Definition of Security: Small Business Owner

Yes, that IS security when nobody can downsize you because you OWN that small business of yours! But preserving that special advantage is a never-ending job. In fact, do you know what needs to be preserved more than anything else?

Well, since they hold the future of your business in their hands, I believe that an outside group of people whose behaviors can effect your business' survival more than any other, deserves your rapt attention.

What I'd like you to conclude from that is, what your key target audiences think about you can take you down in a New York minute!

* customers displeased with your product or service don't come back

* prospects who don't know about you don't buy

* employees who believe you don't care about them lean on their oars

* when minority folks believe you discriminate, you have new problems

* and if community residents believe your business is a lousy place to work, you have hiring and retention problems.

Even though help is on the way, you can't work on everything at once, so prioritize those key audiences. That is, which external audience is of immediate concern?

The good news is that problems like those above just don't happen when you closely and regularly monitor what those "key publics" think about you. First, you find ways to interact with them.

Then probe what they think about you and the business. In what behaviors are they engaging? What about misunderstandings? Do you see any problems brewing?

When you take the trouble to stay in touch with those folks whose behaviors affect your business the most, you've taken an important first step towards preserving your business.

There's a real sequence here. Once you gather those facts from monitoring your key, target audience, it becomes obvious what your problem is and, thus, the public relations goal. For example, correct that misconception about your product; or reinforce a budding perception that you deliver superior service; or correct a suspicion that you don't put women in positions of responsibility.

With your goal in-hand, how are you going to achieve it? You need a strategy which, in public relations, only comes in three flavors: create opinion (perception) where none may exist; change existing opinion, or reinforce it.

So, you've set your public relations goal AND a very doable strategy. Now, what must your message say to implement that strategy? It must address the "fix" you decided upon when you set the goal. It must be clear, specific, persuasive and, above all, believable. As you write it, remain sensitive to what you are trying to do: change somebody's perception which almost always leads to the change in behavior you really want. Does your message meet this challenge?

Many would now find themselves with a great goal, a super strategy and a first class message, and nowhere to go.

But not you. Here, you select the "beasts of burden" you need to carry that message to the eyes and ears of those members of your key, target audience whom you need to reach and move to action.

And that means communications tactics. There are more available to you than we have time or space to list. Among them: community briefings, seminars, special events, news releases, speeches, brochures and personal contacts.

Is your work completed? Nope, because how will you track your progress? The answer is, Round 2 of the monitoring job. Interact with members of your prime outside audience all over again, carefully evaluating what you hear. If the goal was "correct a misconception," are you beginning to notice signs of that correction? Do those you talk to show, however little, a better understanding of the facts of the matter as represented in your message?

What's the bottom line? Behaviors, of course.

When your messages and communications tactics combine to alter a questionable perception held by members of your key, target audience, certain behaviors will soon follow. Among them, favorable mentions in the media and in individual speeches and lectures; increased patronage for your business; "corrected" perceptions by influential members of that important group of people, and many other similar signs that your message and your communications tactics have, indeed, "drawn blood."

Happily, what that adds up to is a successful public relations effort.

Please feel free to publish this article and resource box in your ezine, newsletter, offline publication or website. A copy would be appreciated at bobkelly@tni.net.

Robert A. Kelly ? 2005.

Bob Kelly counsels, writes and speaks to business, non-profit and association managers about using the fundamental premise of public relations to achieve their operating objectives. He has been DPR, Pepsi-Cola Co.; AGM-PR, Texaco Inc.; VP-PR, Olin Corp.; VP-PR, Newport News Shipbuilding & Drydock Co.; director of communications, U.S. Department of the Interior, and deputy assistant press secretary, The White House. He holds a bachelor of science degree from Columbia University, major in public relations.

Visit: bobkelly@tni.net; bobkelly@tni.net

no-contract cleaning service Mundelein ..
In The News:

Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.

How to Protect Yourself & Your Business

As a business owner, you already know how important it... Read More

Incorporating a Small Business: S corporations versus C corporations

If you've been considering incorporating your small business, you've probably... Read More

How To Cut Expenses And Manage Your Business

If you own a small business, you should know that... Read More

Hispanic Small Business Advantage

One thing I have noticed in my travels to different... Read More

What Is YOUR Value Proposition?

Every company has a value proposition. That is a statement... Read More

Expanding Franchisee Advice

Franchisor expansion policies are not as simple as one might... Read More

Small Business Marketing Secrets: Look Like Sizzle, Be The Steak

You've heard marketing and advertising gurus quip, "Sell the sizzle,... Read More

Where to Find a Cash Windfall of $10,000 to $1,000,000 -- You Never Knew You Had

There is a rather famous true story called "Acres of... Read More

Restaurant Operators - What Skills do you Need

A tongue-in-cheek look at the skills required to operate a... Read More

There Is Security in Change... But Use Caution

It has been said that the only constant is change.... Read More

Debit and ATM Card Advice for Small Businesses

Your business account comes with an ATM, Debit card. Pick... Read More

10 Best Practices to Consider as Your SBIR Negotations Approach Contract Signature

10 Best Practices to consider as your SBIR negotiations approach... Read More

Local Search and Internet Yellow Pages - A Whole NewVocabulary for Small Businesss

Buyers want both online and local information about where to... Read More

The Step Zero Effect

The key to organizational focus and helping those who need... Read More

Mobile Truck Washing, Case Study

Most folks in the pressure washing business are happier to... Read More

Trailblazer Interview with Diane J. Levin, Partnering Solutions

Today is a Red Letter Day! It's special because today... Read More

Be Prepared When Business Investors Look Beyond Your Business Plan

You have spent considerable time pulling your business plan together,... Read More

Five Break-through Ideas to Immediately Increase Profits and Improve Cash Flow

Too often in business we get trapped into reviewing our... Read More

Going Public: The Process for Small and Mid-size Companies to Go Public

It's the dream of every person who starts a business... Read More

Are You Making These Mistakes In Your Business?

You've probably heard the statistic that 95% of small businesses... Read More

The Perfect Mission Statement

One way to determine your companies mission statement is based... Read More

Specialty Advertising in C-Stores

It appears the mini-blimp indoor theme and concept is making... Read More

The Business Autopsy: A Fact Of Life

Last week we discussed the importance of performing an autopsy... Read More

Work is a Four Letter Word

I love work, I can watch it all day.I am... Read More

Build Credibility, Value, and Trust on a Shoestring

Setting priorities in your business? Your first job is to... Read More

maid service near Glenview ..