Soho Insights blog

Using a clever snippet of code and the power of LinkedIn it is possible to track visitors to your website to an individually-identifiable level. The implications of this are broad. Head off competitive threats before they emerge, follow up with qualified leads as they first visit your site and build a truly accurate picture of your real website audience like never before.

Using LinkedIn Analytics to Generate Leads

Hacking Twitter Growth for Social Influence

2015.12.24 | Social Influence

Even if you're not "relatable" or know so little about pop culture you think Kim Kardashian is a Disney star (God save the children), this article on hacking Twitter growth is for you, containing a series of above-board techniques to quickly and easily grow your Twitter following - starting with high-power influencers.

Hacking Twitter Growth for Social Influence

What is Inbound Marketing?

2015.12.22 | Inbound Marketing

These days every agency is an 'inbound marketing' agency. In the digital strategy world, 'inbound' is most certainly the flavour of the month and for once, because the BS hype and lingo are justified by the efficacy of the product they describe, there is really nothing wrong with this. So what is inbound marketing?

What is Inbound Marketing?

4 Quick Hacks to Write Better Copy

2015.12.19 | Copywriting

Learning to write good copy requires patience and skill. But for us mere mortals, there are some fly-by-night quick hacks and rough-'n'-ready rules you can take away today that will instantly enable you to write better copy. In this article we cover four game-changers that will make your copy rock.

4 Quick Hacks to Write Better Copy

Considered the “biggest, most systemic risk” threat the insurance industry faces and a growing "national emergency" by the US government itself, the threat of cyberattack is real and present. Most organisations fail to realise the ways in which they are targets however and thus continue to underinvest in cybersecurity. This article introduces the four main tools at the disposal of policymakers seeking to improve cybersecurity at large.

Ensuring Socially Optimal Investment in Cyber-Security

Moving from Dropbox to BitTorrent Sync

2015.08.02 | Cybersecurity

Dropbox is a trusty tool used by teams and businesses around the world to communicate. But is there anything better? In a resource-intensive fast-paced environment Dropbox can seem slow and bottleneck progress. We wanted to know whether a new tool from BitTorrent, Sync, could outperform.

Moving from Dropbox to BitTorrent Sync

Generating Secure Passwords

2015.01.10 | Cybersecurity

Generating secure passwords is easy, quick and simple. In this article we cover what makes a strong password, how to remember dozens of complicated ones, how to avoid reusing the same password more than once, and how to quickly create random passwords on the go.

Generating Secure Passwords

Enabling Multi-Factor Authentication

2015.01.10 | Cybersecurity

Multi-factor authentication adds an extra layer of security to your usage of websites like Gmail, Facebook, Twitter and Apple - as well as business-critical and often data-sensitive tools like AWS, Dropbox and Namecheap. Find out how you can enable multi-factor authentication on all these sites and more in this article.

Enabling Multi-Factor Authentication

Protecting Against Spearphishing Attacks

2015.01.10 | Cybersecurity

Spearphishing is a targeted, disguised type of attack on an individual or organisation, appearing to originate from a known or trusted entity. Increasing in sophistication and number almost daily, even small businesses and operations now have consider how they might safeguard against such attacks. In this article we explore how.

Protecting Against Spearphishing Attacks

Recommended Password Managers

2015.01.10 | Cybersecurity

Security conscious web users are well-aware that they should avoid reusing the same website across multiple websites. But how practical is it to have a hundred different passwords for as many different online services? Without a password management system such a feat becomes nigh-impossible. Here we take a look at three leading password managements solutions to help you determine which one is right for you.

Recommended Password Managers
Have a project you'd like to discuss? Email us Private & confidential