fbpx

Veronika Henry

PROCEPT MARKETING

DDoS Mitigation

Stopping DDoS attacks—or mitigating them—is a multifaceted process. We begin in prevention protocols: these include manual and automatic software updates and security patches for routers and other network hardware, firewalls, servers, PCs, or other workstations and all connected devices. 

What is a CDN?

A content delivery network (CDN) distributes your content and boosts performance in part by minimizing the distance between your websites visitors and the content. CDNs store cached versions of content in multiple locations (points of presence or PoPs); each PoP may contain many caching servers that deliver content to nearby visitors. CDNs subsequently mitigate the impact of a DDoS attack by avoiding a single point of congestion, when the attacker is trying to focus on a single target.

Security Information and Event Management (SIEM) or Security Analytics systems provided by the Host Company are used to recognize and establish normal traffic patterns and ultimately develop rules for the filters by allowing users to study aspects like payload, signatures, origin IP addresses, cookies, HTTP headers, and Javascript footprints. Built-in analytics give you deeper insights into your traffic patterns, threats observed (and blocked) and logs can also be integrated with third-party SIEMs. CDNs can then be configured with these scrubbing filters to prevent huge amounts of fake traffic from causing more than a momentary blip.

What does Procept do to mitigate DDos Attacks?

Our unmetered, always-on DDoS protection for your web assets (HTTP/HTTPs) works in tandem with a cloud web application firewall (WAF), Bot Management, and other L3/4 security services to protect assets from cyber threats of all kinds. Connected to servers in data centers that span 200 cities across 100 countries runs the full stack of DDoS mitigation services. 

In addition, our selected hosting provider furnishes a reverse proxy service that provides DDoS protection for any application (not just the web), such as FTP, SSH, VoIP, gaming, or any application running over a TCP/UDP protocol. This service comes with built-in load balancing and traffic acceleration for L4 traffic.

Our selected host provider’s enhanced server security provides BGP-based DDoS protection for network infrastructure, either in always-on or on-demand deployment modes. Data centers announce customer subnets to ingest network traffic and mitigate threats close to the source of attack. Centralized and decentralized mitigation systems work in concert to identify and mitigate most DDoS attacks in under 10 seconds (3 seconds on average). Preconfigured static rules are deployed in less than 1 second. In addition, the network capacity of 42 Tbps is well equipped to defend against the largest threat.

Our chosen DDoS mitigation solutions follow reliable, tried-and-true industry standards following the strategies of publicly traded Industry pioneers.

Graphics Recap-December 2022

Here are a few of our favorite graphic design projects from local Acadiana businesses & organizations from this past Fall!

Krewe of Rio is a staple of Lafayette Mardi Gras. They organize events year-round in preparation for the Mardi Gras season, and Procept Marketing is proud to play a part in their festivities. Through social media marketing, Procept has created engaging content to increase engagement, while also having a little fun as well. Which float rider are you? 

Pour Decisions is a local event organizer and promotion company, with a focus on the bar and alcohol industry. Procept Marketing was given the opportunity to design a T-shirt for them. The design was so popular, that it was picked up by Legends and has been sold at a number of events throughout Lafayette! 

Acadiana Dream Home is a custom home-building company that specializes in creating luxury homes from scratch. They approached Procept Marketing looking for a logo and a website. After they sat down with our graphic designer and web designer, we got to work to produce content they would be proud to show potential customers. 

Black Child Thrive

Black Child Thrive is an apparel brand with a focus on catering to black children in pursuit of proper representation in an industry where there is little in the way of black models or clothes designed with black children in mind. Procept Marketing is proud to have been able to create a stunning logo for Black Child Thrive. 

Acadiana Haul Away & Junk Removal contacted Procept Marketing looking for a logo design that would represent the company in a professional way. After sitting down with our graphic designer, we were able to design a professional logo based on their wants and needs for their business!

Want vibrant graphics made by cool people who get you? Let’s talk!

DDoS Mitigation

Stopping DDoS attacks—or mitigating them—is a multifaceted process. We begin in prevention protocols: these include manual and automatic software updates and security patches for routers and other network hardware, firewalls, servers, PCs, or other workstations and all connected devices. 

A content delivery network (CDN) distributes your content and boosts performance in part by minimizing the distance between your websites visitors and the content. CDNs store cached versions of content in multiple locations (points of presence or PoPs); each PoP may contain many caching servers that deliver content to nearby visitors. CDNs subsequently mitigate the impact of a DDoS attack by avoiding a single point of congestion, when the attacker is trying to focus on a single target.

Security Information and Event Management (SIEM) or Security Analytics systems provided by the Host Company are used to recognize and establish normal traffic patterns and ultimately develop rules for the filters by allowing users to study aspects like payload, signatures, origin IP addresses, cookies, HTTP headers, and Javascript footprints. Built-in analytics give you deeper insights into your traffic patterns, threats observed (and blocked) and logs can also be integrated with third-party SIEMs. CDNs can then be configured with these scrubbing filters to prevent huge amounts of fake traffic from causing more than a momentary blip.

Our unmetered, always-on DDoS protection for your web assets (HTTP/HTTPs) works in tandem with a cloud web application firewall (WAF), Bot Management, and other L3/4 security services to protect assets from cyber threats of all kinds. Connected to servers in data centers that span 200 cities across 100 countries runs the full stack of DDoS mitigation services. 

In addition, our selected hosting provider furnishes a reverse proxy service that provides DDoS protection for any application (not just the web), such as FTP, SSH, VoIP, gaming, or any application running over a TCP/UDP protocol. This service comes with built-in load balancing and traffic acceleration for L4 traffic.

Our selected host provider’s enhanced server security provides BGP-based DDoS protection for network infrastructure, either in always-on or on-demand deployment modes. Data centers announce customer subnets to ingest network traffic and mitigate threats close to the source of attack. Centralized and decentralized mitigation systems work in concert to identify and mitigate most DDoS attacks in under 10 seconds (3 seconds on average). Preconfigured static rules are deployed in less than 1 second. In addition, the network capacity of 42 Tbps is well equipped to defend against the largest threat.

Our chosen DDoS mitigation solutions follow reliable, tried-and-true industry standards following the strategies of publicly traded Industry pioneers.

Privacy Policy

This privacy policy (“policy”) will help you understand how we use and protect the data you provide to us when you visit and use Procept Marketing’s website.

We reserve the right to change this policy at any given time, of which you will be promptly updated. If you want to make sure that you are up to date with the latest changes, we advise you to frequently visit this page.

What User Data We Collect

When you visit the website, we may collect the following data:

  • Your IP address.
  • Your contact information and email address.
  • Other information such as interests and preferences.
  • Data profile regarding your online behavior on our website.
Why We Collect Your Data

We are collecting your data for several reasons:

  • To better understand your needs.
  • To improve our services and products.
  • To send you promotional emails containing the information we think you will find interesting.
  • To contact you to fill out surveys and participate in other types of market research.
  • To customize our website according to your online behavior and personal preferences.
Safeguarding and Securing the Data

Procept Marketing is committed to securing your data and keeping it confidential. Procept Marketing has done all in its power to prevent data theft, unauthorized access, and disclosure by implementing the latest technologies and software, which help us safeguard all the information we collect online.

Our Cookie Policy

Once you agree to allow our website to use cookies, you also agree to use the data it collects regarding your online behavior (analyze web traffic, web pages you spend the most time on, and websites you visit).

The data we collect by using cookies is used to customize our website to your needs. After we use the data for statistical analysis, the data is completely removed from our systems.

Please note that cookies don’t allow us to gain control of your computer in any way. They are strictly used to monitor which pages you find useful and which you do not so that we can provide a better experience for you.

If you want to disable cookies, you can do it by accessing the settings of your internet browser. You can visit www.internetcookies.com, which contains comprehensive information on how to do this on a wide variety of browsers and devices.

Links to Other Websites

Our website contains links that lead to other websites. If you click on these links Procept Marketing is not held responsible for your data and privacy protection. Visiting those websites is not governed by this privacy policy agreement. Make sure to read the privacy policy documentation of the website you go to from our website.

