Social Media is Okay - Jeopardizing Security Isn't
Upcoming SlideShare
Loading in...5

Social Media is Okay - Jeopardizing Security Isn't



In a world of hackers, phishers, scammers, and Nigerian Princes, how do you keep yourself and your clients safe, while investing time and energy (and not to forget, money) into Social Media....

In a world of hackers, phishers, scammers, and Nigerian Princes, how do you keep yourself and your clients safe, while investing time and energy (and not to forget, money) into Social Media.

An objective look at social media risks and benefits.



Total Views
Views on SlideShare
Embed Views



4 Embeds 399 393 4 1 1



Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Social Media is Okay - Jeopardizing Security Isn't Social Media is Okay - Jeopardizing Security Isn't Presentation Transcript

  • Social mediais okay —jeopardizingsecurity isn’t
  • I am Jordan WollmanExecutive Creative Director & Partner @ Aria
  • I’m 28years old(although my wifemay beg to differ) View slide
  • I’m married to a fantasticphotographer: Briana View slide
  • I have aone-monthold daughter:Remy
  • I generally talk about design, marketing, social media, music and movies
  • I have 357 followers on Twitter, 401 friends on Facebook, and 241connections on LinkedIn
  • I love Star WarsSome people call me Jedi Master
  • I am a Husband, Father, Advertiser, Avid snowboarder, Wine enthusiast,Social media navigator.
  • You can find me on Twitter, Facebook, LinkedIn, Google+, Behance,, Wordpress, projeqt, Virb, Spotify, Vimeo, YouTube,, Pandora, Delicious, Tumblr, Flickr, Gowalla, Foursquare, Klout, ...
  • All that information,and a lot more, you can find onFacebook
  • A digital agency — we design theexperience of brands.
  • We design the experience of brands...In one of many ways, online and through social media
  • Ihere? am o, whyS Let’s talk Social Media
  • Why should you careabout Social Media?
  • In 2011 110 billionminutes werespent on social networks & blogs [Source: Nielsen]
  • In 2011 has 500 million users.That’s 1 in every 13 people on earth.
  • In 201155 milliontweets are published each day
  • In 2011300,000users joineach day
  • In 2011exceeds2 billion viewseach day
  • In 2011 On the professional side, has over 100million usersworld wide
  • In 2011 On the professional side, And a new user joinsevery second of the day
  • Those areyour clients...And they’re talkingabout you.
  • It’s about thedisproportionate power of 1 says my true reach is 270
  • Yeah. Yeah. Yeah.But is it safe?
  • In a lot of ways, yes.In others...?
  • It’s the wild, wild west.The rules are beingwritten in real-time.
  • Two sides to the safety coin:1) Your personal safety2) Your client’s safety
  • thenOkay Let’s look at a few case studies
  • @PrincessTweepasks to be robbed,and gets... robbed
  • “Well, I was ‘checking in’ on Foursquare all overtown today. I know it’s risky — but I lost one ofmy mayorships last week and I’m not going to let that happen again.” said Tweep.
  • “A new website called PleaseRobMe.comdoes nothing more than aggregate publiclyshared check-ins, but its name and purposeattempt to shed more light on the dangerous side effects of location-sharing.” via
  • “Many of us location-sharers get so caught up in the novelty and bonuses associated with our behavior that we forget the implications of our actions.” via
  • “Some law enforcement agencies are referring to check-ins as recent empty homes” via
  • ✓ Foursquare ✓Tools you ✓ Gowalla Looptwillingly ✓ ✓ Google Buzz Google+check in with ✓ Facebook ✓ Twitter
  • ✓ Transit swipe-cards ✓Things that ✓ Swipe cards for doors Electronic tolling (TollTag)track your ✓ ✓ Cellphones Location searches onlocation your PDA ✓ Free Wi-Fipassively ✓ Parking meters you call to add money [Source:]
  • Creepy: cree.pyis an application that allows youto gather geolocation relatedinformation about users fromsocial networking platformsand image hosting services.
  • Hackers hacking July, 2011: AntiSec claimed credit for theBooz Allen hack. It published a list of 90,000military e-mail addresses, apparently stolen from Booz Allens systems. via
  • London fights back at RIM August, 2011: In the wake of ongoing riots in London, Blackberry maker Research in Motion’s website was hacked on Tuesday. via
  • London fights back at RIM“No Blackberry you will NOT assist the police,” wrote one hacker on a Research in Motion blog”
  • Social networking sites leak personal information ...a new study has found, raising the possibility that users of such sites can be tracked everywhere they go online via
  • Social networking sites leak personal informationThe study looked at twelve social networking sites: Bebo, Digg, Facebook, Friendster, Hi5, Imeem, LinkedIn, LiveJournal, MySpace, Orkut, Twitter, and Xanga via
  • Social networking sites leak personal information "Not only do they know where Im visiting, they know who I am," said Wills. "And thats disconcerting." via
  • Social networking sites leak personal information The report found that between 55% and 90% of users keep the default privacy settings via
  • Can it be dangerous? Yes.But the time is now!
  • Keepingyourself safe
  • PrivacySettingsGet to know who can andcan’t see your information
  • it e t!, e i s e n ar y a h Privacy c s e n th SettingsIf y ca theGet to know who can and can’t see your information
  • Photo by Jennifer Daniel Only friend friends It’s not a popularity contest Facebook will cap you at 5,001 anyway
  • Checking-in is okay... But do it as you leave, not as you arrive
  • Don’t check-in at home And don’t let your friends do it either
  • Frank Annie Photo-tagging Is generally associated with Geo-Tagging
  • Keeping your clients safe
  • Have a plan Know the dangers & pitfalls before you start out
  • State your termsof use clearlyAnd report violatorsto Facebook, Twitter,YouTube, etc.
  • Don’t feed the trolls The only want to incite riot— just report, then ignore them
  • Choosea partner Maximize opportunity & avoid pitfalls
  • If not, choose a good tool
  • Verify age Well... do what you can.
  • Asking for check- ins is risky Make sure your clients are aware of the dangers
  • ASLDon’t ask for, or require Age, Sex, Location
  • Moderate theconversationIt’s okay to delete other’s comments,or use profanity filtering
  • It may be risky, but go forth and conquer!
  • Because✓ Over 50% of the ✓ If Facebook were a world is under 30 country it would be the world’s 3rd✓ In 10 years over largest and 2x the 40% of the Fortune size of the U.S. 500 won’t be here ✓ 2009 study revealed✓ Facebook tops that online students Google for weekly out performed those traffic in the U.S. receiving face-to- face instruction
  • Where youraudience is hiding
  • There’s plenty ofinfo out there on the big boys
  • The new kid on the block
  • A total mystery to marketers:they aren’t playing by the rules!
  • Google+ is about individuals — not businesses, organizations, corporations
  • Individuals are authentic
  • Individuals are flawed
  • Individuals areinteresting
  • Individuals areidentifiable
  • Who’sdone itright?
  • Until...
  • That’s Fabio!
  • That’s Fabio!No... really!
  • Individuals are willing toadvocate agood cause
  • Conclusion✓ Brave it... the ✓ Be authentic. time is now! That’s what the ever-growing 50%,✓ It may be under 30 dangerous, but population wants with a little from brands common sense, it’s worth the investment and risk
  • And remember.What happens inVegas......stays on Facebook,YouTube, and Flickr
  • Q&Aw ariaagency.comt @jordanwollmanf /jordanwollman