Kevin Benedict Interviews Social Media Expert Gerry Moran

In this interview we learn from Cognizant's social media expert Gerry Moran on how companies can effectively leverage LinkedIn to reach, engage and connect with their markets.  Enjoy!

Video Link: http://youtu.be/HcXF-r73Nk0




************************************************************************
Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Subscribe to Kevin'sYouTube Channel
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Kevin Benedict Interviews Digital Transformation Expert Ved Sen

This week I am in Orlando, Florida meeting many of the smartest folks in Cognizant and planning our 2015. While at this event I am taking the time to interview some of our global experts on digital trends and strategies.  This interview is with Ved Sen, Global Head, Advisory Services, Social, Mobile and Sensors at Cognizant.  Enjoy!

Video Link: http://youtu.be/1u5gzIQN-us?list=UUGizQCw2Zbs3eTLwp7icoqw


************************************************************************
Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Subscribe to Kevin'sYouTube Channel
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

IT and Data Security and the Risk to Christmas and the Global Economy

Come let us build ourselves a city, with a tower that reaches to the heavens, so that we may make a name for ourselves. ~ Genesis
I have a sizable collection of books in my library, in fact I have a tower of books in my office that is a danger to small children.  Many of the books in my collection are on the topic of technology strategies for businesses.  This collection represents a passion I have for connecting business strategies and new technologies together to improve business performance.  I have, however, learned over the years that with new technologies comes new vulnerabilities that must be considered as part of the adoption strategy.

Today, 27 missiles can destroy our entire commercial global GPS system, and another 2,465 missiles or laser attacks could destroy every active satellite we have in orbit.  That represents a new and emerging vulnerability to our digital economy.

We have seen demonstrated this year that private and government sponsored hackers can bring down markets, transportation systems, communication networks, financial systems and utility grids.  We have seen this month how cyber-attacks, suspected to originate from North Korea, can dramatically impact an entire industry (Entertainment). Cyber-attacks are fast becoming the weapon of choice for countries and organizations with limited funds and military capabilities.  It is a way to maximize the damage they cause for the investment - a kind of bad guy ROI.
Experts believe that for impoverished North Korea, expanding its warfare into cyberspace is an attractive choice because it is cheaper and faster to develop malicious computer codes than to build nuclear bombs or other weapons of mass destruction. Online attacks can be performed anonymously, another upside for the infiltrators. - AP By: YOUKYUNG LEE, December 18, 2014
For all the benefits technology enables, it also makes us more vulnerable to computer and software failures and cyber-attacks (See Flights Disrupted After Computer Failure at UK Control Center).
Philosopher and Urbanist Dr. Paul Virilio said, "To invent something is to invent an accident. To invent the ship is to invent the shipwreck; the space shuttle, the explosion. And to invent the electronic superhighway or the Internet is to invent a major risk which is not easily spotted because it does not produce fatalities like a shipwreck or a mid-air explosion." ~ An Interview with Paul Virilio." in: Apres Coup Psychoanalytic Association. January 2005.
Today, however, fatalities can result from problems with the Internet and associated systems because they touch so many important systems including healthcare systems (see http://www.cnn.com/video/data/2.0/video/us/2014/12/12/nr-dnt-feyerick-cyber-security.cnn.html). We have placed nearly all of our systems of importance on the Internet and into the cloud.  Our military runs on a network centric strategy and our economy as well.  Cyber-attacks today are a most serious threat.

Dr. Virilio identified the fact that all new technologies include new and guaranteed accidents or vulnerabilities.  It doesn't mean we don't pursue them, it just means we need to acknowledge the associated risks, prepare for and manage them.

We are hearing a constant drum beat of the successes hackers and cyber-attackers are having in their attacks on our financial and payment systems, and the theft of our personal data.  When will this become a true priority for "C Level" folks?  It is not just their own companies CEOs are risking today, every interaction and transaction connects businesses to individuals.  Our personal data is now intimately tied to the companies we do business with, and as recent events have proven our data is now in real jeopardy.

Shouldn't we, as customers, be looking to penalize businesses with poor IT security practices and systems?  In a world where our data is currency, the protection of our data is vital.  It is a personal and national security issue.  We need a understand the importance of IT security and data to global economies, and then take the necessary steps to protect them.
The original industrial accidents as, for instance, the derailment of a train or the crash of an airplane, were all specific, localized, and particular accidents. They were taking place at a certain place and at a certain moment in time. Now, however, the revolution of instantaneous transmissions brought about by telecommunications makes the accident global." ~ Virilio Paul and Andreas Ruby (Interviewer). "Surfing the Accident. in: Institute for the Unstable Media. Publication "The Art of the Accident." 1998. (English).
I have seen steps in the right direction.  In 2011, the United States military designated certain kinds of cyber-attacks as "acts of war" that would be treated as such.
WASHINGTON—The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force.  "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said a military official.  SIOBHAN GORMAN And JULIAN E. BARNES, May 31, 2011
I am no fan of war, as I have a son in the military, but we must recognized the seriousness of attacks that cripple our country's infrastructures, economy and security.

