SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
June 2013 ITNOW 25
People now live more and more of their
lives online, with most having accounts
with one or more sites that allow them to
share personal or professional details and
activities with others.
We generally trust who we connect with
but share maybe more than is prudent in
a medium that may seem ephemeral but
can provide an online record long into the
future.
Misjudged messages and images can be
found years later and put employment and
relationships at risk.
Even trying to limit who you initially share
information with doesn’t prevent it from
being recorded or forwarded on, and the
sites may have an interest in you sharing
to the widest audience possible. Always
assume posts are public and permanent.
Even if we are careful about who we
connect with and what we share, we can
provide snippets of information which, taken
together with other data, can expose things
that we did not intend to be publicly revealed
- be they company technologies, plans and
other commercially sensitive data or your
locations and sensitive personal data.
Often our mobile devices, such as
smartphones and tablets, will be set up to
automatically log into social media sites and
other accounts yet lack the same level of
protections that a laptop or desktop might
have.
When someone else gets hold of our
devices it can be all too easy to get access
to the device, along with all the data and
accounts linked to it.
INFORMATION SECURITY
We might also receive posts, links and
recommendations from friends, colleagues
and other contacts that we click on, install
or visit and be subject to other risks, such
as scams, malware, spyware and other
unwanted things.
We all need to be educated to online and
social threats, so we can all identify and deal
with them.
www.bcs.org/security
When posting information online you should always assume that
it is public, says Gareth Niblett, Chairman of the BCS Information
Security Specialist Group.
Information Security Specialist
Group (ISSG):
www.bcs-issg.org.uk
Information Risk Management and
Assurance Specialist Group:
www.bcs.org/groups/irma
BCS Security Community of
Expertise (SCoE):
www.bcs.org/securitycommunity
FURTHER INFORMATION
SHARE
SECURELY
doi:10.1093/itnow/bwt010©2013TheBritishComputerSocietyImage:iStockPhoto/162496927
www.bcs.org/ebooks
Available from all ebook stores
BC196/LD/AD/0513
© BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2013
The increasing use of personal devices
such as smartphones and tablets at work is
offering an opportunity as well as a challenge
for organisations.
This ebook looks at ways to embrace the
benefits of BYOD while offering advice on how
to minimise the risks.
£1.99 (inc.VAT)
According to a recent iPass report, 73% of enterprises allow non-IT-
managed devices to access company resources. This ebook looks at
the security risks of an increasingly mobile workforce and proposes
a range of possible solutions.
£1.99(inc.VAT)
The articles in this ebook look at different aspects of cloud computing.
From strategic and infrastructure considerations to legal and security
issues, the practical advice will build a clearer picture of the benefits
and drawbacks.
£1.99(inc.VAT)
PROFESSIONALS ON THE GO
PROS AND CONS
Alsoavailableinthisebookseries:
GETTING PERSONAL

Mais conteúdo relacionado

Mais procurados

Social media in education
Social media in educationSocial media in education
Social media in educationRobyn Jay
 
Internet Safety Evening Presentation
Internet Safety Evening PresentationInternet Safety Evening Presentation
Internet Safety Evening PresentationAndy Colley
 
Social media Advantages and Disadvantages
Social media Advantages and DisadvantagesSocial media Advantages and Disadvantages
Social media Advantages and DisadvantagesJagmohan Singh
 
Human Factor In Social Media Emergency Management
Human Factor In Social Media Emergency ManagementHuman Factor In Social Media Emergency Management
Human Factor In Social Media Emergency ManagementMassimiliano Mesenasco
 
Internet Safety again
Internet Safety againInternet Safety again
Internet Safety againmwedwards
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureCraig McGill
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital agecomplianceonline123
 
Social networking
Social networkingSocial networking
Social networkingAlen philip
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
 
Cyber Bullying Presentation for Schools
Cyber Bullying Presentation for SchoolsCyber Bullying Presentation for Schools
Cyber Bullying Presentation for SchoolsPhyl Stubbs
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Social Media - Cherry Creek Mortgage Presentation
Social Media - Cherry Creek Mortgage PresentationSocial Media - Cherry Creek Mortgage Presentation
Social Media - Cherry Creek Mortgage PresentationMarket Vertical Partners
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Social networking navigating the work place minefield
Social networking   navigating the work place minefieldSocial networking   navigating the work place minefield
Social networking navigating the work place minefieldRedchip
 

