SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Will Facebook Get You
Hired or Fired?
Kevin Prince
Chief Technology Officer
Perimeter E-Security
440 Wheelers Farm Rd, Milford CT 06461 Phone 800.234.2175
www.perimeterusa.com
A friend of mine told me a story about his mother who would always know when he got into the candy
jar without asking. As a small child he couldn’t figure out how his mom could be omniscient. He
thought that was reserved for Deities and Santa Claus. When he got a bit older, he asked his mom how
she did it. With a smile she told him that his fingers would be various colors from the candy coating and
his mouth would have chocolate smears.
Facebook is like that candy jar and our employers or perspective employers are like my friend’s mom.
Companies look at social networking sites such as Facebook, MySpace,Twitter, LinkedIn, Bebo, Friendster
and others with mixed emotions. On one hand, permitted use attracts younger employees, a friendly
culture, creative sharing of ideas, and encourages friendships between co-workers. On the other hand,
it can have implications with information security, liability, productivity, bandwidth consumption and
more.
Are social networking sites making an impact? Well, governments are considering monitoring them,
human resource departments are using them to screen applicants, authority figures have been known
to infiltrate them in cyber disguise, and worms and Trojan horse software have been written specifically
for them. I think it is safe to say that, yes, social networking sites are impacting our lives.
As of 2/12/09, Facebook is over 200 million members strong. With the viral and addictive qualities it has,
employers have become concerned. About half of all companies use web content filtering or black lists
to block access to social networking sites. Do they have a right to be concerned? Look at these statistics
from the March 2, 2009 issue of Fortune Magazine.
Whether you are an avid user of social networking sites, know someone who is, or are concerned about
our companies exposure to the risks of them, you need to stay safe. Criminals and those with less than
honorable intentions are using these sites in ways we do not expect…and do not want!
Be Aware
Users should be aware that 30% of companies are using social networking sites to learn about
applicants as they interview for jobs. Even a photo or brief description of a user can offer insight into an
applicant that is valuable for companies.
Be cautious of who you add as friends. There are known cases when someone takes on the identity
of others, becomes an online friend, and then gathers other information about you, your contacts,
associations, interests, group affiliations, etc. This information can be used for fraud, social engineering
and other criminal activity.
The typical Facebook user spends an average of 169 minutes a month on the site, where Google
•	
News gets 13 minutes and the New York Times website gets ten minutes.
Facebook total daily minutes went from 1.1 billion to more than 3 billion in the last 12 months.
•	
Facebook users who update their status daily went from 4 million to 15 million in the last year.
•	
The Facebook user base doubled in that same time.
•	
It took 14 years for cell phone usage to reach 150 million units sold while Facebook members
•	
reached that in a mere 5 years. This is one of the fastest adoption rates in history.
440 Wheelers Farm Rd, Milford CT 06461 Phone 800.234.2175
www.perimeterusa.com
Page 2
Be conscious of what you post - assume that the entire world can view your comments, videos, and
pictures. Ask yourself if you would want your boss, mother, priest, and spouse to see what you put
out there…because they just might. Don’t trust any site to keep your content private and remember,
THE INTERNET NEVER FORGETS. All it takes is one night of partying and ending up with less than fully
clothed pictures on the Internet that spread like wildfire.
Phishing is a common method cyber criminals use to lure individuals into giving up their personal
information. Spear phishing is where the criminals target a specific group of users, for example all
customers of a particular bank or credit union. Whaling is an even more directed attack at one particular
person. Although these attacks are often directed towards high net-worth individuals, cyber-criminals
use social networking sites and other online databases to obtain the majority of the information which
allows them to commit these crimes.
Many companies have or are imposing Internet use policies. Be sure you understand what it says
because your HR department will probably want you to sign and tie your employment to it. If Internet
abuse is going on (based on whatever their definition is, which could include reduced productivity) you
could lose your job. This could be Facebook, day trading, sports sites, and a myriad of other places on the
net.
An Internet use policy could outline surfing as something that negatively impacts business processes.
You might not know it but if your Facebook friend sends you a link to the latest High Definition movie
and you download it, that could saturate the Internet bandwidth for the company and bring legitimate
business communications to a halt.
There are cases where someone was viewing inappropriate adult material on their computer and a co-
worker walked by and saw it. This leads to lawsuits against the company and often the termination of
the offending employee. Offenses that may lead to termination can also include slandering a coworker
on a social networking site.
Be Safe
People are generally more cautious about messages in email than they are when they get a link, chat,
text, post, or something else within a social networking website. For some reason we turn off our
defenses once we are logged in. In fact, people are ten times more likely to click on a link sent to them
in a social networking site than in regular email. Cyber criminals use this to their advantage. In the last
year there has been a huge upswing in the variety and frequency of these types of attacks. Phishing
attacks,Trojan horse programs, and malicious software can be used to compromise your identity.
Facebook has already experienced its fair share of worms. One of which is Koobface, which sends you
an email that appears to be from one of your friends and directs you to a YouTube video where you
are directed to download some new software which is in fact a Trojan horse program that infects your
system.
These methods can also be used to compromise your computer, which can lead to bank account
compromise, and if you are at work, spread and infect other systems. This can lead to the total
440 Wheelers Farm Rd, Milford CT 06461 Phone 800.234.2175
www.perimeterusa.com
Page 3
compromise of the company you work for resulting in millions of dollars in damages, lawsuits, lost
business, fines, and more. The average cost of a data security breach for a company is 6.6 million dollars.
Remember that if you are infected with malware or a Trojan horse program, you likely would never know
it. Your system would simply be under the control of a hacker and be used to capture your usernames
and passwords, gain access to your online bank accounts, launch attacks against other systems, relay
SPAM, or take full remote control.
Social networking sites are here to stay. Use these sites as tools. Be sure they don’t keep you from your
dream job or put you in the unemployment line.
Kevin Prince
Chief Technology Officer
Perimeter E-Security
KPrince@perimeterusa.com
About the Author
Named Chief Technology Officer of Perimeter in 2009, Kevin Prince spearheads the company’s technology strategy and leads
the technical team in working closely with its customers to manage all of the complexity and compliance requirements of
securing information across the enterprise.
With more than 19 years of expertise in Information Technology and 11 years focused on Internet security, Mr. Prince is an
evangelist on Internet security topics, including network security threats, fraud, identity theft, cyber terrorism and data
breaches. Through regular speaking engagements, webinars, whitepapers and blog postings, Mr. Prince is dedicated to
educating organizations on how to manage information complexity, meet increasingly stringent compliance and security
requirements, and mitigate risk. Mr. Prince has trained federal examiners for several years.
About Perimeter E-Security
Perimeter is the trusted market leader of information security services that delivers enterprise-class protection and
compliance for businesses of any size. Through its cost-effective security-as-a-software platform, Perimeter offers the most
comprehensive compliance, security and messaging services that include but aren’t limited to: hosted email, encrypted
email, firewall management and monitoring, vulnerability scanning, host intrusion and prevention, email antivirus and spam,
remote data backup and email archiving.
As companies struggle with the increasing cost, complexity and stringent compliance requirements associated with their
information intensive businesses, Perimeter is the only provider that can simultaneously reduce the cost, manage all of the
complexity and meet all of the compliance requirements from a single platform.
Headquartered in Milford, CT, with seven geographically distributed technical operations centers and three redundant
datacenters, Perimeter’s on demand services, which are offered both on a Network (in-the-cloud) and CPE (customer-provided
equipment) basis, are validated by TruSecure and guaranteed for current and future regulatory compliance. If you would like
to speak with us or view a product demo, please don’t hesitate to call at 800.234.2175 Option #2 or visit our web site at
www.PerimeterUSA.com.
440 Wheelers Farm Rd, Milford CT 06461 Phone 800.234.2175
www.perimeterusa.com
Page 4

