SlideShare ist ein Scribd-Unternehmen logo
1 von 41
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
Social Media –
Do not risk your career!”
27th
of March 2014
Christoph Nienhaus
IT Leader for EMEAR Central DACH
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 2
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 3
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
The Elephant’s Memory
•Once on the net, it is there forever—no replays or erasing.
•You simply cannot explain yourself in 140 characters.
•Your customers and future employers will probably use your online
history for due-diligence on you.
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Social bullying –
A double NO GO!!!
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
An elephant never
forgets!
So why do you think the
Internet will ever forget
something?
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
• Posting confidential data
 Business impact: Corporate data loss
• Publishing inappropriate communications
 Business impact: Brand reputation
• Malware ingress point
 Business impact: Productivity loss
• Social engineering attacks
 Business impact: Corporate data loss
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Personal VoicePersonal VoiceCorporate VoiceCorporate Voice
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Abide byAbide by
the rulesthe rules
You areYou are
responsibleresponsible
Add valueAdd value
Be mindfulBe mindful Be honestBe honest
Be respectfulBe respectful
Be yourselfBe yourself
Social Media
Does Not Change
Your Personal Compass
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Use Different, Strong Passwords
Choose Password Hints Carefully
Check your Privacy Settings
Think before you Link
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
1. Pick a phrase you can remember:
This is my secret password I use at work.
2. Grab the first letters:
T i m s p I u a w
3. Change some letters for numbers:
T i m 5 p I u a w
4. Add a punctuation or capitalization:
T i m 5 p I u a W !
Password = Tim5pIuaW!This is an example only ! Do not use this one!
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
e.g. www.longurl.org
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Do you want to have this
presentation and a free gift?
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Thank you.

Weitere ähnliche Inhalte

Ähnlich wie Girls Days 2014 - Cisco Germany - Duesseldorf

Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
IABC Houston
 
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoEWhy Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
Symantec
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
Cisco Russia
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
Rick Huijbregts
 

Ähnlich wie Girls Days 2014 - Cisco Germany - Duesseldorf (20)

Standardization Opportunity for India: Forces Changing our World
Standardization Opportunity for India: Forces Changing our WorldStandardization Opportunity for India: Forces Changing our World
Standardization Opportunity for India: Forces Changing our World
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
 
Cisco brand-language-iabc-houston
Cisco brand-language-iabc-houstonCisco brand-language-iabc-houston
Cisco brand-language-iabc-houston
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
Top Predictions for the Internet of Everything Era
Top Predictions for the Internet of Everything Era Top Predictions for the Internet of Everything Era
Top Predictions for the Internet of Everything Era
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
 
Network as a sensor
Network as a sensorNetwork as a sensor
Network as a sensor
 
Cisco Live LatAm - Mexico Executive Symposium on Digitization
Cisco Live LatAm - Mexico Executive Symposium on DigitizationCisco Live LatAm - Mexico Executive Symposium on Digitization
Cisco Live LatAm - Mexico Executive Symposium on Digitization
 
Learn Without Limits in a Connected World
Learn Without Limits in a Connected WorldLearn Without Limits in a Connected World
Learn Without Limits in a Connected World
 
Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013Internet of everything - Деловой Интернет 2013
Internet of everything - Деловой Интернет 2013
 
EM12c & MS SQL Server
EM12c & MS SQL ServerEM12c & MS SQL Server
EM12c & MS SQL Server
 
Tomorrow Starts Here
Tomorrow Starts HereTomorrow Starts Here
Tomorrow Starts Here
 
Cisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales ContentCisco - Revamping and Standardizing Global Marketing and Sales Content
Cisco - Revamping and Standardizing Global Marketing and Sales Content
 
Corporate Visions Conference
Corporate Visions ConferenceCorporate Visions Conference
Corporate Visions Conference
 
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoEWhy Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
Why Real-time Marketing isn't Fast Enough for the Internet of Everything #IoE
 
Solving Biz Problems with SugarExchange: Session 9: How to Run Contributor Ca...
Solving Biz Problems with SugarExchange: Session 9: How to Run Contributor Ca...Solving Biz Problems with SugarExchange: Session 9: How to Run Contributor Ca...
Solving Biz Problems with SugarExchange: Session 9: How to Run Contributor Ca...
 