Restricting the Collection of your Personal Data

At some point, you might wish to restrict the use and collection of your personal data. You can achieve this by doing the following:

  • When you are filling the forms on the website, make sure to check if there is a box which you can leave unchecked, if you don’t want to disclose your personal information.
  • If you have already agreed to share your information with us, feel free to contact us via email and we will be more than happy to change this for you.

Procept Marketing will not lease, sell or distribute your personal information to any third parties, unless we have your permission. We will only share your personal information if the law forces us to do so. Your personal information will only be used when we need to send you promotional materials if you agree to this privacy policy.

Hacks Vs. Scams

Each day, people scour YouTube videos to gain insight on new ways to garner attention and clients for their business. Unfortunately, marketing actions that seem amazing might not be as miraculous as they appear on the surface. This article will help you distinguish between marketing scams and hacks that provide value for money spent or time invested.

Here are some marketing hacks the pros use compared with marketing scams you’ll want to stay away from.

1) Scam: Pop Up Windows

For years, entities have utilized throwing pop up windows over websites you visit. They do this so you’ll click on it or subscribe to their newsletter by accident. Pop-ups can be ads, notices, offers, or alerts that open on your computer. Some pop-ups are third-party ads that use phishing tactics—like warnings or prizes. They do this to trick you into believing they’re from a trusted company, so you’ll share personal or financial information. They might also claim to offer free downloads, software updates, or plugins, to trick you into installing unwanted software.

Luckily, web browsers like Safari & Google Chrome offer enhanced pop-up blockers to keep rogue adware activity to a minimum. This method is typically predatory at best and won’t be beneficial for conversions for the majority of businesses.

2) Hack: Opt-ins

Opt-ins are the less aggressive, more friendly cousin of pop-ups. Opt-ins appear on websites after a few seconds, either drawing your attention to something in particular. Things like a new collection, offering you a discount, or asking you to subscribe to their mailing list.

For e-commerce businesses, it’s a great idea to offer the customer something like 10% off for subscribing to their mailer. If you aren’t e-commerce, it’s ok to simply ask your viewer to subscribe to get updates & exclusive updates.

3) Scam: Buying Likes, Followers, Comments & Views

Purchasing likes is the marketing equivalent of buying a lottery ticket—your chances of winning are slim to none. If you think sensically, buying likes represent that you do not have faith in your business idea or content, and you do not think it would genuinely attract people.

Even when you do buy marketing services like this, it is unlikely that they’ll be seen by anyone in any regard. People purchasing marketing hacks like these are easily recognized and typically end up with no added value for their time or money spent.

4) Hack: Guerrilla Marketing

Guerilla marketing is an extremely popular marketing tactic used by marketers all over the world to get customers talking about their business when they can’t afford advertising space on billboards, radio, TV commercials, print media & even social media ads. The word “guerrilla,” in its written form, seems very intense. It conjures images of rebellion and conflict. Put it next to the word “marketing,” and it makes a lot of people ask, “Huh?”

But guerrilla marketing isn’t some sort of combative form of communication. In fact, it’s actually a very unconventional form of marketing in that it raises brand awareness among large audiences without interrupting them. What marketers really enjoy about guerrilla marketing is its fairly low-cost nature. The real investment here is a creative, intellectual one.

As niche as it might seem, there are actually a few sub-categories of guerrilla marketing:

  • Outdoor Guerrilla Marketing. Adds something to preexisting urban environments, like putting something removable onto a statue, or putting temporary artwork on sidewalks and streets.
  • Indoor Guerilla Marketing. Similar to outdoor guerrilla marketing, only it takes place in indoor locations like train stations, shops, and university campus buildings.
  • Event Ambush Guerilla Marketing. Leveraging the audience of an in-progress event — like a concert or a sporting game — to promote a product or service in a noticeable way, usually without permission from the event sponsors.
  • Experiential Guerilla Marketing. All of the above, but executed in a way that requires the public to interact with the brand.

