Optimization: The Secret to Butts In Seats and Making More Money [Webinar]Price Optimization: The Secret to Butts In Seats and Making More Money [Webinar]
Price Optimization: The Secret to Butts In Seats and Making More Money [Webinar]
 
Website Redesign Checklist and Tips
Website Redesign Checklist and TipsWebsite Redesign Checklist and Tips
Website Redesign Checklist and Tips
 

Ähnlich wie Why Security Matters for Marketers

Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?Osei Fortune
 
Getting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClubGetting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClubResellerClub
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3Trish McGinity, CCSK
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the UnionDavid Perkins
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDumindu Pahalawatta
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfssuser6c59cb
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goMichael Furman
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The HorizonLalit Kale
 
Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against...
Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against...Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against...
Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against...Invincea, Inc.
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_BrochureJustyna Majek
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataSteven Schwartz
 

Ähnlich wie Why Security Matters for Marketers (20)

Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Panama-Paper-Leak
Panama-Paper-LeakPanama-Paper-Leak
Panama-Paper-Leak
 
Panama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should takePanama Papers Leak and Precautions Law firms should take
Panama Papers Leak and Precautions Law firms should take
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
Getting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClubGetting Started with Sitelock on ResellerClub
Getting Started with Sitelock on ResellerClub
 
Andrew Useckas Csa presentation hacking custom webapps 4 3
Andrew Useckas Csa presentation   hacking custom webapps 4 3Andrew Useckas Csa presentation   hacking custom webapps 4 3
Andrew Useckas Csa presentation hacking custom webapps 4 3
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The Horizon
 
Phishing
PhishingPhishing
Phishing
 
Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against...
Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against...Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against...
Webinar: Operation DeathClick: Uncovering Micro-Targeted Malvertising Against...
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Symantec-CWS_Brochure
Symantec-CWS_BrochureSymantec-CWS_Brochure
Symantec-CWS_Brochure
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 

Mehr von HubSpot

Cultura HubSpot - Cómo crear la mejor empresa posible
Cultura HubSpot - Cómo crear la mejor empresa posibleCultura HubSpot - Cómo crear la mejor empresa posible
Cultura HubSpot - Cómo crear la mejor empresa posibleHubSpot
 
Your Go-To-Market is Killing Your Business, and You Don't Even Know It
Your Go-To-Market is Killing Your Business, and You Don't Even Know ItYour Go-To-Market is Killing Your Business, and You Don't Even Know It
Your Go-To-Market is Killing Your Business, and You Don't Even Know ItHubSpot
 
The Hard Truth About Marketing
The Hard Truth About MarketingThe Hard Truth About Marketing
The Hard Truth About MarketingHubSpot
 
How HubSpot Builds its Engineering Culture (While Maintaining Speed)
How HubSpot Builds its Engineering Culture (While Maintaining Speed)How HubSpot Builds its Engineering Culture (While Maintaining Speed)
How HubSpot Builds its Engineering Culture (While Maintaining Speed)HubSpot
 
The Tech Scene in Berlin is Booming
The Tech Scene in Berlin is BoomingThe Tech Scene in Berlin is Booming
The Tech Scene in Berlin is BoomingHubSpot
 
Aligning Vectors: What Elon Musk Taught Me About Growing A Business
Aligning Vectors: What Elon Musk Taught Me About Growing A BusinessAligning Vectors: What Elon Musk Taught Me About Growing A Business
Aligning Vectors: What Elon Musk Taught Me About Growing A BusinessHubSpot
 
15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to Know15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to KnowHubSpot
 
Inbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a MarketerInbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a MarketerHubSpot
 
What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one. What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one. HubSpot
 
HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot
 
Add the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonAdd the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonHubSpot
 
What is Inbound Recruiting?
What is Inbound Recruiting?What is Inbound Recruiting?
What is Inbound Recruiting?HubSpot
 
Behind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoBehind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoHubSpot
 
25 Discovery Call Questions
25 Discovery Call Questions25 Discovery Call Questions
25 Discovery Call QuestionsHubSpot
 
How to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHow to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHubSpot
 
