{"id":36504,"date":"2020-07-30T08:37:55","date_gmt":"2020-07-30T12:37:55","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=36504"},"modified":"2021-08-02T06:58:10","modified_gmt":"2021-08-02T10:58:10","slug":"reputation-cybersecurity","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/reputation-cybersecurity\/36504\/","title":{"rendered":"Cyber pride without lions: Building a brand security reputation that goes beyond fear"},"content":{"rendered":"<p>Here\u2019s a novel idea. What if your organization made cybersecurity a brand promise? What if, instead of driving cybersecurity awareness by highlighting the risk of attack and its expensive consequences, your organization saw your cybersecurity as a reason customers should choose you?<\/p>\n<p>Could your business market its cybersecurity with pride? Few businesses are ready for that today, but outside cybersecurity, turning risk into business advantage is nothing new.<\/p>\n<h2>The commercial value of safety for car brands<\/h2>\n<p>Today, 1.2 million people worldwide die in car crashes each year. Despite this, we still buy 74 million cars every year.<\/p>\n<blockquote><p>Death and serious injury are bigger risks than those that usually come with cyber incidents, but car manufacturers now lead ad and PR campaigns with safety as a key feature.<\/p>\n<\/blockquote>\n<p>They weren\u2019t always so bold. For decades, while road deaths increased exponentially, car brands dazzled customers with luxury, freedom and engine power. Only in the 1980s did car companies start marketing their defense technology as an integral part of their cars.<\/p>\n<p>Volvo was one of the first car manufacturers to understand the profitable relationship between safety and reputation. They\u2019re now viewed and independently rated as making some of the <a href=\"https:\/\/www.carkeys.co.uk\/news\/here-s-why-volvo-makes-some-of-the-safest-cars-in-the-world\" target=\"_blank\" rel=\"noopener nofollow\">safest cars in the world<\/a>. How did they get there? While working for Volvo in 1959, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/history-safety-technologies\/28080\/\" target=\"_blank\" rel=\"noopener nofollow\">Nils Bohlin invented the three-point safety belt<\/a>. Volvo chose not to patent it, letting other car manufacturers use it for free and showing they put saving lives ahead of profits. Then in 1987, they produced a bold ad campaign featuring crash-test dummies.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/nf2ATS44osA?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p><em>Volvo\u2019s 1987 ad for the Volvo 340<\/em><\/p>\n<p>Fear-driven attitudes towards cybersecurity and reputation management echo the car industry\u2019s delay in seeing sales in safety. Fear can lead us to miss powerful opportunities.<\/p>\n<h2>Why fear isn\u2019t the best motivator for cybersecurity<\/h2>\n<p>Christine Tappolet, Professor of Ethics and Moral Psychology at Universit\u00e9 de Montr\u00e9al, says, \u201cFear influences what we do by narrowing [our] focus.\u201d That\u2019s great when the threat is known and limited, like when a lion is chasing you.<\/p>\n<blockquote><p>When it comes to complex, \u2018always on\u2019 cyberthreats, a narrow focus brought on by fear may mean missing the bigger picture.<\/p>\n<\/blockquote>\n<p>Psychology makes a distinction between two types of motivation: Approach motivation, or being attracted to something positive, and avoidance motivation, or being driven away from something negative. Andrew Elliot, Professor of Psychology at University of Rochester, says, \u201cAvoidance motivation is designed to facilitate surviving, whereas approach motivation facilitates thriving.\u201d<\/p>\n<p>Organizations with a <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/security-awareness-business-2019\/29183\/\" target=\"_blank\" rel=\"noopener nofollow\">strong cybersecurity culture<\/a> focus on thriving rather than simply surviving. They go beyond cybersecurity and reach cyber pride. What does that mean, and how do you get there?<\/p>\n<h2>From fearing attack to cultivating reputation<\/h2>\n<p>\u201cIt takes 20 years to build a reputation and five minutes to ruin it,\u201d says US business tycoon Warren Buffet. \u201cIf you think about that, you\u2019ll do things differently.\u201d<\/p>\n<p>It\u2019s hard not to respond to the stark reality of cybercrime with at least some fear. Cyberattacks can and do damage business reputations. Customers expect you to keep their data safe and your operations running. If you can\u2019t do that, they\u2019ll find someone who can.<\/p>\n<p>Cyber pride is a new way to look at the relationship between cybersecurity and reputation. It moves your organization beyond a purely defensive position towards celebrating and cultivating its cybersecurity reputation.<\/p>\n<h2>What does cyber pride look like in practice?<\/h2>\n<h3>1.\u00a0\u00a0\u00a0 Put your cybersecurity claims to the test<\/h3>\n<p>Volvo\u2019s safety reputation didn\u2019t skyrocket because of an ad campaign and a seatbelt design, but because its claims were true. Independent safety ratings back them up, time and again. In 2017 respected independent testers <a href=\"https:\/\/www.cardekho.com\/features-stories\/this-is-what-makes-volvo-xc90-the-safest-car-in-the-world.htm\" target=\"_blank\" rel=\"noopener nofollow\">Insurance Institute for Highway Safety named Volvo XC90 the safest car in the world<\/a>.<\/p>\n<p>Cybersecurity is the same. If you talk the talk, you must walk the walk. Knowing your business is secure will give you the confidence to promote security as a business value. Customers will find out if your claims are all puff because cyber incidents will interrupt their service or leak their data.<\/p>\n<h3>2.\u00a0\u00a0\u00a0 Break out of the prison of small print<\/h3>\n<p>Private policy links sitting quietly at the bottom of web pages hide precious gems you could polish and display. These policies often start by addressing customers\u2019 valid concerns then descend into a torrent of legalese.<\/p>\n<p>Each web page or marketing material needn\u2019t lead with cybersecurity and data confidentiality, but these must move beyond the shadowy prison. Integrate security practices across your business holistically, recognizing privacy as a foundation for business growth.<\/p>\n<h3>3.\u00a0\u00a0\u00a0 Go beyond following regulation<\/h3>\n<p>Regulation shouldn\u2019t be the sole guide of your cybersecurity and privacy policies. To let regulation drive is to make decisions based on fear, rather than seeking ethical excellence. Regulation also struggles to keep up with technological change in business and cybercrime. While you must meet regulations, you should look beyond it, guided by innovation and ethics.<\/p>\n<p>To use cybersecurity and customer privacy to grow your business, don\u2019t just say you care \u2013 show it, boldly, at every opportunity. It\u2019s the products you build and the culture of your whole organization. In the same way Volvo didn\u2019t just want to be <em>seen as<\/em> making safe cars, they wanted to <em>make<\/em> safe cars, your business can differentiate itself from the crowd with honest, provable cyber pride.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The realities of cybercrime can endanger your business, but your security policy needn\u2019t be built on fear. Instead, win customers by marketing your cyber pride.<\/p>\n","protected":false},"author":2612,"featured_media":36614,"template":"","coauthors":[3907],"class_list":{"0":"post-36504","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-leadership","7":"emagazine-category-safer-business","8":"emagazine-tag-culture","9":"emagazine-tag-marketing"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/reputation-cybersecurity\/36504\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/reputation-cybersecurity\/22966\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/36504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2612"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/36614"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=36504"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=36504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}