RSS: Your content generating SUPERPOWER!

The Geekspeak Guides, Susan Finch and Yvonne Heimann, are at it again giving you ideas of how to use your own site content, content from other sites and from venues such as Youtube, Pinterest and more to populate your site, your podcasting venues such as iTunes and Stitcher. These ideas will help create that fill in content for your social media posts to give you more time to REALLY engage with people in real conversations. This episode was recently featured on Blubrry as a valuable episode.

RSS (Rich Site Summary or Really Simple Syndication) is your simple pipeline of information. In a nutshell, it’s a properly formatted text file created dynamically by websites such as blogs and other content management systems. They don’t all create them, but most do. There are even tools you can use to create one on your own. THIS is the file you want so you can PUSH your content and reuse it, reshape it and share it better with MANY more venues including iTunes. You may use this superpower whether you are gathering content from your website, Pinterest, podcast or other online sites and services.

This video will give you several ideas and teach you how to find your RSS feed on your own site, and where you can use it.

Did you know that PINTEREST is actually a BLOG with CATEGORIES? That means that your entire Pinterest account and individual boards can all be treated as an RSS feed.

Google offers a great FREE tool to generate a feed post, allow subscribers, manage subscribers and allow you to bring in content from other sites into your own, share your content with others with just a few lines of code and it is all DYNAMIC using RSS.

Having a feed address gives you something very specific to submit to Google on one specific topic.

Podcasts use XML/RSS feeds, as well. It’s a text file with useful fields for these various venues. For a podcast, it knows to look for the associated media file, episode art and excerpt. Depending on the podcasting service you use such as Blubrry, Podbean, Lipsyn, you’ll be given different options before they send your fabulous content off to venues such as iTunes, Stitcher, SoundCloud and more.

This 20 minute show gives you some great ideas to use your content to generate more interest, more credibility, more leads and ultimately more sales. Trust us, we know this works.

3 Data Security Myths – Stop blaming IT

Highlights include: 02:50 Learn about Linda; what it takes to be a part of the International Association of Privacy Professionals and how she became a Certified Information Privacy Manager.05:25 In business is a security breach or possible breach the concern of the IT department only?
What other departments play a role in keeping personal information secure?
 

06:58 Why your sales department needs to understand privacy, security and what is considered confidential information.

08:00 Security Data Myth – Is hacking the number 1 way data is breached?

What is the number one way that security is breached at a company?
What percentage of company security breaches are actually caused by hackers?

09:02 Who caused the security breach at Morgan Stanley?

Can employees accidentally give out customer confidential information?

13:23 What is the number one type of information hackers are after?

Why do hackers want medical records?
Can an independent contractor be held liable for leaked private information?

19:42 What is social engineering and how does it play a role in information breaches?

Hear how hackers can ask “everyday” questions and use that info against you.

26:25 Where does the information leak start 40% of the time and what is the solution?

27:25 Examples of how information can be stolen by employees right in front of your face.

You can read it below, too. WOW! It can happen so easily through a “friendly” conversation. People want to reach out and connect to others. It’s human nature. That’s what the weasels prey on.

A gift from Linda to help you get started:

 
 
Linda Zimmer is a certified privacy manager by the International Association of Privacy Professionals. She is also the President of MarCom|Interactive – specialize in digital marketing
 
The biggest myth:
It’s all about technology and we have to be paranoid and pour a ton of resources into our it security.
 
Data breaches come from a lot of different areas within the business.
It’s a brand issue, a reputation issue and a financial issue.
 
The IAPP makes several certifications available. Linda encourages ANYONE wanting to embellish your career.
 
The certification she currently has is CIPM: Certified information privacy manager.
It is the foundation in data security concepts.
How do we operationalize security and privacy within our organizations?
This will help you develop the processes across the organization
It will create a culture of security and privacy throughout the organization.
 
It’s a big hit in the decision of how they shop and where they shop.
It isn’t just a marketing thing.
If marketing and sales don’t have at least a degree of this knowledge, it’s difficult to weave into your online plans, marketing strategies.
 
It gives you bird’s eye view of the organization.
 
Probably using CRM or SalesForce – very silo-ed, this is the information they own. BUT they may use it to transact and record financial transactions which means that credit card info resides within SalesForce or the CRM so there is overlap with finance and sales. 
 
