Social Media Balancing Security & Authenticity without Controlling the Message

Post on 22-Nov-2014

1,198 views 2 download

description

Social media is all the rage. According to a recent report, 94 percent of Generation Y has joined a social networking site. Social media is believed to be leading the next social revolution. In fact, social networking has grown so dramatically that it is now the number one activity on the Web. In response to this social media phenomenon, businesses are moving at a rapid pace to take advantage of the untapped opportunity by making social media an integral part of their business strategy.

transcript

Social Media: Balancing Security & Authenticity w/o Controlling the Message

Cindy Kim, Dir. Of Corp Comm (@CindyKimPR)Chris Hewitt, Sr. Dir. Of Marketing Ops (@chewitt)

SOCIAL MEDIA REVOLUTION

3PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

• Use of web 2.0 applications is growing within enterprises at astonishing rates as companies take advantage of increased productivity and younger workers demand access.

• Web 2.0 opens new risk vectors to cybercriminals as they can quickly exploit the desire of the community members to “trust” each other in order to quickly gain control of passwords and further infiltrate the community and/or endpoint of the of the end-user.

• As TCO pressures mount enterprises will turn increasingly towards the use of web 2.0 and laptop subsidy programs where company employees can go and purchase any PC or mobile phone they desire from retail store fronts.

• IT now finds itself in the role of saying yes, and in doing so must look to educate the organization in defining what its appetite for risk is.

4PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

It’s a Web 2.0 World Today

The applications we use today for productivityCollaborative / Browser-based / Open Source

Social Communities, Gadgets, Blogging and Widgets open up our networks to increasing risk everyday.

Web 2.0

6PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Think it’s Just a Fad?

7PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

More than 50% of IT security and

operations professionals see increasing use of web 2.0 technologies within your

organizations in the next 12-24

months.*

In Just 9 Months:

9PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

100M Users

1B Downloads

If Facebook were a country:

10PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

It would be the 4th largest country in the world

1. China2. India3. US4. Facebook5. Indonesia6. Brazil7. Pakistan8. Bangladesh

SECURITY THE ACHILLES HEEL OF SOCIAL MEDIA?

The number of people using the Web will increase by 45% to 2.2B by 2013

Total global Internet audience is 625M

2/3 have joined social networking (427M)

Security risks are equally substantial

*Forrester Research, 2009

Businesses are NOW at RISK…

• Cyber attacks take advantage of TRUST

• They can quickly capture passwords to INFILTRATE social networks

17

Memberaccount

Koobface unleashed

Phishing Scam

Hacked

Social Networking Phishing Attacks….

…up by 240%

AUTHENTICITY WITHOUT LOSING CONTROL

Protect the BRAND without Controlling the Message…

EngageListen & MonitorEducateCreate a Policy

TRENDS IN SOCIAL MEDIA: A LOOK AT 2010 & BEYOND

Social Media Evolution

Key Takeaways…• No simple solution to manage these risks

• Blocking hinders productivity and morale

• Adopt Acceptable Use of Policy & Work w/ IT Teams

• Don’t be naïve – before you CLICK, verify information & link

• Change your Password ASAP if hacked

• Alert your network if you suspect that they’ve been hacked!

DETAILS:Cindy Kim:

Blog: http://cindykimblog.wordpress.com

Chris Hewitt: Blog: http://whatdoesmarketingreallydo.wordpress.com