10 Perfect Promotional Products for a Nice Spring Day!

101. Slim n Slender Misting Fan: A compact hand-help misting spray with a tall & skinny design. Easy to carry and great for traveling or while out exercising. Colors: Translucent Red, Translucent Blue, Translucent Pink, Translucent Purple, Translucent Orange, Translucent Black

102. Square Sandwiched Hand Fan: 12-point board stock with a wooden handle. Square fan, sandwiched, 4 Color Process. 7 1/2″ W x 8″ H

103. Insulated Slim Tote: Slim and trendy 2-tone cooler bag made from 80 GSM non-woven polypropylene with thermal insulation to keep those evening snacks and drinks cool! Though slim, the interior capacity fits tall drink bottles, bag of chips, and more! This reusable, thermal insulated bag has two large pockets that are great to hold utensils & also provide a large imprint area for your promotional message!

104. Roll-Up Picnic Blanket: Polyester fleece plaid with lining and water-resistant PE backing. Easily folds within itself, Velcro closure. Attached handle for easy carrying. Surface washable. 52″ W x 47″ H Colors: Green/Navy Plaid/Navy Flap, Red/Blue Plaid/Red Flap, Blue/Black Plaid/Black Flap, Red/Black Plaid/Black Flap, Orange Plaid/Royal Blue Flap, Navy Blue/White Plaid/Navy Flap, Brown/Black Plaid/Black Flap, Black/Gray Plaid/Black Flap, Light Blue/Lime Green Flap, Beige/Brown Flap

105. Folding Event Chair with Carrying Bag: This folding chair features arm rests, two mesh cup holders and includes a matching drawstring carrying case. 32″ W x 34″ H x 20″ D Colors: Black, Blue, Lime Green, Red

106. Beverage Insulator Cooler Pocket Can Coolie – 3 Side Imprint Included: Pocket Can Coolie is a collapsible can holder, made with 5mm thick foam laminated with cloth on the inside and out. We will print on both sides plus the bottom. 5mm Thick. Colors: Teal Blue, Royal Blue, Navy Blue, Yellow, Orange, Purple, Green, Brown, Burgundy Red, Red, Lime Green, White, Pink, Black, Camo, Pink Camo

107. 24 oz. Tritan Water Bottle w/ Screw Off Lid: 24 oz. water bottle made from BPA-free Tritan™ material, twist off lid with carry loop. 3 1/2″ W x 10 1/4″ H x 2 1/2″ D Colors: Translucent Red/Black Lid, Translucent Black/Black Lid, Translucent Blue/Black Lid, Translucent Orange/Black Lid

108. Single Tone Matte Sunglasses: Adult-sized sunglasses. Solid color matte plastic frames with tinted lenses. Lenses feature ultraviolet protection level UV400. 5 1/2″ W x 1 7/8″ H x 5 1/2″ D Colors: Red, Orange, Yellow, Lime Green, Blue, Purple, Pink, Gray/Silver, White

109. Small Discus Frisbee: Small discus Frisbee made in the USA and with up to 25% post-industrial recycled polypropylene material. 5.25″ Diameter Colors: White, Lime Green, Blue, Black, Red

1010.Bottle Opener w/ Key Ring: Plastic bottle opener available in 8 colors. 3 1/2″ L x 1/2″ W Colors: Red, Purple, Navy Blue, Yellow, Green, White, Black, Royal Blue, Pink

Visit or call us at 919-926-3074 for more information on promoting your business with our wide range of promotional items.

Corporate Zone Promotional Products

What are promotional products?
Promotional products are logo themed products that are used to promote your business. Promotional items can include apparel, automotive, badges & lanyards, bags, calendars, candy & snacks, caps & hats, clocks, computer accessories, desk items, ecofriendly, executive gifts, fun & games, golf items, healthcare, key tags, kitchen & home, mugs & drinkware, pens, and sport & outdoor.

