SlideShare ist ein Scribd-Unternehmen logo
1 von 8
1
SOCIAL MEDIA RISK AND THE AUDIT PROCESS
• Organizational social media use is rising and growing increasingly important from a risk management standpoint,
yet formal processes for it remain a rarity.
• Evaluating and monitoring social media risk is or will soon become a key part of audit plans.
• The precise nature of organizational social media risk is rapidly changing, which generates confusion as well as
obstacles internal audit must recognize and address.
Key Findings
I am not sure everyone is trained to understand the risks of social media.
– Director of Auditing, Midsize Hospitality Company
2
RISKS OF A CORPORATE SOCIAL MEDIA PRESENCE
(1/2)
Threats and
Vulnerabilities
Risks Risk Mitigation Techniques
Viruses and malware
are introduced to the
organizational
network.
• Data leakage/theft occurs.
• System downtime occurs.
• Resources to clean systems
are required.
• Ensure that antivirus and antimalware controls are
installed on all systems and updated daily.
• Consider using content filtering technology to restrict
or limit access to social media sites.
• Ensure that the appropriate controls are also installed
on mobile devices, such as smartphones.
• Establish or update policies and standards.
• Develop and conduct awareness training and
campaigns to inform employees of the risks involved
with using social media sites.
Customers and the
enterprise are
exposed through a
fraudulent or hijacked
corporate presence.
• Customer backlash/adverse
legal actions occur.
• Customer information is
exposed.
• Reputational damage can
happen.
• Targeted phishing attacks on
customers or employees
occur.
• Engage a brand protection firm that can scan the
internet and search out misuse of the enterprise’s
brand.
• Provide periodic informational updates to customers
to maintain the awareness of potential fraud and to
establish clear guidelines regarding what information
should be posted as part of the enterprise’s social
media presence.
Source: Social Media: Business Benefits and Security, Governance and Assurance Perspectives, ISACA, 2010
3
RISKS OF A CORPORATE SOCIAL MEDIA PRESENCE
(2/2)
Threats and
Vulnerabilities
Risks Risk Mitigation Techniques
Content rights to
information posted to
social media sites are
unclear or undefined.
• The enterprise loses
control/legal rights of
information posted to the
social media sites.
• Ensure that legal and communication teams carefully
review user agreements for social media sites that
are being considered.
• Establish clear policies that dictate to employees and
customers what information should be posted as part
of the enterprise’s social media presence.
• Ensure that there is a capability to capture and log all
communications (if feasible and appropriate).
A move to a digital
business model may
increase customer
service expectations.
• Customers are dissatisfied
with the responsiveness
received in this arena,
leading to potential
reputational damage for the
enterprise and customer
retention issues.
• Ensure that staffing is adequate to handle the amount
of traffic that could be created from social media
presence.
• Create notices that provide clear windows for
customer response.
Electronic
communications that
may be impacted by
retention regulations
or e-discovery are not
effectively managed.
• Regulatory sanctions and
fines are issued.
• Adverse legal actions are
taken.
• Establish appropriate policies, processes and
technologies to ensure that communications via
social media that may be impacted by litigation or
regulations are tracked and archived appropriately.
• Remember that maintaining an archive, depending
on the social media site, may not be a recommended
approach.
4
POLICY RISKS
Source: http://www.protiviti.com/en-UK/Pages/UK-Companies-at-Risk-from-Inadequate-Social-Media-Policies.aspx; online.wsj.com
• Companies without adequate social media policies place themselves at risk of security breaches and reputational
damage among other issues.
• There are a growing number of cases where firms have vague or out-of-date social media policies that are
unenforceable if inappropriate activity takes place.
• Companies should provide their employees real guidance regarding the use of social media sites and should
have very clear policies targeted at issues specific to social networking.
• Companies should develop or update not only their social media policies, but they should also review all their
human resources (HR) and IT policies as many have become outdated in the era of social networking.
In May 2012, Houston-based fashion retailer Francesca's Holdings Corp. fired their CFO for improperly
communicating company information through social media. The CFO had mentioned the company’s board
meetings, earnings calls and sale of shares multiple times on various social media platforms.
Social Media Policy Breach Example
5
SECURITY RISKS
Five Social
Media
Security
Risks
Malware
Intellectual
Property
Leakage
Phishing
Attacks
Physical or
Connected
Threats
Privacy
Settings Left
Open to All
Source: en.community.dell.com; Global Survey on Social Media Risks,; www.adp.com, http://www.huffingtonpost.com/eliyahu-federman/social-media-addiction_b_2480109.html
• Employees may intentionally or
inadvertently use social media – whether
on-the-job or at home – in a way that
poses risks for their employers.
• Virus and malware attacks against
organizations have increased because
of employees using Facebook, Twitter,
LinkedIn and other social media in the
workplace. In 2012, Americans spent 74
billion minutes on social media sites
(20% of their time).
• Organizations are most concerned with
employees downloading apps or widgets
from social media sites, posting
uncensored content and uncensored
blog entries.
6
RISK MANAGEMENT FOR SOCIAL NETWORKING
• Who has access to post authorized information about your company?
− That user/account should be identified as the official representative for your company.
• Define the social networking policy.
− This policy states who can/cannot post information about your company and the objective of using
social networking sites.
− What types of information can be shared publicly?
− Are there any approvals required to post information?
− Should the information be publicly available or only to friends/subscribers?
• Identify what types of content are currently being shared that are not authorized and try to mitigate issues
with it.
− Try to get in front of the postings/issues.
• Determine if social networking is working depending on the number of subscribers/users.
− If a program is not providing value to the organization, discontinue it.
7
KEY QUESTIONS TO CONSIDER
• Can mobile commerce solutions be integrated effectively, efficiently and securely with your overall IT
infrastructure and existing management tools?
• Does your IT function maintain and update clear mobile commerce and social media policies that clearly convey
the acceptable use and security requirements of these capabilities to employees who engage in mobile commerce
and/or social media activities? How are these policies monitored and audited?
• How robust are your information security measures? Are these measures applied differently depending on the
sensitivity or importance of the data being processed and stored?
• Is your organization in compliance with all relevant industry standards for security and privacy as well as
applicable laws and regulations?
• Does your organization have efficient systems and processes for monitoring the quality of compliance as well as
processes for monitoring ongoing regulatory issues and anticipating new rules and regulations?
• Is the overall state of your company’s social media security sufficient? How can social media capabilities be
integrated more extensively into appropriate business processes to deliver value?
8

