+ All Categories
Home > Documents > Balancing Security & Authencity Final

Balancing Security & Authencity Final

Date post: 12-Nov-2014
Category:
Upload: cindy-kim
View: 514 times
Download: 0 times
Share this document with a friend
Description:
 
Popular Tags:
23
Social Media: Balancing Security & Authenticity w/o Controlling the Message Cindy Kim, Dir. Of Corp Comm (@CindyKimPR) Chris Hewitt, Sr. Dir. Of Marketing Ops (@chewitt)
Transcript
Page 1: Balancing Security & Authencity Final

Social Media: Balancing Security & Authenticity w/o Controlling the Message

Cindy Kim, Dir. Of Corp Comm (@CindyKimPR)Chris Hewitt, Sr. Dir. Of Marketing Ops (@chewitt)

Page 2: Balancing Security & Authencity Final

SOCIAL MEDIA REVOLUTION

Page 3: Balancing Security & Authencity Final

3PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

• Use of web 2.0 applications is growing within enterprises at astonishing rates as companies take advantage of increased productivity and younger workers demand access.

• Web 2.0 opens new risk vectors to cybercriminals as they can quickly exploit the desire of the community members to “trust” each other in order to quickly gain control of passwords and further infiltrate the community and/or endpoint of the of the end-user.

• As TCO pressures mount enterprises will turn increasingly towards the use of web 2.0 and laptop subsidy programs where company employees can go and purchase any PC or mobile phone they desire from retail store fronts.

• IT now finds itself in the role of saying yes, and in doing so must look to educate the organization in defining what its appetite for risk is.

Page 4: Balancing Security & Authencity Final

4PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

It’s a Web 2.0 World Today

Page 5: Balancing Security & Authencity Final

The applications we use today for productivityCollaborative / Browser-based / Open Source

Social Communities, Gadgets, Blogging and Widgets open up our networks to increasing risk everyday.

Web 2.0

Page 7: Balancing Security & Authencity Final

SECURITY THE ACHILLES HEEL OF SOCIAL MEDIA?

Page 9: Balancing Security & Authencity Final

The number of people using the Web will increase by 45% to 2.2B by 2013

Total global Internet audience is 625M

2/3 have joined social networking (427M)

Security risks are equally substantial

*Forrester Research, 2009

Page 10: Balancing Security & Authencity Final

Businesses are NOW at RISK…

Page 11: Balancing Security & Authencity Final

• Cyber attacks take advantage of TRUST

• They can quickly capture passwords to INFILTRATE social networks

Page 12: Balancing Security & Authencity Final

12

Memberaccount

Koobface unleashed

Page 13: Balancing Security & Authencity Final

Phishing Scam

Page 14: Balancing Security & Authencity Final

Hacked

Page 15: Balancing Security & Authencity Final

Social Networking Phishing Attacks….

…up by 240%

Page 16: Balancing Security & Authencity Final

AUTHENTICITY WITHOUT LOSING CONTROL

Page 17: Balancing Security & Authencity Final
Page 18: Balancing Security & Authencity Final

Protect the BRAND without Controlling the Message…

EngageListen & MonitorEducateCreate a Policy

Page 19: Balancing Security & Authencity Final

TRENDS IN SOCIAL MEDIA: A LOOK AT 2010 & BEYOND

Page 20: Balancing Security & Authencity Final

Social Media Evolution

Page 21: Balancing Security & Authencity Final
Page 22: Balancing Security & Authencity Final

Key Takeaways…• No simple solution to manage these risks

• Blocking hinders productivity and morale

• Adopt Acceptable Use of Policy & Work w/ IT Teams

• Don’t be naïve – before you CLICK, verify information & link

• Change your Password ASAP if hacked

• Alert your network if you suspect that they’ve been hacked!

Page 23: Balancing Security & Authencity Final

DETAILS:Cindy Kim: http://cindykimblog.wordpress.com

Chris Hewitt: http://whatdoesmarketingreallydo.wordpress.com


Recommended