SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
1st Annual
Social Media Risk Index for
Small to Medium Sized Businesses




                               Panda Security
                             September 2010
     www.pandasecurity.com
Survey Information
     Survey goal 
     •   Uncover top concerns among SMBs about social 
         media, and draw correlations with actual incidence of 
         malware and ultimately financial loss
     Who was surveyed?  
     • 315 representatives from U.S.‐based companies with 
       15‐1000 employees 
     • All participants involved in setting and/or enforcing 
       policies related to network activities
     Timeframe
     •   Survey conducted during the month of July 2010


2        www.pandasecurity.com
Major Conclusions
     Nearly a third of SMBs have been infected by social 
     media malware
     35% of those infected suffered a financial loss, with more 
     than a third of those companies reporting $5,000+ in 
     losses 
     Facebook is driving the majority of social media‐related 
     infections as well as employee privacy violations
     More than half of SMBs have adopted a social media 
     governance policy, including 25 percent blocking 
     employees from accessing popular social media sites via 
     gateway appliances and/or cloud solutions   

3      www.pandasecurity.com
Does your business currently use social media tools?




4       www.pandasecurity.com
Which of the following tools does your business have 
    active accounts with? (Please check all that apply)




5       www.pandasecurity.com
What are the primary reasons employees use social 
    media tools at your organization?




6       www.pandasecurity.com
Is personal use of social media allowed at work?




7       www.pandasecurity.com
Is personal use of social media allowed on company 
    computers during non‐working hours?




8       www.pandasecurity.com
Are there any disallowed social media activities for 
    employees? 




9       www.pandasecurity.com
Which of the following activities are disallowed? 
 (Please check all that apply)




10   www.pandasecurity.com
Does your company actively block social media sites 
 from employees? 




11   www.pandasecurity.com
How does your company block employees from 
 accessing social sites? (Please check all that apply)




12   www.pandasecurity.com
Does your company have a social media governance 
 policy in place for employees?




13   www.pandasecurity.com
Do you have personnel to actively enforce the policy?




14   www.pandasecurity.com
Does your organization plan to formalize a social 
 media policy within the next six months?




15   www.pandasecurity.com
Is training about social media benefits and risks made 
 available to employees?




16   www.pandasecurity.com
What are your biggest concerns about social media 
 right now? (Please check all that apply)




17   www.pandasecurity.com
How knowledgeable is your company about the risks 
 of social media? 




18   www.pandasecurity.com
How knowledgeable do you perceive your company’s 
 employees to be about the threats posed by social 
 media?




19   www.pandasecurity.com
Has your business ever experienced any of the following 
 as a result of social media use by employees? (Please 
 check all that apply)




20   www.pandasecurity.com
For those suffering privacy violations: What social 
 networking site did the privacy violation stem from? 
 (Please check all that apply)




21   www.pandasecurity.com
For those suffering privacy violations: After the 
 privacy violation occurred, did your company change 
 its policies regarding social media usage by 
 employees?




22   www.pandasecurity.com
For those suffering from infections: What social 
 networking site did the malware or virus infection 
 stem from? (Please check all that apply)




23   www.pandasecurity.com
For those suffering from infections: Were there any 
 financial losses resulting from the malware or virus 
 infection?




24   www.pandasecurity.com
For those suffering from infections: What were the 
 estimated monetary losses from the infection? 




25   www.pandasecurity.com
Is an updated antivirus installed on all employee 
 computers?




26   www.pandasecurity.com
Does your business currently have web content 
 filtering controls in place?