Weitere ähnliche Inhalte

Was ist angesagt?

CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrainInfosecTrain
 
Working in Compliance vs. Working On Compliance
Working in Compliance vs. Working On ComplianceWorking in Compliance vs. Working On Compliance
Working in Compliance vs. Working On Compliance360factors
 
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 PresentationRisk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation360factors
 
Compliance framework
Compliance frameworkCompliance framework
Compliance frameworkManoj Agarwal
 
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...PECB
 
Regulatory Change Management
Regulatory Change ManagementRegulatory Change Management
Regulatory Change Management360factors
 
The Importance of IT Compliance Management
The Importance of IT Compliance Management The Importance of IT Compliance Management
The Importance of IT Compliance Management 360factors
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planninggoreankush1
 
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and SafetyREGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety360factors
 
Sap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftSap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftPennonSoft
 
Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceBill Lisse
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Hiten Sethi
 
COSO 2013: What you need to know
COSO 2013: What you need to knowCOSO 2013: What you need to know
COSO 2013: What you need to knowjennyhollingworth
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 

Was ist angesagt? (20)

CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
Working in Compliance vs. Working On Compliance
Working in Compliance vs. Working On ComplianceWorking in Compliance vs. Working On Compliance
Working in Compliance vs. Working On Compliance
 
it grc
it grc it grc
it grc
 
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 PresentationRisk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
 
Compliance framework
Compliance frameworkCompliance framework
Compliance framework
 
Fix nix, inc
Fix nix, incFix nix, inc
Fix nix, inc
 
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
 
Regulatory Change Management
Regulatory Change ManagementRegulatory Change Management
Regulatory Change Management
 
The Importance of IT Compliance Management
The Importance of IT Compliance Management The Importance of IT Compliance Management
The Importance of IT Compliance Management
 
