Blog Posts Tagged with "Social Media"


Social Media Security Tips for Small Business

April 18, 2012 Added by:Robert Siciliano

Many companies restrict internal access to social media. Others prevent employees from discussing or mentioning the company in social media during private time. Follow these social media security tips for small business to prevent security issues...

Comments  (3)


Social Media vs. Old School

April 11, 2012 Added by:Joel Harding

As I’ve stumbled through the discovery process of social media I have also uncovered a myriad of problems. I got a phone call from a great friend in the Pentagon warning me that someone was posing as a PSYOP senior and trying to make contacts through LinkedIn...

Comments  (0)


On Location-Based Services Security

April 09, 2012 Added by:Robert Siciliano

Social networking sites are incorporating location-based services that allow users to broadcast their locations. Carnegie Mellon University has identified more than 80 services that either lack privacy policies or collect and save user data for an indefinite period...

Comments  (0)


Digital Assassination: Protecting Your Business Against Attacks

April 05, 2012 Added by:Ben Rothke

The Internet is being used to destroy brands, reputations, and people’s well-be­ing. These incidents range from inappropriate use of Facebook and blog postings to bogus Wiki­pedia entries to blatant Internet-based character assassination, and much more...

Comments  (0)


Six Good Reasons Not to Ask for Social Media Passwords

April 05, 2012 Added by:Rebecca Herold

There have been a barrage of stories recently about organizations asking applicants and employees for their Facebook, Twitter, LinkedIn and other social networking passwords. Compelled password disclosure is a very bad idea for organizations to do for many reasons...

Comments  (0)


Just One of the Reasons Why I Love Anonymous

March 28, 2012 Added by:Quintius Walker

In the world of cyber-security things transform at the speed of light. From exploits to methods, what worked yesterday is not the solution tomorrow. Ethical problem solving students should do themselves a favor and study the ways of the infamous idea known to us as Anonymous...

Comments  (0)


Innovation and Compliance

March 26, 2012 Added by:Thomas Fox

Can compliance be innovative? Or can innovation inform your compliance program? Innovation in the compliance arena is key. As compliance programs mature and as companies mature in their approach to compliance, innovation will continue to lead best practices...

Comments  (0)


Hackers Target Social Media for Social Engineering Attacks

March 22, 2012 Added by:Dan Dieterle

Hackers are getting much better at their craft, and people are making it very easy for them. A Social Engineer will use information gathered about a person, place or business in specially crafted attacks that play on people’s thoughts, beliefs or emotions...

Comments  (0)


Open, Closed, 1984 and the Evil Empire

March 22, 2012 Added by:Ben Kepes

I’m buoyed by the very existence of open API – technology that forces data interchange to become real. Sure there are ways vendors manipulate what should be open to achieve their aims, but the API is our equivalent of Excalibur – it has the ability to deliver us from evil...

Comments  (0)


Social Media Security Basics: An Infographic

March 22, 2012 Added by:Fergal Glynn

Social networking has quickly become a major medium for communications for both individuals and organizations, but the platforms that allow the development of online personae are not without their own inherent risks. These social media security basics everyone should embrace...

Comments  (1)


Roundtable: Opportunities for HR in Consumerization of IT

March 15, 2012 Added by:Kyle Lagunas

Providing access to all sorts of internal systems for both employees and managers can make for a more adaptable organization regardless of size. IT has struggled with this loss of gatekeeper control, but the sound fiscal results are changing the minds of the C-suite...

Comments  (0)


The Changing World of Information Security Compromises

March 08, 2012 Added by:Brent Huston

Hacktivism is an extended threat for infosec. You can be targeted for your partnerships, role in a supply chain, to steal CPU cycles/storage from your systems, or because you have a common vulnerability. There are a myriad of reasons from the criminal to the abstract...

Comments  (0)


Is LinkedIn Really Secure?

February 24, 2012 Added by:Brittany Lyons

LinkedIn has faced scams and viral attacks, and users have watched private information become public without their permission. Online vulnerability is a problem, and though LinkedIn has addressed issues in a punctual manner, this does not prevent new problems from arising...

Comments  (0)


New EU Data Regulations – What Companies Need to Consider

February 23, 2012 Added by:Fergal Glynn

EU Data Protection Authorities will apply these rules even if this information is processed outside of Europe, it’s not clear today whether these new rules will have an impact on the existing Safe Harbor regulations – something to watch out for in the consultation period...

Comments  (0)


Is Information Online Legally Fair Game to Use for Marketing?

February 21, 2012 Added by:Rebecca Herold

Social media sites are booming. The amount of personal information posted to them, such as photos, videos, original stories, thoughts, gossip, is exploding. Marketers are drooling at the prospect of using all that “free” information. Well, it’s really not free, folks...

Comments  (0)


Social Media Monitoring: A Rubric for Control

February 21, 2012 Added by:Infosec Island Admin

We have become a watched commodity via all means of communication. Programs have been put together with the veneer of protecting us from another 9/11 and perhaps some of them were made with the best of intentions, but this idea of monitoring social media is half baked...

Comments  (2)

Page « < 3 - 4 - 5 - 6 - 7 > »