(Hubspot https://blog.hubspot.com/marketing/guerilla-marketing-examples)

5) Scam: Boost Posts = Advertising

Social media management is challenging; it might seem easy on the eye. But mostly, it’s all about planning content, promoting it, and analyzing critical KPIs. Every post that gets published goes into the report, and at the end of the day, you have to generate revenue from social media, or else there is no reason to continue.

For the sake of generating good ROI and showing better numbers on Facebook and Instagram reports, we have seen agencies simply boosting posts without any proper plan and trust us, when you enable boosting on multiple posts with no particular goal in mind, you are losing money.

You must realize that a quick boost in reach does not necessarily translate into more revenues and better ROI, especially even more so in the case of a retail or e-commerce business.

Furthermore, boosting every post is not even recommended. You must know that most of the additional users who might see your post may not be your target audience, and hence they are unlikely to respond to your content.

When you “boost” your posts, you are not advertising, you are simply throwing flyers from a helicopter, and most of them end up on the road (or) in the trash!

In reality, boosting social posts does help a brand but boosting every other post on Facebook (or) Instagram doesn’t make sense. (Mad Tomatoes)

6) Hack: Email Lists

An email list is simply a list of emails that businesses have gathered from visitors/customers that would like to receive information, updates, discounts, and other details about your business in a digital format that is sent to their email inbox.

The numbers for email marketing look good: you are 6x more likely to get higher click-thru rates on an email than on a tweet. Also, email is 40 times more effective at acquiring new customers than Facebook or Twitter.

(https://www.campaignmonitor.com/blog/email-marketing/importance-building-email-list/)

Email marketing helps you not only to build a relationship with your customers, but gives you a proven way to nurture leads and convert them into long lasting customers. No matter what type of business you operate, an email list is the most important element of a successful marketing strategy.

7)Scam: following or inboxing random people on social media

Have you ever maxed out the daily follow button on a social platform? I won’t do it ever again on any platform, this may be one of the most toxic tactics out there.

While following a max number of people a day has the potential to boost your follower count in terms of numbers, it usually reduces your reach in the long run. Most followers notice when something is not right on your profile, and it also triggers a massive red flag with the platforms.

Social platforms are designed to bury content with a low-follower-to-engagement ratio. Facebook is known for such practice. I assume most social media and writing platforms follow in the same footsteps. Think about it. Nobody wants boring content.

What you should do instead of following everyone in your geographical area is find 10 individuals within your target demographics and leave a thoughtful comment under one of their posts.

8) Hack: Review marketing

Happy customers are one of the most effective marketing tools you can get. Their feedback doesn’t just help you adjust your sales or customer service strategy. It can also strengthen brand loyalty, convert more prospects, and power up your SEO efforts. Reviews can be used to raise your business’s value, foster trust in your potential customer, & increase your brand’s authority.

Data shows that 89% of consumers don’t take action until they read reviews. Working to best present reviews to your target audience can help you achieve noticeable results without a high marketing cost.

9) Scam: Cheap Websites

These days, every business needs a website. If you don’t have a website, that should be one of your top priorities to gain traction with your business. However, don’t trust low website-building prices. 

A website is an investment, especially if you want a custom made one. If someone offers to create a website for you and the price is unbelievable, you’ll get what you pay for. The website will likely be poorly designed and may even be a duplicate of another website. If that’s the case, you may get blacklisted by Google for unoriginal content.

Another option is available through large media companies who offer free or low-cost websites in exchange for other contracted services. The problem with that is that when you decide to stop working with that company, you can’t take your website with you and will end up responsible for forking out the cash when you didn’t plan to

Using marketing hacks can have a big impact on marketing campaigns, but it also has the potential to hurt relationships with consumers if done incorrectly.

Graphic File Formats

When designing graphics, you always want to ensure that you have the best quality across all devices without slowing down the page load time. Thankfully, there are so many formats to choose from, but which ones are suitable for logos, print material, etc.. let’s find out!