Mais conteúdo relacionado

Mais procurados

How to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlineHow to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlinePaul Bossky
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)esolate
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the WorkplaceEric Swenson
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your DesktopAndy Smith
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself OnlineGary Wagnon
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?TheRealEdwin
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012KanelandSvihlik
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcRay Brannon
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world finalshanikosh
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013KanelandSvihlik
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 
Social Media and Online Investigation Of Claims
Social Media and Online Investigation Of ClaimsSocial Media and Online Investigation Of Claims
Social Media and Online Investigation Of ClaimsDano0403
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivAl Rowell
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safetyFred Miller
 
My Online Image
My Online ImageMy Online Image
My Online Imagealuthe
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011KanelandSvihlik
 

Mais procurados (20)

willweeverhaveprivacyonline
willweeverhaveprivacyonlinewillweeverhaveprivacyonline
willweeverhaveprivacyonline
 
How to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating OnlineHow to Catch Someone Who Is Cheating Online
How to Catch Someone Who Is Cheating Online
 
Walworth academy e-safety (staff)
Walworth academy   e-safety (staff)Walworth academy   e-safety (staff)
Walworth academy e-safety (staff)
 
Allan Watt
Allan WattAllan Watt
Allan Watt
 
COPPA Compliance
COPPA ComplianceCOPPA Compliance
COPPA Compliance
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Protecting Yourself Online
Protecting Yourself OnlineProtecting Yourself Online
Protecting Yourself Online
 
Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?
 