Sales has the most access to the most important asset a company has: their customer database. It is all connected. Where does our data sit, where is it stored and what happens to it when it’s on the move.
 

Myth 1:

Hacking is the number one way data is breached.
 

Truth:

40% of all data breaches come from employee mistakes, stolen laptops, negligence with sign-ons, flash drives, external storage.
25% comes from hackers.

Myth 2

Data security is the job of IT
Be careful when you purchase data, Check the reputation, ask the security questions. 
 
Be careful when you do a friend a favor by sharing data. It may be with good intentions, but that data you share, may get commingled with other data and then possibly, that gets sold or hacked. Did you have the permission to SHARE that information with any other company? Do not betray your customers and lists.
 
Be aware of HIPA compliance. This is the number one thing hackers want: Medical Records for medical identity theft. If you work with a company who has to follow this compliance, you need to as well. They should require it of you, as well.
 
Consultants and marketing firms:
We can be held LIABLE for who we hire to handle data.
 
Takeaway:
Need to review the contracts you have with your vendors and be sure that your contact obligates them to follow all of the data and privacy laws. That will go a long with the regulators. The FTC is broadening their scope. There are about two dozen guidelines we have to all be compliant with.
 
Social engineering is the way our data is compromised most frequently.
Someone using known, easily available information to defeat your security systems and protocols.
 
Security analysts love to go into a company and say, “I can hack into your company.”
A security expert, Chris Hadnagy, comes in to pitch a CEO of a large firm. CEO is complacent and brags about how tough their IT dept. is on security, it’s all locked down, etc. Presenting guy accepts this with a wry smile. He leaves and proceeds to look up public information about the CEO. He finds out his favorite team, learns he’s a cancer survivor who promotes a specific charity and goes into action…
 
He calls the CEO pretending to be from that charity. He asks for a donation and says that for this campaign only, if he makes a donation they are giving donors pair of tickets to – get this – a game played by his favorite sports team! WOW ! How fortuitous… It gets better.
 
Then, the fake caller (sales guy demonstrating how easy it is to hack into their company) says he wants to send this CEO a flyer with the info. He want to make sure the CEO can view it in his version of Acrobat Reader and asks him which version. The CEO gives the information gladly and the fake charity guy emails him a PDF. The PDF when opened, launched malware that grabs all access to all network computers the CEO can access and all of his passwords since the fake charity guy knew which version of Acrobat – it told him which operating system, too.  He knew where to hunt for the digital keys to the company. 
 
This sales guy was making a point, but you can see how easy it is to get information through a seemingly innocent conversation. BE CAREFUL what you tell to strangers. A stranger is someone that you would not invite to your house for a BBQ. They are not an acquaintance. You don’t know them, their face, or if they are whom they say they are!
 
These are the NEFARIOUS folks. Don’t let them in. 
 

About Linda Zimmer:  LinkedIn Google+ | Twitter

 

Why convert your audio podcast to video and visa versa?

So you made a video show or tip or guide, but you want to turn it into a podcast. You can do that as a video – depending on your hosting account set up for your podcast station, or you can convert it to audio.
Which is a reminder, that not everyone sits watching you like they would The Voice. They may just want to listen. Don’t rely on screen shares and visuals if you want your content to be more versatile.

But what if you were a guest on a radio show and want to turn that content into video for YouTube? There are simple steps, including making sure you have permission from the original source to re-purpose the content. We will cover steps and ideas of how to best turn your content around to give you more options to get it out there.

You can capture new audiences by reposting your podcasts to other venues such as your website, promote in your newsletter with a screenshot linked to the post or video, uploading to push to iTunes, Stitcher and more. You may even want to upload an audio version and a lower res video version since most watching from those venues are on handheld devices.

Podcasts from your Video or Audio Event

You had a video event or was in an audio interview – NOW WHAT? Is that all there is? Heck NO! Time to make that great event pay off for you.

Did you know YouTube is NOT a podcast? Just because you have something there, doesn’t mean it gets to iTunes, Stitcher and the rest of them. You need to bring them the files through a podcast venue such as Lipsyn, Podbean, Blubrry.

We’ll show you how we are doing this for a few folks and give you some other ideas of what to do with that great content. What about those interviews where you don’t have the original file – how can you use it in your podcast channel?

