Your SlideShare is downloading. ×
Girls Days 2014 - Cisco Germany - Duesseldorf
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Girls Days 2014 - Cisco Germany - Duesseldorf

683
views

Published on

Cisco ist weltweit der führende Anbieter von Netzwerktechnik für Computernetze. …

Cisco ist weltweit der führende Anbieter von Netzwerktechnik für Computernetze.
Während des Girls'Day werden Blicke in den Arbeitsalltag der Vertriebsmitarbeiter/innen und Systemingenieure/innen ermöglicht. Das Arbeiten in einem internationalen Konzern und der Umgang mit web-basierten Arbeitsmitteln möchten wir am Girls´Day vermitteln.
Wir werden aufzeigen, daß virtuelle Treffen, die Zukunft des Internets und Spaß am Arbeitsplatz kein Widerspruch sind...

Mein Beitrag dazu war wie oben beschrieben "Soziale Medien - Risiken und Nebenwirkungen aus Sicht eines Arbeitgebers" - Auch im 5. Jahr macht das immer noch einen riesen Spass!

Published in: Education

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
683
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • OISIN
  • You only get one chance—once it’s on the web, it’s there for ever! Protect your reputation.
    Everything you post can come back to haunt you. Consider that whenever and whatever you post, the whole world is listening!
    http://searchengineland.com/twitter-can-help-get-jobs-take-them-away-16977
    Some other good items in the IBM guidelines: http://www.ibm.com/blogs/zz/en/guidelines.html
    Be thoughtful about how you present yourself in online social networks.
    Speak in the first person. Use your own voice; bring your own personality to the forefront; say what is on your mind.
    Use a disclaimer.
    Respect your audience and your coworkers.
    Respect copyright and fair use laws.
    Add value.
    Don't pick fights.
    Be the first to respond to your own mistakes.
    Use your best judgment.
  • When utilizing social media tools either as a representative of Cisco, in a personal context where it is made known you are an employee of Cisco, or on a personal level from a Cisco network:
    Do not engage in inflammatory or inappropriate discussions about competitors. Always be professional. Refrain from speaking negatively about competitors. Instead, highlight Cisco’s strengths. Link to competitive guidelines
    Be responsible. Using social media is a personal interaction, not corporate communications. You are personally responsible for the content you provide and how you behave on the social web.
    Be aware of laws covering libel, defamation, insider trading, financial disclosures, endorsements and testimonials, privacy, and the protection of intellectual property.
    Be authentic, factual and respectful at all times. Use your real identity. Provide informed, well-supported opinions and cite sources, if applicable. Though social media sites are a more casual form of communication, be sure to remain professional and use a positive tone of voice. Be respectful of your colleagues, the Company and our competitors.
    Avoid engaging in on-line disputes with your audience. Don't use slurs, personal insults or obscenity, and always respect privacy concerns. Avoid language that may be considered objectionable or inflammatory. Show that you have listened and be responsive. If you disagree, respond in professional and respectful manner.
    Be honest. Always tell the truth. Correct any mistakes you make as quickly as possible. Don’t alter older posts without indicating that you have done so.
    Add value. Express an interesting point of view and worthwhile information and perspective. When speaking about Cisco, offer your subject matter expertise and contact your PR representative if unsure if a topic is appropriate.
    Build relationships. Focus on engagement with the audience and building trust to develop relationships rather than using your site solely as a marketing tool to sell Cisco products.
    Be mindful. Your contributions to community discussions are public and will be public and searchable for a long time. Also, content may inadvertently get posted externally. Be aware of both scenarios. If you think you need counsel regarding a specific situation, contact [email_address].
    Review privacy settings of the social networking site you are using. Choose social sites and appropriate settings depending on content you are posting. Understand that when your content is posted on a public social network, all posts and comments may be traceable. Any information that you post should be considered at risk for public disclosure.
    当以思科的名义来应用社交网络的时候,比如:在文章中体现出你是思科员工或者以思科员工名义出现在社区里面。
     不要加入到关于竞争对手的一些煽动性的或者不适合的言论中去。显得专业些,克制自己不要谈论竞争对手的负面信息。另一方面,显示思科的优势,链接到一些思科比较有竞争性的部分。
    要负责任。应用社会媒体是一种个人行为,不是公司行为。 你要对你自己发表的言论和行为负责。
    要注意法律法规中涵盖的诽谤,诬蔑,内幕交易,财务机密泄露,证书,公章,隐私以及知识产权的保护。
    要总是保持可信赖,实事求是和有礼貌。如果可能的话,提供真实的,有价值的信息,观点,学会引用其他资源。
     避免加入到一些网上的争论中去。不能进行辱骂,人身侮辱或者传播淫秽信息,要经常考虑到隐私权。避免一些可能被认为煽动和反动的言论。显示出你能听取意见,如果不同意,可以以一种专业和有礼貌的态度来回复。
     要诚实。要讲真话,尽快改正你犯的错误。修改别人的言论一定要标明。
     言论要有价值。能够表达你的兴趣点和一些有价值的信息和观念。当涉及思科的时候,要显示出一种专业的态度,如果不知道你的观点是否可以交流,请联系PR部门。
     建立关系网络。在建立关系网的时候,不能一个人的名义应用市场工具来销售思科产品,而要侧重于建立和客户之间的信任关系。
     要小心。你在论坛中的言论是公开的,可以被搜索到的。而且还有可能在不经意中被发布到外网。要留心这两种情况。如果你需要律师请联系:[email_address]
    回顾你应用的社交网络的隐私设置。对于你的言论,有选择的使用网络社区和里面的隐私设置。要知道你在一个公共社区网络里面发表的言论是可以追踪的。你所发表的任何言论都信息泄露的风险。
  • Passwords
    Don’t use the same password for social media sites and other sites. If a criminal gets hold of your password for one site, you don’t want them to gain access to all the others.
    Do not share your password information with others.don’t:
    Share an individual email account with others.
    Share a tool or IT system by sharing the account ID and password within the team
    Share your password with your manager and/or colleague and let them operate tools such as Email.
    Always choose a strong password and change it periodically.
    Contain at least eight alphanumeric characters.
    Contain both upper and lower case letters.
    Contain at least one number (for example, 0-9).
    Contain at least one special character (for example,!$%^&*()_+|~-=`{}[]:";'<>?,/).
    Privacy settings
    Check the privacy settings for your profile and ensure that your posts and information are only accessible by people you trust. Choose appropriate settings depending on what you are posting. Remember that when your content is posted on a public social network, all posts and comments may be traceable and trackable. Any information that you post should be considered at risk for public disclosure.
    密码
    不要在网络社区和其他站点使用相同的密码,否则一旦犯罪分子获取到一个站点的密码,他们就能够访问你所有的站点了。
    不要与任何人共享密码
    不要:
    与任何人共享邮箱帐号
    与TEAM成员共享工具或IT系统的帐号和密码
    共享你的帐号给你的经理和/或同事并让他们操作相应的工具,如邮箱
    选用强密码并定期更改
    包含至少8位字母数字
    2. 包含大小写字符
    3. 至少包含一个数字(例如,0~9)
    4. 至少包含一个特殊字符(例如 !$%^&*()_+|~-=`{}[]:“;‘<>?,/ )
    隐私设置
    检查个人属性的隐私设置并确保你的帖子和信息只被你相信的人获取。所谓‘适当的’设置取决于你所发布的信息。请记住,当你发布信息在公共网络社区,所有的信息和评论都是可追踪的。你也应当考虑到你所发布的信息可能会被公开披露的威胁
  • n this attack, the e-mails looked like legitimate LinkedIn invites with a Web link for confirming a contact. However, the link doesn't lead to LinkedIn; it redirects to a Web page and displays a message saying "Please waiting .... 4 seconds" before then redirecting to Google.
    Computer users are likely to shrug it off, but behind the scenes nasty things have happened. The page users are redirected to has malicious JavaScript hidden in an iFrame that detects what browser is being used and what applications are running and figures out if there is a vulnerability it can exploit to drop the Zeus malware onto the system, Stern said.
    For example, Stern used a test system running an older version of Adobe Reader that has a vulnerability. The attack detected that and used an exploit for that Reader hole and installed Zeus on the machine.
    Read more: http://news.cnet.com/8301-27080_3-20017971-245.html#ixzz16C4peiDI
    linkedIn social eng Tom Gillis
  • Check Cisco’s shortening service
    http://security.thejoshmeister.com/2009/04/how-to-preview-shortened-urls-tinyurl.html
  • Transcript