Simplifying IT GRC
Simplifying IT GRCSimplifying IT GRC
Simplifying IT GRC
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
 
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and SafetyREGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
 
Sap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftSap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoft
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT Governance
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011
 
COSO 2013: What you need to know
COSO 2013: What you need to knowCOSO 2013: What you need to know
COSO 2013: What you need to know
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 

Ähnlich wie Social media risks guide

Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work PlacePepovski Darko
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSchleighS
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013KINSHIP digital
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12Louise Spiteri
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Smarsh
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseJay McLaughlin
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
Social media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov streamSocial media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov streamCraig Thomler
 
Social Media
Social MediaSocial Media
Social MediaJ.L+C.L
 
Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013 Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013 Craig Thomler
 
Social Media for Medical Technology Companies
Social Media for Medical Technology Companies Social Media for Medical Technology Companies
Social Media for Medical Technology Companies Grey Matter Marketing
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012PBeisty
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaGerardo A Dada
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013Amarach Research
 

Ähnlich wie Social media risks guide (20)

Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security Presentation
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
Social media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov streamSocial media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov stream
 
Social Media
Social MediaSocial Media
Social Media
 
Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013 Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013
 
Social Media MTL Conference Ppt
Social Media MTL Conference PptSocial Media MTL Conference Ppt
Social Media MTL Conference Ppt
 
Social Media for Medical Technology Companies
Social Media for Medical Technology Companies Social Media for Medical Technology Companies
Social Media for Medical Technology Companies
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social Media
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 

Kürzlich hochgeladen

Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser... Shivani Pandey
 
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...noor ahmed
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448ont65320
 
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...Riya Pathan
 
Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034 Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034  Independent Chenna...Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034  Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034 Independent Chenna... Shivani Pandey
 
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...ritikasharma
 
Independent Sonagachi Escorts ✔ 9332606886✔ Full Night With Room Online Booki...
Independent Sonagachi Escorts ✔ 9332606886✔ Full Night With Room Online Booki...Independent Sonagachi Escorts ✔ 9332606886✔ Full Night With Room Online Booki...
Independent Sonagachi Escorts ✔ 9332606886✔ Full Night With Room Online Booki...Riya Pathan
 
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment BookingCall Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Bookingnoor ahmed
 
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl GoaRussian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goasexy call girls service in goa
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
↑Top Model (Kolkata) Call Girls Salt Lake ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Salt Lake ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Salt Lake ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Salt Lake ⟟ 8250192130 ⟟ High Class Call Girl...noor ahmed
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...noor ahmed
 
Low Rate Young Call Girls in Surajpur Greater Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Surajpur Greater Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Surajpur Greater Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Surajpur Greater Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...aamir
 
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Serviceanamikaraghav4
 
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...rahim quresi
 
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...Apsara Of India
 

Kürzlich hochgeladen (20)

Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
Model Call Girls In Velappanchavadi WhatsApp Booking 7427069034 call girl ser...
 
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
↑Top Model (Kolkata) Call Girls Howrah ⟟ 8250192130 ⟟ High Class Call Girl In...
 
Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448Beautiful 😋 Call girls in Lahore 03210033448
Beautiful 😋 Call girls in Lahore 03210033448
 
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goaGoa Call Girls 9316020077 Call Girls  In Goa By Russian Call Girl in goa
Goa Call Girls 9316020077 Call Girls In Goa By Russian Call Girl in goa
 
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
Independent Hatiara Escorts ✔ 9332606886✔ Full Night With Room Online Booking...
 
Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034 Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034  Independent Chenna...Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034  Independent Chenna...
Verified Trusted Call Girls Tambaram Chennai ✔✔7427069034 Independent Chenna...
 
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
Book Sex Workers Available Kolkata Call Girls Service Airport Kolkata ✔ 62971...
 
Independent Sonagachi Escorts ✔ 9332606886✔ Full Night With Room Online Booki...
Independent Sonagachi Escorts ✔ 9332606886✔ Full Night With Room Online Booki...Independent Sonagachi Escorts ✔ 9332606886✔ Full Night With Room Online Booki...
Independent Sonagachi Escorts ✔ 9332606886✔ Full Night With Room Online Booki...
 
