SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Does Social Media
 Pose a Security
     Threat?
With the use of Facebook, Twitter,
 LinkedIn, and others on the rise, so
   are many new potential security
threats to small to midsize businesses
  working with these sites. As we all
know social media sites can grow our
 SMB’s exposure and generate more
  revenue for the company in some
                cases.
Marketing on social media sites is a
     must for all different types of
 businesses, so shutting down access
to them in the workplace all together
    in order to curb security risks is
               impossible.
However since there are so many new
    cases of accounts on Facebook,
Twitter, and other sites being hacked,
it is extremely easy for a user to click
on a link that a friend posted on their
   wall and cause their computer to
     become infected with a virus.
So now that we know that using social
   media is essential these days for our
SMB to grow, how can SMB owners or IT
      guys protect the security of the
 company? Right now, Wedge Networks
  is beefing up their content inspection
  network to also monitor social media
 and Web application traffic to prevent
      viruses and other security risks
Wedge Networks CEO Hongwen Zhang
says that the “allow-or-block” paradigm
      for social media is extremely
counterproductive in this technological
                   age.
“For SMBs to really have an iron-clad
security grasp–basically, banning social
 media–is simply not possible,” Zhang
          said in an interview.
That’s not to say that companies
  should encourage the use of social
    media in any shape or form. For
example employees shouldn’t be using
   social media to tweet about their
lunch plans on the clock. This of course
should be something that CEOs should
      include in their policies and
          procedures manual.
Wedge Networks new BeSecure
feature will act as an online traffic cop
 for social media sites to try and track
down malware and nip the problem in
the bud. Wedge Networks will monitor
 the things coming in and out of social
   media sites even if it is supposedly
      coming from a safe source.
Think about how much time that is
  going to save you as an IT guy.
    According to an article on
        InformationWeek:
“Rather than categorize sources as
   “good” or “bad,” it takes a look at
      what’s behind it–looking for
  something like a recently injected
    malicious script in an otherwise
    “good” site. Likewise, the device
monitors outbound traffic for sensitive
data; administrators can enact policy-
  based rules that look for particular
 types or formats of information that
           could pose a risk.”
The most difficult aspect of protecting
  your computer from social media
security threats is that each individual
 at a company sets up his or her own
  security settings on their personal
  desktops or laptops, this is why if
   companies choose to use Wedge
Networks services, all computers that
 are a part of your SMB can be easily
              monitored.
While large companies can block social
  media sites across the board, SMB’s
   need the access to these sites for
 exposure and marketing needs across
the board. Check out Wedge Networks
   right here for more information.

Weitere ähnliche Inhalte

Mehr von Black Box Social Media

Mehr von Black Box Social Media (20)

What is facebook premium ads
What is facebook premium adsWhat is facebook premium ads
What is facebook premium ads
 
When to tweet 3 tools for finding your audience on social media
When to tweet 3 tools for finding your audience on social mediaWhen to tweet 3 tools for finding your audience on social media
When to tweet 3 tools for finding your audience on social media
 
Facebook offers share directly with fans
Facebook offers  share directly with fansFacebook offers  share directly with fans
Facebook offers share directly with fans
 
Lesson learned from dan kennedy
Lesson learned from dan kennedyLesson learned from dan kennedy
Lesson learned from dan kennedy
 
What is the new facebook search engine
What is the new facebook search engineWhat is the new facebook search engine
What is the new facebook search engine
 
Using the benefits of facebook timeline for brands to your advantage
Using the benefits of facebook timeline for brands to your advantageUsing the benefits of facebook timeline for brands to your advantage
Using the benefits of facebook timeline for brands to your advantage
 
Social media for sports teams
Social media for sports teamsSocial media for sports teams
Social media for sports teams
 
The value of facebook real time insights
The value of facebook real time insightsThe value of facebook real time insights
The value of facebook real time insights
 
Tips to create a rave with social media marketing world wide
Tips to create a rave with social media marketing world wideTips to create a rave with social media marketing world wide
Tips to create a rave with social media marketing world wide
 
