{"id":3853,"date":"2024-01-29T17:09:15","date_gmt":"2024-01-29T17:09:15","guid":{"rendered":"https:\/\/www.allisonworldwide.com\/?p=3853"},"modified":"2024-01-29T17:09:16","modified_gmt":"2024-01-29T17:09:16","slug":"cybersecurity-comms","status":"publish","type":"post","link":"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/","title":{"rendered":"Four Lessons in Getting Cybersecurity Comms Right\u00a0"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"576\" src=\"https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2024\/01\/GettyImages-1430232403-1024x576.jpg\" alt=\"\" class=\"wp-image-3854\" srcset=\"https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2024\/01\/GettyImages-1430232403-1024x576.jpg 1024w, https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2024\/01\/GettyImages-1430232403-300x169.jpg 300w, https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2024\/01\/GettyImages-1430232403-768x432.jpg 768w, https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2024\/01\/GettyImages-1430232403-1536x864.jpg 1536w, https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2024\/01\/GettyImages-1430232403-2048x1152.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>By Daniel Couzens<\/p>\n\n\n\n<p>A long history of helping cybersecurity brands learn how to communicate has helped the Allison team accumulate some nuggets of knowledge about what works and what doesn\u2019t. It continues to be a great ride, and the bumps and bruises along the way only teach us more!&nbsp;<\/p>\n\n\n\n<p>We\u2019ve put together four pieces of communications wisdom for any cybersecurity vendor seeking media airtime and attention.&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Ambulance Chase with Care<\/strong>&nbsp;<\/p>\n\n\n\n<p>Having started in cybersecurity PR when anti-virus came in boxes, I encouraged my clients at the time to comment on cybersecurity incidents because few other brands did it. Computer viruses were novel, and journalists craved quick-fire commentary. When hackers were more like graffiti artists rather than today\u2019s cyber extortionists, there was nothing amiss with winning column inches on the back of someone else\u2019s misery.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Today, the rules are different. If you\u2019re a major cybersecurity brand, commenting on a live cyber-attack &#8211; it must be done much more carefully. Journalists are all too aware of how exploitative some pitches can be. To avoid being charged with ambulance chasing, brands must offer real intelligence on a situation &#8211; what it is, why it happened, why it\u2019s important &#8211; instead of copy-and-paste lectures.\u00a0 The question experts increasingly need to answer is who the cybercriminal is. In some cases, it may be better to wait until the dust has settled to do a more sober dissection of what happened and what lessons can be learned.\u00a0<\/p>\n\n\n\n<p><strong>Don\u2019t Speak in Tongues<\/strong>&nbsp;<\/p>\n\n\n\n<p>The people with the most knowledge are often the threat experts and not the C-suite. However, they often need help filtering their technology speak and must be taught to communicate their advice in human speak. The cybersecurity industry tends to use even <a href=\"https:\/\/www.ukcybersecuritycouncil.org.uk\/glossary\/\" target=\"_blank\" rel=\"noreferrer noopener\">more jargon and opaque phraseology<\/a> than other areas of enterprise tech, mainly because cybersecurity professionals love to use military-type jargon.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Somebody who can easily dial up and dial down on the details of how a cyberattack functions and can share insights into the motivations of a cyber actor is golden. Cyber comms specialists can help spokespeople make the details of an attack easier to understand and therefore help a journalist share that information with their audience.&nbsp;<\/p>\n\n\n\n<p><strong>Jettison the Hoodie Clich\u00e9<\/strong>&nbsp;<\/p>\n\n\n\n<p>The frequency and intensity of cybersecurity attack and vulnerability stories can quickly become reductive. The result is stale, uncompelling messaging. Brands that can leave behind the clunky cliches of cyber warfare and move beyond the idea of hackers in hoodies in a dark room will soon become the most relevant sources for media.&nbsp;&nbsp;<\/p>\n\n\n\n<p>At Allison, we\u2019ve done research into categorizing recent media coverage about cybersecurity. Most articles on cybercrime are essentially negative. While experts should never stop alerting people to new threats, there is a case for building a more positive agenda and messaging into any current cybersecurity communications program. In other words, don\u2019t make your program simply a counsel of despair and negativity, because it has the potential to showcase cybersecurity can be a positive force in the next wave of technology innovation.