27   www.pandasecurity.com
The solution to Social Media threats?  
 Panda Cloud Internet Protection (PCIP)
     PCIP provides policy‐driven secure web access delivered by and managed through
     the cloud, combining protection against web‐borne threats with data leak
     prevention and granular reporting of all Internet activities. By shifting security
     management and implementation to the cloud, PCIP increases businesses’ control
     over web‐based activities while saving time and money.
     • Advanced threat protection: Beyond URL filtering, protect against Web 2.0 
         attacks, etc.
     • Controlled access: You can control every aspect of your employees’ behavior –
         which websites, how long, how much bandwidth, etc
     • Fine Granularity: Control if employees can view or post on websites, use IM, 
         which file‐types allowed, etc.
     • Correlated reports: In a single console, view your policies, transaction‐level 
         reports, analysis across all services (secure, web access, DLP)




28         www.pandasecurity.com

Weitere ähnliche Inhalte

Was ist angesagt?

Digital Trends 2015 Asia vs AU vs US
Digital Trends 2015 Asia vs AU vs USDigital Trends 2015 Asia vs AU vs US
Digital Trends 2015 Asia vs AU vs US
Suelyn Howe
 
Human Resources: Social Media Matters
Human Resources: Social Media MattersHuman Resources: Social Media Matters
Human Resources: Social Media Matters
Blue Door Consulting
 
Web 2.0 @ Work Survey
Web 2.0 @ Work SurveyWeb 2.0 @ Work Survey
Web 2.0 @ Work Survey
TJ Rains
 

Was ist angesagt? (18)

Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber Attacks
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
 
2015 Microsoft Vulnerabilities Report
2015 Microsoft Vulnerabilities Report 2015 Microsoft Vulnerabilities Report
2015 Microsoft Vulnerabilities Report
 
Open Source 360° Survey Key Takeaways
Open Source 360° Survey Key TakeawaysOpen Source 360° Survey Key Takeaways
Open Source 360° Survey Key Takeaways
 
The State of Network Security 2014
The State of Network Security 2014The State of Network Security 2014
The State of Network Security 2014
 
Managing Security Policies Across Hybrid Cloud Environments
Managing Security Policies Across Hybrid Cloud EnvironmentsManaging Security Policies Across Hybrid Cloud Environments
Managing Security Policies Across Hybrid Cloud Environments
 
RegEd's Breaking Barriers Webinar Series - the social media policy
RegEd's Breaking Barriers Webinar Series - the social media policyRegEd's Breaking Barriers Webinar Series - the social media policy
RegEd's Breaking Barriers Webinar Series - the social media policy
 
10 Things for a Likeable 2016
10 Things for a Likeable 201610 Things for a Likeable 2016
10 Things for a Likeable 2016
 
Digital Trends 2015 Asia vs AU vs US
Digital Trends 2015 Asia vs AU vs USDigital Trends 2015 Asia vs AU vs US
Digital Trends 2015 Asia vs AU vs US
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
 
Human Resources: Social Media Matters
Human Resources: Social Media MattersHuman Resources: Social Media Matters
Human Resources: Social Media Matters
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?
 
Containing the outbreak: The healthcare security pandemic
Containing the outbreak: The healthcare security pandemicContaining the outbreak: The healthcare security pandemic
Containing the outbreak: The healthcare security pandemic
 
Web 2.0 @ Work Survey
Web 2.0 @ Work SurveyWeb 2.0 @ Work Survey
Web 2.0 @ Work Survey
 
Mobile Apps Market Study Indonesia
Mobile Apps Market Study Indonesia Mobile Apps Market Study Indonesia
Mobile Apps Market Study Indonesia
 
A Hacker's perspective on ransomware
A Hacker's perspective on ransomwareA Hacker's perspective on ransomware
A Hacker's perspective on ransomware
 
7 cyber security questions for boards
7 cyber security questions for boards7 cyber security questions for boards
7 cyber security questions for boards
 

Ähnlich wie 1st annual-social-media-risk-index

Social Media Use in WorkplaceNameInstitutional Aff.docx
Social Media Use in WorkplaceNameInstitutional Aff.docxSocial Media Use in WorkplaceNameInstitutional Aff.docx
Social Media Use in WorkplaceNameInstitutional Aff.docx
whitneyleman54422
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
Stites & Harbison
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
SchleighS
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
Louise Spiteri
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
makdul
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
sdavis532
 

