Social mediais okay —jeopardizingsecurity isn’t
I am Jordan WollmanExecutive Creative Director & Partner @ Aria
I’m 28years old(although my wifemay beg to differ)
I’m married to     a fantasticphotographer:        Briana
I have aone-monthold daughter:Remy
I generally talk about  design, marketing,    social media,  music and movies
I have 357 followers on   Twitter, 401 friends on    Facebook, and 241connections on LinkedIn
I love Star WarsSome people call me Jedi Master
I am a Husband,        Father,      Advertiser,  Avid snowboarder,   Wine enthusiast,Social media navigator.
You can find me on   Twitter, Facebook,                     LinkedIn, Google+,                     Behance, About.me,     ...
All that information,and a lot more, you can find onFacebook
A digital agency —   we design theexperience of brands.
We design the     experience of brands...In one of many ways, online and     through social media
Ihere?        am o, whyS    Let’s talk    Social Media
Why should you careabout Social  Media?
In 2011  110 billionminutes werespent on social  networks &    blogs       [Source: Nielsen]
In 2011          has 500 million users.That’s 1 in every 13 people on      earth.
In 201155 milliontweets are published each day
In 2011300,000users joineach day
In 2011exceeds2 billion viewseach day
In 2011  On the professional side,        has over 100million usersworld wide
In 2011  On the professional side, And a new  user joinsevery second  of the day
Those areyour clients...And they’re  talkingabout you.
It’s about thedisproportionate    power of 1    says my true reach is 270     klout.com/#/jordanwollman
Yeah. Yeah. Yeah.But is it safe?
In a lot of ways, yes.In others...?
It’s the wild, wild west.The rules are beingwritten in real-time.
Two sides to the safety coin:1) Your personal safety2) Your client’s safety
thenOkay Let’s look at a few case studies
@PrincessTweepasks to be robbed,and gets... robbed
“Well, I was ‘checking in’ on Foursquare all overtown today. I know it’s risky — but I lost one ofmy mayorships last week ...
“A new website called PleaseRobMe.comdoes nothing more than aggregate publiclyshared check-ins, but its name and purposeat...
“Many of us location-sharers get so caught up in the novelty and bonuses associated    with our behavior that we forget th...
“Some law enforcement agencies are referring   to check-ins as recent empty homes”                     via
✓   Foursquare                ✓Tools you       ✓                    Gowalla                    Looptwillingly       ✓     ...
✓ Transit swipe-cards              ✓Things that   ✓                Swipe cards for doors                Electronic tolling...
Creepy: cree.pyis an application that allows youto gather geolocation relatedinformation about users fromsocial networking...
Hackers hacking July, 2011: AntiSec claimed credit for theBooz Allen hack. It published a list of 90,000military e-mail ad...
London fights back at RIM August, 2011: In the wake of ongoing riots in   London, Blackberry maker Research in  Motion’s w...
London fights back at RIM“No Blackberry you will NOT assist the police,” wrote one hacker on a Research in Motion blog”
Social networking sites leak   personal information     ...a new study has found, raising the   possibility that users of ...
Social networking sites leak   personal informationThe study looked at twelve social networking sites: Bebo, Digg, Faceboo...
Social networking sites leak   personal information   "Not only do they know where Im visiting,     they know who I am," s...
Social networking sites leak   personal information    The report found that between 55%    and 90% of users keep the defa...
Can it be dangerous? Yes.But the time is now!
Keepingyourself safe
PrivacySettingsGet to know who can andcan’t see your information
it             e t!,            e i           s e          n ar     y  a h     Privacy       c s    e n  th SettingsIf y c...
Photo by Jennifer Daniel                           Only friend                           friends                          ...
Checking-in is okay...  But do it as you leave,    not as you arrive
Don’t check-in  at home    And don’t let your    friends do it either
Frank                                  Annie Photo-tagging        Is generally associated           with Geo-Tagging
Keeping your clients safe
Have a plan     Know the dangers & pitfalls     before you start out
State your termsof use clearlyAnd report violatorsto Facebook, Twitter,YouTube, etc.
Don’t feed the trolls The only want to incite riot— just report, then ignore them
Choosea partner   Maximize opportunity   & avoid pitfalls
If not, choose  a good tool
Verify age Well... do what you can.
Asking for check-   ins is risky     Make sure your clients    are aware of the dangers
ASLDon’t ask for, or require Age, Sex, Location
Moderate theconversationIt’s okay to delete other’s comments,or use profanity filtering
It may be risky,   but go forth and conquer!
Because✓ Over 50% of the       ✓ If Facebook were a  world is under 30       country it would be                          ...
Where youraudience is  hiding
There’s plenty ofinfo out there on  the big boys
The new kid on the block
A total mystery to marketers:they aren’t playing by the rules!
Google+ is about individuals     — not businesses, organizations, corporations
Individuals    are authentic
Individuals    are  flawed
Individuals    areinteresting
Individuals    areidentifiable
Who’sdone itright?
Until...
That’s Fabio!
That’s Fabio!No... really!
Individuals    are willing toadvocate agood cause
Conclusion✓ Brave it... the       ✓ Be authentic.  time is now!            That’s what the                          ever-g...
And remember.What happens inVegas......stays on Facebook,YouTube, and Flickr
Q&Aw ariaagency.comt @jordanwollmanf /jordanwollman
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Social Media is Okay - Jeopardizing Security Isn't
Upcoming SlideShare
Loading in …5
×

Social Media is Okay - Jeopardizing Security Isn't

707 views

Published on

In a world of hackers, phishers, scammers, and Nigerian Princes, how do you keep yourself and your clients safe, while investing time and energy (and not to forget, money) into Social Media.

