Blog

Think Cirrus/GDPR Blog/EU Flag
Blog

GDPR: Think Cirrus Perspective

GDPR DEADLINE IS COMING The GDPR deadline is nearly here and it seems to be the responsibility of Marketing and IT agencies to educate the masses about GDPR and what they need to do in order to prepare for compliance when the law changes.   This post explores what we’ll be doing at Think Cirrus HQ to help bring our clients significantly closer to being fully compliant before the regulation is introduced on the 25th May.   As you’ve probably heard the new legislation introduces tougher fines for non-compliance and rumour has it that SMEs will be specifically targeted by these spot-checks because they often ignore this type of legislation.   Any business that has customers is affected so there is still time left we’re encouraging all business owners to  get their head around the regulations now, before it’s too late! You may be aware that data security plays a prominent role in the new GDPR regulation. In comparison to the current Data Protection Act the new regulations follow a stricter set of rules for businesses in relation to security however the requirements from an IT perspective are fairly simple.   To give our clients a little peace of mind our technician’s will be focussing on the following five key areas to ensure customers are on the right track to compliance. Those areas being: 1. Firewalls 2. Secure Configuration 3. User Access Control 4. Malware Protection 5. Patch Management Most businesses should have all of these key elements put in place as part of general good business practice.   For our technician’s, it’s a case of reviewing what measures are in place for our customer base, documenting them and reviewing regularly to ensure everything’s working correctly and running efficiently.   If you’re concerned about your compliance plans or want to learn more about the measures your organisation should be putting in place before the regulation is enforced then please get in touch 

Think Cirrus_Connectivity_Unified Communications
Blog

Top Tips for Adopting Unified Communications

Far from being just a marketing and technology buzzword, unified communications (UC) refers to the integration of devices, applications and communication methods to develop collaborative and productive methods of communication. This could include a combination of real-time communication services such as instant messaging, voice over IP (VOIP), video conferencing and interactive whiteboards or non-real-time methods such as email, text messages or voicemail. Ultimately, unified communications will bring together various communication methods to create consistency across devices and platforms to streamline business processes. If you’re looking to boost efficiency and productivity through unified communications, discover some top tips that can help you make the transition: Start with Discovery Businesses today are fragmented, with multiple offices and remote workers which makes it harder for people to communicate, and often results in multiple tools and point solutions. The first step in a successful Unified Communications implementation is a thorough Discovery phase to understand who your users are, their business requirements and their communication habits. What tools do they have in place to deliver conferencing, video, messaging and voice? When are the contracts up for renewal? The best technology in the world will fail if it doesn’t enable your users to work when, where and how they want – so take this in to consideration from the start. Build a business case Unified communications can offer great benefits to businesses, such as cost reductions, enhanced business continuity and greater security. However, it could prove a costly and time-consuming project if you’re not properly prepared for the transition. Inefficient adoption could increase potential security risks too. Start by developing a business case for unified communications and consider what benefits you could realistically reap. It’s essential to get clear on your business drivers for the project. What are your Unified Communications priorities? When you know the drivers behind the project, you’ll have an easier time building your business case to gain management support – as well as explaining the project and the benefits to the users to improve adoption. Don’t look at technologies until you define your business drivers first! Get support from the top Unified Communications is all about changing the way people work, so you’re going to need senior management support for a successful Unified Communications roll-out. When presenting the project, emphasise the increase in business responsiveness and employee productivity, cost reductions in travel, infrastructure and call charges to show the return-on investment. Is your network up to the task? Integrated voice, messaging and conferencing may be more network intensive than your old systems. Before you select any technology, you need to understand if your network will be able to handle the increased activity. Voice communication is business-critical, it has to have high-availability and resilience to enable the business to work. Plan and prepare in advance, spend time finding experts to conduct a network assessment to ensure you’ll be able to use the new system to its fullest once in-house. Review your existing processes and systems Assess your existing infrastructure to highlight the current communications processes within your business. How these could be improved, what additional methods could aid the business and what do you hope to achieve with unified communications? By having a clear overview of your existing systems, you can identify barriers, determine your specific needs and tailor your approach. Create a delivery plan Since Unified Communications integrates voice, messaging and conferencing, it tends to be a complex project to deliver within the business. It’s critical that you make a roadmap at the beginning, so that you can roll out the new technologies in phases and feel confident that you haven’t forgotten key components. Create a migration plan Developing a structured plan for adoption will enable you to monitor and manage changes. Converging your communication technologies could become a tangled web if you fail to clarify what’s being integrated and any methods that are being introduced. A migration plan will then help you to develop a phased approach to unification before you get started. Transform your network The final step is to implement and rollout the activities that will transform your network and your business. As you manage change, it’s important to consider that you’re changing both business processes and technological processes. Phasing your rollout will help you to mitigate risk, error and substantial disruption. Avoid confusion by ensuring staff are aware of, and prepared for, the changes that will take place and the expected rollout time period. Could digital technology help you to boost productivity and profits? Unified Communications ensures complete connectivity for your business, enabling users to communicate and collaborate no matter where they’re located or what device they’re using. However, the idea of replacing and upgrading business-critical systems of voice, messaging and conferencing can seem daunting. Will Unified Communications work for your organisation? Will you actually save money? And will your users actually use the new systems? Know who will manage Unified Communications Once you’ve completed your Unified Communications implementation, you need to know what happens next. Who will manage the system? Don’t assume you have to hire experts in-house. A Unified Communications Managed Service provides experts on-demand, guaranteed up-time and SLAs and monitoring of your business-critical systems. It lets you focus on your areas of expertise, while ensuring that your Unified Communications system is in experienced and safe hands.10. Consider a single supplier.   Consider a single supplier A Unified Communications solution can be complex with lots of moving parts and when something goes wrong, who are you going to call? Consider working with a single supplier, who understands the end-to-end solution, and provides a single point of contact for all questions and issues. A single supplier also makes the implementation process easier, allowing them to focus on delivering a complete solution from system design and network architecture to call tariffs and hardware, rather than you project-managing multiple vendors.