Internet safety presentation 2012
Internet safety presentation 2012Internet safety presentation 2012
Internet safety presentation 2012
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Internet safety presentation 2013
Internet safety presentation 2013Internet safety presentation 2013
Internet safety presentation 2013
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Social Media and Online Investigation Of Claims
Social Media and Online Investigation Of ClaimsSocial Media and Online Investigation Of Claims
Social Media and Online Investigation Of Claims
 
Internet Safety 2008 Parent Univ
Internet Safety 2008 Parent UnivInternet Safety 2008 Parent Univ
Internet Safety 2008 Parent Univ
 
4 1-1 of social networking safety
4 1-1 of social networking safety4 1-1 of social networking safety
4 1-1 of social networking safety
 
My Online Image
My Online ImageMy Online Image
My Online Image
 
Internet safety presentation 2011
Internet safety presentation 2011Internet safety presentation 2011
Internet safety presentation 2011
 

Destaque

Serkem Vision Pharma 2014 - Rückverfolgbarkeit in Pharmaunternehmen mit SAP u...
Serkem Vision Pharma 2014 - Rückverfolgbarkeit in Pharmaunternehmen mit SAP u...Serkem Vision Pharma 2014 - Rückverfolgbarkeit in Pharmaunternehmen mit SAP u...
Serkem Vision Pharma 2014 - Rückverfolgbarkeit in Pharmaunternehmen mit SAP u...SERKEM GmbH
 
Tarea 1. Dibujamos nuestro pueblo
Tarea 1. Dibujamos nuestro puebloTarea 1. Dibujamos nuestro pueblo
Tarea 1. Dibujamos nuestro puebloblogceipconcordia2b
 
Presentation for Introduction to Public Speaking
Presentation for Introduction to Public SpeakingPresentation for Introduction to Public Speaking
Presentation for Introduction to Public Speakinghlmills
 
Ruelas de Lisboa
Ruelas de LisboaRuelas de Lisboa
Ruelas de Lisboaguida04
 
BRASIL: Remanejamento de Canais para possibilitar a implantação da TV Digital...
BRASIL: Remanejamento de Canais para possibilitar a implantação da TV Digital...BRASIL: Remanejamento de Canais para possibilitar a implantação da TV Digital...
BRASIL: Remanejamento de Canais para possibilitar a implantação da TV Digital...Observacom
 
Lenox online presentation
Lenox online presentationLenox online presentation
Lenox online presentationPaula Lenox
 
RIS Journal 001
RIS Journal 001RIS Journal 001
RIS Journal 001Horst Jens
 
위드블로그 리뷰 및 유통 혁신
위드블로그 리뷰 및 유통 혁신위드블로그 리뷰 및 유통 혁신
위드블로그 리뷰 및 유통 혁신hyunyi3
 
Penelitian pendidikan
Penelitian pendidikan Penelitian pendidikan
Penelitian pendidikan K .
 
Calcasieu parish technology plan
Calcasieu parish technology planCalcasieu parish technology plan
Calcasieu parish technology planmdrwallace3
 
Literasi bahasa
Literasi bahasaLiterasi bahasa
Literasi bahasaEi Reen
 

Destaque (20)

Serkem Vision Pharma 2014 - Rückverfolgbarkeit in Pharmaunternehmen mit SAP u...
Serkem Vision Pharma 2014 - Rückverfolgbarkeit in Pharmaunternehmen mit SAP u...Serkem Vision Pharma 2014 - Rückverfolgbarkeit in Pharmaunternehmen mit SAP u...
Serkem Vision Pharma 2014 - Rückverfolgbarkeit in Pharmaunternehmen mit SAP u...
 
P2
P2P2
P2
 
Tarea 1. Dibujamos nuestro pueblo
Tarea 1. Dibujamos nuestro puebloTarea 1. Dibujamos nuestro pueblo
Tarea 1. Dibujamos nuestro pueblo
 
Presentation for Introduction to Public Speaking
Presentation for Introduction to Public SpeakingPresentation for Introduction to Public Speaking
Presentation for Introduction to Public Speaking
 
Ruelas de Lisboa
Ruelas de LisboaRuelas de Lisboa
Ruelas de Lisboa
 
BRASIL: Remanejamento de Canais para possibilitar a implantação da TV Digital...
BRASIL: Remanejamento de Canais para possibilitar a implantação da TV Digital...BRASIL: Remanejamento de Canais para possibilitar a implantação da TV Digital...
BRASIL: Remanejamento de Canais para possibilitar a implantação da TV Digital...
 
