+ All Categories
Home > Technology > Social Media Balancing Security & Authenticity without Controlling the Message

Social Media Balancing Security & Authenticity without Controlling the Message

Date post: 22-Nov-2014
Category:
Upload: cindy-kim
View: 1,198 times
Download: 2 times
Share this document with a friend
Description:
Social media is all the rage. According to a recent report, 94 percent of Generation Y has joined a social networking site. Social media is believed to be leading the next social revolution. In fact, social networking has grown so dramatically that it is now the number one activity on the Web. In response to this social media phenomenon, businesses are moving at a rapid pace to take advantage of the untapped opportunity by making social media an integral part of their business strategy.
28
Social Media: Balancing Security & Authenticity w/o Controlling the Message Cindy Kim, Dir. Of Corp Comm (@CindyKimPR) Chris Hewitt, Sr. Dir. Of Marketing Ops (@chewitt)
Transcript
Page 1: Social Media Balancing Security & Authenticity without Controlling the Message

Social Media: Balancing Security & Authenticity w/o Controlling the Message

Cindy Kim, Dir. Of Corp Comm (@CindyKimPR)Chris Hewitt, Sr. Dir. Of Marketing Ops (@chewitt)

Page 2: Social Media Balancing Security & Authenticity without Controlling the Message

SOCIAL MEDIA REVOLUTION

Page 3: Social Media Balancing Security & Authenticity without Controlling the Message

3PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

• Use of web 2.0 applications is growing within enterprises at astonishing rates as companies take advantage of increased productivity and younger workers demand access.

• Web 2.0 opens new risk vectors to cybercriminals as they can quickly exploit the desire of the community members to “trust” each other in order to quickly gain control of passwords and further infiltrate the community and/or endpoint of the of the end-user.

• As TCO pressures mount enterprises will turn increasingly towards the use of web 2.0 and laptop subsidy programs where company employees can go and purchase any PC or mobile phone they desire from retail store fronts.

• IT now finds itself in the role of saying yes, and in doing so must look to educate the organization in defining what its appetite for risk is.

Page 4: Social Media Balancing Security & Authenticity without Controlling the Message

4PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

It’s a Web 2.0 World Today

Page 5: Social Media Balancing Security & Authenticity without Controlling the Message

The applications we use today for productivityCollaborative / Browser-based / Open Source

Social Communities, Gadgets, Blogging and Widgets open up our networks to increasing risk everyday.

Web 2.0

Page 6: Social Media Balancing Security & Authenticity without Controlling the Message

6PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

Think it’s Just a Fad?

Page 7: Social Media Balancing Security & Authenticity without Controlling the Message

7PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

More than 50% of IT security and

operations professionals see increasing use of web 2.0 technologies within your

organizations in the next 12-24

months.*

Page 9: Social Media Balancing Security & Authenticity without Controlling the Message

In Just 9 Months:

9PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

100M Users

1B Downloads

Page 10: Social Media Balancing Security & Authenticity without Controlling the Message

If Facebook were a country:

10PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

It would be the 4th largest country in the world

1. China2. India3. US4. Facebook5. Indonesia6. Brazil7. Pakistan8. Bangladesh

Page 11: Social Media Balancing Security & Authenticity without Controlling the Message

SECURITY THE ACHILLES HEEL OF SOCIAL MEDIA?

Page 12: Social Media Balancing Security & Authenticity without Controlling the Message
Page 14: Social Media Balancing Security & Authenticity without Controlling the Message

The number of people using the Web will increase by 45% to 2.2B by 2013

Total global Internet audience is 625M

2/3 have joined social networking (427M)

Security risks are equally substantial

*Forrester Research, 2009

Page 15: Social Media Balancing Security & Authenticity without Controlling the Message

Businesses are NOW at RISK…

Page 16: Social Media Balancing Security & Authenticity without Controlling the Message

• Cyber attacks take advantage of TRUST

• They can quickly capture passwords to INFILTRATE social networks

Page 17: Social Media Balancing Security & Authenticity without Controlling the Message

17

Memberaccount

Koobface unleashed

Page 18: Social Media Balancing Security & Authenticity without Controlling the Message

Phishing Scam

Page 19: Social Media Balancing Security & Authenticity without Controlling the Message

Hacked

Page 20: Social Media Balancing Security & Authenticity without Controlling the Message

Social Networking Phishing Attacks….

…up by 240%

Page 21: Social Media Balancing Security & Authenticity without Controlling the Message

AUTHENTICITY WITHOUT LOSING CONTROL

Page 22: Social Media Balancing Security & Authenticity without Controlling the Message
Page 23: Social Media Balancing Security & Authenticity without Controlling the Message

Protect the BRAND without Controlling the Message…

EngageListen & MonitorEducateCreate a Policy

Page 24: Social Media Balancing Security & Authenticity without Controlling the Message

TRENDS IN SOCIAL MEDIA: A LOOK AT 2010 & BEYOND

Page 25: Social Media Balancing Security & Authenticity without Controlling the Message

Social Media Evolution

Page 26: Social Media Balancing Security & Authenticity without Controlling the Message
Page 27: Social Media Balancing Security & Authenticity without Controlling the Message

Key Takeaways…• No simple solution to manage these risks

• Blocking hinders productivity and morale

• Adopt Acceptable Use of Policy & Work w/ IT Teams

• Don’t be naïve – before you CLICK, verify information & link

• Change your Password ASAP if hacked

• Alert your network if you suspect that they’ve been hacked!

Page 28: Social Media Balancing Security & Authenticity without Controlling the Message

DETAILS:Cindy Kim:

Blog: http://cindykimblog.wordpress.com

Chris Hewitt: Blog: http://whatdoesmarketingreallydo.wordpress.com


Recommended