SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Social Web + Data Breaches =
       Reputation Risk


                   Boyd Neil
           National Practice Leader
   Social Media and Digital Communications
          boyd.neil@hkstrategies.com




                                             June 28, 2012
3




            The Social Web Changes Crisis
             Communications Permanently




6/28/2012
‘There won’t be a significant event in the future that
won’t involve public participation… Social media
(is) the sociological equivalent of climate change.’
                                      Retired Admiral Thad Allen
5




     New voices
                         Two-way channels         Providing organizations
empowered through
                       creating opportunities      with means to directly
 digital challenging
                       for dialogue yet to be      touch most important
  traditional media
                           fully exploited               audiences
       primacy


              Reputation & risk
                                     Mobile technologies
            management models
                                     moving us into new
             impacted: speed,
                                      areas still not fully
               transparency,
                                         understood
                 inaccuracy
6




            A New Frontier for Risk:
                Data Breaches




6/28/2012
8




6/28/2012
19




            The Social Web Loves Data
                    Breaches




6/28/2012
20




6/28/2012
Graphic Credit . . . http://gapingvoidgallery.com/
25




“[Brands suffering data leaks] should email people, post on Twitter,
Facebook and address their customers where they are - you shouldn‟t
have to let people do a Google search or find out through word of
mouth.”
   •   Alys Woodward, research director at market intelligence firm IDC
       Europe
11 principles for managing            26

data breach communication
      on the social web

1.   Use the social web dammit
     (and ignore the
     sarcasm/humour)
2.   Drive internally for timely
     notification (1-2 hours)
3.   Provide interim security advice
     („change password
     immediately‟)
4.   Be transparent about the
     scope and consequences of
     the data breach (when known)
11 principles for managing            27

data breach communication
      on the social web

5.   Coordinate internal protocols
     for multi-platform
     communications (Twitter,
     Facebook, YouTube, etc.)
6.   Use #hashtags related to
     incident so your info. is there
     in frame used to share news
     (Twitter/Facebook
7.   Use multiple media formats
     (visuals + video + text) . . .
     facilitates sharing
11 principles for managing         28

data breach communication
      on the social web

8.    Amplify through
      paid/promoted
      tweets/Facebook posts
9.    Reply to social web
      dialogue + questions with
      „confident humility‟
10.   Commit to fixing your
      firewall and/or internal
      security processes
11.   Get ready now for the
      social web part of the hack
      dammit
29
Sources:
   http://www.marketingweek.co.uk/news/linkedins-slow-reaction-to-data-leaks-hits-
   brand/4002126.article

   http://www.cloudhance.com/how-data-breaches-happen/

   http://www.pcmag.com/article2/0,2817,2394743,00.asp

   http://www.focus.com/fyi/high-profile-data-breaches/

   http://www.backgroundcheck.org/state-of-it-security/

   http://siliconangle.com/blog/2011/06/26/the-largest-data-breaches-of-all-time-
   infographic/

   http://www.infographs.org/2012/02/the-high-cost-of-a-data-breach-infographic/#

   http://paranoid-security.blogspot.ca/

   http://www.youtube.com/watch?v=xyIxFhQ_g5g


6/28/2012

Weitere ähnliche Inhalte

Was ist angesagt?

The Top Social Media Fails and How to Avoid Them
The Top Social Media Fails and How to Avoid ThemThe Top Social Media Fails and How to Avoid Them
The Top Social Media Fails and How to Avoid Them
Vivastream
 
Socio-technical influences on social media adoption
Socio-technical influences on social media adoptionSocio-technical influences on social media adoption
Socio-technical influences on social media adoption
Aimee Jacobs
 
PresentationNevilleHobson
PresentationNevilleHobsonPresentationNevilleHobson
PresentationNevilleHobson
Serge Cornelus
 

Was ist angesagt? (18)

Crowds, Clouds and Crisis
Crowds, Clouds and CrisisCrowds, Clouds and Crisis
Crowds, Clouds and Crisis
 
Crowds, Clouds and Crisis
Crowds, Clouds and CrisisCrowds, Clouds and Crisis
Crowds, Clouds and Crisis
 
Influence measurement – AMEC Measurement Week 2014
Influence measurement – AMEC Measurement Week 2014Influence measurement – AMEC Measurement Week 2014
Influence measurement – AMEC Measurement Week 2014
 
Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...Discussing the Global Commision on Internet Governance statement, Toward a So...
Discussing the Global Commision on Internet Governance statement, Toward a So...
 