Class 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessClass 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessHubSpot
 
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...HubSpot
 
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpotHubSpot
 
3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful CompaniesHubSpot
 
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...HubSpot
 

Mehr von HubSpot (20)

Cultura HubSpot - Cómo crear la mejor empresa posible
Cultura HubSpot - Cómo crear la mejor empresa posibleCultura HubSpot - Cómo crear la mejor empresa posible
Cultura HubSpot - Cómo crear la mejor empresa posible
 
Your Go-To-Market is Killing Your Business, and You Don't Even Know It
Your Go-To-Market is Killing Your Business, and You Don't Even Know ItYour Go-To-Market is Killing Your Business, and You Don't Even Know It
Your Go-To-Market is Killing Your Business, and You Don't Even Know It
 
The Hard Truth About Marketing
The Hard Truth About MarketingThe Hard Truth About Marketing
The Hard Truth About Marketing
 
How HubSpot Builds its Engineering Culture (While Maintaining Speed)
How HubSpot Builds its Engineering Culture (While Maintaining Speed)How HubSpot Builds its Engineering Culture (While Maintaining Speed)
How HubSpot Builds its Engineering Culture (While Maintaining Speed)
 
The Tech Scene in Berlin is Booming
The Tech Scene in Berlin is BoomingThe Tech Scene in Berlin is Booming
The Tech Scene in Berlin is Booming
 
Aligning Vectors: What Elon Musk Taught Me About Growing A Business
Aligning Vectors: What Elon Musk Taught Me About Growing A BusinessAligning Vectors: What Elon Musk Taught Me About Growing A Business
Aligning Vectors: What Elon Musk Taught Me About Growing A Business
 
15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to Know15 Stats Every Marketing Leader Needs to Know
15 Stats Every Marketing Leader Needs to Know
 
Inbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a MarketerInbound Recruiting: Hire Top Talent By Thinking Like a Marketer
Inbound Recruiting: Hire Top Talent By Thinking Like a Marketer
 
What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one. What's a Growth Stack? And why you should build one.
What's a Growth Stack? And why you should build one.
 
HubSpot Diversity Data 2016
HubSpot Diversity Data 2016HubSpot Diversity Data 2016
HubSpot Diversity Data 2016
 
Add the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-ThonAdd the Women Back: Wikipedia Edit-a-Thon
Add the Women Back: Wikipedia Edit-a-Thon
 
What is Inbound Recruiting?
What is Inbound Recruiting?What is Inbound Recruiting?
What is Inbound Recruiting?
 
Behind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot TokyoBehind the Scenes: Launching HubSpot Tokyo
Behind the Scenes: Launching HubSpot Tokyo
 
25 Discovery Call Questions
25 Discovery Call Questions25 Discovery Call Questions
25 Discovery Call Questions
 
How to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's BuyerHow to Earn the Attention of Today's Buyer
How to Earn the Attention of Today's Buyer
 
Class 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your BusinessClass 1: Email Marketing Certification course: Email Marketing and Your Business
Class 1: Email Marketing Certification course: Email Marketing and Your Business
 
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
Why People Block Ads (And What It Means for Marketers and Advertisers) [New R...
 
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot 10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
10 Things You Didn’t Know About Mobile Email from Litmus & HubSpot
 
3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies3 Proven Sales Email Templates Used by Successful Companies
3 Proven Sales Email Templates Used by Successful Companies
 
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
Modern Prospecting Techniques for Connecting with Prospects (from Sales Hacke...
 

