SlideShare a Scribd company logo
1 of 3
Download to read offline
22 Must Haves For
    Secure Enterprise Social
How to Avoid Common Risk, Compliance, and Governance Mistakes
The Enterprise Social Media Security Reality

       “Almost two-thirds of companies surveyed
       say that social media is a significant or
       critical risk to their brand reputation; yet
       60% of companies either never train their
       employees about their corporate social
       media policies or do so only upon hiring.
       Moreover, 43% of companies have less than
       one Full-Time Equivalent (FTE) dedicated to
       managing social media risk.”
                    Guarding the Social Gates: The Imperative
                           for Social Media Risk Management
                       (Alan Webber, Altimeter, August 2012)



       “Nearly two-thirds of security and risk
       professionals (64%) have no social media
       policy in place or if they do, they lack
       tools to sufficiently enforce and support
       the policy.”
                            Manage the Risks of Social Media
                              (Chris McClean and Nick Hayes,
                    Forrester Research, Inc., November 2012)
Social@Scale Security Checklist
22 Must Haves For Every Enterprise-wide Social Media Deployment


                 Do we have...?                                                               Yes   No
Governance
                  1. content rules that flag unacceptable outbound content?

                  2. an approval workflow for outbound content?

                  3. the legal team involved for outbound content guidelines?

                  4. a defined escalation process?

                  5. the ability to track messages from inception to resolution?

                  6. a way to handle rogue accounts?

                  7. enterprise-wide, single point password control?

                  8. a rule to disapprove sending passwords around in Excel?

                  9. Access Management?

                 10. a social media policy or guidelines?

Security
                 11. the ability to treat private messages differently?

                 12. the ability to integrate with enterprise-wide authentication systems?

                 13. only tools and platforms that are enterprise-grade security compliant?

                 14. enforced password guidelines?

                 15. the ability to differentiate influencers?

                 16. automated monitoring rules?

Compliance
                 17. the ability to retract social messages from a central location?
                 18. the ability to document internal conversations about social
                     media situations?
                 19. the ability to archive outbound content?

                 20. the ability to archive inbound content?

                 21. the ability to create audit trails for social media activities?
                 22. a Social Media Management System that meets our own corporate
                     security requirements?

           To learn more about Social@Scale Security, visit us at www.sprinklr.com

More Related Content

What's hot

The guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdfThe guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdf
Anjanette Delgado
 
Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3
Marshall Sponder
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship management
Plínio Okamoto
 
The Social CEO: Executives Tell All
The Social CEO: Executives Tell AllThe Social CEO: Executives Tell All
The Social CEO: Executives Tell All
Weber Shandwick
 
Social Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie TurnerSocial Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie Turner
SIXTY
 

What's hot (19)

Synthesio book signing marshall sponder - delivered
Synthesio book signing    marshall sponder - deliveredSynthesio book signing    marshall sponder - delivered
Synthesio book signing marshall sponder - delivered
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
 
[Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger [Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger
 
The guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdfThe guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdf
 
[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan Etlinger[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan Etlinger
 
Social monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, ColobmiaSocial monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, Colobmia
 
Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3
 
Best Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big BrandsBest Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big Brands
 
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship management
 
The Social CEO: Executives Tell All
The Social CEO: Executives Tell AllThe Social CEO: Executives Tell All
The Social CEO: Executives Tell All
 
What is the future for social media??
What is the future for social media??What is the future for social media??
What is the future for social media??
 
