Marketing Is Dead, and Loyalty Killed It

So, you’ve worked your way up the corporate ladder to become Chief Marketing Officer. Pat yourself on the back – you deserve it! All done? Good. Now, please accept my condolences. Your job is obsolete, and unless you turn yourself into a Chief Loyalty Officer, you’re sure to eventually be replaced by one.

Want proof? Look no further than Apple’s record-smashing earnings release last month. We all know the colossus of Cupertino has amazing products and is constantly working on new ways to dazzle and disrupt, from the Apple Watch to Apple Pay. But the earnings report makes clear that intense loyalty to the iPhone– 87% loyalty, to be precise – is what really drives its success. Instinctively, we all know that, because we can all think of someone who pre-orders every new iteration of the iPhone before the shine has faded from the previous one. That kind of extreme loyalty inspires confidence in others, which in turn drives new sales – 74.5 million new phones last quarter – without Apple having to lift a finger. Indeed, aside from a few television spots and billboards here and there, Apple pretty much ignores marketing and advertising.

Of course, not every company is Apple. Letting the products do all the talking won’t work for everyone. But here is the takeaway that can work for every brand: try de-emphasizing traditional marketing and focusing on loyalty instead.

For most people, the word “marketing” summons up a single-minded focus on selling products – a one-sided endeavor. But one-sided doesn’t work in a world where social media has given consumers a megaphone just as powerful as that of traditional marketers.

Instead, there is loyalty, which requires communicating brand values that people want to be affiliated with. Consumers today have many options, and more than ever they choose particular brands to communicate something personal about their own beliefs and priorities. The best way to establish and reinforce common values is to create content that’s so highly specific it defines not only the brand, but the customer.

Take Chipotle, the good guys of fast food. Their produce is local, the meat is free of hormones and antibiotics, and their cheese comes from pasture-raised cows. But the company’s reputation for being the socially conscious, thinking person’s lunch is about more than just the food. Last year, the company started its “Cultivating Thought” initiative, in which writers such as Toni Morrison and Malcolm Gladwell write short texts that appear on the company’s cups and a dedicated microsite. The idea didn’t come out of the CMO’s office, or from a hotshot agency – it came about because Jonathan Safran Foer had nothing to read in Chipotle one day. This is loyalty talking, not marketing. Chipotle is devoting significant resources to something that won’t make the company any money directly, but that is an act of good faith, perfectly targeted to its customers.

J. Crew is another company that successfully uses content to define itself and its customer. The company’s blog is a master class in cozy chic, effortlessly affluent and gently outdoorsy. (If this blog were a person, its favorite activity would be sitting around an outdoor fire on a crisp fall evening, roasting homemade marshmallows on fragrant cedar sticks.) Recently, the blog featured a story about the history of the fisherman’s sweater, a nature photographer’s photo essay about working all over the world in one of the brand’s puffy vests, a how-to guide on caring for cashmere sweaters, and studio tours with designers. The content is beautiful, creative, and most importantly, it has a distinct personality that has nothing to do with shilling.

Customers keep coming back to J. Crew, Chipotle, and Apple because being a loyal fan of the brand reassures them that they are succeeding in being a certain kind of person. People expect convenience from a transaction, but what they crave is meaning. A marketer’s thundering from the top of a mountain like the voice of God will be quickly spotted for what it is – a disconnected jumble of hollow words bouncing along the canyon walls. Building loyalty is much harder work, and it requires not only valuing customers, but liking them enough to have a conversation every day. Bringing passion and excitement to that conversation requires genuine enthusiasm for your own products and mission. The Chief Loyalty Officer’s job isn’t about asking, “What should this company say?” It’s nothing less than answering the question, “What should this company be?”


Alexander Jutkowitz is a vice chairman and the chief global strategist at Hill+Knowlton Strategies and managing partner for the agency’s content subsidiary, Group SJR.

 

Read More:http://feeds.harvardbusiness.org/~r/harvardbusiness/~3/g6fVeFd38ko/marketing-is-dead-and-loyalty-killed-it

Moscow-Based Security Firm Reveals What May Be The Biggest NSA “Backdoor Exploit” Ever

Since 2001, a group of hackers – dubbed the "Equation Group" by researchers from Moscow-based Kaspersky Lab – have infected computers in at least 42 countries (with Iran, Russia, Pakistan, Afghanistan, India, and Syria most infected) with what Ars Technica calls "superhuman technical feats" indicating "extraordinary skill and unlimited resources."

The exploits – including the ‘prized technique’ of the creation of a secret storage vault that survives military-grade disk wiping and reformatting – cover every hard-drive manufacturer and have many similar characteristics to the infamous NSA-led Stuxnet virus.

According to Kaspersky, the spies made a technological breakthrough by figuring out how to lodge malicious software in the obscure code called firmware that launches every time a computer is turned on.