What is an impression?
The cost per impression in the U.S. is about $.06. An impression is how many times your product is seen within a certain amount of time. In the U.S., bags generate by far the most impressions. Below is a list of products that deliver the most impressions (research provided by Advertising Specialties Impressions/Advertising Specialty Institute 2012).
Bags: 5,732
Hats: 3,153
Writing Instruments: 2,730
Outerwear: 2,090
Shirts: 1,990

Below are a list of facts regarding promotional products and ownership.
• 50% of U.S. consumers own logoed writing instruments
• 43% of U.S. consumers own a promotional shirt
• 29% of U.S. consumers own a promotional bag
• 21% of U.S. consumers own a promotional calendar
• 17% of U.S. consumers own a logoed desk accessory
• 62% of recipients do business with those companies that give them promotional products.
• The average time a promotional item is kept is around 5.4 months.
• A promotional item is used a little over 18 times per month.
• Over 90% reported owning or possessing a professional product within the last 2 years.
• 81% of recipients keep an item because of its usefulness
• For prospects, 1/3 of US consumers are more likely to do business with advertisers after receiving a promotional product from them.
• Bags lead the way among promo items, generating an average of 5,732 impressions followed by caps at 3153, and writing instruments at 2730.
• Promotional products have an average cost per impression of 6 cents.

Advertising Specialties Impressions/Advertising Specialty Institute 2012 & Promotional Products: Facts and Figures

Visit or call us at 919-782-3332 for more information on promoting your business with our wide range of promotional items.

Trick or Treat…or Should We Say Trick or Threat

by Center for Network Security

October is not only National Cyber Security Awareness Month, it’s also the time to celebrate Halloween, bringing to mind scary things that are merely figments of our imagination. In the digital world, however, there are many scary things that are not figments of our imagination, that we should in fact be worried about. The threats in cyber space are real. One of the most important concerns is malware, short for malicious software. The volume of malware continues to surge, with ransomware infections increasing, malware now targeting mobile devices, and new strands of malware attempting to exploit vulnerabilities in aging automated teller machines (ATMs).

Playing on the Halloween theme of scary things, below are some examples of malware you should be aware of, and some tips for minimizing your risks.

What are Some Examples of Malware?

Ransomware. Ransomware is designed to essentially hold your system hostage until you meet the hacker’s demands. A popular version of ransomware currently circulating is known as CryptoWall, which infects a victim’s machine and encrypts its data. The hacker alerts the victim that their files have been encrypted and directs the victim to pay a ransom by a certain date, otherwise the key necessary to decrypt the files will be destroyed.

Ghosts. No, we aren’t talking about the ghosts you’ll see on Halloween. In the cyber world we have Gh0st, an infamous piece of malware that is commonly used by threat actors to remotely access a target and assume complete control. Some versions of Gh0st have the ability to activate the camera and audio-recording functions of the infected machine if the machine has those features.

Zombies. Unlike the make-believe zombies you see in the movies, cyber zombies are real. In the online world, a zombie is a machine compromised with malware and controlled by a hacker. Zombies can send spam, launch denial-of-service attacks and infect other machines, becoming part of a large group of compromised computers being controlled remotely (known as botnets).

Mutations. This malware (known as polymorphic malware) morphs its code to constantly change its form. This mutating process keeps the malware from being detected by pattern-matching analysis tools.

Frankenstein. Continuing along the lines of the mutating software, the Frankenstein malware takes small pieces of software from trusted programs and stitches them together, making the resulting malware undetectable.
How Does Malware Get on Your Machine?

Tricks-n-Treats. Social engineering continues to be the path of least resistance to your data. These “tricks” often rely on establishing trust by purporting to be sourced from an individual or company you know and trust. The cyber criminal then tries to entice you into viewing the “treat,” whether it’s a celebrity photo, the promise of a cash prize or some other lure. Phishing email messages have evolved from being full of easy-to-spot grammatical or spelling errors to appearing very credible, with a look and feel that closely matches a legitimate organization.

Poison. Hackers looking to target your machine know how to poison search results to get you to click on a site that hosts malware. Cyber criminals can sometimes deface legitimate websites by adding content that is designed to rank highly in search results, knowing the first returned sites are more likely to be clicked on directly.
How Can You Minimize Your Risk?

Avoid the tricks by being aware of the tactics:

Do not respond to unsolicited emails or telephone calls from an unknown or untrusted source. Verify the identity of an individual claiming to represent an organization by contacting the organization directly.

Be especially wary of emails that ask you to verify your information or provide sensitive information. Do not open attachments contained in a suspicious email.

Keep the software on your computers and devices up to date through regular patching. Use automatic update settings on your security software, operating system, and web browser.

Only install third-party applications from trusted sources.

Discuss security awareness best practices with your family, friends, colleagues and community.

REMEMBER: While October is recognized as National Cyber Security Awareness Month, we need to be vigilant and proactive every day, not just during the month of October.