Before we get into file formats, let’s discuss vector vs raster. Raster images are made up of pixels to form an image. JPEG, GIF, and PNG are all raster image extensions. Pixel proportions are defined based on their resolutions and can become distorted and blurry if stretched to fill spaces they weren’t intended to fill. Vector images are a lot more flexible. They’re made using proportional formulas rather than pixels. EPS, AI, and PDF are perfect for creating graphics that require frequent adjustments.

Now let’s talk file formats. JPEG (JPG) is the most common format. They are known for their “lossy” compression, meaning the images lose their quality when edited and saved multiple times. You can use JPEGs for projects on the web, in Microsoft Office documents, or for projects that require printing at a high resolution. Paying attention to the resolution and file size with JPEGs is essential to produce a nice, quality project.

PNGs are great for interactive documents such as web pages but are not suitable for print. While PNGs are \”lossless,\” meaning you can edit them and not lose quality, they are still low resolution. With PNG files, you can save your image onto a transparent background which makes for a sharper, web-quality image. PNG and JPEG do not differ much in quality when it comes to detail-rich photographs. However, the file size of PNG is much bigger. PNG is, therefore, best used for images that contain areas with a lot of solid colors and sharp transitions.

GIFS are most common in their animated form. Due to the 24-bit RGB color support (up to 256 colors), the GIF-extension isn’t suitable for color-rich photographs. Graphics with solid colors are recommended for this file type. Since the GIF extension is pretty old, it’s not suitable for modern usage.

TIFF, a popular file format amongst graphic designers, is a large raster file that maintains its quality regardless of how often you compress or re-save the original file. It’s often referred to as a lossless compression because of this. Since TIFF extensions are big file sizes, they are less suited for web usage and are therefore better for editing and preservation. 

A PDF file is an Adobe invention and a great universal tool for sharing graphics. If a designer saves your vector logo in PDF format, you can view it without any design editing software (as long as you have downloaded the free Acrobat Reader software), and can use this file to make further manipulations.

EPS files are in vector format and are designed to produce high-resolution graphics for print. It is a universal file type that can be used to open vector-based graphics in any design editor.

PSDs are files that are created and saved in Photoshop. They contain layers that simplify the process of editing images. They only work with raster images as opposed to vector graphics.

AI, an Adobe Illustrator file, is the image format most preferred by designers and the most reliable for images in different types of projects. Illustrator produces vector images and is the easiest to manipulate. It’s the industry standard and more than likely where your logo was originally rendered.

SVGs are vector based images that are great for infinite scaling without losing quality. It’s a very versatile format and is good for the creation of print materials and logos.

Working with images is a lot more complicated than you\’d think. Hopefully this guide has provided a better understanding of the standard file types and which are most appropriate for your design needs.

Buttons: A Crucial Component to Web & App Design

Buttons, an element we use almost every day, often goes unnoticed as their usage is almost second nature.

They are, however, vital in creating positive and productive user experiences. In the Spruced App, an app that connects local professionals with clients, I aimed to create buttons that grabbed the user’s attention and allowed for a simple and intuitive user journey. 

How Can You Use Them?

For a button to be successful, it must be easily identifiable, while clearly indicating the action a user can complete. For the Spruced App, our goal was to facilitate the process of booking services via a mobile app. In doing so, it’s important to have buttons to help guide that process. My first goal in achieving this was to make buttons that look like buttons. Users need to know instantly what is clickable, or in this case ‘tappable’,  and what isn’t. I decided to use familiar designs such as rounded corners and maintained that design throughout the entirety of the app. Consistency improves speed and accuracy, and that is what’s needed to keep the user engaged and ensure the completion of the desired task.

“Consistency is one of the most powerful usability principles: when things always behave the same, users don’t have to worry about what will happen.” — Jakob Nielsen

Here\’s Some Examples

In this example, I went with a rounded, wide button. Rounded corners are said to be modern, simple, and easier on the eyes, allowing for a more pleasant experience. 

While wide buttons are easier to spot, and more importantly, easier to tap. Properly sizing your buttons and making them finger-friendly are important when designing for apps. You want to ensure that your user has no mishaps and uncertainty when called to action. 

