By Jonathan & Erik Bernstein on June 9, 2014
Crisis plans should include the possibility of even the highest-ranking employees causing reputation damage Unfortunately, after every tragedy there are some who are going to make wildly inappropriate comments or even joke, and if one of those people is your organization’s co-founder, you have a major reputation management issue on your hands. That’s precisely the […]
By Jonathan & Erik Bernstein on January 28, 2014
Never rely on your first option working out perfectly So, you’ve put together a killer crisis management plan, heck you’ve even actually practiced it! Good to go, right? Not so fast. As a wise man once said, sh*t happens, and you’d better believe it can, and will, happen when you’re already fighting to keep your […]
By erik on January 16, 2014
Does your crisis management planning include cyber crime? Every year brings new threats to the forefront, and according to experts 2014 is going to see an explosion in the number, and severity of, cyber attacks. If your crisis management plans don’t already include the possibility of data theft, systems being held ransom, or even completely […]
By Jonathan & Erik Bernstein on October 1, 2013
Rockstar’s reputation may hang in the balance With Grand Theft Auto V claiming the record for not only the fastest-selling video game, but also fastest-selling entertainment product of all time, creator Rockstar North is in crisis management mode as it prepares its servers to handle millions more players than expected at the launch of its […]
By Jonathan & Erik Bernstein on August 5, 2013
Do your crisis management plans include being blackballed by the competition? So-called “black hat” tactics, often effective but unethical, or even illegal, ways of achieving goals, do exist in the world of PR and marketing. While, for the most part, reputable organizations have a policy of not putting shady tactics to work, employees looking to […]
By Jonathan & Erik Bernstein on January 26, 2013
Vulnerability audits key to finding the right direction with crisis management planning So, you’ve seen one nasty case study too many and you’re finally ready to get proactive with your crisis management. You’ve got pen and paper (well, probably more like laptop or tablet) in hand and are ready to crank out that awesome, airtight […]
By Jonathan & Erik Bernstein on August 6, 2012
Technology outpaces security Let’s assume (against the odds) that you’ve been thorough about online password security. You don’t use common garbage passwords like 1234, qwerty, or your birthday, you make sure not to share the same passes between accounts, and your security questions have answers that aren’t in the public domain. That means that your […]