Ähnlich wie 1st annual-social-media-risk-index (20)

Vivienne Storey
Vivienne StoreyVivienne Storey
Vivienne Storey
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Social Media Use in WorkplaceNameInstitutional Aff.docx
Social Media Use in WorkplaceNameInstitutional Aff.docxSocial Media Use in WorkplaceNameInstitutional Aff.docx
Social Media Use in WorkplaceNameInstitutional Aff.docx
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013 Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013
 
Social media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov streamSocial media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov stream
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
The Importance of a Social Media Policy in the Workplace
The Importance of a Social Media Policy in the WorkplaceThe Importance of a Social Media Policy in the Workplace
The Importance of a Social Media Policy in the Workplace
 
Situation Analysis Deck - Social Media Listening & Monitoring Lanscape
Situation Analysis Deck - Social Media Listening & Monitoring LanscapeSituation Analysis Deck - Social Media Listening & Monitoring Lanscape
Situation Analysis Deck - Social Media Listening & Monitoring Lanscape
 
Roots of Social Media Marketing Rise and Social Monitoring Provider Evaluation
Roots of Social Media Marketing Rise and Social Monitoring Provider EvaluationRoots of Social Media Marketing Rise and Social Monitoring Provider Evaluation
Roots of Social Media Marketing Rise and Social Monitoring Provider Evaluation
 
Social Biz 101
Social Biz 101Social Biz 101
Social Biz 101
 
Social Biz 101: A practical guide for getting started in Social Media
Social Biz 101: A practical guide for getting started in Social MediaSocial Biz 101: A practical guide for getting started in Social Media
Social Biz 101: A practical guide for getting started in Social Media
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social Media
 
Social Networking In The Workplace Public Version
Social Networking In The Workplace Public VersionSocial Networking In The Workplace Public Version
Social Networking In The Workplace Public Version
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 

Mehr von New Generation Marketing (18)

Web def completo
Web def completoWeb def completo
Web def completo
 
Viral marketing
Viral marketingViral marketing
Viral marketing
 
Socialbrandingpills
SocialbrandingpillsSocialbrandingpills
Socialbrandingpills
 
Social advertising-best-practices-0509
Social advertising-best-practices-0509Social advertising-best-practices-0509
Social advertising-best-practices-0509
 
Planeta web2
Planeta web2Planeta web2
Planeta web2
 
Mkt online con google
Mkt online con googleMkt online con google
Mkt online con google
 
Marketingplan
MarketingplanMarketingplan
Marketingplan
 
Marketing digital
Marketing digitalMarketing digital
Marketing digital
 
Libro diseno
Libro disenoLibro diseno
Libro diseno
 
La publicidad que viene
La publicidad que vieneLa publicidad que viene
La publicidad que viene
 
How blogs and_social_media_are_changing_public_rel
How blogs and_social_media_are_changing_public_relHow blogs and_social_media_are_changing_public_rel
How blogs and_social_media_are_changing_public_rel
 
Getviral
GetviralGetviral
Getviral
 
Geeknomia
GeeknomiaGeeknomia
Geeknomia
 
El imperio digital
El imperio digitalEl imperio digital
El imperio digital
 
Buscadores negocio
Buscadores negocioBuscadores negocio
Buscadores negocio
 
Brightcove whitepaper-online-video-and-media-industry-q2-2010
Brightcove whitepaper-online-video-and-media-industry-q2-2010Brightcove whitepaper-online-video-and-media-industry-q2-2010
Brightcove whitepaper-online-video-and-media-industry-q2-2010
 
2010 new business survey
2010 new business survey2010 new business survey
2010 new business survey
 
2008 edison arbitron_podcast_report
2008 edison arbitron_podcast_report2008 edison arbitron_podcast_report
2008 edison arbitron_podcast_report
 

1st annual-social-media-risk-index