Cloud: Session 1: Cloud Connectors - Creating Custom Connectors
Cloud: Session 1: Cloud Connectors - Creating Custom ConnectorsCloud: Session 1: Cloud Connectors - Creating Custom Connectors
Cloud: Session 1: Cloud Connectors - Creating Custom Connectors
 
BYOD and Security Trends
BYOD and Security TrendsBYOD and Security Trends
BYOD and Security Trends
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
 

Kürzlich hochgeladen

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Girls Days 2014 - Cisco Germany - Duesseldorf

  • 1. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Social Media – Do not risk your career!” 27th of March 2014 Christoph Nienhaus IT Leader for EMEAR Central DACH
  • 2. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 2
  • 3. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 3
  • 4. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 The Elephant’s Memory •Once on the net, it is there forever—no replays or erasing. •You simply cannot explain yourself in 140 characters. •Your customers and future employers will probably use your online history for due-diligence on you.
  • 25. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Social bullying – A double NO GO!!!
  • 27. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 An elephant never forgets! So why do you think the Internet will ever forget something?
  • 29. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
  • 30. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 • Posting confidential data  Business impact: Corporate data loss • Publishing inappropriate communications  Business impact: Brand reputation • Malware ingress point  Business impact: Productivity loss • Social engineering attacks  Business impact: Corporate data loss
  • 31. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Personal VoicePersonal VoiceCorporate VoiceCorporate Voice
  • 32. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 Abide byAbide by the rulesthe rules You areYou are responsibleresponsible Add valueAdd value Be mindfulBe mindful Be honestBe honest Be respectfulBe respectful Be yourselfBe yourself Social Media Does Not Change Your Personal Compass
  • 33. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Use Different, Strong Passwords Choose Password Hints Carefully Check your Privacy Settings Think before you Link
  • 34. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 1. Pick a phrase you can remember: This is my secret password I use at work. 2. Grab the first letters: T i m s p I u a w 3. Change some letters for numbers: T i m 5 p I u a w 4. Add a punctuation or capitalization: T i m 5 p I u a W ! Password = Tim5pIuaW!This is an example only ! Do not use this one!
  • 35. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
  • 36. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
  • 37. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
  • 38. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 e.g. www.longurl.org
  • 39. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Do you want to have this presentation and a free gift?
  • 40. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
  • 41. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Thank you.

