Business Improvement and Social media
23.3K views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Rescooped by Ricard Lloria from Curation Revolution
Scoop.it!

How I Became The Most Followed Nobody In Finland via @JaanaNystrom

How I Became The Most Followed Nobody In Finland via @JaanaNystrom | Business Improvement and Social media | Scoop.it

@Jaana Nyström is a great curator and she just beat me to the punch :). When she shared her EPIC journey of using G+ to move from "nobody" to "somebody" I planned to blog about her amazing journey. The content and message was too good to be trapped in comments.

Read this post CAREFULLY as you may recognize where you are on Jaana's timeline of personal brand development. There are several "inside baseball" tips to pay particular attention to including:

* Don't worry about perfection, start publishing.
* G+ is an AMAZING and vastly under used tool (start there add more social nets later).
* No matter what, keep turning the crank (keep going) since the only sin you and your personal band can't recover from is NOT PLAYING.

Great stuff from an amazing curator. What lessons did you learn from Jaana Nystrom? What similar lessons have you learned as you create a meaningful personal brand?


Via Martin (Marty) Smith
Suvi Salo's comment, April 14, 2014 2:28 PM
Thank you for recommendation.
malek's curator insight, April 14, 2014 4:35 PM

 I usually don't envy people, but I do envy @Jaana Nyström a bit for her energy & passion. 

Gary Harwell's curator insight, April 15, 2014 1:13 AM

seems reasonable

 

Rescooped by Ricard Lloria from visualizing social media
Scoop.it!

How and Why Social Engineering Works [Infographic]

How and Why Social Engineering Works [Infographic] | Business Improvement and Social media | Scoop.it

For many people in today’s world, being “online” has become a constant status. High-speed internet, smart phones and tablet PC’s have enabled us to stay connected whenever and wherever we are.

Social hackers capitalize on vulnerabilities when it comes to keeping personal details private, and the problem has only seemed to get worse as the digital age has developed.

Techniques as simple as looking over a shoulder as someone enters bank details or passwords are often used, as well as sending out deceiving emails ridden with malware and viruses that can take control of your computer. Hackers pose as a trusted entity in email blasts that utilize mind tricks to get the viewer to click on the link that will trigger the infection of your computer.

Everyone with an internet connection is vulnerable, and public awareness is the first step in ending this growing problem...


Via Lauren Moss
No comment yet.