Levine Communications Office

One of America's Premier Public Relations Firms

  • October 2021
    M T W T F S S
     123
    45678910
    11121314151617
    18192021222324
    25262728293031

Posts Tagged ‘Kim Garst’

How to Protect Your Children from Online Predators

Posted by Levine Communications Office on May 13, 2013

By: Kim Garst

shutterstock_121017844

The web has such amazing opportunities for our children and families, doesn’t it? Who would have guessed when we were all growing up that there would be something as amazing as social media, which is way cooler than growing up with your own phone line in your bedroom, right?

But with the power to connect with the people we love comes some risks that are important to understand in order to protect our families.

Where are your kids online? It used to be that we just needed to know where our children were physically; if they were at home, whether they were safe, where they were going.

It’s not that different online. It’s important to know where your children are online every bit as much as where they are physically.

Depending on your children’s ages, they might be using sites like Giant Hello, Club Penguin or Webkinz which are social sites designed for kids, without the age restrictions of sites like Facebook. Each of these sites have different kinds of verification methods that ensure parents are aware of their children signing up, along with methods to make sure that your children can only connect with people they know.

In either case, it’s important that children learn great social media habits right out the gate, and this is a conversation that you can begin at any age; the sooner the better!

Post Appropriately. Teach your children that everything they post should be treated as viewable by anyone, anywhere, and that they should not post private information publicly.

Children don’t always know where the line between private and public is, so you need to be involved! Especially with younger children, let them know that the privilege of social media access comes with oversight from you.

Like many kinds of freedom, social sharing freedom is going to come gradually as they grow older and demonstrate their ability to handle this newfound freedom.

 

Read the full article at GalTime.com

Posted in Clients, LCO PR | Tagged: , , , , | 11 Comments »

Kim Garst: Twitter – Your New Power Networking Business Tool

Posted by Levine Communications Office on April 12, 2013

By Kim Garst

Kim Garst

Before the Internet and social media channels, gaining access to the people you need to connect with required a great deal of work, time, and often times, a degree of proximity. Today, with social media, you can be anywhere in the world and connect to the people who are critical to growing your business.

The need for networking hasn’t changed, but the tools have — and leveraging those tools to tap into that wealth of opportunity is easier than you might realize.

Tools vs. Strategy

With new social media platforms emerging at an alarming rate, it can be easy to discount the social media revolution as a fad. What you need is a strategic plan — and a platform that can help you accomplish that plan.

How do you know which platform is right for you? What I’ve found is that it’s best to identify your target audience and your business goals. Are you trying to increase sales? Are you looking for strategic partners or additional qualified staff? Are you targeting consumers or do you want to connect with other businesses?

Getting Started With Social Media

If I had to choose a favorite social media platform (or a great place to start networking), I would pick Twitter. I can say with certainty that Twitter is the number one tool I’ve used to grow my business. It’s amazing how much relationship-building you can do in just 140 characters! Twitter is incredibly dynamic, allowing you to customize your experience to meet your networking goals.

Twitter in and of itself can be overwhelming. You’ve got to have a plan and use it strategically to accomplish that plan. If I could give you just a few critical tips they would be:

● Filter your Twitter stream by building lists so that you can closely follow the conversations of a small group of influencers. This allows you to interact and build closer relationships.
● Use Twitter as a search engine. Attempting to tune into the noise of all of Twitter is like trying to look at every webpage on the Internet without using Google, Yahoo, or Bing to filter the information. Using Twitter’s search feature allows you to zone in on the information that is relevant to you.
● Respond to every retweet (RT) and person that reacts to one of your tweets. Keep the conversation going while being yourself. Your followers will appreciate a live, real human being’s response — it can be rare these days!

Of those currently using Twitter, 34 percent of marketers say they have generated leads using the social media platform, and 20 percent have closed deals.

Twitter Success Stories

No matter how much practical, theoretical information I read, I tend to learn more by reading about the successes of others who have used Twitter to network and take their careers or businesses to the next level. Here are some of my favorites….

READ THE REST HERE.

Posted in Clients, LCO PR, Uncategorized | Tagged: , , , | 1 Comment »

Kim Garst: How To Protect Your Kids From Cyber Bullying

Posted by Levine Communications Office on April 5, 2013

By: Susan Carraretto Kim Garst

Has your child ever been bullied online? Have they engaged in cyber bullying? Or would you even know?

Studies are saying there’s a 50% chance they have. Recent reports claim that half of adolescents and teens have been bullied and/or engaged in cyber bullying.

Susan talks with Kim Garst from Boom Social about these shockingly high rates of cyber bullying and how parents can help protect their children from cyber bullies.

When you watch the interview below, you’ll hear Kim’s insights into

  1. The number one thing parents can do to prevent cyber bullying
  2. How to best communicate with your children about online etiquette and bullies online
  3. The importance of monitoring your child’s online activity and how best to do so without being too intrusive
  4. Teaching your kids to think about their online postings and its effect on others and potentially themselves (as it pertains to getting into college or securing a job)
  5. What to do if your child is indeed a victim of cyber bullying and the appropriate steps to take with school administrators, other parents and even law enforcement

Watch the interview here.

Posted in PR, Social Media | Tagged: , , , | Leave a Comment »

So Your Corporate Twitter Account’s Been Hacked

Posted by Levine Communications Office on February 22, 2013

By Scott Bixby

0219-tweets-hacked-2inline405

The back-to-back hackings of Burger King’s (BKW) and Jeep’s official Twitter accounts have big companies scrambling to lock down their social media channels. These hackings, both allegedly perpetrated by a New England DJ, have brought attention to the alarming security holes on many social networks—and the ease with which hackers from Beijing or Baltimore can take over your online identity.

How do I know when a corporate account has been hacked?
“If it’s your personal account, oftentimes people will notify you once you’ve started tweeting out things that seem out of character,” according to social media and corporate brand strategist Kim Garst. “For example, if the hacker has started using your [Direct Message] function on Twitter to send links to your followers, they’ll typically let you know on some other platform that someone has hijacked your account.” For followers of corporate accounts, however, it may not be so simple. In addition to flagrant abuse of the “Caps Lock” key, the first indicator that your account has been hacked is blatantly “off-message” posts. Burger King’s account instructed followers to “Look for a McDonald’s in a hood near you.” During Jeep’s hacking, the company’s official account declared that “We just got sold to @Cadillac because we caught our employees doing this in the bathroom,” with an attached photo of a man with a prescription pill bottle. In short: If a corporate account isn’t trying to sell its own product, and says so in all capital letters, the password security has likely been defeated.

Read the rest of the article at Bloomberg Businessweek

Posted in Uncategorized | Tagged: , , , , , , | Leave a Comment »