Katie Jewett

UPRAISE + rbb: Expanding our reach, elevating our impact

Join

Sign up for The UPSIDE monthly newsletter for the latest industry news and company updates!

Blog

To keep up with what's going on at UPRAISE, get tips about marketing and PR best practices and read our commentary on communications issues, check out our blog regularly!

Featured

How to Market an Acquisition: Proven Strategies for Success

How to Market an Acquisition: Proven Strategies for Success

Communications agencies, like most businesses, grow through organic expansion and acquisition. Each strategy has its benefits. Organic growth demonstrates there is genuine demand for the agency’s services, a loyal client base is in place and robust internal...

What is Public Relations? PR Definition Fully Explained

What is Public Relations? PR Definition Fully Explained

What is public relations, and why is it so misunderstood? pub·lic re·la·tions /ˌpəblik rəˈlāSH(ə)nz/ noun The professional maintenance of a favorable public image by a company or other organization or a famous person. – Oxford Languages A strategic communication...

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Focus

Learn More about Our B2B Tech and Financial Services Capabilities

What is Segregation of Duties in Cybersecurity?

What is Segregation of Duties in Cybersecurity?

The fourth industrial revolution has brought about an increased risk of cyberattacks.  In the following sections, we discuss the segregation of duties, one of the key concepts in protecting your organization, as the risk of cyberattacks poses increased organizational...

read more
The SLAM Method for Phishing Detection

The SLAM Method for Phishing Detection

A nearly ubiquitous reliance on networks in the business world has made companies more prone to cyberattacks than ever. Yet, hostile actions are not always high-tech.  Phishing is one of the most common forms of social engineering attacks. In this article, we discuss...

read more
What are TTPs in Cybersecurity?

What are TTPs in Cybersecurity?

Cyberattacks are on the rise and are likely to increase significantly throughout 2024.  Given this reality, it’s more important than ever that companies understand how to mitigate these threats.  TTPs are one method of studying how hackers get into networks. In the...

read more
CES 2024: Are You Ready?

CES 2024: Are You Ready?

CES is the world’s biggest, most influential tech conference, taking place in Las Vegas from January 9-12. This year’s theme is All Together. All On and we’re expecting a massive audience with companies going all in about the hottest tech topics, including artificial...

read more
LinkedIn Do’s and Don’ts

LinkedIn Do’s and Don’ts

Professional networking is pivotal in career advancement, and maintaining an updated LinkedIn profile is more than just a formality — it’s a strategic necessity. Your LinkedIn profile is an online representation of your professional journey, skills and...

read more