How to get your facebook fan page back if it was disabled by facebook
How to get your facebook fan page back if it was disabled by facebookHow to get your facebook fan page back if it was disabled by facebook
How to get your facebook fan page back if it was disabled by facebook
 
Some useful twitter tips and tricks
Some useful twitter tips and tricksSome useful twitter tips and tricks
Some useful twitter tips and tricks
 
How to market the easy way through social media sites
How to market the easy way through social media sitesHow to market the easy way through social media sites
How to market the easy way through social media sites
 
Instant customer revolution review
Instant customer revolution reviewInstant customer revolution review
Instant customer revolution review
 
Facebook timeline for brands new admin levels
Facebook timeline for brands new admin levelsFacebook timeline for brands new admin levels
Facebook timeline for brands new admin levels
 
Facebook timeline for brands new admin levels
Facebook timeline for brands new admin levelsFacebook timeline for brands new admin levels
Facebook timeline for brands new admin levels
 
Sure fire signs that your website sucks
Sure fire signs that your website sucksSure fire signs that your website sucks
Sure fire signs that your website sucks
 
Guide To Article Marketing: Little Known Secrets To Success
Guide To Article Marketing: Little Known Secrets To SuccessGuide To Article Marketing: Little Known Secrets To Success
Guide To Article Marketing: Little Known Secrets To Success
 
Move over facebook and twitter, google’s new google+ local enhances opportuni...
Move over facebook and twitter, google’s new google+ local enhances opportuni...Move over facebook and twitter, google’s new google+ local enhances opportuni...
Move over facebook and twitter, google’s new google+ local enhances opportuni...
 
Find your niche and the income will follow
Find your niche and the income will followFind your niche and the income will follow
Find your niche and the income will follow
 
10 must have business apps
10 must have business apps10 must have business apps
10 must have business apps
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Does Social Media Pose a Security Threat?

  • 1.
  • 2. Does Social Media Pose a Security Threat?
  • 3. With the use of Facebook, Twitter, LinkedIn, and others on the rise, so are many new potential security threats to small to midsize businesses working with these sites. As we all know social media sites can grow our SMB’s exposure and generate more revenue for the company in some cases.
  • 4. Marketing on social media sites is a must for all different types of businesses, so shutting down access to them in the workplace all together in order to curb security risks is impossible.
  • 5. However since there are so many new cases of accounts on Facebook, Twitter, and other sites being hacked, it is extremely easy for a user to click on a link that a friend posted on their wall and cause their computer to become infected with a virus.
  • 6. So now that we know that using social media is essential these days for our SMB to grow, how can SMB owners or IT guys protect the security of the company? Right now, Wedge Networks is beefing up their content inspection network to also monitor social media and Web application traffic to prevent viruses and other security risks
  • 7. Wedge Networks CEO Hongwen Zhang says that the “allow-or-block” paradigm for social media is extremely counterproductive in this technological age.
  • 8. “For SMBs to really have an iron-clad security grasp–basically, banning social media–is simply not possible,” Zhang said in an interview.
  • 9. That’s not to say that companies should encourage the use of social media in any shape or form. For example employees shouldn’t be using social media to tweet about their lunch plans on the clock. This of course should be something that CEOs should include in their policies and procedures manual.
  • 10. Wedge Networks new BeSecure feature will act as an online traffic cop for social media sites to try and track down malware and nip the problem in the bud. Wedge Networks will monitor the things coming in and out of social media sites even if it is supposedly coming from a safe source.
  • 11. Think about how much time that is going to save you as an IT guy. According to an article on InformationWeek:
  • 12. “Rather than categorize sources as “good” or “bad,” it takes a look at what’s behind it–looking for something like a recently injected malicious script in an otherwise “good” site. Likewise, the device monitors outbound traffic for sensitive data; administrators can enact policy- based rules that look for particular types or formats of information that could pose a risk.”
  • 13. The most difficult aspect of protecting your computer from social media security threats is that each individual at a company sets up his or her own security settings on their personal desktops or laptops, this is why if companies choose to use Wedge Networks services, all computers that are a part of your SMB can be easily monitored.
  • 14. While large companies can block social media sites across the board, SMB’s need the access to these sites for exposure and marketing needs across the board. Check out Wedge Networks right here for more information.