In addition to that, designing a button with a contrasting color to the surrounding elements is also vital. I chose a darker green because it’s much easier to see and stands out against the background. 

\"\"
\"\"

For here, I chose a toggle button. Toggle buttons are useful when the user is expected to turn a feature on or off.  

Different colors represent the current state of the button. A grey color often is representative of a button that is disabled or turned ‘off’. I kept with the green coloring of the previous buttons to determine an active or ‘on’ state.  

Differentiating between different states is very important in creating clarity with the user.

As you can see, buttons are extremely pertinent to the success of a user journey. Without them, you will not be able to make choices or complete actions. Try to aim for a button that is familiar, properly sized, and consistent with the overall aesthetic of your design.

Ready to push some buttons together?

Procept Marketing specializes in progressive web applications & App development. Let\’s chat!

Click Here

How to add a Marketing Agency to your Google My Business Listing

When you begin working with an agency like Procept Marketing to help with your local marketing and search ranking efforts, the agency may ask you to add them to your Google My Business (GMB) listing.  Adding Procept Marketing as a manager for your listing is beneficial as it allows account managers to check out the current state of your listing, ensure that all of your information is current and also link your listing to the Procept Client Dashboard for easy, centralized access to your customer reviews.

Owners, managers, and communications managers all have different levels of access to the listing. Adding users lets owners and managers share access & management responsibilities of a listing without having to share their personal account information. Only an owner can add or remove users. However, a manager may remove himself or herself from a listing.

To add Procept Marketing to your Google My Business Listing:

  1. Sign in to Google My Business.
  2. If you have multiple locations, open the location you’d like to manage.
  3. Click Users  from the menu.
  4. In the top right corner, click the “Invite new\”
  5. Select managers” icon 
  6. Enter our location ID 5840209445.
  7. Select the user’s role by choosing Manager.
  8. Click Invite. Invitees will have the option to accept the invitation and immediately become listing managers.

To add an owner or manager to a Google My Business Listing:

  1. Sign in to Google My Business.
  2. If you have multiple locations, open the location you’d like to manage.
  3. Click Users  from the menu.
  4. In the top right corner, click the “Invite new”
  5. Select managers” icon 
  6. Enter the name or email address of the user you’d like to add.
  7. Select the user’s role by choosing OwnerManager, or Communications manager.
  8. Click Invite. Invitees will have the option to accept the invitation and immediately become listing owners or managers.

When an invitation is accepted, the owners of the listing will be notified via email. All users in the account can view the names and email addresses of the owners and managers of the listing.

 

If you need a little help navigating GMB, please don’t hesitate to reach out to us!


HELP ME!!!

How to Give Access to Facebook Business

Business Manager is a central hub where you can integrate all of your business information and Facebook marketing activity in one place. It lets you easily and effectively share access to assets across your team, with external partner agencies and with vendors.

  • Control and manage access and permissions for all your assets in one place as your team, agency partners or vendors change over time.
  • Work with your colleagues on Business Manager without having to connect or give them access to your personal Facebook profile.
  • Identify risks and see recommended actions you can take to improve security.
  •  Manage multiple assets with batch actions. Track performance across multiple Pages and ad accounts.

If you’re a business who works with an agency or consultant, you can add them to your Business Manager and share your assets with them. When you add a partner to your Business Manager, you can grant access to different assets and assign specific permission levels. Partners can see assets you share with them in their Business Managers.

It is important to retain ownership of your business assets while collaborating with an agency partner.

Before you begin

  • Only business admins can add a partner.
  • Your partner must have a Business Manager. If they don’t, ask them to create a Business Manager.
  • You need your partner’s business ID. Procept Marketing’s business ID is 342242259555183.