Swivel Overview June 2007
Swivel Overview June 2007Swivel Overview June 2007
Swivel Overview June 2007
 
The Top Social Media Fails and How to Avoid Them
The Top Social Media Fails and How to Avoid ThemThe Top Social Media Fails and How to Avoid Them
The Top Social Media Fails and How to Avoid Them
 
Film 240 Flipbook
Film 240 Flipbook Film 240 Flipbook
Film 240 Flipbook
 
Bridging The Gap, Communities And Technologies, 28 June 2007
Bridging The Gap, Communities And Technologies, 28 June 2007Bridging The Gap, Communities And Technologies, 28 June 2007
Bridging The Gap, Communities And Technologies, 28 June 2007
 
History of Interaction Design - Reprised - SCAD - 12Nov2008
History of Interaction Design - Reprised - SCAD - 12Nov2008History of Interaction Design - Reprised - SCAD - 12Nov2008
History of Interaction Design - Reprised - SCAD - 12Nov2008
 
Web 2.0 - The Social Web
Web 2.0 - The Social WebWeb 2.0 - The Social Web
Web 2.0 - The Social Web
 
Web 2.0 - The Social Web
Web 2.0 - The Social WebWeb 2.0 - The Social Web
Web 2.0 - The Social Web
 
How Ready Are You for the Connected Consumer?
How Ready Are You for the Connected Consumer?How Ready Are You for the Connected Consumer?
How Ready Are You for the Connected Consumer?
 
Socio-technical influences on social media adoption
Socio-technical influences on social media adoptionSocio-technical influences on social media adoption
Socio-technical influences on social media adoption
 
Shift happens - Key take aways re:publica '09 - Presentation @ Pepper GmbH - ...
Shift happens - Key take aways re:publica '09 - Presentation @ Pepper GmbH - ...Shift happens - Key take aways re:publica '09 - Presentation @ Pepper GmbH - ...
Shift happens - Key take aways re:publica '09 - Presentation @ Pepper GmbH - ...
 
Enterprise Social Tools & the Knowledge Organization
Enterprise Social Tools & the Knowledge OrganizationEnterprise Social Tools & the Knowledge Organization
Enterprise Social Tools & the Knowledge Organization
 
The Connected Entreprise
The Connected EntrepriseThe Connected Entreprise
The Connected Entreprise
 
Mms Marketing 120109
Mms Marketing 120109Mms Marketing 120109
Mms Marketing 120109
 
PresentationNevilleHobson
PresentationNevilleHobsonPresentationNevilleHobson
PresentationNevilleHobson
 

Andere mochten auch

Andere mochten auch (6)

NXNEi activism slideshare #3
NXNEi activism slideshare #3NXNEi activism slideshare #3
NXNEi activism slideshare #3
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social Web
 
5th annual social media law conference
5th annual social media law conference5th annual social media law conference
5th annual social media law conference
 
Reputation and Shaming on the Social Web
Reputation and Shaming on the Social WebReputation and Shaming on the Social Web
Reputation and Shaming on the Social Web
 
Managing Negative Perceptions
Managing Negative PerceptionsManaging Negative Perceptions
Managing Negative Perceptions
 
6th annual social media and law conference — hashtag activism
6th annual social media and law conference — hashtag activism6th annual social media and law conference — hashtag activism
6th annual social media and law conference — hashtag activism
 

Ähnlich wie Data Breaches and the Social Web

On The Business of social media
On The Business of social media On The Business of social media
On The Business of social media
Doug Winfield
 
Imkt120 ip1 parker_simora social media 2.0
Imkt120 ip1 parker_simora social media 2.0Imkt120 ip1 parker_simora social media 2.0
Imkt120 ip1 parker_simora social media 2.0
parkerst
 
Social business - KdH 2012
Social business - KdH 2012Social business - KdH 2012
Social business - KdH 2012
Yves Van Seters
 
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE GmbH
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
Cindy Kim
 
Integrating social media into your educational practice ouboces
Integrating social media into your educational practice oubocesIntegrating social media into your educational practice ouboces
Integrating social media into your educational practice ouboces
Nell Eckersley
 
Integrating social media into your educational practice hv
Integrating social media into your educational practice hvIntegrating social media into your educational practice hv
Integrating social media into your educational practice hv
Nell Eckersley
 

Ähnlich wie Data Breaches and the Social Web (20)

Web 2.0 in the Enterprise, Talk by Sam Huleatt
Web 2.0 in the Enterprise, Talk by Sam HuleattWeb 2.0 in the Enterprise, Talk by Sam Huleatt
Web 2.0 in the Enterprise, Talk by Sam Huleatt
 
Presentation on the Benefits of Social Media
Presentation on the Benefits of Social MediaPresentation on the Benefits of Social Media
Presentation on the Benefits of Social Media
 
On The Business of social media
On The Business of social media On The Business of social media
On The Business of social media
 