Think Cirrus/Working Remotely/working from home/man sat on chair
Blog

3 Top Tech Tips to work remotely & stay productive

You run a small business which relies on a team that work remotely for you. Whether they work from home or from the local coffee shop; your team need to be able to access and utilise the same resources as if they were in the office. That way their day to day processes aren’t disturbed. And they are even more productive, potentially. We explore some top tips to ensuring your team work like a dream. Have a look at these points and tell us if we’ve missed any out. The right people You need the sort of people who hate micro management and love full autonomy. They don’t need hand holding and they don’t need constant reassurance. They just need to get on with the job in hand. Voice and e-mail interaction is sufficient. They would have already sorted out a home broadband access and with a good laptop, cloud-based storage system – they are good to go. They work remotely like a dream. Most job functions can be done from home with the right systems in place; and with VOIP telephony systems even the receptionist could be at home! A receptionist who works remotely? Who would have thought.   THE RIGHT TECHNOLOGY When we talk about technology we really mean software. After purchasing and setting up a laptop, you need to think about the support software that your team will use every day, such as Microsoft Office, Skype for Business, CRM system such as Infusionsoft or Zoho, accounting software, email marketing software and so much more.  There will also be software that the team don’t see or use but you’ll know it’s working – such as anti-virus, capacity monitoring and system back up software. Here at Think Cirrus when our team work remotely,  we know that it’s just like being in the office because we can use instant messaging, and VOIP telephones. The office number promoted on our website follows us where ever we go and is even diverted to our mobiles when we’re on the road. We never miss a call, because we are emailed the details and we don’t know what we’d do without it. And what is even better is that all the calls made from home are for free because it’s over the internet, using the laptop and a headset and there isn’t any clunky and outdated VPN access because everything is on the cloud. We promote it and are advocates of it because that is our we operate within this business. Essentially, we practice what we preach.   It’s all about the data There should be no obstacles to prevent the home worker from accessing internal IT systems.  This means that if you have everything set up properly, there shouldn’t be any issues, sharing documents or editing and sharing files. When working remotely, there tends to be a bad habit that forms when it comes to saving documents. The mindset turns into storing data locally on their desktop or laptop. This data needs to be protected from data loss, system outages, theft, fire etc. To keep your corporate data safe, you should think about behavioural policies. Such as making sure business-critical data is only stored on central systems or that “remote” data is protected by an automated online backup solution that regularly backs up user data and requires no end user knowledge or intervention. In the case of data loss, individual files or e-mails can be recovered quickly. If a desktop / laptop needs to be rebuilt all data can be recovered from the online storage solution. By implementing an industry-leading archiving solution inactive yet important files and emails that have previously been archived can be accessed remotely and even be made available by offline access, which is synchronised with the central archive when the home worker is (back) online. This ensures that home worker has access to live and archive data when working remotely.

