SlideShare ist ein Scribd-Unternehmen logo
1 von 30
What is social media?
any electronic platform that allows two way communication or other interaction with content
blogs microblogs message boards & forums photo & video sharing Audio & video podcasts social bookmarking social networks reviews
In one way or another, nearly everyone will be in social media in 2009.
 
Why should organizations be on social media?  We all trust our peers more than any other source. And the tools to share opinions are free, lightweight and ubiquitous.
I use social media – primarily blogs, podcast, Twitter, Facebook and LinkedIn…
 
… along with wikis, blogs, feeds, videos and microsharing behind the firewall at TechTarget. But that’s  “Enterprise 2.0”  – not Web 2.0.
“ Enterprise 2.0 is the use of emergent social software platforms by organizations in pursuit of their goals.” -Professor Andrew McAfee, MIT
Enterprise 2.0 implementations generally use a combination of social software and collaborative technologies
Enterprise social computing includes: blogs ,  RSS ,  social bookmarking ,  social networking  and  wikis .
Case studies for successful enterprise social computing include private industry, like Booz-Allen Hamilton and Lockheed Martin,  …and now government, like Intellipedia and A-Space. Or MyBarackObama.com.
How do Web 2.0 and enterprise 2.0 work together?
So let’s call it  “enterprise social computing” …and drop the 2.0.
Most public entities need to be on Facebook and at least monitor Twitter and LinkedIn.
Employees can & will use smartphones to update them in real-time.
In a recent survey by Russell Herder, fewer than one-third of 438 respondents said their organization had a policy in place governing social media use.
Only 10% of the companies surveyed indicated that they had conducted employee training on such use.
And yet Web applications are at the top of security threats to the enterprise.
Is it any wonder that 80% of the executives surveyed said they are fearful of  social networking  risks?
That said… …many organizations  will  allow some form of social computing for collaboration.  Workers are already bringing the tools to work from home when sysadmins don’t provide better versions.
And whether it’s Web 2.0 or enterprise social computing… regulatory compliance means relevant  social messaging will need to be logged and audited for e-discovery.
Facebook is already “discoverable” in Canada.
For those that collaborate most effectively internally and externally, there appear to be major rewards.  Research from MIT’s Andrew McAfee indicates that those who use it best – and safely – reap significant competitive benefits
Best bets to adapt?
Sandboxes  can help with security That’s how the White House addressed the issue – at first. Defense contractors complying with “transparency directives” may proceed similarly.
Social media policies  are key.   IBM’s social computing guidelines  are a gold standard.
And emphasizing  common sense  &  education  for employees about security risks is essential. Phishing, XSS and worms are on the rise.
You can find me at  [email_address] @digiphile or @ITcompliance

Weitere ähnliche Inhalte

Was ist angesagt?

Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
Louise Spiteri
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
Stites & Harbison
 
2009 X Force Treath And Risk Wwiscop
2009 X Force Treath And Risk  Wwiscop2009 X Force Treath And Risk  Wwiscop
2009 X Force Treath And Risk Wwiscop
Juan Carlos Carrillo
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
IJECEIAES
 

Was ist angesagt? (19)

Behaviour Change and Cyber-Security
Behaviour Change and Cyber-SecurityBehaviour Change and Cyber-Security
Behaviour Change and Cyber-Security
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
Trends Affecting the Future of Cybersecurity
Trends Affecting the Future of CybersecurityTrends Affecting the Future of Cybersecurity
Trends Affecting the Future of Cybersecurity
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Open Government and Social Media
Open Government and Social MediaOpen Government and Social Media
Open Government and Social Media
 
Social Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand ProtectionSocial Media Compliance: Imperative for Brand Protection
Social Media Compliance: Imperative for Brand Protection
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Naked Security
Naked SecurityNaked Security
Naked Security
 
Social Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIASocial Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIA
 
Risks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparencyRisks and opportunities for using social media for government transparency
Risks and opportunities for using social media for government transparency
 
20th March Session Six by Raja Lakshmipathy
20th March Session Six by Raja Lakshmipathy20th March Session Six by Raja Lakshmipathy
20th March Session Six by Raja Lakshmipathy
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
 
Essay 2 IE Business School
Essay 2 IE Business SchoolEssay 2 IE Business School
Essay 2 IE Business School
 
ASSIGNMENT Jan-2019 MS-54 Management Information Systems
ASSIGNMENT Jan-2019  MS-54   Management Information SystemsASSIGNMENT Jan-2019  MS-54   Management Information Systems
ASSIGNMENT Jan-2019 MS-54 Management Information Systems
 
2009 X Force Treath And Risk Wwiscop
2009 X Force Treath And Risk  Wwiscop2009 X Force Treath And Risk  Wwiscop
2009 X Force Treath And Risk Wwiscop
 
Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...Security techniques for intelligent spam sensing and anomaly detection in onl...
Security techniques for intelligent spam sensing and anomaly detection in onl...
 
