Man bites Dog…

Well that headline makes no sense. Or does it? Let’s think about those words - and how they might possibly relate to information technology.

The message is tantalising, thought provoking and if man really did bite dog, it’s newsworthy. As a headline it’s short, sharp and to the point – subject, active verb, object.

At PR Deadlines we like to craft all our messaging to the infotech world like that, in clear concise language across the entire communications spectrum: news releases, thought leadership,  videos, pitches, direct mail, ads, lead generation – everything.

It’s a style derived from the Boss, who spent 15 years of his working life writing and editing for newspapers and news agencies worldwide before being lured to the Dark Side (PR).

One of the publications he graced was a tabloid (which must remain nameless), where journalists were instructed to write for people ‘whose lips move when they read’…

Being a simple man, he insists that we all write in clear, concise terms. Although we don’t find too many men biting dogs among our infotech clients, we strive to apply this methodology (you see, we know big techie words) to everything we do.

We use it when unravelling the complexities of our clients’ IT solutions and presenting facts and figures to target audiences with a clarity that compels attention.

Our man-bites-dog style applies equally to today’s digital world, where content is presented in blog and social media formats. Here, short, sharp wording is truly essential since information is condensed into short, engaging, easily-digested pieces. Or should be.

Our clients are smitten – or should that be bitten!

Author LUKE FROST, Director, PR Deadlines

luke.frost@prdeadlines.com.au

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

RECOVERING FROM RANSOMWARE

Ransomware is a type of malware that blocks access to your files and systems until you pay a ransom.

The first example of ransomware happened on September 5, 2013, when Cryptolocker was unleashed.

It quickly affected many systems with hackers requiring users to pay money for the decryption keys.

Find out how one company used backup and cloud storage software to protect their company’s PCs and recovered all of their systems after a ransomware strike.

DOWNLOAD THE REPORT!

 

Popular News

 

Telecommunications