Give a partner access to assets in your Business Manager

To add partners or agencies to your business:

  1. Go to Business Settings.
  2. Below Users in the left-hand column, click “Partners”.
  3. Click + Add.
  4. Select “Give a partner access to your assets.”
  5. Enter the Partner Business ID you want to add and click Next. (Procept Marketing’s business ID is 342242259555183.)
  6. On this screen, you can add partners to multiple assets. Choose a type of asset in the first column. Select the assets you want to add your partner to in the second column. Assign a role for your partner in the third column. Repeat these steps until you’ve chosen roles for all of the assets you want to assign.
  7. Click Save Changes.

Your partner can now see the assets you assigned to them in Business Manager.

The Secret Behind Over 130 Year of Success

Johnson & Johnson\’s Marketing Strategy Sucess

A staple in most US households, Johnson & Johnson has been in business for an impressive 134 years. Regularly ranked in the Forbes Top 500 (and often ranked in Forbes Top 100, too), Johnson and Johnson is arguably one of the most respected brands in their market. So how do they continue to maintain longevity?

The History of Johnson and Johnson

In 1886, the pharmacist Robert Wood Johnson formed a new company with his brothers James Wood Johnson and Edward Mead Johnson. The brothers founded their company based on Joseph Lister\’s then-recent research into the nature of airborne germs and infectious diseases.

Early Development

Once established, Johnson & Johnson built a reputation for creating improved, mass produced versions of common health care and sanitation products. Their timeline includes:

  • 1886 – The Johnson brothers found their company based on the discoveries of Joseph Lister.
  • 1887 – Johnson & Johnson is formally incorporated.
  • 1888 – The company produces its first two products: a mainstream manual on treating injuries and the first mass-market first-aid kit.
  • 1894 – Johnson & Johnson begins its line of maternity and infant-care products, a brand which continues to identify the company to this day.
  • 1921 – The company releases one of its most enduring products: the Band-Aid.
  • 1931 – Johnson & Johnson releases America’s first prescription contraceptive.
  • 1944 – The company goes public.
  • 1959 – With the acquisition of two research laboratories, Johnson & Johnson fully enters the pharmaceutical business. Its first product quickly becomes one of its flagships: an over-the-counter pain reliever called Tylenol.
  • 1982 – Johnson & Johnson helps the FDA to develop the tamper-resistant pill bottle.
  • 1994 – Johnson & Johnson invents the coronary stent, changing the modern approach to cardiology.
  • 2006 – The company acquires Pfizer PFE Consumer Healthcare, bringing its history full circle as Joseph Lister’s Listerine product comes under Johnson & Johnson’s umbrella. 

Over the course of the 1930s, 1940s and 1950s, Johnson & Johnson developed the corporate structure that it still uses today. Then-chief executive Robert Wood Johnson II turned the one company into a decentralized family of companies, all operating under the Johnson & Johnson corporation. Each different unit specializes in different aspects of its business, such as Surgikos’ specialty in surgical packs and Ethicon’s line of suture products.

The Evolution of the Johnson and Johnson Brand.

Johnson and Johnson recently adopted a \”social-first\” strategy, meaning that each campaign begins with social media in mind. Longer ads intended for other platforms are a secondary consideration built to compliment the messages displayed on social media. This allows them to reach consumers quickly and efficiently, while staying relevant for their customers. (Global Marketing Professor)

Our brains are hardwired to respond to stories. Storytelling has been rooted in human nature since the dawn of humanity. As society and technologies change, companies recognize the value of investing in developing the complex art of brand storytelling as a part of their content marketing.

\”It\’s not what we want to talk about; it\’s what the world wants to hear.\”

When Johnson and Johnson launched extended parental leave for their employees across the organization, they treated the announcement like a product launch. To bring their stories to life, they reached out to all departments and focused on people\’s stories.

Johnson and Johnson has long supported nurses and launched a campaign on social media called \”Donate a photo.\” For every photo, the company donated $1 to help train nurses globally. 

How to Apply Johnson and Johnson\’s Successful Strategies to Your Own Business
  1. Use storytelling Add a human element to your brand to create a deeper, emotional connection with your audience.
  2. Support your staff and don\’t be afraid to talk about it.
  3. Adopt a strong social media campaign to showcase your message to your audience quickly.
  4. Stay invested in current events & causes This allows you to remain rooted in your community