Blog Posts Tagged with "Social Media"

50cc8fd5a49d931f4f3f74ab4807904e

Redefining Social Networking

June 18, 2013 Added by:James Fabricant

When it comes to adoption, the initial resistance in the enterprise seems to be that social networking isn’t typically associated with working.

Comments  (0)

315d342a55586593b3fbe9740f5ecff5

Seven “Sins” of Cyber Security

May 07, 2013 Added by:Rick Comeau

While some of the cyber attacks making news lately are the result of sophisticated methods, many are not: they often take advantage of a lack of basic security protections. Let’s take a look at seven “sins” that organizations and users are committing that are leaving them vulnerable.

Comments  (3)

5e402abc3fedaf8927900f014ccc031f

Five Ways to Recognize Data Privacy Day

January 23, 2013 Added by:Allan Pratt, MBA

It is our responsibility, each and every one of us, to protect our data and our digital footprints, so here are five easy ways to recognize this annual event. But in order to be safe online on a regular basis, practice these activities on a monthly as opposed to annual basis...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

How to Protect Your Privacy from Facebook's Graph Search

January 20, 2013 Added by:Electronic Frontier Foundation

Since Facebook removed the ability to remove yourself from search results altogether, we've put together a quick how-to guide to help you take control over what is featured on your Facebook profile and on Graph Search results...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Social Media: Lightning Storm

December 03, 2012 Added by:Joel Harding

I worked for one company who wanted to get information out quickly to all their stakeholders. The problem was the company was mired in an unhealthy aversion to risk. Their mind-set was avoidance, whereas industry transitioned to risk mitigation. That company is doomed to fail...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Social Media Security Risks for Small Business

October 21, 2012 Added by:Robert Siciliano

For more than a decade, cyber criminals have launched countless attacks on banks’ online infrastructure, successfully one-upping security professionals and their clients by creating viruses that bypass existing security measures. In response, computer security companies have continuously updated their technologies...

Comments  (1)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Employers Must Consider Social Media Risks

October 17, 2012 Added by:David Navetta

One should assume that any information purportedly protected by privacy settings could still be viewed by strangers. And t is difficult to authenticate “friends” on a social network – they may be impersonators looking to scrape sensitive information from the ”private” online posts...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Social Media as a Cyber Warfare Gamechanger

October 14, 2012 Added by:Don Eijndhoven

Is some creative type with a long exposure to really unconventional warfare getting his cues from a government with a score to settle, and deep pockets to fund the whole thing? It’s a scary thought. If used properly, Social Media might very well be the most refined weapon for asymmetric warfare to date...

Comments  (3)

65be44ae7088566069cc3bef454174a7

Six Questions to Ask Before Posting to Social Networks

October 10, 2012 Added by:Rebecca Herold

Every day I see yet another situation where employees misused, abused or otherwise accused social media sites to the chagrin of their employers. Businesses need to make a coordinated effort, using a combination of policies, training and technology to mitigate the risks of workers using social media sites...

Comments  (0)

B29000a16fad936906bbf3996fd7a593

Are You What You Tweet?

October 09, 2012 Added by:Online Privacy Foundation

The Online Privacy Foundation (OPF) encourages people to get online and consider all the great things social networking sites could do for them. But the evidence is growing that we need to think harder about how we share information online and question how that information is used...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Navigating Social Media Legal Risks: Safeguarding Your Business

October 03, 2012 Added by:Ben Rothke

Social media makes it easy for organizations to find and retain customers and increase sales, amongst many other benefits. At the same time, it can expose an organization to significant and highly-expensive legal risks and issues, and find themselves at the receiving end of a subpoena...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Three Ways to Minimize Reputational Risk with Social Media

September 26, 2012 Added by:Brent Huston

One of the most difficult tasks for an organization is conveying the importance of discretion for employees who use social media. Not only are organizations at risk from having their networks attacked, but they must protect their reputation and proprietary ideas...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Digital Vertigo: Today's Online Social Revolution is Disorienting Us

September 16, 2012 Added by:Ben Rothke

In the new world of social media and Web 3.0, which is claiming to revolutionize communication and interactions, history is repeating itself. Web 3.0 is turning into an Orwellian infrastructure where the ruling party wields total power over the inhabitants...

Comments  (3)

Bd07d58f0d31d48d3764821d109bf165

You Down with UDID? Yeah, You Know Me...

September 13, 2012 Added by:Tripwire Inc

The Internet is chock full of databases that map UDIDs to usernames, activities, location data, game scores, ad clicks as well as Facebook and other social media profiles. Even if you deleted an application from your phone the data can still persist in the Cloud...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

2012 Norton Cybercrime Report Presents a Worrisome Scenario

September 06, 2012 Added by:Pierluigi Paganini

With 556 million of victims per year, 2 of 3 adults have been victims of online crime in their lifetime, with a total economic loss of 110 Billion and an average cost per victim of $197. The trend demonstrates the need to put in place a massive awareness campaign...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Ultimate Breach of Patient Privacy: Real-Time Death on Video

August 29, 2012 Added by:Danny Lieberman

As social media becomes part of the continuum of interaction in the physical and virtual worlds, privacy becomes an issue of discretionary disclosure control. Online privacy and patient privacy will evolve into a market for products and services with stratified pricing, packaging and product positioning...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »