Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Beware of the “FUD”

March 1, 2011
FUD indbody

Beware of the “FUD”! What, you ask? What is FUD and why should I beware of it?

It is Fear, Uncertainty and Doubt. FUD can come from anyone and anywhere, especially when making a purchasing decision. According to Wikipedia, FUD has been used in various contexts since the 1920s but became more used as a terminology in the 1980s and 1990s.

FUD usually rears its ugly head closer to a purchasing decision. What happens is the fear, uncertainty and doubt of the decision maker either grows from within or is targeted by outside sources. FUD growth from within is natural and inevitable. In all major purchases, personal and professional, you can always find some level of fear, uncertainty and/or doubt about spending the money, making the right choice and the right time, technology or company. This internal FUD never goes away, but most decision makers, both personally and professionally, learn to understand and trust their instincts and desires.

The outside source targeted FUD is the most difficult to recognize, understand and address. It is difficult because it plays on key elements of internal fear, uncertainty and doubt of the decision maker. The outside sources could be competing industry vendors and articles or subject matter experts. Subject matter experts are not necessarily targeting a specific purchase, but are trying to bring information and real world examples to help and to educate the decision maker. What happens, though, is that these examples and/or information can muddy the waters and not clarify as intended.

Reverse FUD is when competing vendors will position their products and technologies in the best light, which of course, is something that they should do.

Direct generic FUD is product or feature/technology comparisons that are not focused on a specific purchase. These product or feature comparisons tend to be centered on new products with limited competition or on features or technologies that company “A” has and company “B” does not. These types of comparisons tend to ignore feature or technology overlap.

The purchase specific FUD is the one to be most cautious. This tends to be a focused effort to influence a decision maker by highlighting and reinforcing any fears, uncertainties and doubts either within the decision maker or by creating them about a competitor’s products, technology or solution. Decision makers need to be aware of this common technique that is most often used when there is either little differentiation between products/technologies/solutions or to attempt a last ditch effort to swing a purchase decision their way.

 

How to Combat FUD

The best ways to combat FUD is to be aware of it, recognize it and not be influenced by it. Just as there are multiple types of FUD (internal, inadvertent and purchase specific), there are multiple techniques that can be used to offset the onslaught of FUD. In addressing the FUD, the first thing to remember is that it will never go away. Whether the buying decision is personal or professional, you might have questions and doubts with a purchase. Recognize FUD’s existence and work to mitigate it by using it to your advantage. Most internal FUD is about spending the money now or later, the best technology or standard and is it needed now or later? Each argument can be offset by recognition, education and evaluation. As always, taking the time early in the purchase decision process to learn about the technologies, standards and potential solutions allows for a more comprehensive evaluation. The inadvertent FUD from subject matter experts can be mitigated by research and understanding. Again, take the time to research and better understand the implications.

The purchase specific FUD is the easiest to recognize but it can be the hardest to mitigate. This type of FUD usually comes at or near the purchase decision deadline. It plays into the biggest fears of the decision maker: am I making the right or best choice? Am I spending my money wisely? It is difficult to mitigate because it comes in at the last moment, hitting on all of the fear, uncertainty and doubt. The bottom line on FUD is to be aware of it, address it and not to be ruled by it. 

 

About the Columnist:

David Elliott has more than 25 years experience in Information Technology and for the past five years in IP surveillance. He is a Certified Information Systems Security Professional (CISSP). Mr. Elliott is currently the program manager for a Service-disabled Veteran owned Small Disadvantaged Business, developing a Data Loss Prevention practice in the government sector. He has worked with Local, State and Federal Government organizations as well as Fortune 500 companies.

KEYWORDS: doubt fear uncertainty

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Ed Daly - Beware of the U.S.? - Security Magazine

    Beware of the U.S.?

    See More
  • chat-apps-security-fp1170x658.jpg

    Beware of chat apps: Your security and brand reputation are on the line

    See More
  • Recurring Scam: Beware of Cell Phone Do Not Call Requests

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing