Tag Archives: Zoom

Aliya Thomas

In this New Normal, executives, leaders and entrepreneurs are all working remotely outside the office where professional dress codes are not required. But professional style and presentation still remain integral to achieving your business and personal goals. It can — and should — be used strategically to reinforce the reputation you want to establish, amplify, or reset.

How you dress and present yourself, even on Zoom, signals the strength of your value to your present and prospective audience, clients, and partners. This balancing act is more challenging now.

With this in mind, we consulted Aliya Thomas, a nationally-known executive image manager, and founder and director of the consulting firm, Elevated Style By Aliya.

Elevated Style specializes in creating high-impact wardrobes for thought leaders, high-level and rising entrepreneurs, and ambitious powerhouse professionals through a simplified and personal approach. In addition to virtually consulting personal clients, Aliya Thomas presents to many organizations and corporations via educational style workshops. Examples include Google, The Network of Women NYC, Philip Lim, Urby, Luminary, and Signature Leaders.

“As a professional powerhouse making bold moves, you not only need to play the part, you need to look the part,” she says “When you elevate your style, you elevate your life. This is true more than ever now that we are all online.”

Our interview:

On Zoom and other virtual meeting platforms, we see everything. What mistakes do you see many of us making?

A common mistake I see virtually is wearing colors that are dull and washed out.  I encourage clients to work with their “signature power colors”.  Power colors are different for each person, depending on personality and complexion. When I help clients identify their signature style, color is a big part of that. The use of color and color placement can speak volumes.  The right color can be a powerful expression of personality and presence. 

Also, virtual presence is not only about what you are wearing, but it’s also about your set- up.  You could look great, but if your background is too distracting, if your lighting is dark and creating shadows, or if your computer is not at eye level, it all affects your professional virtual presence.

What should we be doing?

Just like anything else in life, creating a signature wardrobe starts with a plan. Create at least five options from the waist up, that you feel your best in.  Don’t forget jewelry, color, and layering pieces to add contrast and interest. Rotate these options to create variety.  However, simply creating these options and your wardrobe plan is not always easy for most. I help clients discover their signature style by helping you start with discovering “Your 3 Words.”  These are the three words that best describe who you are, and what you want your image to “say” about you.

You are often called upon by major organizations, to brief their employees on using style to build and expand careers. What is your most common advice?

We have all heard it before. You have to dress the part to BE the part. The challenge is, even though a lot of my clients are extremely successful and great at what they do, when it comes to image and style, some lack confidence in their choices and are stuck with “the how”.  When it comes to elevating your image in an authentic way with impact, outsourcing a qualified personal stylist can make a positive difference.  Not only will you elevate your image confidence, but you’ll also do the same for your personal brand image.  We have less than seven seconds to make a great first impression. Make them count. 

What are your top tips for men and women who want to reboot their image to present themselves now more effectively?

When creating your signature professional look, you always want to stay true to yourself and be authentic. However, no matter your age, body type, or career level, both men and women should consider these top three tips when you are rebooting your wardrobe.

1.  Focus on “The 3 F’s” … fit, fabric, and function. 

Time and time again I see many wearing clothes that are simply too big or too small, especially men.  Finding a go-to tailor is key for that polished look. Tailoring is not just for suits. A good tailor is one of the most valuable tools you can have in your arsenal.  Invest in great quality fabrics that are natural and breathable. Not only will they be more comfortable: they will last longer and naturally look more put together.  As far as function, think about how  you spend the majority of your time. If you spend 75% of your time in professional clothing, 75% of your wardrobe should represent that.      

2. Shoes matter.

When it comes to shoes, it’s all about quality over quantity. You only need a few pair of great shoes that are purposeful to various occasions.  It’s important to rotate them to keep your shoes in good condition. Invest in quality materials and pay attention to comfort, or you won’t wear them.   Always keep your shoes clean, unscuffed and modern. An outdated shoe can make or break a look.       