Mais procurados (20)

Social media in education
Social media in educationSocial media in education
Social media in education
 
Internet Safety Evening Presentation
Internet Safety Evening PresentationInternet Safety Evening Presentation
Internet Safety Evening Presentation
 
Social media
Social mediaSocial media
Social media
 
IS Staff Induction
IS Staff InductionIS Staff Induction
IS Staff Induction
 
Social media Advantages and Disadvantages
Social media Advantages and DisadvantagesSocial media Advantages and Disadvantages
Social media Advantages and Disadvantages
 
Human Factor In Social Media Emergency Management
Human Factor In Social Media Emergency ManagementHuman Factor In Social Media Emergency Management
Human Factor In Social Media Emergency Management
 
Internet Safety again
Internet Safety againInternet Safety again
Internet Safety again
 
ISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security cultureISACA talk - cybersecurity and security culture
ISACA talk - cybersecurity and security culture
 
Cybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to KnowCybersecurity: What the GC and CEO Need to Know
Cybersecurity: What the GC and CEO Need to Know
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Social networking
Social networkingSocial networking
Social networking
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0
 
Mazza
MazzaMazza
Mazza
 
Cyber Bullying Presentation for Schools
Cyber Bullying Presentation for SchoolsCyber Bullying Presentation for Schools
Cyber Bullying Presentation for Schools
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Sep 16 2010 safe and responsible personal use of social media
Sep 16 2010 safe and responsible personal use of social mediaSep 16 2010 safe and responsible personal use of social media
Sep 16 2010 safe and responsible personal use of social media
 
Social Media - Cherry Creek Mortgage Presentation
Social Media - Cherry Creek Mortgage PresentationSocial Media - Cherry Creek Mortgage Presentation
Social Media - Cherry Creek Mortgage Presentation
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Social networking navigating the work place minefield
Social networking   navigating the work place minefieldSocial networking   navigating the work place minefield
Social networking navigating the work place minefield
 

Destaque

djwojdpejdoedjeòfjpefjfpèfmñémf,
djwojdpejdoedjeòfjpefjfpèfmñémf,djwojdpejdoedjeòfjpefjfpèfmñémf,
djwojdpejdoedjeòfjpefjfpèfmñémf,narinder444
 
La literatura desde 1975 hasta la actualidad
La literatura desde 1975 hasta la actualidadLa literatura desde 1975 hasta la actualidad
La literatura desde 1975 hasta la actualidadNataliamg20
 
International auctions for_renewables
International auctions for_renewablesInternational auctions for_renewables
International auctions for_renewablesBALAN DANIEL
 
Verpleegkundig proces rapportage systemen deel 3
Verpleegkundig proces rapportage systemen deel 3Verpleegkundig proces rapportage systemen deel 3
Verpleegkundig proces rapportage systemen deel 3GerritvanIpkens
 
№2 дидактическое пособие мой друг слоненок
№2 дидактическое пособие мой друг слоненок№2 дидактическое пособие мой друг слоненок
№2 дидактическое пособие мой друг слоненокДмитрий Прудников
 
Capital contable nif c 11
Capital contable nif c 11Capital contable nif c 11
Capital contable nif c 11Jael Peña
 
PDC Workshop FFF2017
PDC Workshop FFF2017PDC Workshop FFF2017
PDC Workshop FFF2017TOPdesk
 
CSharp Presentation
CSharp PresentationCSharp Presentation
CSharp PresentationVishwa Mohan
 
Paint course part 1 painting
Paint course part 1 paintingPaint course part 1 painting
Paint course part 1 paintingChemist Edward
 
Overview of Apache SystemML by Berthold Reinwald and Nakul Jindal
Overview of Apache SystemML by Berthold Reinwald and Nakul JindalOverview of Apache SystemML by Berthold Reinwald and Nakul Jindal
Overview of Apache SystemML by Berthold Reinwald and Nakul JindalArvind Surve
 

Destaque (19)