Who are you going to call?
Blog

Think Cirrus Privacy Policy

think cirrus Privacy Policy This privacy policy has been compiled to better serve those who are concerned with how their ‘Personally Identifiable Information’ (PII) is being used online. PII, as described in US privacy law and information security, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Please read our privacy policy carefully to get a clear understanding of how we collect, use, protect or otherwise handle your Personally Identifiable Information in accordance with our website.   What personal information do we collect from the people that visit our blog, website or app? When ordering or registering on our site, as appropriate, you may be asked to enter your name, email address or other details to help you with your experience. When do we collect information? We collect information from you when you fill out a form or enter information on our site.   How do we use your information? We may use the information we collect from you when you register, make a purchase, sign up for our newsletter, respond to a survey or marketing communication, surf the website, or use certain other site features in the following ways:       • To follow up with them after correspondence (live chat, email or phone inquiries)   How do we protect your information? Our website is scanned on a regular basis for security holes and known vulnerabilities in order to make your visit to our site as safe as possible. We use regular Malware Scanning. Your personal information is contained behind secured networks and is only accessible by a limited number of persons who have special access rights to such systems, and are required to keep the information confidential. In addition, all sensitive/credit information you supply is encrypted via Secure Socket Layer (SSL) technology. We implement a variety of security measures when a user enters, submits, or accesses their information to maintain the safety of your personal information. All transactions are processed through a gateway provider and are not stored or processed on our servers.   Do we use ‘cookies’? Yes. Cookies are small files that a site or its service provider transfers to your computer’s hard drive through your Web browser (if you allow) that enables the site’s or service provider’s systems to recognize your browser and capture and remember certain information. For instance, we use cookies to help us remember and process the items in your shopping cart. They are also used to help us understand your preferences based on previous or current site activity, which enables us to provide you with improved services. We also use cookies to help us compile aggregate data about site traffic and site interaction so that we can offer better site experiences and tools in the future. We use cookies to:       • Understand and save user’s preferences for future visits.       • Compile aggregate data about site traffic and site interactions in order to offer better site experiences and tools in the future. We may also use trusted third-party services that track this information on our behalf. You can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies. You do this through your browser settings. Since browser is a little different, look at your browser’s Help Menu to learn the correct way to modify your cookies. If you turn cookies off, Some of the features that make your site experience more efficient may not function properly.It won’t affect the user’s experience that make your site experience more efficient and may not function properly.   Third-party disclosure We do not sell, trade, or otherwise transfer to outside parties your Personally Identifiable Information.   Third-party links We do not include or offer third-party products or services on our website.   Google Google’s advertising requirements can be summed up by Google’s Advertising Principles. They are put in place to provide a positive experience for users. https://support.google.com/adwordspolicy/answer/1316548?hl=en We have not enabled Google AdSense on our site but we may do so in the future.   California Online Privacy Protection Act CalOPPA is the first state law in the nation to require commercial websites and online services to post a privacy policy. The law’s reach stretches well beyond California to require any person or company in the United States (and conceivably the world) that operates websites collecting Personally Identifiable Information from California consumers to post a conspicuous privacy policy on its website stating exactly the information being collected and those individuals or companies with whom it is being shared. – See more at: http://consumercal.org/california-online-privacy-protection-act-caloppa/#sthash.0FdRbT51.dpuf According to CalOPPA, we agree to the following: Users can visit our site anonymously. Once this privacy policy is created, we will add a link to it on our home page or as a minimum, on the first significant page after entering our website. Our Privacy Policy link includes the word ‘Privacy’ and can easily be found on the page specified above. You will be notified of any Privacy Policy changes:       • On our Privacy Policy Page Can change your personal information:       • By emailing us       • By calling us       • By chatting with us or by sending us a support ticket How does our site handle Do Not Track signals? We honor Do Not Track signals and Do Not Track, plant cookies, or use advertising when a Do Not Track (DNT) browser mechanism is in place. Does our site allow third-party behavioral tracking? It’s also important to note that we allow third-party behavioral tracking   COPPA (Children Online Privacy Protection Act) When it comes to the collection of personal information from children under the age of 13 years old, the Children’s Online Privacy Protection Act (COPPA) puts parents in control. The Federal Trade Commission, United States’ consumer protection agency, enforces the COPPA Rule, which spells out what operators of websites and online services must do to protect children’s privacy and safety online. We do not specifically market to