Imkt120 ip1 parker_simora social media 2.0
Imkt120 ip1 parker_simora social media 2.0Imkt120 ip1 parker_simora social media 2.0
Imkt120 ip1 parker_simora social media 2.0
 
Social business - KdH 2012
Social business - KdH 2012Social business - KdH 2012
Social business - KdH 2012
 
GTC West: The Business Case For Social Media
GTC West: The Business Case For Social MediaGTC West: The Business Case For Social Media
GTC West: The Business Case For Social Media
 
Social Networking and Social Media - Some things to think about
Social Networking and Social Media - Some things to  think aboutSocial Networking and Social Media - Some things to  think about
Social Networking and Social Media - Some things to think about
 
Shifting Sands: The new face of sustainable innovation in the age of social m...
Shifting Sands: The new face of sustainable innovation in the age of social m...Shifting Sands: The new face of sustainable innovation in the age of social m...
Shifting Sands: The new face of sustainable innovation in the age of social m...
 
Security and Trust in social media networks
Security and Trust in social media networksSecurity and Trust in social media networks
Security and Trust in social media networks
 
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
ADTELLIGENCE_ White Paper_Monetization of Social Networks_Chapter1
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
Social banking 2.2 social media
Social banking 2.2   social mediaSocial banking 2.2   social media
Social banking 2.2 social media
 
Social Media Transformers in THE NEW FINANCIAL WORLD!!!
Social Media Transformers in THE NEW FINANCIAL WORLD!!!Social Media Transformers in THE NEW FINANCIAL WORLD!!!
Social Media Transformers in THE NEW FINANCIAL WORLD!!!
 
Jay Byrne MSMW_2012
Jay Byrne MSMW_2012Jay Byrne MSMW_2012
Jay Byrne MSMW_2012
 
Teigland_Exploring future of value creation
Teigland_Exploring future of value creationTeigland_Exploring future of value creation
Teigland_Exploring future of value creation
 
Maximizing Knowledge-Sharing
Maximizing Knowledge-SharingMaximizing Knowledge-Sharing
Maximizing Knowledge-Sharing
 
Integrating social media into your educational practice ouboces
Integrating social media into your educational practice oubocesIntegrating social media into your educational practice ouboces
Integrating social media into your educational practice ouboces
 
Web 2.0, Social Media and HR
Web 2.0, Social Media and HRWeb 2.0, Social Media and HR
Web 2.0, Social Media and HR
 
Integrating social media into your educational practice hv
Integrating social media into your educational practice hvIntegrating social media into your educational practice hv
Integrating social media into your educational practice hv
 
Big data - challenge or opportunity
Big data - challenge or opportunityBig data - challenge or opportunity
Big data - challenge or opportunity
 

Kürzlich hochgeladen

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Kürzlich hochgeladen (20)

BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Falcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial WingsFalcon Invoice Discounting: Tailored Financial Wings
Falcon Invoice Discounting: Tailored Financial Wings
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 

Data Breaches and the Social Web

  • 1. Social Web + Data Breaches = Reputation Risk Boyd Neil National Practice Leader Social Media and Digital Communications boyd.neil@hkstrategies.com June 28, 2012
  • 2.
  • 3. 3 The Social Web Changes Crisis Communications Permanently 6/28/2012
  • 4. ‘There won’t be a significant event in the future that won’t involve public participation… Social media (is) the sociological equivalent of climate change.’ Retired Admiral Thad Allen
  • 5. 5 New voices Two-way channels Providing organizations empowered through creating opportunities with means to directly digital challenging for dialogue yet to be touch most important traditional media fully exploited audiences primacy Reputation & risk Mobile technologies management models moving us into new impacted: speed, areas still not fully transparency, understood inaccuracy
  • 6. 6 A New Frontier for Risk: Data Breaches 6/28/2012
  • 7.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. 19 The Social Web Loves Data Breaches 6/28/2012
  • 21.
  • 22. Graphic Credit . . . http://gapingvoidgallery.com/
  • 23.
  • 24.
  • 25. 25 “[Brands suffering data leaks] should email people, post on Twitter, Facebook and address their customers where they are - you shouldn‟t have to let people do a Google search or find out through word of mouth.” • Alys Woodward, research director at market intelligence firm IDC Europe
  • 26. 11 principles for managing 26 data breach communication on the social web 1. Use the social web dammit (and ignore the sarcasm/humour) 2. Drive internally for timely notification (1-2 hours) 3. Provide interim security advice („change password immediately‟) 4. Be transparent about the scope and consequences of the data breach (when known)
  • 27. 11 principles for managing 27 data breach communication on the social web 5. Coordinate internal protocols for multi-platform communications (Twitter, Facebook, YouTube, etc.) 6. Use #hashtags related to incident so your info. is there in frame used to share news (Twitter/Facebook 7. Use multiple media formats (visuals + video + text) . . . facilitates sharing
  • 28. 11 principles for managing 28 data breach communication on the social web 8. Amplify through paid/promoted tweets/Facebook posts 9. Reply to social web dialogue + questions with „confident humility‟ 10. Commit to fixing your firewall and/or internal security processes 11. Get ready now for the social web part of the hack dammit
  • 29. 29 Sources: http://www.marketingweek.co.uk/news/linkedins-slow-reaction-to-data-leaks-hits- brand/4002126.article http://www.cloudhance.com/how-data-breaches-happen/ http://www.pcmag.com/article2/0,2817,2394743,00.asp http://www.focus.com/fyi/high-profile-data-breaches/ http://www.backgroundcheck.org/state-of-it-security/ http://siliconangle.com/blog/2011/06/26/the-largest-data-breaches-of-all-time- infographic/ http://www.infographs.org/2012/02/the-high-cost-of-a-data-breach-infographic/# http://paranoid-security.blogspot.ca/ http://www.youtube.com/watch?v=xyIxFhQ_g5g 6/28/2012

