Social Media
&
Security @brianhonan
Who Am I?
@brianhonan
What
is
Social Media?
Websites and applications that
enable users to create and share
content or to participate in social
networking.
- Oxford E...
Forms of electronic communication
(as Web sites for social networking
and microblogging) through which
users create online...
“A group of Internet-based
applications that build on the
ideological and technological
foundations of Web 2.0, and that
a...
Courtesy of Instantcheckmate.com
Government Official Sacked
Forgot Boss was Facebook Friend
Posting They Are Not at Home
Yes, 53%
No, 47%
Courtesy of Legal & General Group PLC
Yes, 60%
No, 40%
Post About Nights Out
Courtesy of Legal & General Group PLC
Shared Images of Expensive Items
Yes, 24%
No, 76%
Courtesy of Legal & General Group PLC
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Social Media Scams
Competition Winners ??
Click on This Link …
Twitter Threats
Koobface
Courtesy TrendMicro
Zeus?
Do You Trust That App?
CourtesyofBitrebels.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Anthony Stancl
Secure Passwords?
Common Passwords
Password Reset
My Name is Marie
How Did I Steal Her ID?
Corporate Issues
Password Reuse
81%
61%
19%
39%
0% 20% 40% 60% 80% 100%
IT Pros
General
Courtesy Darkreading.com & welivesecurity.com
Social Media Treasure Trove
The Gift That Keeps on Giving
Social Engineering
Emily Williams & Robin Page
http://www.thesecurityblogger.com/?p=1903
Misinformation
Manipulation?
How To Defend
Establish Policies
Awareness
Be Careful
What You
Share
Update Privacy Settings
Twitterfall
Handling Security Breaches
Bad News
 Use All Channels.
 Use Social Media to Direct
People to More Information
 Update Regularly (Timezones,
etc.)
 Keep We...
Monitor & Respond
Brian.honan@bhconsulting.ie
@brianhonan
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
Upcoming SlideShare
Loading in...5
×

How to Like Social Media Network Security

1,555

Published on

This is my presentation from Source Dublin 2014 on cyber crime and social media.

Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.

Published in: Technology, Business
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,555
On Slideshare
0
From Embeds
0
Number of Embeds
10
Actions
Shares
0
Downloads
10
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

How to Like Social Media Network Security

  1. 1. Social Media & Security @brianhonan
  2. 2. Who Am I?
  3. 3. @brianhonan
  4. 4. What is Social Media?
  5. 5. Websites and applications that enable users to create and share content or to participate in social networking. - Oxford English Dictionary
  6. 6. Forms of electronic communication (as Web sites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (as videos) . - Mirriam-Webster Dictionary
  7. 7. “A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content." - Wikipedia
  8. 8. Courtesy of Instantcheckmate.com
  9. 9. Government Official Sacked
  10. 10. Forgot Boss was Facebook Friend
  11. 11. Posting They Are Not at Home Yes, 53% No, 47% Courtesy of Legal & General Group PLC
  12. 12. Yes, 60% No, 40% Post About Nights Out Courtesy of Legal & General Group PLC
  13. 13. Shared Images of Expensive Items Yes, 24% No, 76% Courtesy of Legal & General Group PLC
  14. 14. Courtesy of Instantcheckmate.com
  15. 15. Courtesy of Instantcheckmate.com
  16. 16. Social Media Scams
  17. 17. Competition Winners ??
  18. 18. Click on This Link …
  19. 19. Twitter Threats
  20. 20. Koobface Courtesy TrendMicro
  21. 21. Zeus?
  22. 22. Do You Trust That App?
  23. 23. CourtesyofBitrebels.com
  24. 24. Courtesy of Instantcheckmate.com
  25. 25. Courtesy of Instantcheckmate.com
  26. 26. Courtesy of Instantcheckmate.com
  27. 27. Anthony Stancl
  28. 28. Secure Passwords?
  29. 29. Common Passwords
  30. 30. Password Reset
  31. 31. My Name is Marie
  32. 32. How Did I Steal Her ID?
  33. 33. Corporate Issues
  34. 34. Password Reuse 81% 61% 19% 39% 0% 20% 40% 60% 80% 100% IT Pros General Courtesy Darkreading.com & welivesecurity.com
  35. 35. Social Media Treasure Trove
  36. 36. The Gift That Keeps on Giving
  37. 37. Social Engineering Emily Williams & Robin Page http://www.thesecurityblogger.com/?p=1903
  38. 38. Misinformation
  39. 39. Manipulation?
  40. 40. How To Defend
  41. 41. Establish Policies
  42. 42. Awareness
  43. 43. Be Careful What You Share
  44. 44. Update Privacy Settings
  45. 45. Twitterfall
  46. 46. Handling Security Breaches
  47. 47. Bad News
  48. 48.  Use All Channels.  Use Social Media to Direct People to More Information  Update Regularly (Timezones, etc.)  Keep Webpage Updated  Have Staff Trained  Trust Employees  Get Senior Representative to Talk Early and Often  Engage With Others Use Social Media in IR
  49. 49. Monitor & Respond
  50. 50. Brian.honan@bhconsulting.ie @brianhonan
  1. Gostou de algum slide específico?

    Recortar slides é uma maneira fácil de colecionar informações para acessar mais tarde.

×