SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Social Media with an eye on
Security
October 10, 2011
© 2008 Mobile Telephone Networks. All rights reserved.
Refrain
Tell your story
Keep up the conversation
Be safe!
© 2008 Mobile Telephone Networks. All rights reserved.
Background
The rise of social media is inextricably linked with the
revolution in mobile computing, which has spawned a huge
industry in mobile application development.
Today, social media platforms such as Twitter, Facebook and
LinkedIn increasingly are being used by corporate
organisations to engage with customers, manage reputation,
build their brands and communicate information to the rest of
the world.
But social media for Business isn't all about "liking,"
"friending," "up-voting" or "digging." For organizations, there
are real risks to using social media, ranging from damaging
the brand to exposing proprietary information to inviting
lawsuits.
© 2008 Mobile Telephone Networks. All rights reserved.
Background cont’d
No matter what a company does any where else, on
social media the key task is to create a COMMUNITY.
© 2008 Mobile Telephone Networks. All rights reserved.
Refrain
Tell your story
Keep up the conversation
Be safe!
© 2008 Mobile Telephone Networks. All rights reserved.
10 Tips to Build Communities
1. Join a conversation
(Listen before joining)
2. Start a conversation
(Use the Hash tag-#tag- to highlight key words)
3. Crowdsource IT
(Ask questions that develops practical responses and make
content out of the process)
4. Get connected and think about your status but don’t be an
uptweeter
5. Share and care – empathy
6. Personality – you need to have a personality
7 Curate content
(Gather good material/content to share)
© 2008 Mobile Telephone Networks. All rights reserved.
10 Tips to Build Communities cont’d
8. Add value
(links to doc,pdf, pictures, videos others)
9. Strategise
( Think about the tools available to you and how to use them)
10. Pick the right tools for the job – twtpoll, ghtnow.com
© 2008 Mobile Telephone Networks. All rights reserved.
Refrain
Tell your story
Keep up the conversation
Be safe!
© 2008 Mobile Telephone Networks. All rights reserved.
An Eye on Security
We are all aware of the mantra: ‘Safety First’. It is especially
true in cyberspace where ‘There is no LAW”.
So before you use any social networking site, it is invaluable
to understand how they make you vulnerable, and then take
steps to protect yourself and the people you work with.
As a rule: Always make sure you use secure passwords to
access social networks. If anyone else does get into your
account, they are gaining access to a lot of information about
you and about anyone else you are connected to via that
social network. Invariably, it is important, you change
passwords regularly as a matter of routine.
© 2008 Mobile Telephone Networks. All rights reserved.
Security Tips
Make sure you understand the default privacy settings offered by
the social networking site, and how to change them.
Consider using separate accounts/identities, or maybe different
pseudonyms, for different campaigns and activities.
Remember that the key to using a network safely is being
able to trust its members. Separate accounts may be a good
way to ensure that such trust is possible.
Be careful when accessing your social network account in public
internet spaces. Delete your password and browsing history
when using a browser on a public machine. See Chapter 6.
How to destroy sensitive information.
© 2008 Mobile Telephone Networks. All rights reserved.
Security Tips cont’d
• Access social networking sites using https:// to safeguard
your username, password and other information you post.
Using https:// rather than http:// adds another layer of
security by encrypting the traffic from your browser to your
social networking site.
© 2008 Mobile Telephone Networks. All rights reserved.
Refrain
Tell your story
Keep up the conversation
Be safe!
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
Saskia1234
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
Assignment4
Assignment4Assignment4
Assignment4
a1104137
 
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
GWAVA
 

Was ist angesagt? (20)

Cyber bullying
Cyber bullying Cyber bullying
Cyber bullying
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Assignment4
Assignment4Assignment4
Assignment4
 
Misinformation on the internet: Video and AI
Misinformation on the internet: Video and AIMisinformation on the internet: Video and AI
Misinformation on the internet: Video and AI
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
NISO Roundtable Discussion, "Artificial Intelligence #1: Planning for Impleme...
NISO Roundtable Discussion, "Artificial Intelligence #1: Planning for Impleme...NISO Roundtable Discussion, "Artificial Intelligence #1: Planning for Impleme...
NISO Roundtable Discussion, "Artificial Intelligence #1: Planning for Impleme...
 
NISO Roundtable Discussion, Cybersecurity, February 12 2020
NISO Roundtable Discussion, Cybersecurity, February 12 2020NISO Roundtable Discussion, Cybersecurity, February 12 2020
NISO Roundtable Discussion, Cybersecurity, February 12 2020
 
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
GWAVACon - The future of content archiving– E-Mail, Social, Mobil …
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
ADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and GasADIPEC physical and Infosec for Oil and Gas
ADIPEC physical and Infosec for Oil and Gas
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Out in the open protecting your privacy in the digital age
Out in the open  protecting your privacy in the digital ageOut in the open  protecting your privacy in the digital age
Out in the open protecting your privacy in the digital age
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Just Look Around And Ask
Just Look Around And AskJust Look Around And Ask
Just Look Around And Ask
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 

Andere mochten auch

Africas ict infrastructure_building_on_mobilerevolution_2011
Africas ict infrastructure_building_on_mobilerevolution_2011Africas ict infrastructure_building_on_mobilerevolution_2011
Africas ict infrastructure_building_on_mobilerevolution_2011
Elvis Eromosele
 
The rise of social networking
The rise of social networkingThe rise of social networking
The rise of social networking
Elvis Eromosele
 

Andere mochten auch (6)

Africas ict infrastructure_building_on_mobilerevolution_2011
Africas ict infrastructure_building_on_mobilerevolution_2011Africas ict infrastructure_building_on_mobilerevolution_2011
Africas ict infrastructure_building_on_mobilerevolution_2011
 