Blog

Data-at-rest is data-at-risk.

Is your data at risk? Now is the time to calculate the real-time risk of a data breach in financial terms.  Business owners should have full visibility.  Data-at-rest is data-at-risk.   Data Breaches – stolen Customer Data. Do you store client, customer and employee data on your PC, laptop, tablet, server? Do you know the financial repercussions if you were hacked?   Data at REST is Data at RISK Until now, businesses without the resources of a dedicated Information Security team have had few options. Sensitive data-at-rest was virtually impossible to find and secure, and that meant it was easily breached.   RISK SCAN and REPORT This NEW software will scan all your documents, systems and applications associated with you and your devices. You will receive your analysis in the form of a report and we’ll offer you advice and guidance on what to do next.   Data Breach Benchmark KEY BENEFITS Become GDPR Complaint Gain visibility of sensitive data Minimize the risk of a data breach Demonstrate regulatory compliance Offer more comprehensive security   You will receive your analysis in the form of a report and we’ll offer you advice and guidance on what to do next. Your report will contain all the information and data that isn’t secure and it’ll outline the exact financial implications of a data breach   Want more information? DOWNLOAD THIS – Data Breach Benchmark Report_

man on a tablet/cyber security
Blog

We might not be Cyber Certified but we are Cyber experienced

At the moment the two hottest buzz phrases in the world of data protection, marketing and Information Technology are ‘Cyber Security’ and ‘GDPR’. What does cyber security really mean? Aren’t businesses meant to be secure already? Do they need a badge to say that they are secure? This blog will explore what is means to be secure and why Think Cirrus doesn’t have a cyber security badge, yet ensures all clients have impeccable cyber security measures in place. The Government endorsed scheme Cyber Essentials is doing a great job of raising awareness that businesses should do more to protect themselves from on-line threats.   And quite rightly the stats for on-line threats, hacks, vulnerabilities continue to increase, the cloud can be an unfriendly place and small business is far from immune. You should be taking pro-active steps to protect data, systems and in many cases the risky data they hold related to clients, staff and people.   “Small and midsized organizations (SMBs), defined as those with 100 to 1,000 employees, are hardly immune to cybercrime — actually quite to the contrary. According to Keeper Security’s “The State of SMB Cybersecurity” report, a staggering 50 percent of small and midsized organizations reported suffering at least one cyberattack in the last 12 months”   What is Cyber Security?  Cyber Security is a very broad term and comprises technologies, processes and controls that are designed to protect systems, networks and data from cyber-attacks.   Effective cyber security reduces the risk of cyber-attacks, and protects organisations and individuals from the unauthorised exploitation of systems, networks and technologies.     Creating a solid cyber security foundation The most effective strategy to mitigate and minimise the effects of a cyber-attack is to build a solid foundation upon which to grow your cyber security technology stack. Solution providers often tell their clients their applications are 100% compatible and will operate seamlessly with the current IT infrastructure, and for the most part, this is true. The problem arises when we start adding IT security solutions from different manufacturers regardless of the granularity of their configuration settings – technology gaps will always be present. And technology gaps will always appear for one simple reason: developers will always keep certain portions of their code proprietary as part of their competitive advantage. Hence, true compatibility and interchangeability may only be 90%. These are known as technology gaps. It is through these gaps that attacks usually occur. A solid cyber security foundation will identify these gaps and propose the appropriate action to take to mitigate the risk of an attack. A solid foundation provides organisations the confidence to build their cyber security strategies. We might not have a cyber essentials accreditation but we do ensure that our clients are cyber secure.