Hinweis der Redaktion

  1. I’ll cover three things today:1 . . . A perspective on the social web (define it Boyd)2 . . . The prevalence and impact of data breaches today3 . . . 11 principles for managing communications on the social web should your organization be faced with a data breach
  2. Definition of ‘data breach’ . . . “A data breach is the intentional or unintentional release of secure information to an untrusted environment . . . It is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so.”
  3. Before discussing data breaches, their frequency and impact, and how to manage communication around data breaches in social media, I want to make a few foundational points about the relationship between the social web and crisis communications.
  4. In general, digital security is considered a major threat by consumersWhile it appears that the percentage of digital contact as a proportion of all fraud has stayed the same, this is in spite of the fact that our awareness of online security threats has increased significantly
  5. Yet as individuals we are remarkably incautious about what information we share when we go online, especially on platforms like Facebook which we see as a private exchange with friends . . . This is a whole new area of social interest and books are being written about it.There is also something which I like to call the ‘fallacy of the password paradigm’ . . . The believe that our single username and password will protect out account . . . Even though that data is sitting on corporate organizational databases.
  6. Not surprisingly then, identity theft remains the biggest threat even though it has declined by 2.0 % over the past three years.But while individuals are vulnerable given their propensity to share indiscriminately, the biggest security threats are when companies are hacked.
  7. It is difficult to put a dollar value on these breaches since they often resolve very quickly . . . But as we will get to, there are significant so-called ‘soft’ costs that may be more profound.
  8. Nevertheless, the cost to the companies and, therefore, to consumers because we pay through rising product and service costs, is huge. In the last five years, it is estimated that the cost of security breaches over the last twenty years or so is in the neighbourhood of $22 billion.
  9. Sony Corporation in the last year alone has been the target of hacks and inadvertent data breaches affecting in the range of 26 million customers.The highest profile one was the April 26, 2011 attack on Sony’s PlayStation Network.
  10. How are these breaches made?Most are from hacking . . . Relatively few from social tactics such as the release of secure data over Twitter or Facebook for example92% of incidents were discovered by a third party which means:1 . . . Companies are likely not as rigorous as they should be2 . . . Because they are discovered by third parties it means that they are susceptible to being released through social networks like Twitter . . . The social web can easily find out about data breaches before you do . . . And begin the assault on your organization for its lack of diligence etc.
  11. The impact of these data breaches is not so much the dollar cost . . . But the two-fold consequence of the central place the Internet and the social web have in our lives today:1 . . . The level of trust people have in the organization that is the target of the data breach2 . . . The reputation of the organization among governments, suppliers and customers.
  12. These breaches are seldom hidden anymore and it is often people on social networks who 1 . . . Uncover the breach through the immediate evidence they have of their own accounts being hacked.2 . . . Amplify the news of the breach through the social networks which now connect a billion or so of us
  13. So . . . If your organization is hacked
  14. What do you do:
  15. ACL . . . ACCESS CONTROL LIST … a set of data that informs a computer’s operating system about access permissions.POS … POINT OF SALE . . . But also means Parent Over Shoulder when teens are texing.
  16. What do you do:First is to recognize that how you react on the social web will make a difference to both trustand reputation, which in my view are where the worst damage can be done.Second is to recognize that you can avoid what I call the risk of inaction; in other words, you can prepare your social web response in advance in the same way prepare and practice your crisis communication plans.
  17. When you are faced with a data breach, you should use every social channel at your disposal – as soon as possible – to tell customers about the problem and what they should do.