Archive
The failure of enterprise to prepare for cyberattacks
Late last month, Zeitgeist went with friends to his local theatre to see “Teh [sic] Internet is a Serious Business”. The play, a story of the founding of the hacktivist group Anonymous, was the most well-publicised dawn of cyberattacks on businesses and governments. The organisation, at its best, set it sights on radical groups that promoted marginalisation of others, whether that was the Church of Scientology in the US or those trying to dampen the Arab Spring in Tunisia. This collective, run by people, some of whom were still in school, showed the world how vulnerable institutions were to being targeted online. We wrote about cybersecurity as recently as this summer, summarising the key points in a recent report from The Economist on what was needed to mitigate against future attacks and how to reduce the damage such attacks inflict. The issue is not going away (and in fact is likely to become worse before it gets better).
It was back in January that management consultancy McKinsey produced a report, ‘Risk and responsibility in a hyperconnected world: Implications for enterprises’, where they estimated the total aggregate impact of cyberattacks at $3 trillion. There is much to be done to avert such losses, but the current picture is far from rosy. Most tech executives gave their institutions “low scores in making the required changes”, the report states; nearly 80% of them said they cannot keep up with attackers’ – be they nation-states or individuals – increasing sophistication. Moreover, though more money is being directed at this area, “larger expenditures have not translated into an increased maturity” yet. And while the attacks themselves carry potentially devastating economic impact on a company, their prevention comes at a price too for the business, beyond the financial. McKinsey reports that security concerns are delaying mobile functionality in enterprises by an average of six months. If attacks continue, the consultancy posits this could result in “a world where a ‘cyberbacklash’ decelerates digitization [sic]”. Revelations about pervasive cyberspying by Western governments on their own citizens could well be a catalyst to this. Seven points are made in the report for enterprises to manage disruptions better:
- Prioritise the greatest business risks to defend and invest in.
- Provide a differentiated approach to defence of assets, based on their importance.
- Move from “simply bolting on security to training their entire staff to incorporate it from day one into technology projects”.
- Be proactive; develop capabilities “to aggregate relevant information” to attune defence systems
- Test. Test. Test again.
- Enlist CxOs to help them understand the value in protection.
- Integrate risk of attack with other corporate risk analysis
Given the amount of business and social issues that involve digital processes – “IP, regulatory compliance, privacy, customer experience, product development, business continuity, legal jurisdiction” – there is a huge amount of disagreement about how much state involvement there should be in the degree to which enterprises must take steps to protect themselves. This is an important point for discussion though, and we touched on it when we wrote about cyberattacks previously.
But that report was way back in January, things must have solved themselves since then, right? Last week, PwC reported that corporate cyber security budgets are being slashed, even while cyberattacks are becoming far more frequent. The FT reported that global security budgets fell 4% YoY in 2014, while the number of reported security incidents increased 48%. Bear in mind these are only reported incidents. This is potentially no bad thing, if we’re to go by McKinsey’s diagnosis of too much money being thrown at the problem in the first place. At the same time, it’s not exactly comforting.
Only a few days after PwC’s figures were published, JP Morgan revealed that personal data for 76 million households – about two-thirds of total US households – had been “compromised” by a cyberattack that had happened earlier in the year. Information stolen included names, phone numbers and email addresses of customers. It was also revealed that other financial institutions were probed too. Worryingly, the WSJ reports that investigators disagree on what exactly the hackers did. It was also unclear who was to blame; nation state or individual. Such disagreements over the ramifications of the attack, the identity of the attackers as well as the delayed revelation of the attack itself, illustrate just how necessary transparency is, if such attacks are to be better protected against and managed in the future.
For those in London at the end of the month, The Economist is hosting an event for those who apply, on October 21, examining “how businesses can and should respond to a data breach, whether it stem from a malicious insider, an external threat or simple carelessness”. Hope to see you there.
Cyberattacks and espionage – Risks and Prevention
It’s not quite as cool as Bond in his Tom Ford suit leaning on his wonderful Aston Martin while he plots his next move to unseat some despot. All the same, Germany’s recent apparent spate of typewriter purchases points to a renewed sense of fear of being overheard and compromised in an era of digitally pervasive content, vulnerable networks and indelible conversations. Spying and intelligence concerns coalesced with subject matter we’ve previously written about – including online privacy, governance, security and the internet of things – in a special report in last week’s The Economist, which produced eight articles on the subject of security in a digital landscape. Some highlights:
- Cybercrime is costly. The Centre for Strategic and International Studies estimates the annual global cost of digital crime and intellectual-property theft at $445 billion – a sum “roughly equivalent to the GDP of a smallish rich European country such as Austria”.