Kürzlich hochgeladen

Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfEastern Online-iSURVEY
 
From Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEOFrom Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEOSzymon Słowik
 
top marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar Ctop marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar CManojkumar C
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfCIO Business World
 
What’s the difference between Affiliate Marketing and Brand Partnerships?
What’s the difference between Affiliate Marketing and Brand Partnerships?What’s the difference between Affiliate Marketing and Brand Partnerships?
What’s the difference between Affiliate Marketing and Brand Partnerships?Partnercademy
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guidekiva6
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garsiderobwhite630290
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceVIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceSapana Sha
 
Understanding the Affiliate Marketing Channel; the short guide
Understanding the Affiliate Marketing Channel; the short guideUnderstanding the Affiliate Marketing Channel; the short guide
Understanding the Affiliate Marketing Channel; the short guidePartnercademy
 
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the InternetExploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internetnehapardhi711
 
TAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto SectorTAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto SectorSocial Samosa
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentationdgtivemarketingagenc
 
Michael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysisMichael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysisjunaid794917
 
5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software Solutions5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software SolutionsDevherds Software Solutions
 
The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...sowmyrao14
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDemandbase
 
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRCall Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRlizamodels9
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?Juan Pineda
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationAli Raza
 

Kürzlich hochgeladen (20)

Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdfSnapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
Snapshot of Consumer Behaviors of March 2024-EOLiSurvey (EN).pdf
 
From Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEOFrom Chance to Choice - Tactical Link Building for International SEO
From Chance to Choice - Tactical Link Building for International SEO
 
top marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar Ctop marketing posters - Fresh Spar Technologies - Manojkumar C
top marketing posters - Fresh Spar Technologies - Manojkumar C
 
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdfMost Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
Most Influential HR Leaders Leading the Corporate World, 2024 (Final file).pdf
 
What’s the difference between Affiliate Marketing and Brand Partnerships?
What’s the difference between Affiliate Marketing and Brand Partnerships?What’s the difference between Affiliate Marketing and Brand Partnerships?
What’s the difference between Affiliate Marketing and Brand Partnerships?
 
Jai Institute for Parenting Program Guide
Jai Institute for Parenting Program GuideJai Institute for Parenting Program Guide
Jai Institute for Parenting Program Guide
 
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon GarsideInbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
Inbound Marekting 2.0 - The Paradigm Shift in Marketing | Axon Garside
 
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Lajpat Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts ServiceVIP Call Girls In Green Park 9654467111 Escorts Service
VIP Call Girls In Green Park 9654467111 Escorts Service
 
Understanding the Affiliate Marketing Channel; the short guide
Understanding the Affiliate Marketing Channel; the short guideUnderstanding the Affiliate Marketing Channel; the short guide
Understanding the Affiliate Marketing Channel; the short guide
 
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the InternetExploring Web 3.0 Growth marketing: Navigating the Future of the Internet
Exploring Web 3.0 Growth marketing: Navigating the Future of the Internet
 
TAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto SectorTAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
TAM AdEx 2023 Cross Media Advertising Recap - Auto Sector
 
Influencer Marketing Power point presentation
Influencer Marketing  Power point presentationInfluencer Marketing  Power point presentation
Influencer Marketing Power point presentation
 
Michael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysisMichael Kors marketing assignment swot analysis
Michael Kors marketing assignment swot analysis
 
5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software Solutions5 Digital Marketing Tips | Devherds Software Solutions
5 Digital Marketing Tips | Devherds Software Solutions
 
The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...The Evolution of Internet : How consumers use technology and its impact on th...
The Evolution of Internet : How consumers use technology and its impact on th...
 
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdfDigital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
Digital Marketing Spotlight: Lifecycle Advertising Strategies.pdf
 
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCRCall Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
Call Girls In Aerocity Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delhi NCR
 
What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?What are the 4 characteristics of CTAs that convert?
What are the 4 characteristics of CTAs that convert?
 
ASO Process: What is App Store Optimization
ASO Process: What is App Store OptimizationASO Process: What is App Store Optimization
ASO Process: What is App Store Optimization
 