3.  Don’t forget the face!

With more business being conducted virtually, the face is even more important. This is more of an image tip as opposed to style.  Gentlemen, find a modern haircut for your face shape. This is huge.  This also goes for eyewear. The right glasses and haircut make a world of difference. Ladies, the same goes for you.  Women also need to consider make up and jewelry. I always suggest playing up your eyes OR your lips, not both at the same time.  And don’t be afraid of a little color on your lips.  It brightens your face and brings attention to your words.  The same goes with earrings and necklaces. Choose one or the other to highlight. Professionally, a delicate or statement necklace, with low-profile earrings work best. Wearing bold earrings virtually tend to be more distracting.  Those work best for nights out or casual weekend looks.

Read the Elevated Style Blog. Follow Aliya on Instagram at ElevatedStylebyEliya.

This is part of our continuing series of interviews with experts whose work relates to online reputation management.  

 
 
Joel Wallenstrom , Wickr CEO - Reputation Communications Interview

Like you, we hear a lot about hacking of private and organizational emails, texts and other privacy breaches, as well as foreign actors eavesdropping on the phones of major U.S. corporations. Jeff Bezos is just one example of a V.I.P who was recently in the news after his personal texts became an international news story. Experian’s infamous 2015 breach, in which millions of customers’ private data became public, is another. Government and political leaks are a whole other category. When these confidential personal or corporate communications become public, we wonder why they were not sent out on private channels.

We turned to Joel Wallenstrom, CEO of Wickr, which provides end-to-end encrypted platforms for individual, corporate, government and enterprise users. We asked him to help educate our readers about their options—and why they are at more risk of a breach than they realize.

Even supposedly “secure” platforms are actually not. Snapchat was recently in the news because employees spied on clients’ private messages. Gmail is reportedly exposed to many third parties. How does Wickr address this problem?

Many people don’t realize that providers of collaboration tools like email, text, videoconferencing and file management services underwrite the cost of delivery by getting access to your data, selling it, and/or monetizing it. This is their profit source and the basis for the huge valuations for companies like Slack, Uber and Zoom. Third-party developers of such apps often can access your messaging, location, preferences, habits, and more.  If you are conducting business on an app like WeChat, for instance, the Chinese government is able to read your messages. New popular collaboration tools like Slack are built to give the services provider access to all your communications.  This creates a path to your sensitive files, communications and data.

 Many executives don’t realize that enterprise security, risk and compliance professionals often prefer non-encrypted email platforms because it allows them to identify bad actors within a company and to track potentially suspicious behavior.  This is called telemetry, which essentially means they are collecting everything so that they can see everything. But this gives those who utilize it a great deal of power.  In the recent case of Snapchat, their security team abused this power, appropriately named “God Mode,” to access customer data.  So, when you use mainstream systems, realize you and your team are not the only ones with complete access to them. Your security team, the service provider, and adversaries smart enough to ride their coattails also have access.

Wickr is different. We are the only service provider that has no ability to see clients’ messages, files, calls, videoconferences, and other data. If Wickr is ever breached, the data sent on our system is safe. We provide “clean pipes” for data and enable clients to completely wipe their phones and systems in accordance with their retention and deletion policies.  Further, we provide the ability to store data in their secure archives for as long as clients need.  Because we don’t have access to users’ data and therefore cannot sell or monetize it, our revenue comes from a fee to our corporate customers. We maintain a free service for individuals and small groups.

 Why do so many prominent people in business and elsewhere continue to feel confident about sending the most intimate information via text?

Because it’s easy—and because 98% of people in business don’t understand encryption or how it works.  The phone companies and big tech companies have distributed their technologies en masse, and encryption historically has not been a part of them.  We’ve seen small changes with Apple embracing privacy as a way to differentiate their products and services.  Slack and Zoom are new products that people love to use because they are easy—but they are not secure.  Data privacy is becoming something that people will pay for, or at least influence their purchase decision.  It’s now up to those of us in the privacy industry to make products that are easy to use like Slack and Zoom. It’s a big responsibility and one we take very seriously at Wickr.

 Are there still major organizations that continue to use old platforms for internal and external emails? We hear there are plenty and that it is a cost-cutting decision.

The better question is whether there are major organizations not using old platforms. The biggest change I’ve seen has not been to the underlying technologies, but rather how those technologies are managed.  Email retention policies are a good example.  After the John Podesta incident, many Chief Information Security Officers (CISOs) instituted email retention policies so that emails didn’t simply stick around forever.  But even that commonsensical move proves to be difficult to implement in large organizations, and chief information security officers often feel burned.  Therefore, when the C-Suite asks the security team to adopt really secure and really private enterprise collaboration products like Wickr Pro, the CISO delays, looking for the support of legal and compliance and IT.  This delay simply pushes sensitive communications to consumer products on their own devices that are not managed by the enterprise.  Products like WeChat, WhatsApp and Telegram are dangerous venues for sensitive corporate communications. We are left with a mix of executives sending sensitive business communications on their phones on personal apps managed by China or Facebook, and then sending insecure emails and documents when they need to use a work issued machine like a laptop.  It’s the worst of both worlds.

 What are the most common concerns you hear from CEOs and risk executives regarding adapting to secure communications?

There are three primary concerns: first, they worry that the technology will be too expensive; second, that it will not work at scale; and third, that encryption will somehow aggravate their regulators.  The last point is very important as there are industries that require retention of certain communications for compliance purposes.  There are strong and flexible end-to-end encryption products that conform to any data retention and data deletion policies.  On the contrary, when employees use consumer apps to conduct business, they are unable to conform to any rules or regulations set forth by their organization.  As I mentioned before, it’s up to the privacy industry to make things easy to use and manage.  This is not an easy task, which is why you see most apps simply being sold in app stores and providing no service or integrations with enterprise software management tools.  This is the challenge we took on with Wickr Pro.  We want organizations to have a point of view on data protection and give them powerful tools to protect and control their data.

Wickr offers highly secure, out-of-band communication channels that deploy to provide the necessary capabilities in times of crisis. When were these developed and what type of crises are they used for?

Wickr was originally deployed for very select uses for journalists and NGOs working overseas.  The technology was configured for users whose communications were so sensitive that interception was a matter of life and death.  That product still exists, but we have been more focused on building Wickr Pro atop this platform to create more flexible and general-purpose products.  We think that small groups and large organizations can benefit from the same level of protection needed by warfighters and NGOs.  We’ve simply given people more control over how the product is used.  For example, rather than require that all messages are destroyed after 7 days, an organization might configure WickrPro to mimic their email retention policy and have messages delete after 90 days.  Further, Wickr Pro does not require anonymity, so large organizations can easily deploy at scale using single sign on (SSO). The strength of our cryptography remains— we’ve just made it easy to use.

Wickr’s ephemeral messaging feature allows administrators and users to set self-destruction timers for messages as short as a few seconds. What types of professional situations are those most used for?

The feature set goes far beyond setting a self-destruct timer for an individual message.  Teams can be set up in a security group that has its own settings.  The executive team, for example, can be its own group so that they can send messages to Wickr users outside their company, such as to their law firm or a business partner.  Another group can be set up for interns where nothing is stored for more than a week and they can only communicate internally. I’ve seen executives set self-destruction timers, which we call “Burn on Read” in WickrPro, for messages as short as a few hours when they are sending pictures of whiteboard notes from a Board of Directors (BOD) meeting.  That way, the pictures do not remain on their devices after the notes have been documented by their executive assistants.  I’ve also observed campaign staffers use settings as short as seconds in a group message during a candidate speech given in the 2018 elections. In those same elections, polling data and opposition research reports would be transmitted in secure Wickr Pro rooms that ensured the data was deleted from end user devices after a week when the next round of data was distributed.  With flexible controls, different use cases can be enforced and even orchestrated.  There is nothing exactly the same across all WickrPro customer deployments, except that Wickr cannot touch their data.

*

Joel Wallenstrom has led top white hat hacker teams responding to some of the most high-profile incidents in the past 20 years. Under his leadership, Wickr has pivoted the company from solely offering a free consumer product to a robust enterprise compliance ready, secure collaboration platform used by the Fortune 500 and top federal organizations. Prior to joining Wickr, Joel co-founded iSEC Partners, one of the world’s leading information security research teams, later acquired by the NCC Group. Joel also served as the Director for Strategic Alliances @stake, one of the very first computer security companies, which was acquired by L0pht Heavy Industries and was itself later purchased by Symantec.

*

This is part of our continuing series of interviews with experts whose work relates to online reputation management.