As a passionate mobile industry analyst and enthusiast, I am eager for us to solve these cyber-attack and data security issues. We clearly have a massive global problem that needs solved, and the solution is not just a series of small start-ups with clever technologies.  It is bigger than that.  It is a global economic and security issue.  It needs the highest levels of emphasis and collaboration.

We need to be the vanguards of IT security and data protection.  What are the steps needed?  Here are some ideas to consider:
  • Elevate defense against cyber-attacks to a corporate, IT, economic and national security priority.
  • Recognize cyber-attacks are not just an individual company's IT problem or inconvenience, it is a national economic and security issue.
  • Measure executive's on their company's IT and data security practices and performance and base their compensation packages at least in part on these measurements.
  • Encourage all companies to prioritize IT and data security, and to educate IT staff on how to best respond to cyber-attacks.
  • Develop standards for IT and data security practices.
  • Motivate companies to meet these IT and data security standards by certifying them and publishing the results.
  • Encourage consumers to support certified businesses.
  • Organize independent IT and data security auditors that certify businesses against these standards.
  • Enforce stiff penalties against countries protecting organizations involved in cyber-attacks. 
The digital economy is growing exponentially, but cyber-attacks, left unchecked, will halt the digital economy like the Grinch Who Stole Christmas [data].

************************************************************************
Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Subscribe to Kevin'sYouTube Channel
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Mobile Cyber Security News Weekly - Week of December 7, 2014

Welcome to the Mobile Cyber Security News Weekly, our newest online newsletter. Mobile Cyber Security will focus on the most interesting news, articles and links related to mobile and cyber security, mobile malware, mobile application management, cyber warfare (and more!) that I run across each week.  I am specifically targeting market trend information.

Also read Connected Globe News Weekly
Also read Field Mobility News Weekly
Also read Mobile Commerce News Weekly
Also read Mobile Health News Weekly
Also read Mobility News Weekly

Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here!

New security measures by Apple have reduced phone theft by as much as 40 percent, a study from the US Federal Communications Commission (FCC) has shown. Read Original Content

Mobile device security software market is forecast by Infonetics Research to increase at a 25 percent compound annual growth rate topping $4 billion by 2018. Read Original Content

Analysts at Research and Markets forecast the global BYOD security market to grow at a compound annual growth rate of 35.23 percent over the period 2014-2019. Read Original Content

B2M Solutions’ mobile software delivers valuable insight and actionable analytics for enterprise customers. Business leaders and managers within the mission critical, rugged mobile enterprise now have operational views of key business and technology analytics affecting performance and productivity. B2M software is developed with specific functionality to help organizations identify and unblock mobility problems as soon as, or even before, they occur, allowing customers to sustain critical business processes and gain competitive advantages. To Lean more visit www.B2M-Solutions.com.  This newsletter is sponsored in part by B2M Solutions

Financial-services companies plan to bolster their cyber security budgets by about $2 billion over the next two years, according to accounting and consulting firm PricewaterhouseCoopers. Read Original Content

A particularly nasty mobile malware campaign targeting Android users has hit between four million and 4.5 million Americans since January of 2013, according to an estimate by Lookout, a San Francisco mobile security company. Read Original Content


In the recent Mobile Cyber Threats report from Kaspersky Lab and INTERPOL, it was revealed that Android is by far the biggest target for mobile malware. Because of the huge Android user base and being an open platform, malware designed for Android has the greatest odds of success and easy to exploit as well. Read Original Content

Blackberry has announced a security partnership with Samsung aimed at bolstering the encryption on the firm’s Android smartphones. Read Original Content

MasterCard has revealed plans to make use of biometric information to replace passwords required for online payments, harnessing technologies such as Apple’s TouchID fingerprint scanner found on iPhones and iPads. Read Original Content

Latest Articles on http://mobileenterprisestrategies.blogspot.com

The Internet of My Things and How It Works

Mobile Expert Interviews: B2M's CEO Julie Purves
Mobile Apps, Sensor Platforms, Code Halos and Consumer Behaviors
Digital: Big Vision, Small Action
Amplified Influence and Mobile Apps
Feeling Thankful - Is there an App for That?
Gamification Strategies and Mobile Applications - The Way it Should Be
2015 Enterprise Mobility Events Announced
Insights into the Impact of Big Data, Mobile Apps and Code Halos Strategies on Retail