Gr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and UseGr 3 Societal Issues of Information System Design and Use
Gr 3 Societal Issues of Information System Design and Use
 
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...Webinar - Security 2.0: A new way to deal with today’s security challenges in...
Webinar - Security 2.0: A new way to deal with today’s security challenges in...
 

Ähnlich wie Social Media and Identity

On The Business of social media
On The Business of social media On The Business of social media
On The Business of social media
Doug Winfield
 
Case 18Social Networking and Social ResponsibilityThe Beginn.docx
Case 18Social Networking and Social ResponsibilityThe Beginn.docxCase 18Social Networking and Social ResponsibilityThe Beginn.docx
Case 18Social Networking and Social ResponsibilityThe Beginn.docx
annandleola
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
Cindy Kim
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
Josh Stein
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
Louise Spiteri
 
253 By Dr. Patricia Franks and Robert Smallwood .docx
253   By Dr. Patricia Franks and Robert Smallwood   .docx253   By Dr. Patricia Franks and Robert Smallwood   .docx
253 By Dr. Patricia Franks and Robert Smallwood .docx
lorainedeserre
 

Ähnlich wie Social Media and Identity (20)

Micro Blogging In The Enterprise Final
Micro Blogging In The Enterprise FinalMicro Blogging In The Enterprise Final
Micro Blogging In The Enterprise Final
 
On The Business of social media
On The Business of social media On The Business of social media
On The Business of social media
 
Huddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media toolsHuddle Webinar - Engaging your workforce with social media tools
Huddle Webinar - Engaging your workforce with social media tools
 
GfWM Position Paper Knowledge Management and Enterprise 2.0
GfWM Position Paper Knowledge Management and Enterprise 2.0GfWM Position Paper Knowledge Management and Enterprise 2.0
GfWM Position Paper Knowledge Management and Enterprise 2.0
 
Case 18Social Networking and Social ResponsibilityThe Beginn.docx
Case 18Social Networking and Social ResponsibilityThe Beginn.docxCase 18Social Networking and Social ResponsibilityThe Beginn.docx
Case 18Social Networking and Social ResponsibilityThe Beginn.docx
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
What Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTWWhat Is Enterprise 2.0 - From WTF To FTW
What Is Enterprise 2.0 - From WTF To FTW
 
Protecting Against Web Threats
Protecting Against Web ThreatsProtecting Against Web Threats
Protecting Against Web Threats
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
 
Defense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticleDefense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 Article
 
A Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at QualcommA Case Study of Micro-Blogging for Learning at Qualcomm
A Case Study of Micro-Blogging for Learning at Qualcomm
 
Fyronic seminar at Nehra
Fyronic seminar at NehraFyronic seminar at Nehra
Fyronic seminar at Nehra
 
Overview of Web 2.0 in the Government
Overview of Web 2.0 in the GovernmentOverview of Web 2.0 in the Government
Overview of Web 2.0 in the Government
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social Technologies
 
253 By Dr. Patricia Franks and Robert Smallwood .docx
253   By Dr. Patricia Franks and Robert Smallwood   .docx253   By Dr. Patricia Franks and Robert Smallwood   .docx
253 By Dr. Patricia Franks and Robert Smallwood .docx
 

Mehr von Alexander Howard

Data journalism in the second machine age
Data journalism in the second machine ageData journalism in the second machine age
Data journalism in the second machine age
Alexander Howard
 
NICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalismNICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalism
Alexander Howard
 
Slides on App Contests & Challenges for EPA Webinar
Slides on App Contests & Challenges for EPA WebinarSlides on App Contests & Challenges for EPA Webinar
Slides on App Contests & Challenges for EPA Webinar
Alexander Howard
 
Making open government data sing
Making open government data singMaking open government data sing
Making open government data sing
Alexander Howard
 

Mehr von Alexander Howard (20)

Collab Space DC Open Data
Collab Space DC Open DataCollab Space DC Open Data
Collab Space DC Open Data
 
Towards a More Open World
Towards a More Open WorldTowards a More Open World
Towards a More Open World
 
The art and science of data-driven journalism
The art and science of data-driven journalism The art and science of data-driven journalism
The art and science of data-driven journalism
 
Data journalism in the second machine age
Data journalism in the second machine ageData journalism in the second machine age
Data journalism in the second machine age
 
Data journalism Overview
Data journalism OverviewData journalism Overview
Data journalism Overview
 
Media and Citizen Power: Open Africa Summit
Media and Citizen Power: Open Africa SummitMedia and Citizen Power: Open Africa Summit
Media and Citizen Power: Open Africa Summit
 