Lenox online presentation
Lenox online presentationLenox online presentation
Lenox online presentation
 
Andreia
AndreiaAndreia
Andreia
 
RIS Journal 001
RIS Journal 001RIS Journal 001
RIS Journal 001
 
위드블로그 리뷰 및 유통 혁신
위드블로그 리뷰 및 유통 혁신위드블로그 리뷰 및 유통 혁신
위드블로그 리뷰 및 유통 혁신
 
Penelitian pendidikan
Penelitian pendidikan Penelitian pendidikan
Penelitian pendidikan
 
Die ppt von der polnischen schule
Die ppt von der polnischen schuleDie ppt von der polnischen schule
Die ppt von der polnischen schule
 
Docentes 2012
Docentes 2012Docentes 2012
Docentes 2012
 
Calcasieu parish technology plan
Calcasieu parish technology planCalcasieu parish technology plan
Calcasieu parish technology plan
 
6
66
6
 
Practico 02
Practico 02Practico 02
Practico 02
 
Consulta de ventas
Consulta de ventasConsulta de ventas
Consulta de ventas
 
English Vocabulary
English VocabularyEnglish Vocabulary
English Vocabulary
 
Literasi bahasa
Literasi bahasaLiterasi bahasa
Literasi bahasa
 
Aea Conference Presentation November 2007 J Sheldon
Aea Conference Presentation November 2007 J SheldonAea Conference Presentation November 2007 J Sheldon
Aea Conference Presentation November 2007 J Sheldon
 

Semelhante a Perimeter E-Security: Will Facebook Get You Hired or Fired?

Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of ITMahdiRahmani15
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile securityErnest Staats
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk MitigationBrandProtect
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 

Semelhante a Perimeter E-Security: Will Facebook Get You Hired or Fired? (20)

Facebook
FacebookFacebook
Facebook
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
negative implications of IT
negative implications of ITnegative implications of IT
negative implications of IT
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Users guide
Users guideUsers guide
Users guide
 
Computer 4 ict
Computer 4 ictComputer 4 ict
Computer 4 ict
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social & mobile security
Social & mobile securitySocial & mobile security
Social & mobile security
 
Internet Threats and Risk Mitigation
Internet Threats and Risk MitigationInternet Threats and Risk Mitigation
Internet Threats and Risk Mitigation
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Securityguide
SecurityguideSecurityguide
Securityguide
 
Tot edu eng.
Tot edu eng.Tot edu eng.
Tot edu eng.
 

Último

Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...amitlee9823
 
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...Pooja Nehwal
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Pooja Nehwal
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证tufbav
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
一比一原版(nyu毕业证书)纽约大学毕业证学历认证靠谱办理
一比一原版(nyu毕业证书)纽约大学毕业证学历认证靠谱办理一比一原版(nyu毕业证书)纽约大学毕业证学历认证靠谱办理
一比一原版(nyu毕业证书)纽约大学毕业证学历认证靠谱办理bbhul52a
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...MOHANI PANDEY
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)kojalkojal131
 
Top Rated Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointGetawu
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...Call Girls in Nagpur High Profile
 
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsEscorts Call Girls
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Call Girls in Nagpur High Profile
 

Último (20)

Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
Call Girls Banashankari Just Call 👗 7737669865 👗 Top Class Call Girl Service ...
 
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Kalyan Call On 9920725232 With Body to body massage wit...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
Call Now ≽ 9953056974 ≼🔝 Call Girls In Yusuf Sarai ≼🔝 Delhi door step delevry≼🔝
 
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Dharwad 7001035870 Whatsapp Number, 24/07 Booking
 
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...9004554577, Get Adorable Call Girls service. Book call girls & escort service...
9004554577, Get Adorable Call Girls service. Book call girls & escort service...
 
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Kothrud Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006Call Girls in Vashi Escorts Services - 7738631006
Call Girls in Vashi Escorts Services - 7738631006
 
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
(ISHITA) Call Girls Service Aurangabad Call Now 8617697112 Aurangabad Escorts...
 