- Focus on prevention rather than reaction. As with many things, the best way to make sure cyberattacks aren’t too damaging to your business is to make sure they never happen in the first place. It’s more difficult (and costly) with digital security because the process can easily feel like a Sisyphean struggle; businesses invest in new technology only to see it circumvented by more hacking, perhaps exposing a different loophole or vulnerability. But an iterative approach is better than leaving the door open and spending more money after the fact.
- Honesty is the best policy. After being hacked, a company can find it hard to admit it. This is understandable. Not only is it somewhat embarassing, it admits to customers and shareholders that the company is vulnerable, but it also suggests that their data is not safe with said company; perhaps they should shop elsewhere. However, transparency in such a situation is paramount if others are to learn how to combat such attacks. One suggestion is that the US government “create a cyber-equivalent of the National Transportation Safety Board, which investigates serious accidents and shares information about them”.
- Who to complain to? The perpetrators of cybercrimes are no longer limited to the teenaged hackers of yesteryear. Though ideological groups like Anonymous serve as a disruptive influence, often the biggest problems are caused by the governments charged with protecting things like individual privacy, security and freedom of speech. From the US to China, authorities “do not hesitate to use the web for their own purposes, be it by exploiting vulnerabilities in software or launching cyber-weapons such as Stuxnet, without worrying too much about the collateral damage done to companies and individuals”.
- External trends point to a worsening of the problem. The Internet of Things as a trend will have billions of devices connected to each other via the Internet over the next few years. With one of the fundamental ideas being that the user isn’t really aware of the connection, the likelihood of spotting a hacked device becomes all the smaller. This isn’t a huge problem in cases like a connected fridge receiving spam email, but it becomes more of a problem when hackers can gain remote control of your car. One of the barriers to improved security for everyday devices is that the margins are razor-thin, as are the chips to connected to the devices, in order to keep the product small. Any added security software or hardware and the cost and size of the product increases.
Zeitgeist believe the risk to IoT devices will be one of the key areas that businesses and regulators will need to focus their efforts in the future. Because it is still a relatively fledgling sector, the issue is not being discussed yet in many places. Deloitte, in association with the Wall Street Journal, recently reported on the nature of cyberrisks and how companies can help mitigate them. Well worth a read.
“Lots and lots of files” – Privacy, data and a new currency
One of the seminal television shows of the 1990s, The X-Files played on myths, legends and government paranoia to worldwide critical and popular acclaim. One of the key episodes of the series found the lead characters, FBI agents Mulder and Scully, happening upon an abandoned mining facility. Contained inside were row upon row of filing cabinets. Inside, thousands of names spilled forth. The sheer number of file drawers is a visual feast for the viewer. But there is more; one of the agent’s names is in those files. Personal data on her (in the form of a tissue sample) has been taken without consent. Down the rabbit hole we go…
We have always operated under the assumption that governments must surveil in order to protect its citizens. The difference today, as Edward Snowden has so plainly shown, is firstly that you are the one being watched, and secondly that the sheer extent of the surveillance and the pervasive nature of its collection is staggering. The pervasiveness of all this is a key point. Not much in the way of policy has changed really in the past fifty years, it’s just that spying on swathes of the world’s population has become increasingly easier and cheaper. Back in 2006, the UK’s Information Commissioner’s Office warned that the country was moving “towards pervasive surveillance”. Such a prophecy seems to have turned into reality. It creates an uncomfortable feeling that those in charge do not have our best interests at heart, or at least that the ends do not justify the means.
Some of the finest publications in the world have been struggling to make sense of what all this means; Zeitgeist is using this post to highlight some of those key thoughts and issues covered. Back in September, The New York Times reported, paradoxically,
“Even agency programs ostensibly intended to guard American communications are sometimes used to weaken protections. The N.S.A.’s Commercial Solutions Center, for instance, invites the makers of encryption technologies to present their products to the agency with the goal of improving American cybersecurity. But a top-secret N.S.A. document suggests that the agency’s hacking division uses that same program to develop and ‘leverage sensitive, cooperative relationships with specific industry partners’ to insert vulnerabilities into Internet security products.”