 

Disk drive firmware is viewed by spies and cybersecurity experts as the second-most valuable real estate on a PC for a hacker, second only to the BIOS code invoked automatically as a computer boots up.

 

"The hardware will be able to infect the computer over and over," lead Kaspersky researcher Costin Raiu said in an interview.

 

 

Kaspersky’s reconstructions of the spying programs show that they could work in disk drives sold by more than a dozen companies, comprising essentially the entire market. They include Western Digital Corp, Seagate Technology Plc, Toshiba Corp, IBM, Micron Technology Inc and Samsung Electronics Co Ltd.

The group used a variety of means to spread other spying programs, such as by compromising jihadist websites, infecting USB sticks and CDs, and developing a self-spreading computer worm called Fanny, Kasperky said.

Fanny was like Stuxnet in that it exploited two of the same undisclosed software flaws, known as "zero days," which strongly suggested collaboration by the authors, Raiu said. He added that it was "quite possible" that the Equation group used Fanny to scout out targets for Stuxnet in Iran and spread the virus.

Which, as Reuters reports, strongly suggests the "extraordinary skills and unlimited resources" were funded by the NSA…

The U.S. National Security Agency has figured out how to hide spying software deep within hard drives made by Western Digital, Seagate, Toshiba and other top manufacturers, giving the agency the means to eavesdrop on the majority of the world’s computers, according to cyber researchers and former operatives.

 

That long-sought and closely guarded ability was part of a cluster of spying programs discovered by Kaspersky Lab, the Moscow-based security software maker that has exposed a series of Western cyberespionage operations.

 

Kaspersky said it found personal computers in 30 countries infected with one or more of the spying programs, with the most infections seen in Iran, followed by Russia, Pakistan, Afghanistan, China, Mali, Syria, Yemen and Algeria. The targets included government and military institutions, telecommunication companies, banks, energy companies, nuclear researchers, media, and Islamic activists, Kaspersky said.

 

The firm declined to publicly name the country behind the spying campaign, but said it was closely linked to Stuxnet, the NSA-led cyberweapon that was used to attack Iran’s uranium enrichment facility. The NSA is the agency responsible for gathering electronic intelligence on behalf of the United States.

 

A former NSA employee told Reuters that Kaspersky’s analysis was correct, and that people still in the intelligence agency valued these spying programs as highly as Stuxnet. Another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives, but said he did not know which spy efforts relied on it.

The global coverage is clearly focused in a particular region (and not in the US)…

As Kasperskey exposes, victims generally fall into the following categories:
•     Governments and diplomatic institutions
•     Telecommunication
•     Aerospace
•     Energy
•     Nuclear research
•     Oil and gas
•     Military
•     Nanotechnology
•     Islamic activists and scholars
•     Mass media
•     Transportation
•     Financial institutions
•     Companies developing cryptographic technologies

As an interesting note, some of the “patients zero” of Stuxnet seem to have been infected by the EQUATION group. It is quite possible that the EQUATION group malware was used to deliver the STUXNET payload.

So far, Kaspersky have identi?ed several malware platforms used exclusively by the Equation group. They are:

EQUATIONDRUG  – A very complex attack platform used by the group on its victims. It supports a module plugin system, which can be dynamically uploaded and unloaded by the attackers.

DOUBLEFANTASY  – A validator-style Trojan, designed to con?rm the target is the intended one. If the target is con?rmed, they get upgraded to a more sophisticated platform such as EQUATIONDRUG or GRAYFISH.

 

EQUESTRE  – Same as EQUATIONDRUG.

 

TRIPLEFANTASY – Full-featured backdoor sometimes used in tandem with GRAYFISH. Looks like an upgrade of DOUBLEFANTASY, and is possibly a more recent validator-style plugin.

 

GRAYFISH  – The most sophisticated attack platform from the EQUATION group. It resides completely in the registry, relying on a bootkit to gain execution at OS startup.

FANNY  – A computer worm created in 2008 and used to gather information about targets in the Middle East and Asia. Some victims appear to have been upgraded ?rst to DoubleFantasy, and then to the EQUATIONDRUG system. Fanny used exploits for two zero-day vulnerabilities which were later discovered with Stuxnet.

EQUATIONLASER  – An early implant from the EQUATION group, used around 2001-2004. Compatible with Windows 95/98, and created sometime between DOUBLEFANTASY and EQUATIONDRUG.

Although the implementation of their malware systems is incredibly complex, surpassing even Regin in sophistication, there is one aspect of the EQUATION group’s attack technologies that exceeds anything Kaspersky has ever seen before.

This is the ability to infect the hard drive ?rmware.