Thinkcirrus/peoplearoundatable/wifi
Blog

WIFI Data – Why it’s a hidden marketing gem and what you should do with it.

Here at Think Cirrus we provide WIFI for many clients within retail and hospitality. And we love it. It provides guests with an excellent WIFI experience but from the point of view of the business owner, (yeah that’s you) – it provides vital contact details and data gathering that you can’t afford to miss. Why is WIFI Data a Hidden Gem? Because for every customer who logs onto your WIFI, you’ll acquire customer contact details. They will enter their name and email address which is a marketing communications gold mine. This means you can keep in touch with them, and not only get them to double and triple opt in, but you can email them, add them to social media advertising lists and much, much more. But today we’ll tell you how to add their details to Facebook custom audiences.   What is a Facebook Custom Audience? A custom audience is an ad targeting option on Facebook Ads and lets you find people who you already know on your business Facebook.  A custom audience from customer list could be from the customers who have logged onto your wifi. They have chosen to opt in and you can use facebook ads to retarget/remarket your business. To enable you to be able to do this I have sourced a guide from facebook for you to use. Happy promoting!   Create a Custom Audience from a customer file This article contains instructions on how to create a Custom Audience from your customer file. Before you begin Make sure the customer file you want to use is ready. If you want to get the most out of the data in your customer file, consult our best practices while creating it. Create a Custom Audience from a customer file Get Started To get started creating a Custom Audience from your customer file: Go to your Audiences If you already have audiences, click the Create Audiencedropdown and select Custom Audience. If you don’t have any audiences, you’ll see audience creation buttons, rather than dropdowns. Click Create a Custom Audience. Click Customer File Click Add from your own file   From there, there are five parts to creating your Custom Audience: Add Customer File Edit Data Mapping Hashed Upload & Creation  Next Steps Below, we’ll breakdown each one. Add Customer File To add a customer file: Choose whether you’ll upload your customer file as a file (.txt or .csv) or copy and paste it. If you choose to upload, click Upload Fileand select your customer file. If you choose to copy and paste, do so in the “Paste your content here” field. Give your audience a name and description if you want to. Click Next. Tip: You can download a data file template we’ve created that’s set up to help our system map your data more easily. Click Download file template to check it out. Edit Data Mapping We show you a preview of your data and how we’d classified it. There are three statuses you may see in this preview: means we think we know what type of data this is (but you can correct us if we’re wrong – see below) and will use it when trying to match the information in your customer file to people on Facebook. Only the data with this symbol gets uploaded for matching. means we’re not sure what type of data this is or you’ve told us to leave it out of matching. If we’re not sure, you can tell us (see below). Check out our best practices guide to make sure it’s formatted in a way we can use. means the data type has been identified (either by us automatically or by you), but we can’t detect a supported format. You may have to reformat the data in your file or select a formatting option from a Choose format dropdown (see below). For example, birthdays can be listed in different formats like MM/DD/YYYY or DD-MM-YYYY. Learn more. You can also leave the data type out of matching (see below). Note: If you’re seeing a lot of errors, it may be because we’re looking for the wrong delimiter (the punctuation mark that separates data points). You can change this by hovering over “modify the delimiter” and choosing a new one. You can interact with your data preview in three ways: Changing the data’s type Removing the data from match consideration Changing the data’s format To change your data’s type, click the dropdown and choose what type of data you’ve provided. From this dropdown, you can also choose Do Not Upload, which tells us not to use that data when matching. To change your data’s format, click the Choose format dropdown and choose what format we should be using to match your data. Note: Every piece of data requires a type to be usable, but only some kinds require formatting details. You’ll only see the Choose format dropdown if it’s necessary. If you need to change anything about your customer file to maximize the number of identifiers we can use, do so now. Once you’re ready, repeat the steps above. When you’re satisfied, click Create & Upload. Hashed Upload & Creation We hash your data, upload it and create your audience for you. This may take a little while if your file is large. Feel free to continue working in another browser tab or window while you wait. Next Steps When we’re done creating your Custom Audience, we automatically generate a list of next steps you can take to get the most out of it. You can take one of those next steps immediately or click Done to finish. Get more information on two of the next steps you can take: creating a Lookalike Audience and creating an ad. Learn how to edit your Custom Audience.  

