Definition of Security: Small Business Owner

Yes, that IS security when nobody can downsize you because you OWN that small business of yours! But preserving that special advantage is a never-ending job. In fact, do you know what needs to be preserved more than anything else?

Well, since they hold the future of your business in their hands, I believe that an outside group of people whose behaviors can effect your business' survival more than any other, deserves your rapt attention.

What I'd like you to conclude from that is, what your key target audiences think about you can take you down in a New York minute!

* customers displeased with your product or service don't come back

* prospects who don't know about you don't buy

* employees who believe you don't care about them lean on their oars

* when minority folks believe you discriminate, you have new problems

* and if community residents believe your business is a lousy place to work, you have hiring and retention problems.

Even though help is on the way, you can't work on everything at once, so prioritize those key audiences. That is, which external audience is of immediate concern?

The good news is that problems like those above just don't happen when you closely and regularly monitor what those "key publics" think about you. First, you find ways to interact with them.

Then probe what they think about you and the business. In what behaviors are they engaging? What about misunderstandings? Do you see any problems brewing?

When you take the trouble to stay in touch with those folks whose behaviors affect your business the most, you've taken an important first step towards preserving your business.

There's a real sequence here. Once you gather those facts from monitoring your key, target audience, it becomes obvious what your problem is and, thus, the public relations goal. For example, correct that misconception about your product; or reinforce a budding perception that you deliver superior service; or correct a suspicion that you don't put women in positions of responsibility.

With your goal in-hand, how are you going to achieve it? You need a strategy which, in public relations, only comes in three flavors: create opinion (perception) where none may exist; change existing opinion, or reinforce it.

So, you've set your public relations goal AND a very doable strategy. Now, what must your message say to implement that strategy? It must address the "fix" you decided upon when you set the goal. It must be clear, specific, persuasive and, above all, believable. As you write it, remain sensitive to what you are trying to do: change somebody's perception which almost always leads to the change in behavior you really want. Does your message meet this challenge?

Many would now find themselves with a great goal, a super strategy and a first class message, and nowhere to go.

But not you. Here, you select the "beasts of burden" you need to carry that message to the eyes and ears of those members of your key, target audience whom you need to reach and move to action.

And that means communications tactics. There are more available to you than we have time or space to list. Among them: community briefings, seminars, special events, news releases, speeches, brochures and personal contacts.

Is your work completed? Nope, because how will you track your progress? The answer is, Round 2 of the monitoring job. Interact with members of your prime outside audience all over again, carefully evaluating what you hear. If the goal was "correct a misconception," are you beginning to notice signs of that correction? Do those you talk to show, however little, a better understanding of the facts of the matter as represented in your message?

What's the bottom line? Behaviors, of course.

When your messages and communications tactics combine to alter a questionable perception held by members of your key, target audience, certain behaviors will soon follow. Among them, favorable mentions in the media and in individual speeches and lectures; increased patronage for your business; "corrected" perceptions by influential members of that important group of people, and many other similar signs that your message and your communications tactics have, indeed, "drawn blood."

Happily, what that adds up to is a successful public relations effort.

Please feel free to publish this article and resource box in your ezine, newsletter, offline publication or website. A copy would be appreciated at bobkelly@tni.net.

Robert A. Kelly ? 2005.

Bob Kelly counsels, writes and speaks to business, non-profit and association managers about using the fundamental premise of public relations to achieve their operating objectives. He has been DPR, Pepsi-Cola Co.; AGM-PR, Texaco Inc.; VP-PR, Olin Corp.; VP-PR, Newport News Shipbuilding & Drydock Co.; director of communications, U.S. Department of the Interior, and deputy assistant press secretary, The White House. He holds a bachelor of science degree from Columbia University, major in public relations.

Visit: bobkelly@tni.net; bobkelly@tni.net

maid service near Mundelein ..
In The News:

Foreign-owned apps secretly harvest personal data from seniors, making them prime targets for scams. Learn how to protect your privacy and stop data brokers today.
Sens. Josh Hawley and Richard Blumenthal introduce bipartisan GUARD Act to protect minors from AI chatbots through mandatory age verification and disclosure requirements.
Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.
SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.

Looking into the Future for Profits

How to identify future solutions and opportunities?Your power page, if... Read More

Book Yourself Solid Key #5: Go Forward With Gusto & Articulate What You Do

Want your small business to flip instead of flop?! Statistically... Read More

Canon City, Colorado - Good for Small Business

Canon City, Colorado is known for it's 6 Prisons; State... Read More

Small Businesses With Work Trucks; A Warning

If you are a non-operator owner of many work trucks,... Read More

Small Business Success Tip: Learn Something New Everyday

Your grandfather probably told you to "learn something new everyday".... Read More

Mobile Car Wash and Cleaning Post Office Jeeps

If you own a mobile truck washing, pressure washing or... Read More

How to Find A Group that Needs Speakers

How do you find groups that are in need of... Read More

The Key to a Successful Business

Where would a business be without a business plan? A... Read More

Creating a Dynamite Account Plan

Why do you need an account plan?When you first decide... Read More

Quality Controls for Franchising Companies Sample Outline

Quality control in franchising companies is paramount and all franchising... Read More

Tips on Setting Up Your Small Business Bank Account

One of the first things you will need to set... Read More

Definition of Security: Small Business Owner

Yes, that IS security when nobody can downsize you because... Read More

Change May Be Your Ace in the Hole

Whether it has been thrust upon you by external market... Read More

Excuses Franchisees Make; When They Violate Exclusive Territory Agreements

One of the biggest excuses franchisees of home based and... Read More

Corporate Shells

A corporate shell could be liken to a house that... Read More

Do You Make These 7 Deadly Cash Flow Mistakes?

Managing cash flow is every small business owner's most important... Read More

Time to Sell your Restaurant? Some Advice from Restaurant Consultants, Inc.

As a specialist in getting restaurants open, it is surprising... Read More

Can Your Business Run Without You?

What would happen if you decided to take an extended... Read More

Hosted PBX, Is It Right For You?

"Order Now!" "Your Business Will Fail If You Don't Have... Read More

Small Business Secrets: Self-Confidence Can Be Arranged

At first blush this idea might be difficult to wrap... Read More

Is Your Small Business Name Important?

You bet a name is important. Many small business owners... Read More

Start a Resume Writing Service for Profit

The resume writing service serves an important role in the... Read More

Carwash Franchisor Case Study

There are only a handful of car wash franchises in... Read More

How to Increase the Cash Flow in Your Private Practice in 30 Days

If you have a busy private practice, chances are you... Read More

Why is My Restaurant Not Full Every Monday Night?

In a quest for customers and to keep those customers,... Read More

high-end home cleaning Bannockburn ..