Zeitgeist remembers dining alone in New York in September poring over the news. The NSA tried to ask for permission to legally insert a ‘backdoor’ into all digital encryption, but were denied. So they went ahead and did it anyway. They influenced government policy that led to fundamental weaknesses in encryption software. Last week, a federal judge considered the constitutionality of the US’s surveillance programmes. He called the technology used by the NSA “almost Orwellian” and ordered it to stop collecting the telephone records of two plaintiffs. It is one of several cases currently underway.

Click to see The New Yorker’s infographic on what personal data is made available to social networks and their advertisers
Of course, such spying would have not have been possible without the consent – tacit or otherwise – of companies in the private sector. There is clamor in the US, UK, Brazil and other countries for more restrictive regulation that makes it harder to collect consumer data. Such policy could make data analysis and collection onerous and might have a significant impact for those businesses that make a living out of using such data. As The Economist puts it,
“Should all this make it harder and costlier for companies to gather information, that would hurt the likes of Facebook and Google, which depend on knowing enough about their customers to ping them with ads that match their tastes.”
The New Yorker recently featured a fascinating article complete with unnerving infographic (excerpted image above) showing just how much information we display on our various social networks is then shared with the platform and its advertisers. This month, a new film, Her, arrives in cinemas, from the director of Being John Malkovich. The heroine is a disembodied voice – acted by Scarlett Johansson – who serves as operating system. The line between her servitude and rapid consumption of all her user’s data quickly becomes blurred. As the reviewer Anthony Lane puts it, also for The New Yorker,
“Who would have guessed, after a year of headlines about the N.S.A. and about the porousness of life online, that our worries on that score—not so much the political unease as a basic ontological fear that our inmost self is possibly up for grabs—would be best enshrined in a weird little [film]?”
Unsurprisingly, the results of a recent YouGov poll in the UK showed consumers were now far less willing to part with their own data. Almost half would be less willing to share their personal data with companies in the next five years. A mere 2% said they would be more willing to do so. Part of the problem lies in a lack of transparency: who is using my data, which piece of information exactly, and how does it benefit them? More importantly, what am I getting in return for surrendering my data? Steve Wilkinson of Ernst & Young offered little in the way of cheering news, “Many customers have recognised that businesses are using their personal information to help increase revenues, and are starting to withdraw access to their private data… In spite of this, there is a reluctance to adopt incentives that encourage consumers to part with personal data”.
Writing in the FT yesterday, Evgeny Morozov penned an excellent article claiming the media was spending far too much time on the intricacies of government involvement rather than how the whole cocktail mixes together. The overreach, according to the author, is being treated as an aberration, that will disappear in the face of tighter controls and the harsh light of day. It should instead, Morozov argues, be treated as part of a worrying trend in which “personal information – rather than money – becomes the chief way in which we pay for services – and soon, perhaps, everyday objects”. The article continues,
“Now that every piece of data, no matter how trivial, is also an asset in disguise, they just need to find the right buyer. Or the buyer might find them, offering to create a convenient service paid for by their data – which seems to be Google’s model with Gmail, its email service… [W]e might be living through a transformation in how capitalism works, with personal data emerging as an alternative payment regime. The benefits to consumers are already obvious; the potential costs to citizens are not. As markets in personal information proliferate, so do the externalities – with democracy the main victim. This ongoing transition from money to data is unlikely to weaken the clout of the NSA; on the contrary, it might create more and stronger intermediaries that can indulge its data obsession.”
“Should we not be more critical of the rationale, advanced by the NSA and other agencies, that they need this data to engage in pre-emptive problem-solving? We should not allow the falling costs of pre-emption to crowd out more systemic attempts to pinpoint the origins of the problems that we are trying to solve. Just because US intelligence agencies hope to one day rank all Yemeni kids based on their propensity to blow up aircraft does not obviate the need to address the sources of their discontent – one of which might be the excessive use of drones to target their fathers. Unfortunately, these issues are not on today’s agenda, in part because many of us have bought into the simplistic narrative – convenient to both Washington and Silicon Valley – that we just need more laws, more tools, more transparency.”
“I hope for the comedy… I suspect the horror. Possibly in the future you’ll no longer be permitted to be who you think you are, or even who you’re pretending to be: You will be who they say you are, based on your data-mined, snooped-upon online presence. You’ll be stuck with that definition of yourself. You won’t be able to take off the mask.”
Such disconcerting thoughts on having your own personality dictated to you might once have been the stuff of science-fiction, apt for an episode of The X-Files. Besides adages of truth being stranger than fiction, the clarion call of these publications appears to be that people should be sitting up and taking notice of what has been going on over the last ten years with extensive policy / data / consumerism creep. It is not just the NSA, but the way society intertwines information for monetisation that must be scrutinised if we are to avoid having to worry about trivial things like playing videogames in peace.
