7 Tips for Incorporating New Business Development into Your Busy Schedule
Finding time for new business development can be difficult for many entrepreneurs. There always seems to be another priority or a pressing task. Not making the time to pursue new business, however, is a sure-fire way to an empty pipeline and slow sales.
Don’t stall your growth. Here are 10 tips for fitting new business development into your busy schedule.
1. Schedule a time for new business on your calendar. Next, go one step further and consider that time as firm as a meeting with a new prospect. You would never cancel one of those! First thing in the morning is best, before you check your e-mail or listen to voicemail. It can be difficult to break away later on.
2. End your workday an hour early two times a week to allow for business development tasks during that time.
3. As you focus on business development tasks and research, set your phone to “do not disturb.” Post a “do not disturb” sign on your door to ward off interruptions. Turn off your e-mail and your cell phone. Treat this precious time as you would a meeting.
4. Before canceling your biz-dev time for an “emergency,” ask yourself if this new priority truly needs to be handled by you right now. Can it wait for 60 minutes? Can it be addressed by one of your team members? If the answer is no and you must handle the emergency, reschedule a time for biz dev promptly.
5. Aim for 60 minutes, two times a week. If that seems impossible, begin with 30 minutes. Or even 15 minutes. If even 10 minutes seems impossible, refer to number seven below.
6. Limit your prospect list. Pick 10 of your most promising contacts and focus on them. Replace each one as you get through to them.
7. If you try to incorporate these tips and find it impossible, you might want to rethink your desire to earn money and run a company. Business development is the lifeline of an organization and worth your regular attention.
This article was originally published on the EO Global Octane Blog.ed by businesses as a weak link in the cybersecurity chain. And while some people tend to focus on the threat posed by malicious hackers or bitter insiders, it is actually unintentional mistakes and compromises that are a much bigger issue.
Check out these seven ways that your employees could unwittingly compromise your organization’s cybersecurity, as well as some of the measures you can put in place to mitigate the risk.
1. Using personal devices
The rise of bring-your-own-device (BYOD) means that more employees are using their own devices to read company emails and access sensitive business information. Unlike business-owned devices, which can be easily audited and controlled by your IT team, personal devices may not have antivirus software installed, and could have a huge range of other exploitable weaknesses.
A recent report from Verizon revealed that 79 percent of companies consider their own employees a “significant threat,” and that some of the riskiest behaviors for employees using BYODs included downloading mobile apps and visiting questionable websites.
2. Connecting to public Wi-Fi hotspots
A huge number of workers use wi-fi hotspots in order to send and receive work emails, or even to access company files and information. Whilst being able to work on the go might be good for employee productivity, using public wi-fi is not without cybersecurity risks. Most notably, public wi-fi networks can be used by cybercriminals to eavesdrop on communications, steal files and distribute malware.
3. Surfing the web
Cybercriminals will often look for ways to compromise reputable and popular websites in order to distribute malware or intercept communications. Employees browsing the web need to be extremely careful and avoid sharing details with sites that don’t display a padlock, which indicates connections to the site are encrypted.
In so-called watering hole attacks, hackers will purposely seek to compromise websites that an organization’s employees are known to visit regularly. NotPetya, ransomware believed to have originated in the Ukraine and spread via a compromised government website, is one major example of this.
4. Downloading unsafe content
Employees need to take serious care when they download files or applications. The issue here is not only that downloads can contain malware, but they can also unintentionally introduce new vulnerabilities that attackers may seek to exploit. Open-source software can be particularly vulnerable to compromise owing to the fact that it is widely used and that cybersecurity is often not a high priority of developers.
5. Practicing poor password security
Despite constant warnings about the risks of poor password security, employees are still routinely failing to practice strong hygiene in this area. There are actually many reasons for this—and it’s not just because users are lazy or have too many accounts to manage. In some instances, businesses are actually encouraging poor practices by asking employees to share credentials, in order to reduce the need to purchase additional licenses for software.
6. Falling foul of phishing scams
Unfortunately, it is still common for individuals to fall for phishing emails. Recent statistics reveal that 1 in every 99 emails is a phishing attack which makes them a real danger to businesses. If employees aren’t able to recognize phishing attempts, they can end up inadvertently disclosing sensitive information, transferring payments for goods and services to unintended recipients, and installing malware.
7. Collating Dark Data
Dark data is information that is collected by businesses, but is forgotten about and now has a clear owner. Such information could include old emails, versions of documents, meeting minutes and customer or supplier information.
Dark data can be extremely valuable to cybercriminals. Some employee practices, such as CCing too many people on emails, are actually contributing to the problem of businesses being able to secure and manage it.
How to mitigate employee security risks
To mitigate the security risks and challenges posed by employees to your business, it’s important to foster a strong security culture. Educate staff about maintaining good cyber hygiene as well as how to spot the latest phishing scams
It’s also important to take practical steps to protectively monitor networks and endpoints. Mistakes will happen so having people and technology to swiftly detect and respond before they can develop can be extremely important. If your organization lacks security resources, then a 24/7 outsourced managed detection and response service is a great option to quickly bolster the protection of your business.
This article was originally published on the EO Global Octane Blog.
Unlock Your Full Potential as an Entrepreneur
Unlock your potential with the Entrepreneurs' Organization (EO). Immerse yourself in exclusive events with renowned speakers, participate in peer-to-peer mentorship, access high-level executive education programs, and join intimate forums for reciprocal learning and support. Embrace a world of opportunities designed for high-revenue entrepreneurs like you.
Don't wait, join EO today and propel your entrepreneurial journey to new heights!