Social Media Balancing Security & Authenticity without Controlling the Message
-
Upload
cindy-kim -
Category
Technology
-
view
1.197 -
download
2
description
Transcript of Social Media Balancing Security & Authenticity without Controlling the Message
![Page 1: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/1.jpg)
Social Media: Balancing Security & Authenticity w/o Controlling the Message
Cindy Kim, Dir. Of Corp Comm (@CindyKimPR)Chris Hewitt, Sr. Dir. Of Marketing Ops (@chewitt)
![Page 2: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/2.jpg)
SOCIAL MEDIA REVOLUTION
![Page 3: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/3.jpg)
3PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
• Use of web 2.0 applications is growing within enterprises at astonishing rates as companies take advantage of increased productivity and younger workers demand access.
• Web 2.0 opens new risk vectors to cybercriminals as they can quickly exploit the desire of the community members to “trust” each other in order to quickly gain control of passwords and further infiltrate the community and/or endpoint of the of the end-user.
• As TCO pressures mount enterprises will turn increasingly towards the use of web 2.0 and laptop subsidy programs where company employees can go and purchase any PC or mobile phone they desire from retail store fronts.
• IT now finds itself in the role of saying yes, and in doing so must look to educate the organization in defining what its appetite for risk is.
![Page 4: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/4.jpg)
4PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
It’s a Web 2.0 World Today
![Page 5: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/5.jpg)
The applications we use today for productivityCollaborative / Browser-based / Open Source
Social Communities, Gadgets, Blogging and Widgets open up our networks to increasing risk everyday.
Web 2.0
![Page 6: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/6.jpg)
6PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
Think it’s Just a Fad?
![Page 7: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/7.jpg)
7PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
More than 50% of IT security and
operations professionals see increasing use of web 2.0 technologies within your
organizations in the next 12-24
months.*
![Page 8: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/8.jpg)
8PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
38
13
4
3
Years to Reach 50M Users:
![Page 9: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/9.jpg)
In Just 9 Months:
9PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
100M Users
1B Downloads
![Page 10: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/10.jpg)
If Facebook were a country:
10PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION
It would be the 4th largest country in the world
1. China2. India3. US4. Facebook5. Indonesia6. Brazil7. Pakistan8. Bangladesh
![Page 11: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/11.jpg)
SECURITY THE ACHILLES HEEL OF SOCIAL MEDIA?
![Page 12: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/12.jpg)
![Page 14: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/14.jpg)
The number of people using the Web will increase by 45% to 2.2B by 2013
Total global Internet audience is 625M
2/3 have joined social networking (427M)
Security risks are equally substantial
*Forrester Research, 2009
![Page 15: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/15.jpg)
Businesses are NOW at RISK…
![Page 16: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/16.jpg)
• Cyber attacks take advantage of TRUST
• They can quickly capture passwords to INFILTRATE social networks
![Page 17: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/17.jpg)
17
Memberaccount
Koobface unleashed
![Page 18: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/18.jpg)
Phishing Scam
![Page 19: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/19.jpg)
Hacked
![Page 20: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/20.jpg)
Social Networking Phishing Attacks….
…up by 240%
![Page 21: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/21.jpg)
AUTHENTICITY WITHOUT LOSING CONTROL
![Page 22: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/22.jpg)
![Page 23: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/23.jpg)
Protect the BRAND without Controlling the Message…
EngageListen & MonitorEducateCreate a Policy
![Page 24: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/24.jpg)
TRENDS IN SOCIAL MEDIA: A LOOK AT 2010 & BEYOND
![Page 25: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/25.jpg)
Social Media Evolution
![Page 26: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/26.jpg)
![Page 27: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/27.jpg)
Key Takeaways…• No simple solution to manage these risks
• Blocking hinders productivity and morale
• Adopt Acceptable Use of Policy & Work w/ IT Teams
• Don’t be naïve – before you CLICK, verify information & link
• Change your Password ASAP if hacked
• Alert your network if you suspect that they’ve been hacked!
![Page 28: Social Media Balancing Security & Authenticity without Controlling the Message](https://reader034.fdocuments.in/reader034/viewer/2022051816/54708e11b4af9fc30a8b47ba/html5/thumbnails/28.jpg)
DETAILS:Cindy Kim:
Blog: http://cindykimblog.wordpress.com
Chris Hewitt: Blog: http://whatdoesmarketingreallydo.wordpress.com