\u00a0<img decoding=\"async\" src=\"blob:https:\/\/www.allisonworldwide.com\/bf22432d-bc7a-4ca1-a3f8-32ad086c5293\"><strong>Know the Numbers<\/strong>\u00a0<\/p>\n\n\n\n<p>When it comes to sharing cybersecurity insights, few organisations are willing to talk to the media as case studies due to the fear of disclosing information about how they secure themselves. The alternative must be investing in research to reveal insights about attitudes to cybersecurity &#8211; from the C-suite to security professionals to working professionals.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Despite the large number of market research studies commissioned for PR every year and the difficulty of standing out from the crowd, research remains a key tool for promoting thought leadership. The most valuable studies are those that arrive at counter-intuitive findings (for example, companies without a CISO report fewer cyber-attacks) or that delve into a niche like how corporate systems at risk from staff <a href=\"https:\/\/www.paloaltonetworks.com\/company\/press\/2020\/palo-alto-networks-connected-enterprise-iot-security-report-2020\" target=\"_blank\" rel=\"noreferrer noopener\">connecting their personal devices to business networks<\/a>. The most impactful studies are those that quantify the real-world damage of cyber-attacks in pounds and pence, or dollars and cents. Journalists no longer need studies about the importance of cybersecurity or even incident rates. They want more concrete evidence of what the costs are of an attack and the rewards of proper cybersecurity.&nbsp;<\/p>\n\n\n\n<p>I\u2019d love to know what other maxims should be added to our list. We\u2019d love to hear from you if you\u2019d like to talk about how we can help you in your local market or internationally, <a href=\"https:\/\/www.allisonworldwide.com\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">contact us to schedule a meeting<\/a>.<\/p>\n\n\n\n<p><em>Daniel Couzens is a senior vice president in the London office. He specializes in B2B technology and has many years of experience leading global brand and reputation building for some of the world\u2019s leading technology providers.\u00a0<\/em>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Daniel Couzens A long history of helping cybersecurity brands learn how to communicate has helped the Allison team accumulate [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":3854,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.1 (Yoast SEO v21.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Four Lessons in Getting Cybersecurity Comms Right\u00a0<\/title>\n<meta name=\"description\" content=\"Here are four pieces of communications for cybersecurity vendors seeking media airtime and attention.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Four Lessons in Getting Cybersecurity Comms Right\u00a0\" \/>\n<meta property=\"og:description\" content=\"Here are four pieces of communications for cybersecurity vendors seeking media airtime and attention.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/\" \/>\n<meta property=\"og:site_name\" content=\"Allison Worldwide\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-29T17:09:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-29T17:09:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2024\/01\/GettyImages-1430232403.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2308\" \/>\n\t<meta property=\"og:image:height\" content=\"1298\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Allison\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Allisonww_\" \/>\n<meta name=\"twitter:site\" content=\"@Allisonww_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Allison\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/\"},\"author\":{\"name\":\"Allison\",\"@id\":\"https:\/\/www.allisonworldwide.com\/#\/schema\/person\/1cdf564c17bd0e8eb52ccb2a8b4997f5\"},\"headline\":\"Four Lessons in Getting Cybersecurity Comms Right\u00a0\",\"datePublished\":\"2024-01-29T17:09:15+00:00\",\"dateModified\":\"2024-01-29T17:09:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/\"},\"wordCount\":800,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.allisonworldwide.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/\",\"url\":\"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/\",\"name\":\"Four Lessons in Getting Cybersecurity Comms Right\u00a0\",\"isPartOf\":{\"@id\":\"https:\/\/www.allisonworldwide.com\/#website\"},\"datePublished\":\"2024-01-29T17:09:15+00:00\",\"dateModified\":\"2024-01-29T17:09:16+00:00\",\"description\":\"Here are four pieces of communications for cybersecurity vendors seeking media airtime and attention.\u00a0\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.allisonworldwide.com\/#website\",\"url\":\"https:\/\/www.allisonworldwide.com\/\",\"name\":\"Allison Worldwide\",\"description\":\"We do things differently.\",\"publisher\":{\"@id\":\"https:\/\/www.allisonworldwide.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.allisonworldwide.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.allisonworldwide.com\/#organization\",\"name\":\"Allison Worldwide\",\"url\":\"https:\/\/www.allisonworldwide.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.allisonworldwide.