SlideShare uma empresa Scribd logo
1 de 8
SOCIAL MEDIA AND ENTERPRISE
SECURITY WHITEPAPER
Sarah Schleigh

Presentation and Paper can be viewed here:
http://www.slideshare.net/SchleighS
SOCIAL MEDIA APPLICATIONS
 Researching job candidates
 Connecting with clients and consumers – sales

 Market research – polling and surveying customers
  to see what they want or need
 Networking – professionals at different firms can
  network with each other if they share common
  interests or job responsibilities and bounce ideas off
  each other
 Communication dissemination – notices of
  upcoming sales, or recent company
  accomplishments (such as being voted #1 in a
  customer service survey)
SOCIAL MEDIA THREATS
 Sites are frequently used by malicious individuals to
  spread malware and viruses
 Hackers use social media sites to gather personal
  information and attempt to guess passwords and
  login information (both personal and work-related)
 Data leakage – intentional or unintentional
  disclosure of confidential information on social
  media sites – can cause severe reputational
  damage and loss of customers
 Hard to monitor and control – unlike email
CURRENT STEPS BEING TAKEN TO MITIGATE
RISKS

 Daily updates to malware and virus detection
  software
 Some companies limit users ability to download
  plug-ins or applications from social media sites
 Some companies only allow certain users with a
  business need to access social media
 Some companies provide training – particularly in
  regards to confidential information
 The problem is many companies are not doing
  everything they could be doing to mitigate social
  media security risks
RECOMMENDATIONS
   Social Media Use Policy
     This policy preferably would be separate from the
      normal internet use policy and/or code of conduct in
      order to emphasize its importance
     Should spell out specific guidelines on what is
      acceptable or unacceptable to post, what kind of activity
      is acceptable, and what is expected of users
     Should also specifically spell out the consequences if
      and when employees violate the Social Media Use
      Policy
     This policy should be reviewed with new employees
      immediately following their hire date and existing
      employees should be required to review it at least
      annually
RECOMMENDATIONS (CONT’D)
 Limit access to social media sites at work to only
  those users who need access to it. Discourage
  employees from using accessing their personal
  social media accounts at work.
 Offer training regularly – this will provide employees
  the opportunity to ask questions about what is and
  is not acceptable and allow them to understand the
  risks of social media
 Establish appropriate communication channels – in
  between annual policy reviews and periodic
  training, employees may have questions and it is
  important that they know who to direct these
  questions to and that questions are welcome
RECOMMENDATIONS (CONT’D)
 Have a dedicated team handle the corporate social
  media accounts – if size allows. Recommended to
  not leave this up to one person as a team may
  catch more incidents of data that should not be
  disclosed.
 Randomly monitor the activity of users who have
  authorized access to social media at work
 Don’t forget about mobile devices! Firms should try
  to stick to one kind of smartphone and one kind of
  tablet to be issued by the company so that they do
  not have to support many different kinds
RECOMMENDATIONS (CONT’D)
 General IT security improvements – password
  management training, implement stricter password
  requirements, use security tokens, use content
  filtering technology and make sure that antivirus
  and antimalware software is updated as frequently
  as possible
 Less commonly used but still worth consideration is
  the use to two separate networks – one for
  employees’ personal activity and one for business
  so that if malware/virus threats are downloaded
  through social media they cannot impact the highly
  important business network

Mais conteúdo relacionado

Mais procurados

Social networking risks
Social networking risksSocial networking risks
Social networking risksPadma Kannan
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Essay 2 IE Business School
Essay 2 IE Business SchoolEssay 2 IE Business School
Essay 2 IE Business SchoolAlexander Klaver
 
Social Media Policies Presentation Christy Season
Social Media Policies Presentation   Christy SeasonSocial Media Policies Presentation   Christy Season
Social Media Policies Presentation Christy SeasonSMC Columbia
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Social networking
Social networkingSocial networking
Social networkingavernkm
 
Social Media Employee Policies
Social Media Employee PoliciesSocial Media Employee Policies
Social Media Employee PoliciesAnvil Media, Inc.
 