Whitepapers of Note

Don't Get SMACked - How Social, Mobile, Analytics and Cloud are Reshaping the Enterprise
Making BYOD Work for Your Organization

************************************************************************
Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Subscribe to Kevin'sYouTube Channel
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Telling the Brand Story with Mobile Applications and Code Halos

Click to Enlarge
"48% of eBay’s transactions globally are now touched by mobile at some point in the transaction." ~ Jonathan Gabbai, Head of International Mobile at eBay
The pace of change in retail today is crazy!  Consumer behaviors are changing as fast as new mobile applications are being released.  I don't envy the role of the IT strategy team or the marketing team in a retail operation today.  The shopping experience is changing monthly.  The way consumers research products and pricing is changing.  Customer expectations are increasing, and customer loyalty is a fleeting goal.  On top of all this, we (the consumer) are quickly finding ways to ignore mobile advertisements.

Juniper Research predicts smartphone and tablet users will make 195 billion mobile commerce transactions by 2019, up from 72 billion in 2014.  That massive increase, represents fewer visits to expensive big box stores for most customers. This trend will most definitely impact retailers' strategies and business models.

In our house, most of our Christmas shopping is completed online! Our dogs (Molli and Nelli) no longer even bark when the delivery man arrives as he is like family now. They only get off their beds long enough to eat the dog biscuits he brings.

Dr. Windsor Holden of Juniper Research predicts a huge jump in the number of transactions made on smartphones and tablets this holiday season alone. “Last year, about 18% of all e-transactions in the U.S. were on mobile phones and tablets. I expect to see a very, very sharp increase … around 30% to 35% of all e-commerce transactions,” he said.

With fewer opportunities to impress customers in their stores, retailers will need to impress through their mobile applications, user experiences and digital storytelling capabilities.   This will elevate the role of mobile application developers as the app is the brand.  This is reminiscent of the transformation in marketing where spending on traditional media moved to online and mobile. The sea-change is upon us.

A recent survey titled B2X Customer Care  (see  attached image) found participants in all countries would rather give up their TVs before their phones. Why?  The phone and tablet are becoming our TVs of choice.  Another data point that shows us how smartphones and tablets are changing our behaviors.

Given the increasing importance of mobile devices, marketers need to quickly understand how to tell their brand and product stories via mobile devices.  The good news is these mobile devices today have incredible story telling abilities.  Donald Miller, the author of multiple New York Times bestsellers (and 212,000 Twitter followers), has recently founded a new consulting firm called StoryBrand  whose purpose is to teach businesses how to combine storytelling skills and processes with emerging technologies.  Let's think about the storytelling tools available on an average smartphone:
  1. Customized and hyper-personalized mobile applications that know you and your preferences.
  2. Embedded video and music to add dramatic flair, coolness and romance.
  3. Mobile apps and embedded sensors to understand your health and physical activity level.
  4. Interactive mobile apps that answer questions, provide advice and help you solve problems.
  5. Maps and turn-by-turn navigation to lead you to the nearest stores with your brand and style preferences.
  6. Mobile apps that know your location and history of activities at particular locations.
  7. Mobile payment systems and retail apps that know your transaction histories and buying habits.
  8. Mobile apps like Starbucks that know the location of stores you most frequent, your travel history, favorite drinks, volume of drinks, if you order multiple or single drinks (they know if you often order as a single, couple or family), where you likely work (location where you order during business hours).
  9. Mobile apps combined with MNO (Mobile Network Operator) data and big data analytics can quickly understand the demographics of where you live, travel and work - your patterns of life.  They can quickly make assumptions of your age, income, educational level, preferences and family size and season of life.
These technologies and the data collected (Code Halos), once analyzed, are golden in the hands of a digital storyteller.  Businesses now need to tell a better digital story, while making the technology disappear into the background.

For more information on Donald Miller's StoryBrand workshops visit http://storybrand.com/.

************************************************************************
Kevin Benedict
Writer, Speaker, Senior Analyst
Digital Transformation, EBA, Center for the Future of Work Cognizant
View my profile on LinkedIn
Learn about mobile strategies at MobileEnterpriseStrategies.com
Follow me on Twitter @krbenedict
Subscribe to Kevin'sYouTube Channel
Join the Linkedin Group Strategic Enterprise Mobility
Join the Google+ Community Mobile Enterprise Strategies
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and digital transformation analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.

Interviews with Kevin Benedict