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment BookingCall Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
Call Girls in Barasat | 7001035870 At Low Cost Cash Payment Booking
 
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl GoaRussian Escorts Agency In Goa  💚 9316020077 💚 Russian Call Girl Goa
Russian Escorts Agency In Goa 💚 9316020077 💚 Russian Call Girl Goa
 
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service NashikCall Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
Call Girls Nashik Gayatri 7001305949 Independent Escort Service Nashik
 
↑Top Model (Kolkata) Call Girls Salt Lake ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Salt Lake ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Salt Lake ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Salt Lake ⟟ 8250192130 ⟟ High Class Call Girl...
 
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
↑Top Model (Kolkata) Call Girls Sonagachi ⟟ 8250192130 ⟟ High Class Call Girl...
 
Low Rate Young Call Girls in Surajpur Greater Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Surajpur Greater Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Surajpur Greater Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Surajpur Greater Noida ✔️☆9289244007✔️☆ Female E...
 
Desi Bhabhi Call Girls In Goa 💃 730 02 72 001💃desi Bhabhi Escort Goa
Desi Bhabhi Call Girls  In Goa  💃 730 02 72 001💃desi Bhabhi Escort GoaDesi Bhabhi Call Girls  In Goa  💃 730 02 72 001💃desi Bhabhi Escort Goa
Desi Bhabhi Call Girls In Goa 💃 730 02 72 001💃desi Bhabhi Escort Goa
 
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
Nayabad Call Girls ✔ 8005736733 ✔ Hot Model With Sexy Bhabi Ready For Sex At ...
 
Russian ℂall gIRLS In Goa 9316020077 ℂall gIRLS Service In Goa
Russian ℂall gIRLS In Goa 9316020077  ℂall gIRLS Service  In GoaRussian ℂall gIRLS In Goa 9316020077  ℂall gIRLS Service  In Goa
Russian ℂall gIRLS In Goa 9316020077 ℂall gIRLS Service In Goa
 
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service👙  Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
👙 Kolkata Call Girls Shyam Bazar 💫💫7001035870 Model escorts Service
 
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
𓀤Call On 6297143586 𓀤 Sonagachi Call Girls In All Kolkata 24/7 Provide Call W...
 
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
Karnal Call Girls 8860008073 Dyal Singh Colony Call Girls Service in Karnal E...
 