Social media guidelines
Social media guidelines Social media guidelines
Social media guidelines Adam De Vile
 
Use of Web 2.0 for external knowledge managment
Use of Web 2.0 for external knowledge managmentUse of Web 2.0 for external knowledge managment
Use of Web 2.0 for external knowledge managmentMaxim Lobov
 
Mobile marketing.social media international students
Mobile marketing.social media international studentsMobile marketing.social media international students
Mobile marketing.social media international studentsNational University
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
ISACA Corporate Guidelines For Social Media Efforts
ISACA Corporate Guidelines For Social Media EffortsISACA Corporate Guidelines For Social Media Efforts
ISACA Corporate Guidelines For Social Media EffortsRaul Colon
 
Social media compliance
Social media complianceSocial media compliance
Social media complianceMatchPointSG
 

Mais procurados (20)

Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Social networking risks
Social networking risksSocial networking risks
Social networking risks
 
Vivienne Storey
Vivienne StoreyVivienne Storey
Vivienne Storey
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Essay 2 IE Business School
Essay 2 IE Business SchoolEssay 2 IE Business School
Essay 2 IE Business School
 
Social Media Policies Presentation Christy Season
Social Media Policies Presentation   Christy SeasonSocial Media Policies Presentation   Christy Season
Social Media Policies Presentation Christy Season
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Social networking
Social networkingSocial networking
Social networking
 
Social Media Employee Policies
Social Media Employee PoliciesSocial Media Employee Policies
Social Media Employee Policies
 
Social media guidelines
Social media guidelines Social media guidelines
Social media guidelines
 
Anti-Malvertising Guidelines
Anti-Malvertising GuidelinesAnti-Malvertising Guidelines
Anti-Malvertising Guidelines
 
Use of Web 2.0 for external knowledge managment
Use of Web 2.0 for external knowledge managmentUse of Web 2.0 for external knowledge managment
Use of Web 2.0 for external knowledge managment
 
Mobile marketing.social media international students
Mobile marketing.social media international studentsMobile marketing.social media international students
Mobile marketing.social media international students
 
web security
web securityweb security
web security
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Social Media Guidelines for Employees
Social Media Guidelines for EmployeesSocial Media Guidelines for Employees
Social Media Guidelines for Employees
 
Social Media and Privacy
Social Media and PrivacySocial Media and Privacy
Social Media and Privacy
 
ISACA Corporate Guidelines For Social Media Efforts
ISACA Corporate Guidelines For Social Media EffortsISACA Corporate Guidelines For Social Media Efforts
ISACA Corporate Guidelines For Social Media Efforts
 
Social media compliance
Social media complianceSocial media compliance
Social media compliance
 

Destaque

Neil Fraser
Neil FraserNeil Fraser
Neil Fraserichil
 
Oficina de mapas conceituais
Oficina de mapas conceituaisOficina de mapas conceituais
Oficina de mapas conceituaisFlávio Pereira
 
Aratz eta ane
Aratz eta aneAratz eta ane
Aratz eta anexarpati
 
Elena eta Cecilia
Elena eta CeciliaElena eta Cecilia
Elena eta Ceciliaxarpati
 
кадровая измеримость как технологическая основа для управленческих решений
кадровая измеримость как технологическая основа для управленческих решенийкадровая измеримость как технологическая основа для управленческих решений
кадровая измеримость как технологическая основа для управленческих решенийLAZOVOY
 
nutraceuticals and functional food
 nutraceuticals and  functional food   nutraceuticals and  functional food
nutraceuticals and functional food gaurav gautam
 
Periféricos de salida
Periféricos de salidaPeriféricos de salida
Periféricos de salidatocayojunior
 
Подорож до країни словників - Прасол Г. С.
Подорож до країни словників - Прасол Г. С.Подорож до країни словників - Прасол Г. С.
Подорож до країни словників - Прасол Г. С.brdschool20
 
Evaluación de proyectos j. sarmiento
Evaluación de proyectos   j. sarmientoEvaluación de proyectos   j. sarmiento
Evaluación de proyectos j. sarmientoWilfredy Inciarte
 
Joves i lectura
Joves i lecturaJoves i lectura
Joves i lecturaJoanprofe
 

Destaque (15)

