Sunday, December 4, 2016

Is Cold Calling Dead?

Why is it so hard to decide whether or not Cold Calling is dead?

If you are a Sales Professional and you’ve spent any time on Linkedin, you’ve probably seen a post or article claiming that Cold Calling is dead. Click one of those links and prepare for comments and discussions more polarizing than the Presidential Election! On one side are tech-savvy, new school sales people claiming that clients don’t want to be interrupted and will resent you for calling their phone and the other are industry pros who have built their living by picking up the phone and winning the “numbers game” of sales. If you isolate the loudest and most defiant members of each group, you are probably looking at people that are either too afraid to interrupt their clients or outdated sales people who rely on relationship selling and are afraid to change.
So what’s my take?
I don’t think that selling has really changed that much over the last 30 years.
I think that the way people make purchasing decisions, manage vendors and leverage technology and information has certainly changed.
These are not mutually exclusive ideas. As a Sales Professional your job is to interrupt your client’s day to present them with meaningful value in a way that builds trust and credibility while also disrupting their status quo. It doesn’t matter how you do it, if you are successful with this then you will enter into meaningful sales engagements. Some organizations choose to pick up the phone. Some stop by in person. Some deploy complex marketing and lead generating strategies that fully vet each prospect before allowing sales to call them. The last one may sound different than the others, but it’s not. Marketing is still sending someone an email. You are still directing someone to your website, when they weren’t necessarily seeking you out. You are still presenting information on Linkedin that someone decides to read during their day.
I expect that most readers would jump to the conclusion that I believe Cold Calling is alive and well. Here comes the bomb…
Cold Calling is dead. It has been dead for a long long time. In fact, it died the instant that most business people and consumers had consistent access to a telephone. It died the moment that it was no longer novel to receive a phone call. The moment people stopped saying “Yay my phone is ringing! I can’t wait to see who it is!” and started saying “who is calling me? Why can’t they just text or email me? I am busy.”
If you pick up the phone and call someone with a simple pitch or obviously generic talk track that doesn’t provide value to the person you are calling or show that you have done your research, then whoever answers will most likely not be happy to talk to you. But this has been the case for a long time.
If you look back at many of the most successful sales strategies of their time, Spin, Sandler, Solution Selling, none of them encourage sales people to make high volume, simplistic phone calls with the intention of closing a transaction or setting an appointment. Typically, you are leveraging your knowledge about a specific client to create a paradigm shifting situation that clears the way for a sales engagement.
So as a Sales Professional, consider what you would do in the following situations:
  • You don’t know when a particular prospect will be in their buying cycle.
    • You could invest in technology that evaluates prospect’s purchasing history, web traffic and infrastructure to create targeted marketing  that drive inbound leads to you so you know exactly when they are in the market.
    • You could also pick up the phone and ask.
  • You know that your service is a perfect fit for a prospect based off of the success you recently had with a similar company.
    • You could create original content around the case study and plaster it all over Linkedin consistently for a long period of time. Connect with your prospect and drive their interest.
    • You could try to find a referral from your network to connect you to this prospect and get you in the door.
    • You could reach out over the phone email to a number of mid level people within the prospective and build interest around your solution and get sponsored up to the decision maker.
    • You could launch a prospecting campaign towards the decsion maker that includes the phone, stop by’s in person, linkedin connections and emails.
At the end of the day it is my belief that none of the examples I shared would be considered Cold Calling. If you consistently leverage your CRM and build off your past prospecting efforts and information you have gathered, you will be able to improve your messaging and approach over time. At some point you will have relevant enough content to secure an appointment. And what’s one way to reach your prospect to do this? Pick up the phone.
By: Brad Young, Regional GM QBSI-East

Recent IoT-based DDoS attack Puts Businesses at Risk


What workplace issue keeps the top CIO’s up at night?

Of all the workplace issues keeping CIO’s up at night, the most worrisome for IT executives is security and downtime associated with IoT-based DDoS attacks, according to a December 2015 study of 276 U.S. CIO’s and executive IT professionals commissioned by Sungard Availability Services (Sungard AS).
The recent cybersecurity attack using connected devices, or the Internet of Things (IoT), was serious, unusual and even historic.  It also is a taste of the disruptions to come, say security experts.
The attack, which affected a number of major websites, reportedly used internet-enabled camera’s and multi-function printers (MFPs) as a platform for a Distributed Denial of Service (DDoS) attack.  These websites included large Infrastructure and Software as a Service providers Amazon, Netflix & Microsoft including Social Media sites Facebook & Twitter. The attackers exploited manufacturer-set passwords that hadn’t been reset by users.
Thousands of new devices are connected to the Internet daily. Some of these devices may be running low-power processors incapable of supporting sophisticated security.  Embedded devices continue to operate for years after their last software patch.

Providing Security Beyond the Device

Today, any multi-function printer (MFP) firm with a product or a service is potentially an IoT vendor. IoT security poses unusual risks as it is one thing to steal usernames and passwords and take intellectual property or money, but it is an entirely different matter to gain access to systems that can physically disrupt and interfere with people directly.  Any connected device such as a printer with cardkey internet access, can be hacked.
Customers recognize Xerox as a trusted provider of secure solutions with a wide array of security capabilities. A majority of the Xerox MFP line include features to protect the printer from unauthorized remote access and protect the confidentiality of “data in motion (1),” specifically customer jobs which are transmitted to the printer over the network. Many businesses recognize a need to bolster information security outside their devices from a network level.
Through collaboration with Cisco Systems, a worldwide leader in network security, addresses this challenge. Powered by Cisco’s Identity Services Engine (ISE), Cisco TrustSec is an intelligent solution providing more secure access to a client’s network resources while supporting BYOD work practices. With this policy control platform in place, companies can reliably enforce compliance, enhance infrastructure security and simplify service operations.
TrustSec ISE is a thoroughly tested and proven system that enables clients to easily deal with the increasing proliferation of network endpoints – including MFPs, printers, tablets and webcams – and deploy security policies more quickly. Cisco ISE Profiling Services provides dynamic detection and classification of endpoints connected to the network.
Cisco ISE allows a client to deploy, control and monitor Xerox devices, including:
  •  Automatically provision and grant network access rights to printers and MFPs to prevent inappropriate access (including automatically tracking new printing devices connecting to the network)
  • Provide simplified implementation security policies for printers and MFPs
  • “Firewall” the printing devices to prevent general access to printers and MPFs in restricted areas
  • Automatically prevent connection of non-approved print devices
  • Configures network wall jacks to only allow a specific MFP and reject all other network enable devices
Collaborating with confidence while reducing TCO

Xerox devices coupled with Cisco ISE, deliver comprehensive security by integrating Xerox devices within a client’s network infrastructure. It’s my belief that together they dramatically reduce cost of ownership while delivering world-class monitoring and troubleshooting features designed to streamline operations for your customer service, help desk and support teams.
Finally, all technology leaders need a relentless focus on today’s operations and a business strategy with a strong view of changing external trends ahead.  CIOs must be aware of issues that affect their security, their organizations’ availability and their ability to attract and retain strong talent in order to be best prepared for what lies ahead and to help them be more competitive.
By: Steve Loring, Strategic Account Manager, QBSI-East
1. Xerox and Cisco: Securing Your Networked Printing Devices – White Paper