The plugin version 4 is more complex and can reprogram 12 drive “categories”


 

*  *  *

So to summarize:

1) US sanctions Russia

 

2) a Russian-based research group (Kaspersky Lab is an international group operating in almost 200 countries and territories worldwide. The company is headquartered in Moscow, Russia, with its holding company registered in the United Kingdom. Kaspersky Lab currently employs over 2,850 qualified specialists) reveals that through Equation group’s code, there is NSA presence across the supply chain of the highest margin US products .

 

3) As Reuters notes, the exposure of these new spying tools could lead to greater backlash against Western technology, particularly in countries such as China, which is already drafting regulations that would require most bank technology suppliers to proffer copies of their software code for inspection.

 

4) And Peter Swire, one of five members of U.S. President Barack Obama’s Review Group on Intelligence and Communications Technology, said the Kaspersky report showed that it is essential for the country to consider the possible impact on trade and diplomatic relations before deciding to use its knowledge of software flaws for intelligence gathering. "There can be serious negative effects on other U.S. interests," Swire said.

It appears the ‘boomerang’ is boomerang-ing…

*  *  *

Full Kaspersky Labs report below:

Equation Group Questions and Answers

Read More:http://www.zerohedge.com

Reactive, Assumptive and Behavioral Modeling: Marketing’s Quest for Humanized Content

February 16, 2015
Are you marketing like a robot? Marketing has come a long way. While automation was once considered the “bleeding edge” of marketing technologies, the industry has caught up and most SaaS companies provide at least some level of automation.
reactive, assumptive, behavioral, marketing


Read More:http://www.socialmediatoday.com/marketing/2015-02-16/reactive-assumptive-and-behavioral-modeling-marketings-quest-humanized-content

U.S. Smartphone Penetration Reaches 75 Percent

U.S. Smartphone Penetration Reaches 75 Percent

February 15, 2015
Imagine that a marketer could reach more than 70 percent of Americans without utilizing traditional mass-media, such as TV or radio. Well, that’s the allure of mobile marketing via smartphone apps.
smartphone penetration


Read More:http://www.socialmediatoday.com/technology-data/2015-02-15/us-smartphone-penetration-reaches-75-percent

Curating Content Tips, Tools and Traffic

February 15, 2015
While achieving an optimal balance between original and curated content is always a discussion, the debate boils down to: it’s both finding great content while also producing great content.
Content Curation

Read More:http://www.socialmediatoday.com/marketing/2015-02-15/curating-content-tips-tools-and-traffic

8 Ways To Tune Up Your SEO

February 14, 2015
Have you ever had a car that needed a tune up? It ran okay, but it wasn’t the greatest at going uphill or passing other vehicles on the highway. It needed that tune up — the little tweaks and adjustments that make the engine run efficiently. Your site has a power source that acts like the engine in a car — the SEO factors can be okay but not be as powerful as possible, just like the car that needs a tune up

Read More:http://www.socialmediatoday.com

When Millennials Take Over: Preparing for the Ridiculously Optimistic Future of Business

As the Millennials ascend into management positions over the next several years, they will simultaneously become the largest generation in the workforce. While the Millennials won’t formally “take over” (no single generation ever runs things on its own), they will serve as a kind of “secret decoder ring” for all of us, helping clarify what the future of business will look like, post revolution. Change is coming, and smart organizations will start making the necessary adjustments today to stay ahead.

Read More:http://www.socialmediatoday.com

The New Authenticity and Authority: What it Looks Like, How to Use It

Jon Stewart’s retirement from The Daily Show this week, accompanied by many tears and some cheers, is getting a lot of coverage around the web. First, because the show is insanely popular. But more than that, because the show demonstrates a real shift in what authority and authenticity look like in the 21st century. In

Read More…

The post The New Authenticity and Authority: What it Looks Like, How to Use It appeared first on Copyblogger.

Read More:http://www.copyblogger.com/?p=45586

How To Improve Your LinkedIn Productivity With Third-Party Apps

Do you use LinkedIn to connect with new prospects? Are you looking for better ways to network with LinkedIn? The right third party applications can save time and automate your LinkedIn experience. In this article you’ll discover applications that will help increase your LinkedIn communication and productivity. #1: Evernote Using Evernote is like having your […]

This post How To Improve Your LinkedIn Productivity With Third-Party Apps first appeared on Social Media Examiner.
Social Media Examiner – Your Guide to the Social Media Jungle

Read More:http://www.socialmediaexaminer.com/?p=78300

Social Impact: How a Nonprofit Became a Content Phenom

charity: water intends to reinvent the nonprofit from the way it engages the public to the way it distributes and tracks every dollar raised. Learn how this nonprofit became a fundraising and content-publishing phenom without a traditional marketing budget. Continue reading →

The post Social Impact: How a Nonprofit Became a Content Phenom appeared first on Content Marketing Institute.

Read More:http://contentmarketinginstitute.com/?p=46033