The New Normal of the Internet of Things
In the wake of PRISM, New York Times takedowns and spying London rubbish bins, people on the Internet don’t feel that secure any more… at all. Business Insider published an article recently saying the days of truly private email conversations are over. A new trend in “countersurveillance fashion” has sprung up (see above image), and New York’s New Museum is opening a ‘privacy gift shop’ for September.
One of the clients Zeitgeist works for is about to get heavily involved in Machine to Machine (M2M) communication, otherwise known as the Internet of Things (IoT). Intel were making themselves heard last month at an event in London’s Spitalfields Market on the subject. And earlier this month, the exemplary blog GigaOm published an article entitled “How can we design an internet of things for everyone (not just alpha geeks)?”. This new development, which includes self-driving cars, fridges ordering milk for you when you run out without being asked, potentially brings with it ideas of a utopian world of interconnected devices that do your bidding.
But such potential is now seen in a different light, post-PRISM. The first two user comments, screengrabbed below, were a grim reminder of the new normal, where such a utopian future has already been tarnished by abuses before it even arrives.

The likes of PRISM and xKeystroke have arguably completely reversed the libertarian premise of the Internet
Pucci’s eCRM Fail
In the world of luxury, discretion is paramount. Not only should there be a sense of exclusivity about a brand and its wares, but the customer’s relationship with the brand should be personal and – given their probable high net worth – confidential. Which is why fashion label Emilio Pucci, whose signature designer Matthew Williamson left last year, has unfortunately failed so epically with the email it sent out to its Sloane Street of London customers last week.
The eCRM emails that the fashion label sends out are never particularly well-designed, relying on quite brief text with simple fonts. The invitation to a trunk show was first sent listing a date that had already passed. It was then sent again, this time with the correct date, but with every single one of Pucci’s Sloane Street customers clearly CC’d on the email for all to see, well over 500 customers. The message contains contact details of those high up in the worlds of law, finance, music, film and fashion. The risks to privacy violations here (as well as this evidently being illegal), are obvious. A data collector’s dream, to suddenly be in possession of the addresses for such a sought-after group of people. For the person that sent out the email however, it’s a nightmare.
On Convergence
Today the problem lies not in acquiring information, but in how to apply it effectively and efficiently in order to solve the problem at hand. The impact of the increasingly easy access we have to information was scrutinised recently by President Obama at Hampton University, “With iPods and iPads and Xboxes [sic] and PlayStations—none of which I know how to work—information becomes a distraction, a diversion, a form of entertainment, rather than a tool of empowerment”. As Le Monde details, the speech as a whole was really geared toward warning people of the dangers of excessive use of technology; about making sure it is the parents rather than the X-box that tucks the child into bed at night.
The statement in of itself though, is strange, given the person saying it. It is generally agreed that Obama won the election with his revolutionary form of fundraising. It meant he raised more money than fellow Democratic nominee Hillary Clinton, who stuck to her old-school guns by going to uber donors in their sizable Upper East Side and Malibu residences. Not only that, but the way he went about it – a truly grassroots system of peer advocacy; viral awareness through social networks to encourage micropayment upon micropayment – showed he was intuitively in touch with the electorate, and with a new way of doing things. To hear these Luddite words from Obama, complaining about the X-box, is odd coming from someone whose campaign advertisements appeared on in-game billboards on the X-box’s Burnout Paradise, moreover from someone who is a self-confessed Blackberry addict. His self-deprecating manner is patronising and unnecessary; people elected him because he is elite, which should not be seen as a bad thing, as Jon Stewart points out, “The Navy Seals are an elite squad… why must the President be a dumbass?” Bill Maher has more: no longer has more because this content has been removed by HBO, sorry. It was pretty funny though.
The information we all now have access to over the Internet is truly staggering. YouTube now receives 2bn hits daily (though not without repercussions), which rivals that of this blog. However that is no reason for condemnation, as long as whatever it is (text, audio, video; i.e. content) can be accessed efficiently. The problem at the moment is that this is not the case. ‘Convergence’ has been a buzzword for what seems like a lifetime in the world of digital. It is happening, but only in fits and starts, and to some extent it is being hampered by conglomerates whose corporate interest (quite understandably) in the bottom line does not exactly dovetail with what convergence is really about – open source.