Think Cirrus/Do Business anywhere/laptop on a bench outside
Blog

4 Reasons why you should consider a Managed WIFI Solution

1. Updates are Managed Every wireless system requires firmware and software updates. If these updates aren’t carried out or are done so incorrectly with have a serious impact on the connectivity and performance of your network. With a managed WIFI solution you’ll be supported by a team of experts who will live the system every day, understand what needs to be done, how it works and how it’ll affect your performance. This means the team will complete the updates at the right time for your system to keep running at its best. Wireless is a utility like electricity or water it’s a fundamental requirement for every business to operate. The problem is, few small business owners have the skill set, the time or the inclination to support the ever-changing needs. It’s both a financial and technical challenge to keep up with demand. Which is why deploying a managed WIFI system is the perfect solution 2. Device and Wi-Fi Alignment Devices today such as laptops, tablets and phones have an 18 to 24-month life span before another version comes out and you never know who is going to be bringing what onto your network next. Your current WIFI system will probably last from 24 – 36 months, the problem is, this isn’t well known amongst small to medium sized business owners. As a result, business owners think that the technology in place will still be fit for purpose, but you land up trying to support the latest devices on an outdated WIFI system that is over 5 years old. With a managed WIFI system you can guarantee you’re always going to have the latest infrastructure in place to support the latest devices being used, this is because your systems will be updated and refreshed every 36 – 48 months, perfectly within the optimal limits. 3. Wi-Fi as a subscription (Wi-Fi as a service) Think Cirrus is an expert when it comes to getting high quality, robust WIFI connectivity into hard-to-reach locations, listed buildings such as within the Rows in Chester City Centre, HGV stops and campus-based organisations. Think Cirrus can provide Wireless-as-a-Service (WaaS), another acronym… yep, sorry we know.  All this means is that you buy connectivity from us, paying for it on a service basis. If you own a hotel, holiday park or caravan park and your customers wish to purchase WIFI from you, you can choose whether you pass on all or some of the costs by charging them to use your WIFI. Buying WIFI connectivity as a service is a very low-risk option, as all support and technology upgrades are included in the service, and the cost to you is spread over a period of time. 4. Worry-less management. With a managed WIFI solution you don’t have to think about it. Your Managed service provider will do everything you need to. With Think Cirrus there are no call out charges as its all included as part of the monthly support payment. There are no hidden costs, just open and honest I.T. Boost Your Business and Engage Customers with Wi-Fi   Or you could just decide that it’s 1995…

Manged WIFI Service
Blog

Don’t waste time trying to fix your Wi-Fi all the time! Let the experts do it.  

  If managing your Wi-Fi is making your hair turn grey, then think again. There is a solution out there, and we’d like to explore it with you. A fully managed service provider is around the corner, to remove the hassle and hold your hand every step of the way. What is a Managed Wi-Fi Solution? A managed wi-fi solution is a wireless system with minimal upfront costs. The Managed Service provider (MSP) will fix or replace existing technology/equipment and monthly, the MSP will monitor and update what’s needed at the right time, for a reasonable monthly fee. If you don’t have the skill set or inclination this is an ideal situation. If you don’t want to have to even think about positioning a router or access points as it can be time consuming and frustrating. If you just want things to work, that is where your MSP will come into play. They’ll be your support system. Most MSP’s should visit you on site, at your venue or office, HQ, and carry out a network analysis and will ask qualifying questions to determine what your needs are. How many users and devices will need to be active at the same time. Do you want guests to access a network which is separate from your own? Do you need to take Wi-Fi payments on the network.   Is your business growing, as managed Wi-Fi is scalable and can grow as fast or as slowly as your business. Most MSP’s should have the capacity to monitor your systems 24/7 and they will update the software and firmware as part of the monthly subscription. Upgrades and patching Upgrades will be carried out at a time convenient for you and if a piece of equipment fails we will replace it. Most MSP’s will make sure that all your technology and equipment is up to date and Most MSP will purchase all the equipment that is needed, and install it, get you up and running and keep holding your hand whilst you run your business. There is a lot of information here so to summarise, instead of having to take your time away from growing and running your business, why not let someone else run it for you?