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2023\/07\/allison-footer-logo.svg\",\"contentUrl\":\"https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2023\/07\/allison-footer-logo.svg\",\"width\":1439,\"height\":369,\"caption\":\"Allison Worldwide\"},\"image\":{\"@id\":\"https:\/\/www.allisonworldwide.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/Allisonww_\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.allisonworldwide.com\/#\/schema\/person\/1cdf564c17bd0e8eb52ccb2a8b4997f5\",\"name\":\"Allison\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.allisonworldwide.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8d8fbdcba0a5afb7f7a80e34e1a7c13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8d8fbdcba0a5afb7f7a80e34e1a7c13?s=96&d=mm&r=g\",\"caption\":\"Allison\"},\"url\":\"https:\/\/www.allisonworldwide.com\/author\/allison\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Four Lessons in Getting Cybersecurity Comms Right\u00a0","description":"Here are four pieces of communications for cybersecurity vendors seeking media airtime and attention.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/","og_locale":"en_US","og_type":"article","og_title":"Four Lessons in Getting Cybersecurity Comms Right\u00a0","og_description":"Here are four pieces of communications for cybersecurity vendors seeking media airtime and attention.\u00a0","og_url":"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/","og_site_name":"Allison Worldwide","article_published_time":"2024-01-29T17:09:15+00:00","article_modified_time":"2024-01-29T17:09:16+00:00","og_image":[{"width":2308,"height":1298,"url":"https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2024\/01\/GettyImages-1430232403.jpg","type":"image\/jpeg"}],"author":"Allison","twitter_card":"summary_large_image","twitter_creator":"@Allisonww_","twitter_site":"@Allisonww_","twitter_misc":{"Written by":"Allison","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/#article","isPartOf":{"@id":"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/"},"author":{"name":"Allison","@id":"https:\/\/www.allisonworldwide.com\/#\/schema\/person\/1cdf564c17bd0e8eb52ccb2a8b4997f5"},"headline":"Four Lessons in Getting Cybersecurity Comms Right\u00a0","datePublished":"2024-01-29T17:09:15+00:00","dateModified":"2024-01-29T17:09:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/"},"wordCount":800,"commentCount":0,"publisher":{"@id":"https:\/\/www.allisonworldwide.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/","url":"https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/","name":"Four Lessons in Getting Cybersecurity Comms Right\u00a0","isPartOf":{"@id":"https:\/\/www.allisonworldwide.com\/#website"},"datePublished":"2024-01-29T17:09:15+00:00","dateModified":"2024-01-29T17:09:16+00:00","description":"Here are four pieces of communications for cybersecurity vendors seeking media airtime and attention.\u00a0","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.allisonworldwide.com\/cybersecurity-comms\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.allisonworldwide.com\/#website","url":"https:\/\/www.allisonworldwide.com\/","name":"Allison Worldwide","description":"We do things differently.","publisher":{"@id":"https:\/\/www.allisonworldwide.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.allisonworldwide.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.allisonworldwide.com\/#organization","name":"Allison Worldwide","url":"https:\/\/www.allisonworldwide.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.allisonworldwide.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2023\/07\/allison-footer-logo.svg","contentUrl":"https:\/\/www.allisonworldwide.com\/wp-content\/uploads\/2023\/07\/allison-footer-logo.svg","width":1439,"height":369,"caption":"Allison Worldwide"},"image":{"@id":"https:\/\/www.allisonworldwide.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/Allisonww_"]},{"@type":"Person","@id":"https:\/\/www.allisonworldwide.com\/#\/schema\/person\/1cdf564c17bd0e8eb52ccb2a8b4997f5","name":"Allison","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.allisonworldwide.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a8d8fbdcba0a5afb7f7a80e34e1a7c13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8d8fbdcba0a5afb7f7a80e34e1a7c13?s=96&d=mm&r=g","caption":"Allison"},"url":"https:\/\/www.allisonworldwide.com\/author\/allison\/"}]}},"lang":"en","translations":{"en":3853},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/posts\/3853"}],"collection":[{"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/comments?post=3853"}],"version-history":[{"count":0,"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/posts\/3853\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/media\/3854"}],"wp:attachment":[{"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/media?parent=3853"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/categories?post=3853"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.allisonworldwide.com\/wp-json\/wp\/v2\/tags?post=3853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}