Social Network Privacy, Security and Reputation Management.
What are the threats on social networks?
How can you help your customers manage their online identity?
3. Risks:
• Increased occurrence rate of identity theft
• Social Engineering/Phishing
• SPAM
• Hacked accounts
Risks:
• Cyber bullying
• Sexual Predators
• Reputation damaging posts and photos
• Lost privacy over sharing of location data
3
A Typical Online Family
4. • Over half of adolescents have been bullied online.1
• 20% of children on social networks have been approached by
a stranger in a sexual nature.2
• Malicious Facebook “apps” are designed to lure children to
give access to their personal data, making them more
exposed to identity theft and privacy invasion.
4
1. i-Safe America Foundation – Cyber bullying statistics.
2. Crimes Against Children Research Center.
Growing online threats for children
5. 35% of college admissions officers
report finding something on an applicant’s social network page
that negatively impacted their admissions chances.*
*Kaplan’s 2012 Prep Test Survey
6. 68% of employers have turned down a job candidate based on
negative information found on social network sites.
8. LinkedIn users are
106%more likely to be a victim of identity fraud…
and social media users who check-in using GPS are
67% more likely.
9. One Platform
One API
One Partner
Social Network Security
Reputation Management
Internet Privacy
Cyber bullying detection
Identity Theft Prevention
Personal Data Discovery and Control
Identity:One
10. • Child Social Network Protection
– Cyber bullying and sexual predator detection
• Adult Social Network Management
– Monitor Reputation, Privacy, Security
• Social Language Analysis
– Proprietary Social Network Threat Detection
– Language analysis designed for social media
The Identity:One Platform
11. • Consolidated view of all social activity
– Photos, Posts, Tweets
– See privacy settings on a per-post level
• Reputation Management
– See how you look to others
– Alerting to potential privacy infringements
• Identity Protection
– Prevent Identity Leakage and Theft
– Locate Personally Identifiable Information
Customer Benefits
12. Alert and Action
• Notify and alert users of
potential threats
• Remove social activity and
photos
Analyze
• Scan social network
profiles and activities for
potential threats.
Monitor
• Ongoing Monitoring
of Social Networks.
How it Works
13. Privacy & Profile Alerts
Privacy Alerts
Phone # Exposed
Email Address Exposed
Address Exposed
Date of Birth Exposed
Employer & Length of Employment Exposed
Current Position Exposed
IM Account Exposed
Hometown Found
Location data found in social content items
Privacy Settings of Posts and Photos
Content Related Alerts
Alcohol & Drug Related
Profanity and Vulgarity
SPAM
Bullying and Threats
Grooming (actions deliberately undertaken with the aim of
befriending and establishing an emotional connection with a
child, to lower the child's inhibitions in preparation for sexual
activity with the child, or exploitation.)
Sexual in Nature
Harm or other Abuse
Bigotry-Racism
Weapons
14. End User Actions
Remove Photos, Posts, Comments
Block Users
Unfollow
Expert Tips and Resources
15. Developer Friendly
Rapid development
• build and launch products in 6-8 weeks.
Create your own user experience
• choose what features and alerts to integrate
16. Build Your
Own Apps
Core
Platform
Privacy &
Security
Monitoring
The Identity:One Platform
Social Network Authentication Data Normalization Content Filtering
Alerts Customer Analytics
API for Partner Application Development
Behavioral Analysis
Identity Risk
Analysis
Lead Acquisition
& Customer
Insight
Custom
18. • Social data is living and breathing
– Send periodic summary emails recapping information that
you’ve monitored on their behalf:
“Hi Mary, just wanted to let you know that last month we scanned over
1,200 posts and comments in your social networks. Great news, we
detected no threats. Also, we know that you’re a busy professional and
mom, so we thought you might enjoy these quick tips on...”
• Become a Trusted Advisor
– Use their social profile information to create targeted and value
added advice and insight to your customers.
Create Meaningful Customer Experiences
20. • Provide website visitors a free social identity risk
assessment.
• Social Authentication can increase web sign-ups by up
to 90%1
• Build Trust. Build Your Sales Funnel.
Connect with more customers and prospects
1: Source, Gigya.com
21. • Demonstrate Immediate Value to Customer
– Low Cost to You, High Value to Customer = AWESOME
• Personalized Awareness of a Person’s Risk for ID theft.
– Give them a reason to take the next step.
• Create Your Own Variations
– Customize your assessment or Freemium offer to best position your
existing product offer.
– I.E. – if you know they’re a parent of a young teen, position Cyber
Bullying prevention.
Identity Risk Assessment [Freemium]
Privacy settings on social networks tend to be confusing and many users don’t realize that they are exposing personal photos or that they’re being tagged in photos that can be made public.
A widely publicized event involved Randi Zuckerberg, Mark Zuckerberg’s sister, in which she posted a photo a family photo to Facebook that inadvertently got shared publically across Facebook and Twitter.