Social Media Risk and Reputation Management

Post on 01-Nov-2014

305 views 0 download

Tags:

description

Of the biggest business risks presented by cyber threats such as hacking, identity theft, privacy breaches and other security events, reputation damage is the one that concerns individuals and businesses the most. Social media is a global phenomenon that can't be ignored. Being online makes you feel vulnerable, but paradoxically, NOT having an active online presence exposes your business to even greater risks of brand damage, credibility and reputation impact. How do you craft your Facebook, Twitter, LinkedIn and other social channels to maximize your positive exposure and limit your risk? Learn how reputation is part of the Threat/Impact Triad and how proper management can avert disaster.

Transcript of Social Media Risk and Reputation Management

By:

Claudiu PopaInformatica Corporation

Online Reputation Management Secrets that Will Make or Break Your (e)Business

© InformaticaEducation.com© InformaticaEducation.comsource: Manta 2012

© InformaticaEducation.com© InformaticaEducation.com

© InformaticaEducation.com© InformaticaEducation.com

so what’s the problem?so what’s the problem?

Source: Smarsh, Gartner, Ponemon, Symantec IDC

© InformaticaEducation.com© InformaticaEducation.com

takeawaystakeaways

• presence > control

• one password / site

• identity > trust

• permission > profit

• policy > legitimacy

• oversharing < validation

© InformaticaEducation.com© InformaticaEducation.com

presence means controlpresence means control

© InformaticaEducation.com© InformaticaEducation.com

... if you control access... if you control access

© InformaticaEducation.com© InformaticaEducation.com

social damagesocial damage

© InformaticaEducation.com© InformaticaEducation.com

password management is key ... literallypassword management is key ... literally

© InformaticaEducation.com© InformaticaEducation.com

password management > social media password management > social media policypolicy

© InformaticaEducation.com© InformaticaEducation.com

© InformaticaEducation.com© InformaticaEducation.com

privacy > legitimacyprivacy > legitimacy

© InformaticaEducation.com© InformaticaEducation.com

© InformaticaEducation.com© InformaticaEducation.com

embrace socialembrace social

© InformaticaEducation.com© InformaticaEducation.com

restrict posts > open commentsrestrict posts > open comments

© InformaticaEducation.com© InformaticaEducation.com

identity > trustidentity > trust

© InformaticaEducation.com© InformaticaEducation.comSource: McAfee

© InformaticaEducation.com© InformaticaEducation.com

social hates noise - demands substancesocial hates noise - demands substance

© InformaticaEducation.com© InformaticaEducation.com

permission > profitpermission > profit

© InformaticaEducation.com© InformaticaEducation.com

FollowFollow Twitter.ClaudiuPopa.comTwitter.ClaudiuPopa.com for a short read for a short read

ReadRead Subscribe.ClaudiuPopa.comSubscribe.ClaudiuPopa.com for a long read for a long read

Connect Connect LinkedIn.ClaudiuPopa.com LinkedIn.ClaudiuPopa.com