When a villain openly attacks, it’s highly unlikely that rescue will arrive at that moment of desperate need–and that includes a rescue by our Super Prez Barack Obama.
As I write, a computer virus is building a head of steam that promises to hit many businesses–and they may never see it coming. Almost all companies run anti-virus software to prevent their networks from being “hacked”. Today, the eyes of the IT world are glued on global computer networks, waiting to see what effect the Conficker virus will have on up to 15 million computers that may have been infected since last autumn. Conficker finds vulnerable computers and automatically disables security services and blocks access to anti-virus websites. This is one bad worm. I define this as cyber-terrorism, would you agree?
Now, what about cyber-terrorism that defines itself as identifying vulnerable websites and disabling their ability to effectively market through ecommerce? How could this happen? Simply.
Online corporate reputation may be the most vulnerable point of impact that companies face today. While almost all businesses connected to the Internet are vigilant about anti-virus software updates, analytics and impressions, few consider what can be done to damage a corporate reputation by ensuring that routine online search results return negative, slanderous and in some cases even libelous results.
It is estimated by industry insiders that by the end of 2010, criminals will routinely use the Internet to actually extort payments from companies. Nonpayment could result in a type of cyber-terrorism that few have considered. Alright, alright, you say. This is a far-fetched idea, a kind of doomsday scenario. The question for consideration is this: If you knew it was coming, what–if anything–would you do about it?
There is one simple answer. Get a firm grip on your company’s online reputation. Persistent monitoring and intervention is the only current solution that I am aware of. The best way to counteract negative postings is to do it with positive information that has greater credibility. Consistently scanning and evaluating for online reputation attacks is the proactive approach of defense.
Absent Homeland Security, we common people cannot look to SuperPrez for our solution. We must protect and defend ourselves in the real world. There is no bailout or rescue for this type of crisis.
–Steven Wyer, Reputation Advocate
Before you can recover from an online attack you have to be aware that you can be attacked.
Whether you are a doctor, lawyer, celebrity or a working professional, bad information on the Internet can exist without you even knowing it’s there. If Dell, Apple, JetBlue and national figures with deep pockets are touchable, then you are touchable. Bad publicity can destroy a good reputation.
An online attack cannot be prepared for by simply using conventional weapons. It is a new day and you must accept that you are probably not prepared. Recently, as I was explaining the business of Reputation Advocate to a group of business people, a comment was made to the affect of “I’m sure glad I don’t need that type of help”. You guessed it, within a few days my phone rang and it was the person who made the comment; they had found bad information on the Internet and they were in need of assistance. With sites like ripoffreport.com, no one is safe.
ReputationAdvocate.com can assist individuals, professionals such as doctors, dentists and financial service professionals, as well as private and public companies in defending themselves against misinformation and negative publicity on search engines such as Google.
The first line of defense in reputation management is humility.