Hinweis der Redaktion

  1. OISIN
  2. You only get one chance—once it’s on the web, it’s there for ever! Protect your reputation. Everything you post can come back to haunt you. Consider that whenever and whatever you post, the whole world is listening! http://searchengineland.com/twitter-can-help-get-jobs-take-them-away-16977 Some other good items in the IBM guidelines: http://www.ibm.com/blogs/zz/en/guidelines.html Be thoughtful about how you present yourself in online social networks. Speak in the first person. Use your own voice; bring your own personality to the forefront; say what is on your mind. Use a disclaimer. Respect your audience and your coworkers. Respect copyright and fair use laws. Add value. Don't pick fights. Be the first to respond to your own mistakes. Use your best judgment.
  3. When utilizing social media tools either as a representative of Cisco, in a personal context where it is made known you are an employee of Cisco, or on a personal level from a Cisco network: Do not engage in inflammatory or inappropriate discussions about competitors. Always be professional. Refrain from speaking negatively about competitors. Instead, highlight Cisco’s strengths. Link to competitive guidelines Be responsible. Using social media is a personal interaction, not corporate communications. You are personally responsible for the content you provide and how you behave on the social web. Be aware of laws covering libel, defamation, insider trading, financial disclosures, endorsements and testimonials, privacy, and the protection of intellectual property. Be authentic, factual and respectful at all times. Use your real identity. Provide informed, well-supported opinions and cite sources, if applicable. Though social media sites are a more casual form of communication, be sure to remain professional and use a positive tone of voice. Be respectful of your colleagues, the Company and our competitors. Avoid engaging in on-line disputes with your audience. Don't use slurs, personal insults or obscenity, and always respect privacy concerns. Avoid language that may be considered objectionable or inflammatory. Show that you have listened and be responsive. If you disagree, respond in professional and respectful manner. Be honest. Always tell the truth. Correct any mistakes you make as quickly as possible. Don’t alter older posts without indicating that you have done so. Add value. Express an interesting point of view and worthwhile information and perspective. When speaking about Cisco, offer your subject matter expertise and contact your PR representative if unsure if a topic is appropriate. Build relationships. Focus on engagement with the audience and building trust to develop relationships rather than using your site solely as a marketing tool to sell Cisco products. Be mindful. Your contributions to community discussions are public and will be public and searchable for a long time. Also, content may inadvertently get posted externally. Be aware of both scenarios. If you think you need counsel regarding a specific situation, contact [email_address]. Review privacy settings of the social networking site you are using. Choose social sites and appropriate settings depending on content you are posting. Understand that when your content is posted on a public social network, all posts and comments may be traceable. Any information that you post should be considered at risk for public disclosure. 当以思科的名义来应用社交网络的时候,比如:在文章中体现出你是思科员工或者以思科员工名义出现在社区里面。  不要加入到关于竞争对手的一些煽动性的或者不适合的言论中去。显得专业些,克制自己不要谈论竞争对手的负面信息。另一方面,显示思科的优势,链接到一些思科比较有竞争性的部分。 要负责任。应用社会媒体是一种个人行为,不是公司行为。 你要对你自己发表的言论和行为负责。 要注意法律法规中涵盖的诽谤,诬蔑,内幕交易,财务机密泄露,证书,公章,隐私以及知识产权的保护。 要总是保持可信赖,实事求是和有礼貌。如果可能的话,提供真实的,有价值的信息,观点,学会引用其他资源。  避免加入到一些网上的争论中去。不能进行辱骂,人身侮辱或者传播淫秽信息,要经常考虑到隐私权。避免一些可能被认为煽动和反动的言论。显示出你能听取意见,如果不同意,可以以一种专业和有礼貌的态度来回复。  要诚实。要讲真话,尽快改正你犯的错误。修改别人的言论一定要标明。  言论要有价值。能够表达你的兴趣点和一些有价值的信息和观念。当涉及思科的时候,要显示出一种专业的态度,如果不知道你的观点是否可以交流,请联系PR部门。  建立关系网络。在建立关系网的时候,不能一个人的名义应用市场工具来销售思科产品,而要侧重于建立和客户之间的信任关系。  要小心。你在论坛中的言论是公开的,可以被搜索到的。而且还有可能在不经意中被发布到外网。要留心这两种情况。如果你需要律师请联系:[email_address] 回顾你应用的社交网络的隐私设置。对于你的言论,有选择的使用网络社区和里面的隐私设置。要知道你在一个公共社区网络里面发表的言论是可以追踪的。你所发表的任何言论都信息泄露的风险。
  4. Passwords Don’t use the same password for social media sites and other sites. If a criminal gets hold of your password for one site, you don’t want them to gain access to all the others. Do not share your password information with others.don’t: Share an individual email account with others. Share a tool or IT system by sharing the account ID and password within the team Share your password with your manager and/or colleague and let them operate tools such as Email. Always choose a strong password and change it periodically. Contain at least eight alphanumeric characters. Contain both upper and lower case letters. Contain at least one number (for example, 0-9). Contain at least one special character (for example,!$%^&*()_+|~-=`{}[]:";'<>?,/). Privacy settings Check the privacy settings for your profile and ensure that your posts and information are only accessible by people you trust. Choose appropriate settings depending on what you are posting. Remember that when your content is posted on a public social network, all posts and comments may be traceable and trackable. Any information that you post should be considered at risk for public disclosure. 密码 不要在网络社区和其他站点使用相同的密码,否则一旦犯罪分子获取到一个站点的密码,他们就能够访问你所有的站点了。 不要与任何人共享密码 不要: 与任何人共享邮箱帐号 与TEAM成员共享工具或IT系统的帐号和密码 共享你的帐号给你的经理和/或同事并让他们操作相应的工具,如邮箱 选用强密码并定期更改 包含至少8位字母数字 2. 包含大小写字符 3. 至少包含一个数字(例如,0~9) 4. 至少包含一个特殊字符(例如 !$%^&*()_+|~-=`{}[]:“;‘<>?,/ ) 隐私设置 检查个人属性的隐私设置并确保你的帖子和信息只被你相信的人获取。所谓‘适当的’设置取决于你所发布的信息。请记住,当你发布信息在公共网络社区,所有的信息和评论都是可追踪的。你也应当考虑到你所发布的信息可能会被公开披露的威胁
  5. n this attack, the e-mails looked like legitimate LinkedIn invites with a Web link for confirming a contact. However, the link doesn't lead to LinkedIn; it redirects to a Web page and displays a message saying "Please waiting .... 4 seconds" before then redirecting to Google. Computer users are likely to shrug it off, but behind the scenes nasty things have happened. The page users are redirected to has malicious JavaScript hidden in an iFrame that detects what browser is being used and what applications are running and figures out if there is a vulnerability it can exploit to drop the Zeus malware onto the system, Stern said. For example, Stern used a test system running an older version of Adobe Reader that has a vulnerability. The attack detected that and used an exploit for that Reader hole and installed Zeus on the machine. Read more: http://news.cnet.com/8301-27080_3-20017971-245.html#ixzz16C4peiDI linkedIn social eng Tom Gillis
  6. Check Cisco’s shortening service http://security.thejoshmeister.com/2009/04/how-to-preview-shortened-urls-tinyurl.html