Happy birthday m0ms kiee
Happy  birthday m0ms kieeHappy  birthday m0ms kiee
Happy birthday m0ms kiee
 
djwojdpejdoedjeòfjpefjfpèfmñémf,
djwojdpejdoedjeòfjpefjfpèfmñémf,djwojdpejdoedjeòfjpefjfpèfmñémf,
djwojdpejdoedjeòfjpefjfpèfmñémf,
 
Hotel sedap malam
Hotel sedap malamHotel sedap malam
Hotel sedap malam
 
La literatura desde 1975 hasta la actualidad
La literatura desde 1975 hasta la actualidadLa literatura desde 1975 hasta la actualidad
La literatura desde 1975 hasta la actualidad
 
International auctions for_renewables
International auctions for_renewablesInternational auctions for_renewables
International auctions for_renewables
 
Profile
ProfileProfile
Profile
 
Verpleegkundig proces rapportage systemen deel 3
Verpleegkundig proces rapportage systemen deel 3Verpleegkundig proces rapportage systemen deel 3
Verpleegkundig proces rapportage systemen deel 3
 
№2 дидактическое пособие мой друг слоненок
№2 дидактическое пособие мой друг слоненок№2 дидактическое пособие мой друг слоненок
№2 дидактическое пособие мой друг слоненок
 
10287 lecture5(2)
10287 lecture5(2)10287 lecture5(2)
10287 lecture5(2)
 
Luis cernuda
Luis cernudaLuis cernuda
Luis cernuda
 
Capital contable nif c 11
Capital contable nif c 11Capital contable nif c 11
Capital contable nif c 11
 
PDC Workshop FFF2017
PDC Workshop FFF2017PDC Workshop FFF2017
PDC Workshop FFF2017
 
CSharp Presentation
CSharp PresentationCSharp Presentation
CSharp Presentation
 
Paint course part 1 painting
Paint course part 1 paintingPaint course part 1 painting
Paint course part 1 painting
 
Files Vs DataBase
Files Vs DataBaseFiles Vs DataBase
Files Vs DataBase
 
Winston Wallace CV 3-2016
Winston Wallace CV 3-2016Winston Wallace CV 3-2016
Winston Wallace CV 3-2016
 
Informatica 1.1
Informatica 1.1Informatica 1.1
Informatica 1.1
 
Overview of Apache SystemML by Berthold Reinwald and Nakul Jindal
Overview of Apache SystemML by Berthold Reinwald and Nakul JindalOverview of Apache SystemML by Berthold Reinwald and Nakul Jindal
Overview of Apache SystemML by Berthold Reinwald and Nakul Jindal
 
Mi experiencia con la Nikon COOLPIX P-600
Mi experiencia con la Nikon COOLPIX   P-600Mi experiencia con la Nikon COOLPIX   P-600
Mi experiencia con la Nikon COOLPIX P-600
 

Semelhante a BCS ITNow 201306 - Share Securely

Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaksSocialKwan
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalistsantoniokisembo
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxHAYDEECAYDA
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social NetworksClint Hamada
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550Liberteks
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 

Semelhante a BCS ITNow 201306 - Share Securely (20)

IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Protecting Intellectual Property in the Age of WikiLeaks
Protecting Intellectual Property in the  Age of WikiLeaksProtecting Intellectual Property in the  Age of WikiLeaks
Protecting Intellectual Property in the Age of WikiLeaks
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Safer internet day 2011
Safer internet day 2011Safer internet day 2011
Safer internet day 2011
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
TheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptxTheInternetDigitalSecurityfddreeere.pptx
TheInternetDigitalSecurityfddreeere.pptx
 
Parent workshop - Social Networks
Parent workshop - Social NetworksParent workshop - Social Networks
Parent workshop - Social Networks
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Users guide
Users guideUsers guide
Users guide
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
SOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptxSOCIAL-AND-ETHICAL.pptx
SOCIAL-AND-ETHICAL.pptx
 

Mais de Gareth Niblett

Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Gareth Niblett
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsGareth Niblett
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsGareth Niblett
 
BCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseBCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseGareth Niblett
 
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureBCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureGareth Niblett
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityGareth Niblett
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsGareth Niblett
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionGareth Niblett
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessGareth Niblett
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnGareth Niblett
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertGareth Niblett
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletGareth Niblett
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationGareth Niblett
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceGareth Niblett
 
RIPA: Perception and Practice
RIPA: Perception and PracticeRIPA: Perception and Practice
RIPA: Perception and PracticeGareth Niblett
 

Mais de Gareth Niblett (16)

Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest Threats
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider Threats
 
BCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber ResponseBCS ITNow 201603 - Cyber Response
BCS ITNow 201603 - Cyber Response
 
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureBCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, Secure
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic Security
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk Business
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going On
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay Alert
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 
RIPA: Perception and Practice
RIPA: Perception and PracticeRIPA: Perception and Practice
RIPA: Perception and Practice
 

Último

Finance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdfFinance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdfandersonwille2024
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRNeha Kajulkar
 
Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.AFFFILIATE
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...SocioCosmos
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for siteAshtonCains
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECall girl Jaipur
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...Heena Escort Service
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"SocioCosmos
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfmacawdigitalseo2023
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Onlykhanf3647647
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for siteAshtonCains
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxednyonat
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Nitya salvi
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the siteAshtonCains
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfeliklein8
 

Último (20)

Finance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdfFinance-and-Operations-in-the-Azure-Cloud.pdf
Finance-and-Operations-in-the-Azure-Cloud.pdf
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptxDickinsonSlides teeeeeeeeeeessssssssssst.pptx
DickinsonSlides teeeeeeeeeeessssssssssst.pptx
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 

BCS ITNow 201306 - Share Securely

  • 1. June 2013 ITNOW 25 People now live more and more of their lives online, with most having accounts with one or more sites that allow them to share personal or professional details and activities with others. We generally trust who we connect with but share maybe more than is prudent in a medium that may seem ephemeral but can provide an online record long into the future. Misjudged messages and images can be found years later and put employment and relationships at risk. Even trying to limit who you initially share information with doesn’t prevent it from being recorded or forwarded on, and the sites may have an interest in you sharing to the widest audience possible. Always assume posts are public and permanent. Even if we are careful about who we connect with and what we share, we can provide snippets of information which, taken together with other data, can expose things that we did not intend to be publicly revealed - be they company technologies, plans and other commercially sensitive data or your locations and sensitive personal data. Often our mobile devices, such as smartphones and tablets, will be set up to automatically log into social media sites and other accounts yet lack the same level of protections that a laptop or desktop might have. When someone else gets hold of our devices it can be all too easy to get access to the device, along with all the data and accounts linked to it. INFORMATION SECURITY We might also receive posts, links and recommendations from friends, colleagues and other contacts that we click on, install or visit and be subject to other risks, such as scams, malware, spyware and other unwanted things. We all need to be educated to online and social threats, so we can all identify and deal with them. www.bcs.org/security When posting information online you should always assume that it is public, says Gareth Niblett, Chairman of the BCS Information Security Specialist Group. Information Security Specialist Group (ISSG): www.bcs-issg.org.uk Information Risk Management and Assurance Specialist Group: www.bcs.org/groups/irma BCS Security Community of Expertise (SCoE): www.bcs.org/securitycommunity FURTHER INFORMATION SHARE SECURELY doi:10.1093/itnow/bwt010©2013TheBritishComputerSocietyImage:iStockPhoto/162496927 www.bcs.org/ebooks Available from all ebook stores BC196/LD/AD/0513 © BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2013 The increasing use of personal devices such as smartphones and tablets at work is offering an opportunity as well as a challenge for organisations. This ebook looks at ways to embrace the benefits of BYOD while offering advice on how to minimise the risks. £1.99 (inc.VAT) According to a recent iPass report, 73% of enterprises allow non-IT- managed devices to access company resources. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. £1.99(inc.VAT) The articles in this ebook look at different aspects of cloud computing. From strategic and infrastructure considerations to legal and security issues, the practical advice will build a clearer picture of the benefits and drawbacks. £1.99(inc.VAT) PROFESSIONALS ON THE GO PROS AND CONS Alsoavailableinthisebookseries: GETTING PERSONAL