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
怎样办理维多利亚大学毕业证(UVic毕业证书)成绩单留信认证
 
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Chickpet ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
一比一原版(nyu毕业证书)纽约大学毕业证学历认证靠谱办理
一比一原版(nyu毕业证书)纽约大学毕业证学历认证靠谱办理一比一原版(nyu毕业证书)纽约大学毕业证学历认证靠谱办理
一比一原版(nyu毕业证书)纽约大学毕业证学历认证靠谱办理
 
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Vinay Nagar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
Get Premium Pimple Saudagar Call Girls (8005736733) 24x7 Rate 15999 with A/c ...
 
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
(=Towel) Dubai Call Girls O525547819 Call Girls In Dubai (Fav0r)
 
Top Rated Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Ravet ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Develop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power pointDevelop Keyboard Skill.pptx er power point
Develop Keyboard Skill.pptx er power point
 
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
VVIP Pune Call Girls Balaji Nagar (7001035870) Pune Escorts Nearby with Compl...
 
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chikhali Call Me 7737669865 Budget Friendly No Advance Booking
 
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort GirlsDeira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
Deira Dubai Escorts +0561951007 Escort Service in Dubai by Dubai Escort Girls
 
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...Top Rated  Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
Top Rated Pune Call Girls Katraj ⟟ 6297143586 ⟟ Call Me For Genuine Sex Serv...
 

Perimeter E-Security: Will Facebook Get You Hired or Fired?