We will have a part 2 of how to go from video to audio and audio to video for podcasting or creating more content for YouTube.

Venues we covered in this show and getting your audio or video content to:

  • iTunes
  • Stitcher
  • Windows Phone 7/8 (formerly Zoon)
  • Miro – it’s the iTunes of Windows, so we hear.
  • Tunein Radio – radio/podcast station on your phone
  • DoubleTwist
  • Pocketcast
  • Roku – you heard us ROKU. Your content could be set up on a Roku channel – but it’s not simple. It usually requires the help of experts in this specific category. It has its own programming language.
  • IMBD – it’s not just for movies. It’s for YOUR content. Again, you may want to hire someone to help you with this.
  • Pandora – if you are posting MUSIC or COMEDY.

BABY steps. Start with iTunes and Stitcher. But how do you get it to them in a proper format? That’s where selecting the podcast venue that is best for you comes in. Only you can decide based on your needs, skills and budget. We suggest the following to consider: Podbean.com, Lipsyn.com, Blubrry for WordPress plugin, Soundcloud.

bigdaddyradio-podcast-logo-bgYou’ll need graphics of specific sizes, a channel/show description – it’s ANOTHER profile that uses your RSS feed from your podcast venue/blog. This includes the main podcast graphic – each venue requires a different specification, icons, episode graphics for each episode to display in the players and more.

Don’t go too fast, either – slow down. Think this through. If you create your iTunes channel and then change where your site is hosted, such as switching from Podbean to Lipsyn, etc. you’ll lose ALL that work unless you change the feed location. The way that Yvonne and I like to change the feed location is by FIRST creating a Feedburner feed address through http://feedburner.google.com. This will be the constant. You can edit the FEED DETAILS in Feedburner later if you need to. You won’t lose your iTunes channel then. BUT you will have to do one of two things:

1. keep the old podcast site around and let it just hang out so the old links work

2. recreate all of the old posts from the old podcast site on the new one, possibly backdate the posts

Episode27-sales-lead-management (tall)If you choose option 2, you’ll also want to create 301 redirects in case you have folks that have linked to that site. If they have embedded the OLD location players, they will cease to work. Something to consider. Choose your podcast blog venue CAREFULLY. What I’ve learned by dealing with Podbean. I like their simplicity. What I do NOT like is that they make changes to the admin and programming that effect the players, the layout, the link structure and more without warning. I find out and then post to their support frantic and then they reply and usually resolve my issue, but I’m caught off guard. In one instance, I had to go back through all posts and redo the players to go with their new code because old code stopped working.

  • Items to look for in your podcast solution:
  • Template options that give you the features you need.
  • The ability to give your guests player code for specific shows to allow further promotion and reach.
  • The ability to have a player of all shows/play list of your shows to use on other venues. 
  • The ability to subscribe to new post notifications.

nugget_jascha2Remember to have your guests help promote the show before, but more importantly, AFTER airing when you have your replay post ready to go. I suggest you give them a tidy “thank you” email package:

  1. thank you note highlighting a moment.
  2. graphic that you have as the featured image for that post/show
  3. embed code so they can post
  4. link to your post on your podcast site
  5. consider creating graphics with quotes from the show they were on – “nuggets.” so they can share in their posts in various social media venues.

This is enough to get your feet wet. We’ll be covering related topics in the upcoming episodes of Geekspeak Guides. See more episodes at geekspeakguides.com , look for us on Google+ in our community and on my Youtube playlist.

The Power of Podcasting

The WHY, HOW, WHEN and WHAT For’s of podcasting! Being able to podcast is turning into one of the best ways to re-purpose your content, so tune in if you want to learn more from the experts!


Meet Our Panel This Week!!!
+Susan Finch – +Susan Finch Solutions  Marketing, PR & Web Pro for DECADES! 
With a background in public relations and advertising since 1986, Susan is a “gentle guide for clients trying new venues online.” She engages those skills as she helps create an online presence that will appeal to existing and future clients and/or investors. All these factors are considered before she constructs a suggested plan for clients. It goes way beyond an online presence.

+Shannon Hernandez – is an on-air radio personality, podcaster, and social media/online resource. He assists small business owners optimize their marketing efforts through cloud productivity suites and increase their visibility on social media. He is also an authority on podcast generation and audio imaging production.