Análise dos riscos naturais
Análise dos riscos naturaisAnálise dos riscos naturais
Análise dos riscos naturais
 
Neil Fraser
Neil FraserNeil Fraser
Neil Fraser
 
Medina
MedinaMedina
Medina
 
Oficina de mapas conceituais
Oficina de mapas conceituaisOficina de mapas conceituais
Oficina de mapas conceituais
 
Discapacidad
DiscapacidadDiscapacidad
Discapacidad
 
Aratz eta ane
Aratz eta aneAratz eta ane
Aratz eta ane
 
Elena eta Cecilia
Elena eta CeciliaElena eta Cecilia
Elena eta Cecilia
 
кадровая измеримость как технологическая основа для управленческих решений
кадровая измеримость как технологическая основа для управленческих решенийкадровая измеримость как технологическая основа для управленческих решений
кадровая измеримость как технологическая основа для управленческих решений
 
Menu
MenuMenu
Menu
 
Resume
ResumeResume
Resume
 
nutraceuticals and functional food
 nutraceuticals and  functional food   nutraceuticals and  functional food
nutraceuticals and functional food
 
Periféricos de salida
Periféricos de salidaPeriféricos de salida
Periféricos de salida
 
Подорож до країни словників - Прасол Г. С.
Подорож до країни словників - Прасол Г. С.Подорож до країни словників - Прасол Г. С.
Подорож до країни словників - Прасол Г. С.
 
Evaluación de proyectos j. sarmiento
Evaluación de proyectos   j. sarmientoEvaluación de proyectos   j. sarmiento
Evaluación de proyectos j. sarmiento
 
Joves i lectura
Joves i lecturaJoves i lectura
Joves i lectura
 

Semelhante a Social Media Security Whitepaper

Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work PlacePepovski Darko
 
Social Media Management & Employees
Social Media Management & EmployeesSocial Media Management & Employees
Social Media Management & EmployeesJohn Theriault
 
Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Oasis Solutions Group
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12Louise Spiteri
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseJay McLaughlin
 
Social Media
Social MediaSocial Media
Social MediaJ.L+C.L
 
How to Engage Employees in Social Media for Sales Results
How to Engage Employees in Social Media for Sales ResultsHow to Engage Employees in Social Media for Sales Results
How to Engage Employees in Social Media for Sales ResultsAlan See
 
Social Media at Work Place Training Manual
Social Media at Work Place Training ManualSocial Media at Work Place Training Manual
Social Media at Work Place Training ManualLaura Lee
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012PBeisty
 
Taking social networking to the next level
Taking social networking to the next levelTaking social networking to the next level
Taking social networking to the next levelAndrea Baker
 
Social Media Trainings (Annexure)
Social Media Trainings (Annexure)Social Media Trainings (Annexure)
Social Media Trainings (Annexure)Vanilla Skills
 
Social CRM Best Practices How-To Guide
Social CRM Best Practices How-To GuideSocial CRM Best Practices How-To Guide
Social CRM Best Practices How-To GuideDemand Metric
 
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docxSOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docxwhitneyleman54422
 
Building trust on your brands using social media tools
Building trust on your brands using social media toolsBuilding trust on your brands using social media tools
Building trust on your brands using social media toolsVaradharajan Krishnamoorthy
 

Semelhante a Social Media Security Whitepaper (20)

Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
 
Social Media Management & Employees
Social Media Management & EmployeesSocial Media Management & Employees
Social Media Management & Employees
 
Social Media Policy For Your Small Business
Social Media Policy For Your Small Business Social Media Policy For Your Small Business
Social Media Policy For Your Small Business
 
Social Media Policies by Sarah Wallace
Social Media Policies by Sarah WallaceSocial Media Policies by Sarah Wallace
Social Media Policies by Sarah Wallace
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 
Social Media Applications.pdf
Social Media Applications.pdfSocial Media Applications.pdf
Social Media Applications.pdf
 
Social Media
Social MediaSocial Media
Social Media
 
How to Engage Employees in Social Media for Sales Results
How to Engage Employees in Social Media for Sales ResultsHow to Engage Employees in Social Media for Sales Results
How to Engage Employees in Social Media for Sales Results
 