Martin MCM Marketing Guru
Blog

Guest Blog: GDPR is coming – should we be scared or simply bored?

    GDPR is coming – should we be scared or simply bored? May 2018 is when you start to get your direct marketing and data usage into gear. Gone are the times where you can spam people, where you can say that they have opted in when they haven’t. Oon the 25th May 2018 GDPR (General Data Protection Regulation) will come into force and it will set off what has been described by some as a nuclear bomb under every aspect of direct marketing. Fears, Concerns and Myths There are so many rumours being bandied around that nobody really knows what the rules are. Here are some that we’ve all heard: You will have to take all your carefully collected, monitored, mailed-to customers and prospects, throw them away, and start again. Unless you have detailed opt-ins for every mailing, you must stop contacting your customers. It’s going to be as bad as the millennium bug. We’ll have to stop sending out our email newsletter. All our data collection will now be heavily controlled and regulated with severe penalties incurred by any of us who do not comply. I won’t be able to collect business cards at exhibitions, so I can’t try to sell my products, so what’s the point of exhibitions? We’ve all heard these fears and concerns and while there are elements of truth in each, they don’t paint the complete picture.  The reality is both more complicated and yet simpler. Reasons for contacting Customers It all comes down to your reasons for contacting customers and prospects and whether they are ‘people’ or ‘companies’. This is a key distinction as they are both covered under slightly different parts of the regulations. You have to deal with each slightly differently. There are a number of grounds under which you can legitimately process data under GDPR but perhaps the two most interesting for small to medium businesses are: Consent for specific purposes Legitimate business interests Realistically, we believe that most businesses will be able to continue with most of their current activity (unless they already skirt the law, of course). It’s more a case of understanding what you are doing, defining why you are doing it, tailoring it as necessary and changing the message to make it clear to everyone. For the majority of small to medium businesses, GDPR will, as the Information Commissioner says, “be an ongoing journey”. It’s not some apocalyptic event which will derail your business. It’s not intended to kill your business, it’s not the nuclear bomb it has been described as. We suspect that many global businesses will probably ignore it, while pretending not to of course. At a recent training session run by the IDM, the speaker expressed the view that companies like Facebook and Google will never adopt GDPR. They will merely fight it out in court and pay the fines. It is, in his opinion, almost impossible for them to meet the requirements, the data they collect and process is simply too complicated and too ingrained in everyday life. Whether this is true or not, in our opinion, while they are chasing global companies it’s highly unlikely that the GDPR Police will raid a pet shop in Crewe and fine them 4% of turnover. Particularly if that shop is behaving reasonably, has taken steps, and is securing and managing their data appropriately. It’s easy to become GDPR Compliant  The reality is that by following a fairly simple process and then adopting some simple, and to be honest, reasonable measures (particularly on data security), the average business can meet GDPR, and crucially – be seen to meet it. Having gone through the GDPR process with several clients, we know that the main issue is often, not how difficult it is, but how boring it is. The analysis of data, review of security, mapping of processes and completion of balancing tests are all far less exciting than they may sound. It can become an excruciatingly long, slow and tedious procedure, especially for the business owner who would rather be running their business and generating new customers. So why is GDPR made out to be the scariest thing in the world? Why do consultants talk about it in hushed tones and dress it up in complexity and complication? Well, if you lead people to the edge of a cliff and give them a little shove to make them think they’re going to fall, how easy it then becomes to sell them your services to save them. GDPR is an issue, yes. It’s not easy, and it is something that you will have to address. But we suspect that the biggest barrier will be how dull it is, not how difficult it is to comply. Guest Blogger – Martin Corlett-Moss Today’s guest blog is written by Martin Corlett-Moss owner and founder of MCM2 Marketing Agency based in Nantwich.  He’s a straight-talking, marketing professional who knows what he’s talking about and gets stuff done – simply and concisely.  He is a marketing guru and ppc expert. Martin works with small businesses to help them grow. www.mcm2.co.uk   For info on the IDM Courses: https://www.theidm.com/marketing-courses/legal-and-regulation/general-data-protection-regulation  

Speak to an Expert
Book a Meeting ×
Scroll to Top