CRM stands for Customer Relationship Management. Customer Relationship Management is a marketing and sales strategy devised and applied by a business with the intention of developing loyal clients, resulting in business growth. Each company’s CRM strategy is specific to the business, however they all have one thing in common: client focus. Continue reading →
It seems more objects than not are connected to the internet in some way or another. Whether it’s traditional technology such as computers, laptops, tablets and smartphones, or the less expected items such as household appliances, toys, cars, and drones; with an internet connection comes the opportunity to save information to what is commonly referred to as ‘the cloud’. But with so many internet-connected-things, surely the cloud is going to run out of space at some point, right? Continue reading →
The uptake of CRM software is growing at a steady rate of approximately 13% each year over the last few years according to reports from Gartner (2014; 2015). And with good reason – CRM software enables companies to grow loyal relationships with their clients by allowing a better understanding, segmentation and tiering of their client base, improved targeting of promotions and cross selling, and the implementation of alerts that signal a client is about to depart. CRMs are a complex software that can deliver what many refer to as a ‘360 degree view’ of their clients. Continue reading →
“Everything is hackable”, whistle blower Edward Snowden said of the newly introduced Australian meta-data retention laws, “So you hope the government agency or the third party provider has very high security standards”. If you’re not exactly sure what the meta-data retention laws are, they require telco companies to store records of phone and internet activity for two years and grant access to security and law enforcement agencies without a warrant. This includes the phone number of people you called or sent SMS messages to, time and date of calls and SMS, length of calls, the location of the nearest phone tower when you sent or received a call or SMS; and for internet activity: the time, date, size, sender and recipients of emails, time and duration of your web connections, your IP address, the volume of your uploads and downloads, location and geographical data.
According to the Australian government these laws have been introduced in an effort to enhance Australia’s security against terrorism and criminals. However it would appear that these new laws could actually reduce Australia’s cyber security. While the meta-data won’t record the content of your communications, there is still a lot of information that, if found in the wrong hands, could put Australians and businesses in a vulnerable position. Continue reading →