• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Social media threats and risks: corporate espionage
 

Social media threats and risks: corporate espionage

on

  • 590 views

Presentation of social media threat: corporate espionage

Presentation of social media threat: corporate espionage

Statistics

Views

Total Views
590
Views on SlideShare
590
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Social media threats and risks: corporate espionage Social media threats and risks: corporate espionage Presentation Transcript

    • By Maria Thanbichler Social Media in Marketing MAR8PO067-2
    • 1. General definition 2. Areas of espionage 3. Way to access information 4. How avoid/prevent / overcome 5. Conclusion
    •  Corporate espionage is the process of illegally and unethically obtaining confidential information from other companies to be able to gain a competitive advantage  It is most commonly associated with technology-heavy industries, biotechnology, aerospace, teleco mmunications, transportation and engine technology, automobiles, energy
    • The espionage take place in the following areas of a company:  Ideas (products)  Techniques (software, hardware)  Processes  Recipes  Formulas
    • The espionage take place in the following areas of a company:  Customer  Pricing  Sales  Marketing  Strategies datasets
    •  Hacking systems  Social engineering (tricking of a person into revealing their  Dumpster Diving (refers to using various methods to get  Whacking (wireless hacking)  Phone Ease Dropping (listen secretly to the private  Observe/espionage the employees password or other valuable corporate information) information about a technology user; it involves searching through trash or garbage looking for something useful) conversation of others)
    •  Encrypting data/emails/hard desk  Use a firewall  Installation of anti-virus and password security software  Catch up on new or possible employees  Workshops for employees how to deal with critical data at work/ in home office / at a business travel
    • The protection of data in social media networks of a company should be ranked on the first, because otherwise competitors / other nations can steal the ideas. That could lead to a large loss of profit. But on the other hand, nowadays it is important to present your company in social media networks to be available for a lot of people.
    •  http://lexicon.ft.com/Term?term=industrial- espionage  http://faculty.usfsp.edu/gkearns/Articles_Fr aud/corporate%20espionage.pdf