The rise of social networking
The rise of social networkingThe rise of social networking
The rise of social networking
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Ähnlich wie Social media and security

Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
tecnologico de tuxtepec
 
socialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptxsocialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptx
DipeshYadav59
 
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxCaroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
annandleola
 

Ähnlich wie Social media and security (20)

REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Enabling Social in Financial Services, Meeting Compliance Presentation - BDI ...
Enabling Social in Financial Services, Meeting Compliance Presentation - BDI ...Enabling Social in Financial Services, Meeting Compliance Presentation - BDI ...
Enabling Social in Financial Services, Meeting Compliance Presentation - BDI ...
 
socialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptxsocialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptx
 
The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF The Importance of Privacy and Security at SMWF
The Importance of Privacy and Security at SMWF
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
 
OpenText Social Media
OpenText Social Media OpenText Social Media
OpenText Social Media
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentation
 
INTERNET PRIVACY
INTERNET PRIVACYINTERNET PRIVACY
INTERNET PRIVACY
 
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docxCaroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
Caroline CabralUSEM 102Professor SchachtDecember 10, 2015.docx
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 

Kürzlich hochgeladen

Poster_density_driven_with_fracture_MLMC.pdf
Poster_density_driven_with_fracture_MLMC.pdfPoster_density_driven_with_fracture_MLMC.pdf
Poster_density_driven_with_fracture_MLMC.pdf
Alexander Litvinenko
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
CaitlinCummins3
 

Kürzlich hochgeladen (20)

Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
Chapter 7 Pharmacosy Traditional System of Medicine & Ayurvedic Preparations ...
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
Poster_density_driven_with_fracture_MLMC.pdf
Poster_density_driven_with_fracture_MLMC.pdfPoster_density_driven_with_fracture_MLMC.pdf
Poster_density_driven_with_fracture_MLMC.pdf
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17Features of Video Calls in the Discuss Module in Odoo 17
Features of Video Calls in the Discuss Module in Odoo 17
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
Benefits and Challenges of OER by Shweta Babel.pptx
Benefits and Challenges of OER by Shweta Babel.pptxBenefits and Challenges of OER by Shweta Babel.pptx
Benefits and Challenges of OER by Shweta Babel.pptx
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 

Social media and security

  • 1. Social Media with an eye on Security October 10, 2011
  • 2. © 2008 Mobile Telephone Networks. All rights reserved. Refrain Tell your story Keep up the conversation Be safe!
  • 3. © 2008 Mobile Telephone Networks. All rights reserved. Background The rise of social media is inextricably linked with the revolution in mobile computing, which has spawned a huge industry in mobile application development. Today, social media platforms such as Twitter, Facebook and LinkedIn increasingly are being used by corporate organisations to engage with customers, manage reputation, build their brands and communicate information to the rest of the world. But social media for Business isn't all about "liking," "friending," "up-voting" or "digging." For organizations, there are real risks to using social media, ranging from damaging the brand to exposing proprietary information to inviting lawsuits.
  • 4. © 2008 Mobile Telephone Networks. All rights reserved. Background cont’d No matter what a company does any where else, on social media the key task is to create a COMMUNITY.
  • 5. © 2008 Mobile Telephone Networks. All rights reserved. Refrain Tell your story Keep up the conversation Be safe!
  • 6. © 2008 Mobile Telephone Networks. All rights reserved. 10 Tips to Build Communities 1. Join a conversation (Listen before joining) 2. Start a conversation (Use the Hash tag-#tag- to highlight key words) 3. Crowdsource IT (Ask questions that develops practical responses and make content out of the process) 4. Get connected and think about your status but don’t be an uptweeter 5. Share and care – empathy 6. Personality – you need to have a personality 7 Curate content (Gather good material/content to share)
  • 7. © 2008 Mobile Telephone Networks. All rights reserved. 10 Tips to Build Communities cont’d 8. Add value (links to doc,pdf, pictures, videos others) 9. Strategise ( Think about the tools available to you and how to use them) 10. Pick the right tools for the job – twtpoll, ghtnow.com
  • 8. © 2008 Mobile Telephone Networks. All rights reserved. Refrain Tell your story Keep up the conversation Be safe!
  • 9. © 2008 Mobile Telephone Networks. All rights reserved. An Eye on Security We are all aware of the mantra: ‘Safety First’. It is especially true in cyberspace where ‘There is no LAW”. So before you use any social networking site, it is invaluable to understand how they make you vulnerable, and then take steps to protect yourself and the people you work with. As a rule: Always make sure you use secure passwords to access social networks. If anyone else does get into your account, they are gaining access to a lot of information about you and about anyone else you are connected to via that social network. Invariably, it is important, you change passwords regularly as a matter of routine.
  • 10. © 2008 Mobile Telephone Networks. All rights reserved. Security Tips Make sure you understand the default privacy settings offered by the social networking site, and how to change them. Consider using separate accounts/identities, or maybe different pseudonyms, for different campaigns and activities. Remember that the key to using a network safely is being able to trust its members. Separate accounts may be a good way to ensure that such trust is possible. Be careful when accessing your social network account in public internet spaces. Delete your password and browsing history when using a browser on a public machine. See Chapter 6. How to destroy sensitive information.
  • 11. © 2008 Mobile Telephone Networks. All rights reserved. Security Tips cont’d • Access social networking sites using https:// to safeguard your username, password and other information you post. Using https:// rather than http:// adds another layer of security by encrypting the traffic from your browser to your social networking site.
  • 12. © 2008 Mobile Telephone Networks. All rights reserved. Refrain Tell your story Keep up the conversation Be safe!