Your SlideShare is downloading. ×
The Holy Grail Of Social Media Privacy
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

The Holy Grail Of Social Media Privacy

3,162
views

Published on

There is no denial to the fact that social media has increased the threat for enterprise using social channels as a way to build reputation and deliver marketing collateral. CIOs and Security Experts …

There is no denial to the fact that social media has increased the threat for enterprise using social channels as a way to build reputation and deliver marketing collateral. CIOs and Security Experts regularly speak about the importance of increased need to secure corporate networks and setting up enterprise-wide guidelines for authorization and use of software and applications in use, including social media platforms. Privacy guidelines play a critical part in enterprise security, providing sound basis for any good security practice because they set the principles.

So, if you are looking to devise a security policy guidelines or are looking for help with your social media management and security, read on this PowerPoint!

Published in: Social Media, Business, Technology

1 Comment
19 Likes
Statistics
Notes
No Downloads
Views
Total Views
3,162
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
24
Comments
1
Likes
19
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. FOR ENTERPRISE
  • 2. All devices (PCs, Laptops, Tablets, etc.) that access social media platforms must be frequently updated for operating system, Apps, Security software and supporting programs such as Java, Adobe and Flash, etc. 1
  • 3. All devices must run a full security suite that offers protection against malware (viruses), phishing filters, spam and potential threats. 2
  • 4. All devices must be password protected to ensure security and avoid unauthorized access. 3
  • 5. All portable devices should have remote tracking and wiping software in place. Sensitive data should be encrypted as well. 4
  • 6. All devices must be scanned completely by the security software at least once a week. 5
  • 7. All devices that are used to store critical data must be backed-up weekly on another computer or devices located at a secure location. 6
  • 8. All devices that are connected to corporate social media accounts must not be allowed to use personal accounts on the same device. Apps and software must be checked for security before installation. 7
  • 9. All email accounts associated with social media channels for authentication or reset must be controlled by the IT Dept. of the organization. 8
  • 10. All social media accounts must integrate two factor authentication. 9
  • 11. All devices must use a password manager and generate complex passwords for each social media account. Passwords should never be written down, only managed using the password manager. 10
  • 12. Enjoy 24/7 password management, secure access, two-factor authentication and more with our easy-to-use and reliable password manager and Single Sign-On (SSO) solution! Sign-Up Now For a Free Trial Follow us: Twitter: @Identacor Facebook: Facebook.com/Identacor Google+: Plus.google.com/+IdentacorSSO