Open data journalism
Open data journalismOpen data journalism
Open data journalism
 
Moldova Open Data Journalism Workshop
Moldova Open Data Journalism WorkshopMoldova Open Data Journalism Workshop
Moldova Open Data Journalism Workshop
 
Big data, a city of things and civic innovation
Big data, a city of things and civic innovationBig data, a city of things and civic innovation
Big data, a city of things and civic innovation
 
NICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalismNICAR: Open government, Gov 2.0 and open data journalism
NICAR: Open government, Gov 2.0 and open data journalism
 
Open innovation in governance
Open innovation in governanceOpen innovation in governance
Open innovation in governance
 
Social media past, present and future
Social media past, present and futureSocial media past, present and future
Social media past, present and future
 
Open Data Journalism
Open Data JournalismOpen Data Journalism
Open Data Journalism
 
Frbny social media-rfp
Frbny social media-rfpFrbny social media-rfp
Frbny social media-rfp
 
Opening Government
Opening GovernmentOpening Government
Opening Government
 
Slides on App Contests & Challenges for EPA Webinar
Slides on App Contests & Challenges for EPA WebinarSlides on App Contests & Challenges for EPA Webinar
Slides on App Contests & Challenges for EPA Webinar
 
Making open government data sing
Making open government data singMaking open government data sing
Making open government data sing
 
Value proposition of open government data
Value proposition of open government dataValue proposition of open government data
Value proposition of open government data
 
Goscon 2010
Goscon 2010Goscon 2010
Goscon 2010
 
Fedtalks Presentation: Chris C. Kemp, NASA CTO
Fedtalks Presentation: Chris C. Kemp, NASA CTOFedtalks Presentation: Chris C. Kemp, NASA CTO
Fedtalks Presentation: Chris C. Kemp, NASA CTO
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Social Media and Identity

  • 1. What is social media?
  • 2. any electronic platform that allows two way communication or other interaction with content
  • 3. blogs microblogs message boards & forums photo & video sharing Audio & video podcasts social bookmarking social networks reviews
  • 4. In one way or another, nearly everyone will be in social media in 2009.
  • 5.  
  • 6. Why should organizations be on social media? We all trust our peers more than any other source. And the tools to share opinions are free, lightweight and ubiquitous.
  • 7. I use social media – primarily blogs, podcast, Twitter, Facebook and LinkedIn…
  • 8.  
  • 9. … along with wikis, blogs, feeds, videos and microsharing behind the firewall at TechTarget. But that’s “Enterprise 2.0” – not Web 2.0.
  • 10. “ Enterprise 2.0 is the use of emergent social software platforms by organizations in pursuit of their goals.” -Professor Andrew McAfee, MIT
  • 11. Enterprise 2.0 implementations generally use a combination of social software and collaborative technologies
  • 12. Enterprise social computing includes: blogs , RSS , social bookmarking , social networking and wikis .
  • 13. Case studies for successful enterprise social computing include private industry, like Booz-Allen Hamilton and Lockheed Martin, …and now government, like Intellipedia and A-Space. Or MyBarackObama.com.
  • 14. How do Web 2.0 and enterprise 2.0 work together?
  • 15. So let’s call it “enterprise social computing” …and drop the 2.0.
  • 16. Most public entities need to be on Facebook and at least monitor Twitter and LinkedIn.
  • 17. Employees can & will use smartphones to update them in real-time.
  • 18. In a recent survey by Russell Herder, fewer than one-third of 438 respondents said their organization had a policy in place governing social media use.
  • 19. Only 10% of the companies surveyed indicated that they had conducted employee training on such use.
  • 20. And yet Web applications are at the top of security threats to the enterprise.
  • 21. Is it any wonder that 80% of the executives surveyed said they are fearful of social networking risks?
  • 22. That said… …many organizations will allow some form of social computing for collaboration. Workers are already bringing the tools to work from home when sysadmins don’t provide better versions.
  • 23. And whether it’s Web 2.0 or enterprise social computing… regulatory compliance means relevant social messaging will need to be logged and audited for e-discovery.
  • 24. Facebook is already “discoverable” in Canada.
  • 25. For those that collaborate most effectively internally and externally, there appear to be major rewards. Research from MIT’s Andrew McAfee indicates that those who use it best – and safely – reap significant competitive benefits
  • 26. Best bets to adapt?
  • 27. Sandboxes can help with security That’s how the White House addressed the issue – at first. Defense contractors complying with “transparency directives” may proceed similarly.
  • 28. Social media policies are key. IBM’s social computing guidelines are a gold standard.
  • 29. And emphasizing common sense & education for employees about security risks is essential. Phishing, XSS and worms are on the rise.
  • 30. You can find me at [email_address] @digiphile or @ITcompliance