The constantly stimulating blog Only Dead Fish featured a very well-written and thought-provoking article on convergence. Having studied the matter as part of its Master’s degree, Zeitgeist thought it knew all there was to know about such matters. This article challenged any existing, simplistic preconceptions. The author quotes Grant McCracken, who says, of the iPad as a converged device,
“The iPad critics can’t see this third space because they work from a utilitarian point of view. For them, iPad will create economic value only if it solves practical problems. But Apple has always seen the economic proposition as a cultural one, as an opportunity to speak to the entire consumer in all of his or her complexity, not just the problem solver.”
The author goes on to reference Henry Jenkins’ ‘Black box’ fallacy, “sooner or later all media content will flow through a single black box”. This is indeed one interpretation of the idea of convergence, and it is not necessarily wrong. However, what Zeitgeist believes convergence means for the consumer is not about a black box; we enjoy being able to access content through our myriad devices. What it does mean then is seamless interaction between these devices, i.e. being able to watch my TV show on the commute from work, returning home to dock the device in my TV and have it immediately start playing there, etc.
Conversations over social networks will play an increasing role as these platforms converge (and privacy continues to erode). However, the question remains on everyone’s lips about how to monetise all these goings on. One colleague of Zeitgeist’s suggested a provider like Sky might end up providing an offering where consumers can pick a package that includes The Guardian, some music (Sky has a lacklustre service for this already) and the Cookery Channel, believing that people would be more willing to pay for content in packages rather than in small, one-off payments. Of course, News Corporation could, with little difficulty provide a similar service, whereby they provide access to The Times, The Sun, Sky Sports events, Sky Songs and new films released by 20th Century Fox as packages.
The American humourist Frank Clark wrote that “If you can find a path with no obstacles, it probably doesn’t lead anywhere”. Convergence as a term could easily turn out to be one of those unobtainable zeniths, along the lines of world peace; an abstract term. The possibilities though of seamless connectivity of content between platforms is an extremely attractive one, both for consumer and advertiser.
Spinning the wheel of anonymity
Chatroulette is big. BIG. French Connection have recently leaped into the fray. It reminds Zeitgeist of the olden days of chatting with various random people on walled gardens like CompuServe with complete anonymity. However, as eConsultancy reports, that veil of anonymity is about to be lifted. Chatroulettemap.com was recently set up, displaying the location of the user and their images, using their IP address. As the article points out,
“The privacy and security implications of this are obvious. The fact that the average internet user probably doesn’t know what an IP address is or how it can be used only makes the situation worse, as individuals who may otherwise be inclined not to participate join the fun not knowing that they could be identified and tracked down.”
Zeitgeist – enduring various men doing disgusting things – has had the pleasure of using Chatroulette to chat with a photographer in New York who shoots for ad agencies that include the blessed Ogilvy, as well as inquisitive Frenchwomen and dancing Canadians. It all feels a bit weird though, and something not far removed from the masque sequence in “Eyes Wide Shut”.
Turning the Screw
Increasingly, there seems to be an Orwellian slant to the machinations of the Internet. Last summer, early adopters of the Kindle and fans of George Orwell would probably have been rather frustratingly struck by the irony of waking up to find their library somewhat diminished. As one blog writes,
“In George Orwell’s “1984,” government censors erase all traces of news articles embarrassing to Big Brother by sending them down an incineration chute called the “memory hole.” On Friday, it was “1984” and another Orwell book, “Animal Farm”, that were dropped down the memory hole – by Amazon.com.”
Another blog notes that the Kindle is “basically a device that Amazon controls that you just happen to have in your hands.” The novels were removed after being added by a company that did not have the sufficient rights to them. This may be sufficient reason to remove the product from the store; it does not, however, excuse the way in which Amazon went about systematically removing copies that were on owner’s devices, who had already paid them. The incident was noted in a more recent editorial in the FT, evincing a mounting ownership creep on behalf of major corporations. Now, more than ever, when products are not only files on your desktop but stored remotely in a cloud, a consumer’s rights to ownership have never felt less tangible.
Apple, specifically its App Store, has recently come under fire again, this time for the removal of adult apps. Some adult-themed apps, such as the Playboy app, will remain available. It is the thought of Apple acting not only as moral arbiter, but also in an ad hoc manner with that responsibility, which should give consumers cause for concern. If someone creates an app or wants to distribute a book online in the future, will they hesitate to share their innovation and creativity for fear it could be summarily deleted at will by a fickle corporation? TechCrunch has a fascinating and well-written article here on the removal by Google of many music blogs that were deemed under the DCMA to be infringing on intellectual property. Again, as in the Kindle case, it is less the justification of the action (although this can also be disputed), and more the way it was done that is inexcusable.