  • 1. Will Facebook Get You Hired or Fired? Kevin Prince Chief Technology Officer Perimeter E-Security 440 Wheelers Farm Rd, Milford CT 06461 Phone 800.234.2175 www.perimeterusa.com
  • 2. A friend of mine told me a story about his mother who would always know when he got into the candy jar without asking. As a small child he couldn’t figure out how his mom could be omniscient. He thought that was reserved for Deities and Santa Claus. When he got a bit older, he asked his mom how she did it. With a smile she told him that his fingers would be various colors from the candy coating and his mouth would have chocolate smears. Facebook is like that candy jar and our employers or perspective employers are like my friend’s mom. Companies look at social networking sites such as Facebook, MySpace,Twitter, LinkedIn, Bebo, Friendster and others with mixed emotions. On one hand, permitted use attracts younger employees, a friendly culture, creative sharing of ideas, and encourages friendships between co-workers. On the other hand, it can have implications with information security, liability, productivity, bandwidth consumption and more. Are social networking sites making an impact? Well, governments are considering monitoring them, human resource departments are using them to screen applicants, authority figures have been known to infiltrate them in cyber disguise, and worms and Trojan horse software have been written specifically for them. I think it is safe to say that, yes, social networking sites are impacting our lives. As of 2/12/09, Facebook is over 200 million members strong. With the viral and addictive qualities it has, employers have become concerned. About half of all companies use web content filtering or black lists to block access to social networking sites. Do they have a right to be concerned? Look at these statistics from the March 2, 2009 issue of Fortune Magazine. Whether you are an avid user of social networking sites, know someone who is, or are concerned about our companies exposure to the risks of them, you need to stay safe. Criminals and those with less than honorable intentions are using these sites in ways we do not expect…and do not want! Be Aware Users should be aware that 30% of companies are using social networking sites to learn about applicants as they interview for jobs. Even a photo or brief description of a user can offer insight into an applicant that is valuable for companies. Be cautious of who you add as friends. There are known cases when someone takes on the identity of others, becomes an online friend, and then gathers other information about you, your contacts, associations, interests, group affiliations, etc. This information can be used for fraud, social engineering and other criminal activity. The typical Facebook user spends an average of 169 minutes a month on the site, where Google • News gets 13 minutes and the New York Times website gets ten minutes. Facebook total daily minutes went from 1.1 billion to more than 3 billion in the last 12 months. • Facebook users who update their status daily went from 4 million to 15 million in the last year. • The Facebook user base doubled in that same time. • It took 14 years for cell phone usage to reach 150 million units sold while Facebook members • reached that in a mere 5 years. This is one of the fastest adoption rates in history. 440 Wheelers Farm Rd, Milford CT 06461 Phone 800.234.2175 www.perimeterusa.com Page 2
  • 3. Be conscious of what you post - assume that the entire world can view your comments, videos, and pictures. Ask yourself if you would want your boss, mother, priest, and spouse to see what you put out there…because they just might. Don’t trust any site to keep your content private and remember, THE INTERNET NEVER FORGETS. All it takes is one night of partying and ending up with less than fully clothed pictures on the Internet that spread like wildfire. Phishing is a common method cyber criminals use to lure individuals into giving up their personal information. Spear phishing is where the criminals target a specific group of users, for example all customers of a particular bank or credit union. Whaling is an even more directed attack at one particular person. Although these attacks are often directed towards high net-worth individuals, cyber-criminals use social networking sites and other online databases to obtain the majority of the information which allows them to commit these crimes. Many companies have or are imposing Internet use policies. Be sure you understand what it says because your HR department will probably want you to sign and tie your employment to it. If Internet abuse is going on (based on whatever their definition is, which could include reduced productivity) you could lose your job. This could be Facebook, day trading, sports sites, and a myriad of other places on the net. An Internet use policy could outline surfing as something that negatively impacts business processes. You might not know it but if your Facebook friend sends you a link to the latest High Definition movie and you download it, that could saturate the Internet bandwidth for the company and bring legitimate business communications to a halt. There are cases where someone was viewing inappropriate adult material on their computer and a co- worker walked by and saw it. This leads to lawsuits against the company and often the termination of the offending employee. Offenses that may lead to termination can also include slandering a coworker on a social networking site. Be Safe People are generally more cautious about messages in email than they are when they get a link, chat, text, post, or something else within a social networking website. For some reason we turn off our defenses once we are logged in. In fact, people are ten times more likely to click on a link sent to them in a social networking site than in regular email. Cyber criminals use this to their advantage. In the last year there has been a huge upswing in the variety and frequency of these types of attacks. Phishing attacks,Trojan horse programs, and malicious software can be used to compromise your identity. Facebook has already experienced its fair share of worms. One of which is Koobface, which sends you an email that appears to be from one of your friends and directs you to a YouTube video where you are directed to download some new software which is in fact a Trojan horse program that infects your system. These methods can also be used to compromise your computer, which can lead to bank account compromise, and if you are at work, spread and infect other systems. This can lead to the total 440 Wheelers Farm Rd, Milford CT 06461 Phone 800.234.2175 www.perimeterusa.com Page 3
  • 4. compromise of the company you work for resulting in millions of dollars in damages, lawsuits, lost business, fines, and more. The average cost of a data security breach for a company is 6.6 million dollars. Remember that if you are infected with malware or a Trojan horse program, you likely would never know it. Your system would simply be under the control of a hacker and be used to capture your usernames and passwords, gain access to your online bank accounts, launch attacks against other systems, relay SPAM, or take full remote control. Social networking sites are here to stay. Use these sites as tools. Be sure they don’t keep you from your dream job or put you in the unemployment line. Kevin Prince Chief Technology Officer Perimeter E-Security KPrince@perimeterusa.com About the Author Named Chief Technology Officer of Perimeter in 2009, Kevin Prince spearheads the company’s technology strategy and leads the technical team in working closely with its customers to manage all of the complexity and compliance requirements of securing information across the enterprise. With more than 19 years of expertise in Information Technology and 11 years focused on Internet security, Mr. Prince is an evangelist on Internet security topics, including network security threats, fraud, identity theft, cyber terrorism and data breaches. Through regular speaking engagements, webinars, whitepapers and blog postings, Mr. Prince is dedicated to educating organizations on how to manage information complexity, meet increasingly stringent compliance and security requirements, and mitigate risk. Mr. Prince has trained federal examiners for several years. About Perimeter E-Security Perimeter is the trusted market leader of information security services that delivers enterprise-class protection and compliance for businesses of any size. Through its cost-effective security-as-a-software platform, Perimeter offers the most comprehensive compliance, security and messaging services that include but aren’t limited to: hosted email, encrypted email, firewall management and monitoring, vulnerability scanning, host intrusion and prevention, email antivirus and spam, remote data backup and email archiving. As companies struggle with the increasing cost, complexity and stringent compliance requirements associated with their information intensive businesses, Perimeter is the only provider that can simultaneously reduce the cost, manage all of the complexity and meet all of the compliance requirements from a single platform. Headquartered in Milford, CT, with seven geographically distributed technical operations centers and three redundant datacenters, Perimeter’s on demand services, which are offered both on a Network (in-the-cloud) and CPE (customer-provided equipment) basis, are validated by TruSecure and guaranteed for current and future regulatory compliance. If you would like to speak with us or view a product demo, please don’t hesitate to call at 800.234.2175 Option #2 or visit our web site at www.PerimeterUSA.com. 440 Wheelers Farm Rd, Milford CT 06461 Phone 800.234.2175 www.perimeterusa.com Page 4