Social media risks guide

  • 1. 1
  • 2. SOCIAL MEDIA RISK AND THE AUDIT PROCESS • Organizational social media use is rising and growing increasingly important from a risk management standpoint, yet formal processes for it remain a rarity. • Evaluating and monitoring social media risk is or will soon become a key part of audit plans. • The precise nature of organizational social media risk is rapidly changing, which generates confusion as well as obstacles internal audit must recognize and address. Key Findings I am not sure everyone is trained to understand the risks of social media. – Director of Auditing, Midsize Hospitality Company 2
  • 3. RISKS OF A CORPORATE SOCIAL MEDIA PRESENCE (1/2) Threats and Vulnerabilities Risks Risk Mitigation Techniques Viruses and malware are introduced to the organizational network. • Data leakage/theft occurs. • System downtime occurs. • Resources to clean systems are required. • Ensure that antivirus and antimalware controls are installed on all systems and updated daily. • Consider using content filtering technology to restrict or limit access to social media sites. • Ensure that the appropriate controls are also installed on mobile devices, such as smartphones. • Establish or update policies and standards. • Develop and conduct awareness training and campaigns to inform employees of the risks involved with using social media sites. Customers and the enterprise are exposed through a fraudulent or hijacked corporate presence. • Customer backlash/adverse legal actions occur. • Customer information is exposed. • Reputational damage can happen. • Targeted phishing attacks on customers or employees occur. • Engage a brand protection firm that can scan the internet and search out misuse of the enterprise’s brand. • Provide periodic informational updates to customers to maintain the awareness of potential fraud and to establish clear guidelines regarding what information should be posted as part of the enterprise’s social media presence. Source: Social Media: Business Benefits and Security, Governance and Assurance Perspectives, ISACA, 2010 3
  • 4. RISKS OF A CORPORATE SOCIAL MEDIA PRESENCE (2/2) Threats and Vulnerabilities Risks Risk Mitigation Techniques Content rights to information posted to social media sites are unclear or undefined. • The enterprise loses control/legal rights of information posted to the social media sites. • Ensure that legal and communication teams carefully review user agreements for social media sites that are being considered. • Establish clear policies that dictate to employees and customers what information should be posted as part of the enterprise’s social media presence. • Ensure that there is a capability to capture and log all communications (if feasible and appropriate). A move to a digital business model may increase customer service expectations. • Customers are dissatisfied with the responsiveness received in this arena, leading to potential reputational damage for the enterprise and customer retention issues. • Ensure that staffing is adequate to handle the amount of traffic that could be created from social media presence. • Create notices that provide clear windows for customer response. Electronic communications that may be impacted by retention regulations or e-discovery are not effectively managed. • Regulatory sanctions and fines are issued. • Adverse legal actions are taken. • Establish appropriate policies, processes and technologies to ensure that communications via social media that may be impacted by litigation or regulations are tracked and archived appropriately. • Remember that maintaining an archive, depending on the social media site, may not be a recommended approach. 4
  • 5. POLICY RISKS Source: http://www.protiviti.com/en-UK/Pages/UK-Companies-at-Risk-from-Inadequate-Social-Media-Policies.aspx; online.wsj.com • Companies without adequate social media policies place themselves at risk of security breaches and reputational damage among other issues. • There are a growing number of cases where firms have vague or out-of-date social media policies that are unenforceable if inappropriate activity takes place. • Companies should provide their employees real guidance regarding the use of social media sites and should have very clear policies targeted at issues specific to social networking. • Companies should develop or update not only their social media policies, but they should also review all their human resources (HR) and IT policies as many have become outdated in the era of social networking. In May 2012, Houston-based fashion retailer Francesca's Holdings Corp. fired their CFO for improperly communicating company information through social media. The CFO had mentioned the company’s board meetings, earnings calls and sale of shares multiple times on various social media platforms. Social Media Policy Breach Example 5
  • 6. SECURITY RISKS Five Social Media Security Risks Malware Intellectual Property Leakage Phishing Attacks Physical or Connected Threats Privacy Settings Left Open to All Source: en.community.dell.com; Global Survey on Social Media Risks,; www.adp.com, http://www.huffingtonpost.com/eliyahu-federman/social-media-addiction_b_2480109.html • Employees may intentionally or inadvertently use social media – whether on-the-job or at home – in a way that poses risks for their employers. • Virus and malware attacks against organizations have increased because of employees using Facebook, Twitter, LinkedIn and other social media in the workplace. In 2012, Americans spent 74 billion minutes on social media sites (20% of their time). • Organizations are most concerned with employees downloading apps or widgets from social media sites, posting uncensored content and uncensored blog entries. 6
  • 7. RISK MANAGEMENT FOR SOCIAL NETWORKING • Who has access to post authorized information about your company? − That user/account should be identified as the official representative for your company. • Define the social networking policy. − This policy states who can/cannot post information about your company and the objective of using social networking sites. − What types of information can be shared publicly? − Are there any approvals required to post information? − Should the information be publicly available or only to friends/subscribers? • Identify what types of content are currently being shared that are not authorized and try to mitigate issues with it. − Try to get in front of the postings/issues. • Determine if social networking is working depending on the number of subscribers/users. − If a program is not providing value to the organization, discontinue it. 7
  • 8. KEY QUESTIONS TO CONSIDER • Can mobile commerce solutions be integrated effectively, efficiently and securely with your overall IT infrastructure and existing management tools? • Does your IT function maintain and update clear mobile commerce and social media policies that clearly convey the acceptable use and security requirements of these capabilities to employees who engage in mobile commerce and/or social media activities? How are these policies monitored and audited? • How robust are your information security measures? Are these measures applied differently depending on the sensitivity or importance of the data being processed and stored? • Is your organization in compliance with all relevant industry standards for security and privacy as well as applicable laws and regulations? • Does your organization have efficient systems and processes for monitoring the quality of compliance as well as processes for monitoring ongoing regulatory issues and anticipating new rules and regulations? • Is the overall state of your company’s social media security sufficient? How can social media capabilities be integrated more extensively into appropriate business processes to deliver value? 8