In the Communist nirvana that is China, things are worse. Le Monde reports that though the country is on the brink of launching IPv6, allowing people to create and type in URLs using Chinese characters, the government is also imposing draconian measures for those wishing to set up websites. The government already restricts access to sites such as BBC News, Facebook and Twitter. In the past two weeks, they have also asked that anyone wishing to open a web site must present themselves before the authorities with their identity card and photographs of themselves, ostensibly to combat pornography. Not only is this measure entirely unnecessary and completely antithetical to the libertarian principles of the Internet, but from a practical standpoint it is wildly inefficient and will certainly stifle innovation. The UK government’s initial plans for censuring those who share files illegally have been, for the moment, stayed.
Conversely, these same bodies are not operating with impunity, even in situations where arguably they are not to blame. Three Google executives were convicted in Italy at the end of last month. The charge, Reuters reported, was “violating the privacy of an Italian boy with autism by letting video of him be posted on the site in 2006.” Quite how it was decided that those hosting the video – on a site that apparently serves a billion videos every day – could possibly have responsibility for it is beyond Zeitgeist. The New York Times writes “It suggests that Google is not simply a tool for its users, as it contends, but is effectively no different from any other media company, like newspapers or television, that provides content and could be regulated”. One of the accused, global privacy counsel Peter Fleischer, commented that if employees were “criminally liable for any video on a hosting platform, when they had absolutely nothing to do with the video in question, then our liability is unlimited.” Despite corporate overreach in some areas, sometimes the judicial system can be just as harsh on those same corporations. The insight is that what goes around, comes around.
The Fearful Symmetry of Tiger Woods
From the Winter 2009 Zeitgeist…
Brand ambassadors are nothing new. Napoleon (seen above in a casual pose) has long been such an ambassador for the watchmaker Breguet, having worn one during his short (for he was short) life. But what happens when the real world conflicts with the manufactured artifice? Are all of Andre Agassiʼs triumphs now overshadowed by drug addiction? What of recent rumours that Tony the Tiger is diabetic?
Tiger Woodsʼ indiscretions have highlighted such concerns; what happens when an athlete who is not only a champion in his chosen field, but also seemingly the epitome of a gentleman in his private life, turns out to be less than perfect? Tigerʼs presence – a young man of mixed ethnicity in a sport dominated by old, rotund white guys obsessed with the faux exclusivity of country clubs – was a huge statement in of itself. It was for all these reasons though that some major blue-chip brands chose to invest in his good name. Who can forget the fantastic Nike spot of yesteryear?
While his namesake currently graces the Spirit Airlines website, Tiger can unfortunately no longer be found on the Accenture homepage. For a company to so abruptly end such a sponsorship is an enormous blow to both parties and both brands. Industry Standard wrote, “Tiger has literally become the sole face, the strategic embodiment, the business essence of Accenture, the $22 billion global IT, outsourcing and business consultancy proclaim[ing]: ʻWe know what it takes to be a Tiger.ʼ Everything about that slogan has now become a PR debacle, comedian’s punch line and perplexing psychological examination…”.
Tiger is now on an “indefinite” leave from golf and the brands that rely on the sportsman solely for his golfing prowess are sure to be affected. Electronics Arts will have a hard time selling the umpteenth version of the Tiger Woods PGA Tour franchise if the eponymous player does not compete. TV ratings for golf tournaments will similarly suffer, according to the FT and New York Times. Nike, PepsiCo and AT&T are all of a ʻwait and seeʼ mindset. Gillette will “remove its Woods-related advertising for now” in order to respect his much sought-after privacy. Gilletteʼs triumvirate has suffered of late. Thierry Henry is also mired in scandal after denying Ireland a place in the World Cup by somewhat guiding a ball with his hand at a crucial point in the game. Gillette has denied the act will affect his contract. Roger Federer seems to be the only one currently untainted, though not wishing to jinx him, Zeitgeist will move swiftly on…
Ultimately, such crises can be fleeting. Michael Phelps, pictured with a bong and promptly dropped by Kelloggʼs, will not be forgotten for winning a Fort Knox-worth of gold medals in Beijing. NFL player Michael Vick organised brutal dogfights in his free time, but returned to the game to cheers from the fickle crowd. There may be lasting impact this time, however. As the Zeitgeist team have said before, if caught, the best practice is to immediately admit culpability, express sincere contriteness and take ownership of the situation, as Accenture have done.