Why Security Matters for Marketers

  • 2. As marketers we’re focused on GROWTH
  • 4. Chapter one: Why you should care about security.
  • 5. If you collect data from customers, you are responsible for ensuring their protection Bryan Eisenberg
  • 6. Websites are being attacked every second
  • 7. Insecure websites are more frequently targeted •  Most of these attacks are aimed to steal user information, or compromise a website. •  Looking at different attack types you can see what some of the most common attacks are – http is most prominent. •  50% of attacks come against insecure websites.
  • 8. Businesses of Every Size Are Being Targeted •  Betty’s Tea is a UK based café chain and was targeted in May 2015 •  As a result of the attack: 120,000 customer names, email addresses and encrypted passwords were stolen.
  • 9. A Story about Sony •  Sony was hacked in November, 2014 and personal employee details including names and salaries were leaked •  47,000 records were stolen, and the outrage started immediately, and is still ongoing
  • 12. Every Attack Ties into Value •  According to PwC, every website SMB website hacking incident costs between $92,000 - $165,000 on average. •  McAfee found almost 90% of small- and medium-sized business in the US do not use data protection for company and customer information, and less than half secured company email to prevent phishing scams. 7-year olds can even hack networks
  • 13. Most Websites Don’t Have Security Only 20% of website are secure!
  • 14. Brands have the opportunity to stand out for proactively addressing it and those who do not will very soon be far behind. Align your brand with the changing consumer mindset and be a leader in customer security.” Bo Holland, CEO AllClearID
  • 15. Chapter two: How website attacks happen.
  • 16. There are two primary types of website attacks MAN-IN-THE-MIDDLE DDOS
  • 18. What is a Man-in-the-Middle Attack? •  A Man-in-the-Middle attack happens when a hacker places a small file on your website, and steals incoming user data. •  These files can go undetected for weeks, months, or years due to their small size. Visitor Hacker Website
  • 19. DDoS
  • 20. What is a DDoS Attack? •  A DDoS (Distributed Denial of Service) attack happens when a hackers uses multiple computers to flood traffic to a website. •  Incoming traffic volume is so large and so sudden, there is no option but for your website to go down. Website
  • 21. What can we do to prevent these attacks?
  • 23. What is SSL? Visitor Hacker Website •  SSL stands for Secure Sockets Layer, and is a way of encrypting traffic between a website and the visitor. •  As a result of traffic being encrypted, hackers cannot steal private or customer information from Man-in-the-Middle attacks.
  • 25. Benefits of SSL A padlock displays in the URL bar for secure websites – increasing visitor and consumer confidence that their information is safe. Trust SEO Website Enhancements
  • 28. Benefits of SSL “If your in a competitive niche, then it can give you an edge from Google’s point of view. With the HTTPS ranking boost, it acts like a tiebreaker. For example, if all quality signals are equal for two results, then the one that is on HTTPS would get the extra boost that is needed to trump the other result.” Google’s Gary Illyes, said:Trust SEO Website Enhancements
  • 29. Benefits of SSL Trust SEO Website Enhancements HTTPS is “moderately correlated to higher search rankings” Source: http://backlinko.com/search-engine-ranking
  • 31. Benefits of SSL Trust SEO Website Enhancements Using HTML5, your website can incorporate features that utilize the visitors device information, such as: •  Geolocation •  Video and Microphone •  Device Motion/Orientation •  Fullscreen Without SSL, none of these will work in Chrome or Firefox.
  • 32. What is a WAF? •  WAF stands for Web Application Firewall and forms a protective ring around your website to weed-out bad traffic, and allow good visitors to come through. Website Website Visitor Hacker
  • 33. Hacking Recovery Plan 1.  Check with I.T. and/or your website host to determine root cause, and impact 2.  Create scenarios and playbooks for every type of hacking incident (loss of user information, website downtime, etc.) 3.  Communicate with affected internal stakeholders 4.  Communicate with external customers, prospects, and other affected parties 5.  Ensure you have contact details for key team members
  • 35. Create a Hacking Recovery Plan 1.  Check with I.T. and/or your website host to determine root cause, and impact 2.  Create scenarios and playbooks for every type of hacking incident (loss of user information, website downtime, etc.) 3.  Communicate with affected internal stakeholders 4.  Communicate with external customers, prospects, and other affected parties 5.  Ensure you have contact details for key team members
  • 36. Want to secure your website today? Click here to start a free trial of the HubSpot Website Add-on.
  • 37. Jeffrey Vocell (@jvocell) Product Marketing Manager Thank you!