article thumbnail

Top PLG Product Manager Roles (+ Candidate Spotlight)

User Pilot

Launched referral loops and community-driven strategies that led to a consistent 25% MoM acquisition growth. Professional interests Som will drive growth through product-led and community-driven strategies with rapid experimentation.

article thumbnail

Do You Know How Safe Your Data Is?

The Marketing & Growth Hacking Publication

Implement Two-Factor Authentication Cybersecurity statistics say that small businesses are the targets of 43% of cyber attacks, and it’s essential to take all measures possible to ward off potential danger. Thanks for reading The Marketing & Growth Hacking Publication Join our Facebook Group. Contact us for a sponsored post.

Data 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Company Reputation Can Be Bolstered Via Word-of-Mouth Marketing

The Marketing & Growth Hacking Publication

Further, data breach insurance can keep a business in the black even after a cybersecurity incident, ensuring you can form relationships with customers for the long haul. Thanks for reading The Marketing & Growth Hacking Publication Join our Facebook Group. Contact us for a sponsored post. Write for us.

article thumbnail

Growth with a Capital “G”: What It Is and How to Get Started

OpenView Labs

The more complex sales cycle—with longer lead times, sales team interactions, demos and multiple funnel steps—creates an environment over which a growth team has little control. Even so, I’ve seen some organizations start very successful growth hacking teams by looking at the acquisition challenge in a data-driven, quantitative way.

article thumbnail

SaaStr Podcast #402 with HackerOne CEO Mårten Mickos: “Customers Want Value + Simplicity: The Must Haves to Deliver”

SaaStr

Marten Mickos: Similarly, at our company, at HackerOne, you can call us a two sided marketplace, you can call us a cybersecurity company or SaaS business. How do you package ethical hacking into something that becomes a subscription offering, where customers will consume it on an ongoing basis and pay a recurring fee?