Costas Nicou Back Office

Notes

The customer journey and customer journey maps

What is the customer journey? The path a customer takes from learning about a product to getting their questions answered to making a purchase. Touchpoint?  Each interaction with a brand during a purchase journey is called a touch point. Customer Journey map A visualization of the touchpoints a typical customer encounters along their purchase journey

Read More

Inclusive Marketing

In digital marketing, the creative choices a company makes can impact how people view themselves and how they view other people. Sometimes marketing campaigns (especially those that are older or more traditional) can reinforce stereotypes and leave out the perspectives of underrepresented groups of people. Inclusive marketing, on the other hand, seeks to represent a […]

Read More

Play it Safe – Manage Security Risks – Week 2 – Part 3

OWASP – Open Web Applications Security Project Minimize attack surface area, refers to all the potential vulnerabilities that a threat actor could exploit. Like attack vectors like phishing emails or week passwords Principle least privilege Defense in depth Separation of duties Keep security simple Fix security issues correctly Scope refers to the specific criteria of […]

Read More

Play it Safe – Manage Security Risks – Week 2 – Part 2

The purpose of frameworks, organizations use frameworks as a starting point to develop plans that mitigates risks, threats and vulnerabilities to sensitive data and assets. NIST Cybersecurity framework is a voluntary framework that consists of standards, guidelines and best practices to manage cybersecurity risk. The CSF consist of five important core functions: IDENTIFY, PROTECT, DETECT, […]

Read More

Play it Safe – Manage Security Risks – Week 2 – Part 1

Authentication is the process of verifying who someone or something is. An example of authentication is logging in into a website with your username and password. Biometrics is unique physical characteristics that can be used to verify a person’s identity. Examples of biometric are a fingerprint, an eye scan or a palm scan Vishing is the exploitation […]

Read More

Foundations of Cybersecurity – Week 4

Security information and event management (SIEM) tools A SIEM tool is an application that collects and analyzes log data to monitor critical activities in an organization. A log is a record of events that occur within an organization’s systems. Depending on the amount of data you’re working with, it could take hours or days to […]

Read More
1 2 3 4 5 7