Digital Marketing and Cyber-Security

Objectives of my posts and target audience.

  1. The objectives of my posts are:
  • To inform vulnerable people of possible undesirable consequences from Digital Marketing
  • To give advice on how to protect yourself from those consequences
  1. My target audience are:
  • Anyone and everyone in today’s day and age



I have used Google Keyboard Tool to find out Demand for the following keywords:

  • Digital marketing
  • Cyber Security
  • Digital Marketing and Cyber Security
  • Digital Marketing Cyber Security

Screenshot (49)

Figure 1. Print Screen from Google Keyword Tool.

Then I was using allintitle: function to determine Supply for the above keywords.

Screenshot (54) Screenshot (55) Screenshot (56) Screenshot (57)

Figure 2. Print Screens from Google allintitle: function.


The idea for good content is to find keywords that gives you high demand and low supply.


I could not come up with such keywords, and my objective is to discuss clients’ security on-line.


Competitive Analysis

There are many websites informing about Customer Data Protection form an organisation point of view.

What could I do different or better?

I would like to discuss Customer Data Protection from a customer point of view.

I decided to break down my topic into 4 posts:

  1. Basic Terms you need to know to understand the risks.
  • Digital Marketing
  • Cyber Security
  • Big Data
  1. Caring before Sharing
    • Understand the Responsibility
  2. Free cheese is only in a mouse-trap
  • Two examples of extreme Cases
  1. Ways to be safe while surfing the web
  • 5 Rules

Basic Terms you need to know to understand the risks.

5 W’s of Digital Marketing.

What: is the promotion of product/service via a form of electronic media.

Who: Companies, Brands, Individuals.

Why: To benefit Marketing efforts – gain more customers.

To build and enrich relationships with customers.

To provide better Customer Support.

Where: Mainly Internet, but also mobiles phones, display ads, etc.…

When: Since 2010’s but it has roots in 1980’s.

Digital Marketing continues to grow and develop.


Marketing is all about meeting the needs and wants of customers. They do not buy what is being sold, they buy what has value to them. Marketing focuses on consumers’ interests, experiences and satisfaction, to create a personalised experience to each customer.


Cyber Security is the protection of Information Systems form theft or damage to the hardware, the software, and to the information on them, as well as from misdirection of services they provide.


Big Data.

There is no particular definition of Big Data. I am going to use definition from :

“The ability of society to harness information in novel ways to produce useful insights or goods and services of significant value.”

I am sure you can find yourselves some information on Big Data and its uses; for the topic I am going to talk about, it is enough to see that Data and Information is a Valuable Source, and breaching Security is a serious offence.

Caring before Sharing.

Why is there Big Data? – Because Data makes money.

Why is there so many promoting ads? Do you really believe that someone is interested into selling you stuff?

Why are there Cyber Attacks targeting information on computers?

  • Because Information has a Bigger Value that you think.


People were living on Earth thousands of years, and statistics tells us we have created 90% of the world data in less than last 2 years. Does it make sense? – No. It means that information was not captured in any form (capturing was limited).


The next question to answer is: Why do we need to store so many details? I will leave it to you to meditate on it.

Free cheese is only in mouse-trap.

This is a very popular Russian saying. I like it because it’s true.


Let’s have a look at the following examples of people having too much trust.


Case 1. Munich shooting that happened on 22nd of July 2016.

Police said Sonboly appeared to have hacked a Facebook account and sent a message urging people to come to the McDonald’s in the Olympia shopping centre if they wanted free food.



Case 2. Conning Pensioners from 2005 to 2009.

The defendants identified victims, or “leads,” by purchasing from list brokers the names and contact information of U.S. residents who subscribed to sweepstakes lotteries.

From my personal observation I can tell that the more scams and scammers get detected, the more inventive they become.


It still does not tell us how to avoid them but maybe we can learn from them.

Ways to be safe while surfing the web.

Rule Nr 1: It is not possible to 100% protect yourself from being scammed on the web.

Rule Nr 2: Get to know more about Cyber Security and do steps for preventing information leakages on your computer.

Rule Nr 3: Share your personal information only when it is really needed and you are confident about the second party.

Rule Nr 4: Don’t subscribe to organisations if you do not have any reason to.

Rule Nr 5: Don’t expect too much favouritism: “free cheese is only in a mouse-trap”.