discussion post 3 parts

PART ONE. Organizations often require managers to write short articles for newsletter or blog publication. Becoming comfortable writing this style of commentary for a general audience is important in an era in which media can be authored by anyone.

The focus of your work will be social responsibility of the chosen company. This is a public relations-style article. Today’s consumers of media want quick, informative, and exciting information. It can be written in 1st or 3rd person.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

This post should be 200-300 words in length. If you are engaging in research, be sure to cite in the body of the post and add a reference list in APA format

1st Response:

  • Societal marketing is one concept within marketing which emphasizes social consciousness as an area in the marketing plan. It concerns the fact that a firm is able to market a given product not just with consumer as well as company needs but with long-term well-being of the society in general (Hose, 2018). Those firms that end up producing the right societal marketing campaigns end up incorporating ethical and social considerations into their plan of marketing. There exist several ways through which a company is able to realize the societal marketing goal. The aim of societal marketing for a firm to realize its needs as well as the needs of a consumer while taking into consideration the long-term good of the larger society is rife. In the kind of marketing, a firm makes use of socially conscious stance as a means of attracting consumers who may be appreciative of the desire of the company to market the products while taking the society into consideration.Every manager is expected to offer guidance, motivation and inspiration to their team members. In this regard, every manager should have sources around them that guide in this process (Piontek, 2018). To do this, they may come up with blog posts to this end that other members of the company may read through. It does not mean that they should always be lecturing the members on the dos and don’ts of the company. .

2nd Response:

  • The world, at least from a cybersecurity perspective; is a much different place than it was ten, fifteen, or even five years ago. Data breaches, compromises and attacks that would be almost unthinkable then, now happen regularly enough to cause concern. Of course, these things were happening then, but nobody was paying attention to them. In 2005 alone, the were 136 reported data breaches; and that is only the reported ones (De Groot, 2019). The scope of breaches has since expanded to come to a harsh truth: the total records breached is an unknown variable and thus likely higher than we know. In the year 2006, the VA breach made headlines because someone had actually compromised the United States Government; conversely the OPM breach of 2015 made even bigger headlines. These are, unfortunately, not isolated cases.In the year 2015, Verizon sent out a report titled “2015 Verizon Data Breach Investigations Report”, detailing over 2,100 breaches for more than 700 million records from the previous year (Verizon, 2015). That number stands in stark contrast to 2005. While these numbers may be frightening, often times the initialization vectors, indicators of compromise, the flaws in systems; the very weaknesses that allow these attacks to continue to occur remain very much the same from when they were first discovered.Such things as not following the tenets of CIA “confidentiality, integrity, availability”, subpar user provisioning, segregation of duties and vetting, lack of information security awareness, testing and training, non-hardened or ineffective system, tool and application configuration, and being behind the curve on patch management. For these reasons and others, it is imperative that an organization be guided towards improving it’s response to such things. The method of assessing an environment, identifying any gaps and determining what the final state is; is a misnomer. There is no “final state”. There will always be areas to be more vigilant. This highlights the benefits of cybersecurity consulting, a knowledgeable consultant can help with the assessments, assist in the set up of a strong cybersecurity program, and address skill gaps with experience to help drive the organization towards meeting their IT security goals.It may be “not if, but when”, but being prepared for that “when” determines everything.

Each reply should be one paragraph in length (or about 75 words) and must be substantive in nature. Do not simply say “I agree” or “That is great.” Specify why and be detailed in your explanation. You may use research in your responses

 
Looking for a similar assignment? Our writers will offer you original work free from plagiarism. We follow the assignment instructions to the letter and always deliver on time. Be assured of a quality paper that will raise your grade. Order now and Get a 15% Discount! Use Coupon Code "Newclient"