    • 1. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 Social Media – Do not risk your career!” 27th of March 2014 Christoph Nienhaus IT Leader for EMEAR Central DACH
    • 2. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 2
    • 3. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3Cisco Confidential© 2012 Cisco and/or its affiliates. All rights reserved. 3
    • 4. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
    • 5. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
    • 6. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
    • 7. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
    • 8. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
    • 9. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
    • 10. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
    • 11. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
    • 12. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
    • 13. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
    • 14. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
    • 15. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
    • 16. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
    • 17. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
    • 18. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
    • 19. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
    • 20. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
    • 21. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
    • 22. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
    • 23. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
    • 24. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 The Elephant’s Memory •Once on the net, it is there forever—no replays or erasing. •You simply cannot explain yourself in 140 characters. •Your customers and future employers will probably use your online history for due-diligence on you.
    • 25. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
    • 26. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Social bullying – A double NO GO!!!
    • 27. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
    • 28. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 An elephant never forgets! So why do you think the Internet will ever forget something?
    • 29. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
    • 30. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 • Posting confidential data  Business impact: Corporate data loss • Publishing inappropriate communications  Business impact: Brand reputation • Malware ingress point  Business impact: Productivity loss • Social engineering attacks  Business impact: Corporate data loss
    • 31. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Personal VoicePersonal VoiceCorporate VoiceCorporate Voice
    • 32. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 Abide byAbide by the rulesthe rules You areYou are responsibleresponsible Add valueAdd value Be mindfulBe mindful Be honestBe honest Be respectfulBe respectful Be yourselfBe yourself Social Media Does Not Change Your Personal Compass
    • 33. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Use Different, Strong Passwords Choose Password Hints Carefully Check your Privacy Settings Think before you Link
    • 34. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 1. Pick a phrase you can remember: This is my secret password I use at work. 2. Grab the first letters: T i m s p I u a w 3. Change some letters for numbers: T i m 5 p I u a w 4. Add a punctuation or capitalization: T i m 5 p I u a W ! Password = Tim5pIuaW!This is an example only ! Do not use this one!
    • 35. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
    • 36. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
    • 37. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
    • 38. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 e.g. www.longurl.org
    • 39. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Do you want to have this presentation and a free gift?
    • 40. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
    • 41. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Thank you.

    ×