Social Media MTL Conference Ppt
Social Media MTL Conference PptSocial Media MTL Conference Ppt
Social Media MTL Conference Ppt
 
Social Media at Work Place Training Manual
Social Media at Work Place Training ManualSocial Media at Work Place Training Manual
Social Media at Work Place Training Manual
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
Taking social networking to the next level
Taking social networking to the next levelTaking social networking to the next level
Taking social networking to the next level
 
Social Media Trainings (Annexure)
Social Media Trainings (Annexure)Social Media Trainings (Annexure)
Social Media Trainings (Annexure)
 
Social CRM Best Practices How-To Guide
Social CRM Best Practices How-To GuideSocial CRM Best Practices How-To Guide
Social CRM Best Practices How-To Guide
 
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docxSOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
SOCIAL MEDIA USE IN THE WORKPLACEDean CloudenProfessional Co.docx
 
Blogger Game Plan
Blogger Game PlanBlogger Game Plan
Blogger Game Plan
 
Building trust on your brands using social media tools
Building trust on your brands using social media toolsBuilding trust on your brands using social media tools
Building trust on your brands using social media tools
 

Último

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 

Último (20)

Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 

Social Media Security Whitepaper

  • 1. SOCIAL MEDIA AND ENTERPRISE SECURITY WHITEPAPER Sarah Schleigh Presentation and Paper can be viewed here: http://www.slideshare.net/SchleighS
  • 2. SOCIAL MEDIA APPLICATIONS  Researching job candidates  Connecting with clients and consumers – sales  Market research – polling and surveying customers to see what they want or need  Networking – professionals at different firms can network with each other if they share common interests or job responsibilities and bounce ideas off each other  Communication dissemination – notices of upcoming sales, or recent company accomplishments (such as being voted #1 in a customer service survey)
  • 3. SOCIAL MEDIA THREATS  Sites are frequently used by malicious individuals to spread malware and viruses  Hackers use social media sites to gather personal information and attempt to guess passwords and login information (both personal and work-related)  Data leakage – intentional or unintentional disclosure of confidential information on social media sites – can cause severe reputational damage and loss of customers  Hard to monitor and control – unlike email
  • 4. CURRENT STEPS BEING TAKEN TO MITIGATE RISKS  Daily updates to malware and virus detection software  Some companies limit users ability to download plug-ins or applications from social media sites  Some companies only allow certain users with a business need to access social media  Some companies provide training – particularly in regards to confidential information  The problem is many companies are not doing everything they could be doing to mitigate social media security risks
  • 5. RECOMMENDATIONS  Social Media Use Policy  This policy preferably would be separate from the normal internet use policy and/or code of conduct in order to emphasize its importance  Should spell out specific guidelines on what is acceptable or unacceptable to post, what kind of activity is acceptable, and what is expected of users  Should also specifically spell out the consequences if and when employees violate the Social Media Use Policy  This policy should be reviewed with new employees immediately following their hire date and existing employees should be required to review it at least annually
  • 6. RECOMMENDATIONS (CONT’D)  Limit access to social media sites at work to only those users who need access to it. Discourage employees from using accessing their personal social media accounts at work.  Offer training regularly – this will provide employees the opportunity to ask questions about what is and is not acceptable and allow them to understand the risks of social media  Establish appropriate communication channels – in between annual policy reviews and periodic training, employees may have questions and it is important that they know who to direct these questions to and that questions are welcome
  • 7. RECOMMENDATIONS (CONT’D)  Have a dedicated team handle the corporate social media accounts – if size allows. Recommended to not leave this up to one person as a team may catch more incidents of data that should not be disclosed.  Randomly monitor the activity of users who have authorized access to social media at work  Don’t forget about mobile devices! Firms should try to stick to one kind of smartphone and one kind of tablet to be issued by the company so that they do not have to support many different kinds
  • 8. RECOMMENDATIONS (CONT’D)  General IT security improvements – password management training, implement stricter password requirements, use security tokens, use content filtering technology and make sure that antivirus and antimalware software is updated as frequently as possible  Less commonly used but still worth consideration is the use to two separate networks – one for employees’ personal activity and one for business so that if malware/virus threats are downloaded through social media they cannot impact the highly important business network