Managing Social Media Risks
Managing Social Media RisksManaging Social Media Risks
Managing Social Media Risks
 
Financial Institutions and Social Media
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media
 
Social Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie TurnerSocial Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie Turner
 
2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfaction2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfaction
 
A Framework for Social Analytics
A Framework for Social AnalyticsA Framework for Social Analytics
A Framework for Social Analytics
 
Kreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI EquationKreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI Equation
 
RESEARCH_PRINT
RESEARCH_PRINTRESEARCH_PRINT
RESEARCH_PRINT
 

Similar to Best Practices for Secure Enterprise Social Media Deployments

InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
Josh Stein
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
FERMA
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
SchleighS
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media Governance
Mike Lesczinski
 

Similar to Best Practices for Secure Enterprise Social Media Deployments (20)

3852 Socialnetworking Bk
3852 Socialnetworking Bk3852 Socialnetworking Bk
3852 Socialnetworking Bk
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
 
D'souza social content
D'souza social contentD'souza social content
D'souza social content
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Managing Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaManaging Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social Media
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Essential guide to social media for executives
Essential guide to social media for executivesEssential guide to social media for executives
Essential guide to social media for executives
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk Management
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media Governance
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategy
 

More from Sprinklr

Content Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata SolutionsContent Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata Solutions
Sprinklr
 

More from Sprinklr (12)

Care Is The New Marketing
Care Is The New MarketingCare Is The New Marketing
Care Is The New Marketing
 
Engaging New Audiences with Twitter
Engaging New Audiences with TwitterEngaging New Audiences with Twitter
Engaging New Audiences with Twitter
 
Succeeding with Instagram Ads
Succeeding with Instagram AdsSucceeding with Instagram Ads
Succeeding with Instagram Ads
 
Calculate Your ROI at SXSW
Calculate Your ROI at SXSWCalculate Your ROI at SXSW
Calculate Your ROI at SXSW
 
How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships
 
Content Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata SolutionsContent Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata Solutions
 
How Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President ObamaHow Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President Obama
 
Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?
 
How Virgin America Soared During #Snowmageddon
How Virgin America Soared During #SnowmageddonHow Virgin America Soared During #Snowmageddon
How Virgin America Soared During #Snowmageddon
 
Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...
 
Build it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis ManagementBuild it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis Management
 
Sprinklr overview of Facebook Timeline
Sprinklr overview of Facebook TimelineSprinklr overview of Facebook Timeline
Sprinklr overview of Facebook Timeline
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Best Practices for Secure Enterprise Social Media Deployments

  • 1. 22 Must Haves For Secure Enterprise Social How to Avoid Common Risk, Compliance, and Governance Mistakes
  • 2. The Enterprise Social Media Security Reality “Almost two-thirds of companies surveyed say that social media is a significant or critical risk to their brand reputation; yet 60% of companies either never train their employees about their corporate social media policies or do so only upon hiring. Moreover, 43% of companies have less than one Full-Time Equivalent (FTE) dedicated to managing social media risk.” Guarding the Social Gates: The Imperative for Social Media Risk Management (Alan Webber, Altimeter, August 2012) “Nearly two-thirds of security and risk professionals (64%) have no social media policy in place or if they do, they lack tools to sufficiently enforce and support the policy.” Manage the Risks of Social Media (Chris McClean and Nick Hayes, Forrester Research, Inc., November 2012)
  • 3. Social@Scale Security Checklist 22 Must Haves For Every Enterprise-wide Social Media Deployment Do we have...? Yes No Governance 1. content rules that flag unacceptable outbound content? 2. an approval workflow for outbound content? 3. the legal team involved for outbound content guidelines? 4. a defined escalation process? 5. the ability to track messages from inception to resolution? 6. a way to handle rogue accounts? 7. enterprise-wide, single point password control? 8. a rule to disapprove sending passwords around in Excel? 9. Access Management? 10. a social media policy or guidelines? Security 11. the ability to treat private messages differently? 12. the ability to integrate with enterprise-wide authentication systems? 13. only tools and platforms that are enterprise-grade security compliant? 14. enforced password guidelines? 15. the ability to differentiate influencers? 16. automated monitoring rules? Compliance 17. the ability to retract social messages from a central location? 18. the ability to document internal conversations about social media situations? 19. the ability to archive outbound content? 20. the ability to archive inbound content? 21. the ability to create audit trails for social media activities? 22. a Social Media Management System that meets our own corporate security requirements? To learn more about Social@Scale Security, visit us at www.sprinklr.com