An objective look at social media risks and benefits.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
707
On SlideShare
0
From Embeds
0
Number of Embeds
402
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Social Media is Okay - Jeopardizing Security Isn't

  1. 1. Social mediais okay —jeopardizingsecurity isn’t
  2. 2. I am Jordan WollmanExecutive Creative Director & Partner @ Aria
  3. 3. I’m 28years old(although my wifemay beg to differ)
  4. 4. I’m married to a fantasticphotographer: Briana
  5. 5. I have aone-monthold daughter:Remy
  6. 6. I generally talk about design, marketing, social media, music and movies
  7. 7. I have 357 followers on Twitter, 401 friends on Facebook, and 241connections on LinkedIn
  8. 8. I love Star WarsSome people call me Jedi Master
  9. 9. I am a Husband, Father, Advertiser, Avid snowboarder, Wine enthusiast,Social media navigator.
  10. 10. You can find me on Twitter, Facebook, LinkedIn, Google+, Behance, About.me, Wordpress, projeqt, Virb, Spotify, Vimeo, YouTube, Last.fm, Pandora, Delicious, Tumblr, Flickr, Gowalla, Foursquare, Klout, Ping.fm ...
  11. 11. All that information,and a lot more, you can find onFacebook
  12. 12. A digital agency — we design theexperience of brands.
  13. 13. We design the experience of brands...In one of many ways, online and through social media
  14. 14. Ihere? am o, whyS Let’s talk Social Media
  15. 15. Why should you careabout Social Media?
  16. 16. In 2011 110 billionminutes werespent on social networks & blogs [Source: Nielsen]
  17. 17. In 2011 has 500 million users.That’s 1 in every 13 people on earth.
  18. 18. In 201155 milliontweets are published each day
  19. 19. In 2011300,000users joineach day
  20. 20. In 2011exceeds2 billion viewseach day
  21. 21. In 2011 On the professional side, has over 100million usersworld wide
  22. 22. In 2011 On the professional side, And a new user joinsevery second of the day
  23. 23. Those areyour clients...And they’re talkingabout you.
  24. 24. It’s about thedisproportionate power of 1 says my true reach is 270 klout.com/#/jordanwollman
  25. 25. Yeah. Yeah. Yeah.But is it safe?
  26. 26. In a lot of ways, yes.In others...?
  27. 27. It’s the wild, wild west.The rules are beingwritten in real-time.
  28. 28. Two sides to the safety coin:1) Your personal safety2) Your client’s safety
  29. 29. thenOkay Let’s look at a few case studies
  30. 30. @PrincessTweepasks to be robbed,and gets... robbed
  31. 31. “Well, I was ‘checking in’ on Foursquare all overtown today. I know it’s risky — but I lost one ofmy mayorships last week and I’m not going to let that happen again.” said Tweep.
  32. 32. “A new website called PleaseRobMe.comdoes nothing more than aggregate publiclyshared check-ins, but its name and purposeattempt to shed more light on the dangerous side effects of location-sharing.” via
  33. 33. “Many of us location-sharers get so caught up in the novelty and bonuses associated with our behavior that we forget the implications of our actions.” via
  34. 34. “Some law enforcement agencies are referring to check-ins as recent empty homes” via
  35. 35. ✓ Foursquare ✓Tools you ✓ Gowalla Looptwillingly ✓ ✓ Google Buzz Google+check in with ✓ Facebook ✓ Twitter
  36. 36. ✓ Transit swipe-cards ✓Things that ✓ Swipe cards for doors Electronic tolling (TollTag)track your ✓ ✓ Cellphones Location searches onlocation your PDA ✓ Free Wi-Fipassively ✓ Parking meters you call to add money [Source: eff.org]
  37. 37. Creepy: cree.pyis an application that allows youto gather geolocation relatedinformation about users fromsocial networking platformsand image hosting services.
  38. 38. Hackers hacking July, 2011: AntiSec claimed credit for theBooz Allen hack. It published a list of 90,000military e-mail addresses, apparently stolen from Booz Allens systems. via
  39. 39. London fights back at RIM August, 2011: In the wake of ongoing riots in London, Blackberry maker Research in Motion’s website was hacked on Tuesday. via
  40. 40. London fights back at RIM“No Blackberry you will NOT assist the police,” wrote one hacker on a Research in Motion blog”
  41. 41. Social networking sites leak personal information ...a new study has found, raising the possibility that users of such sites can be tracked everywhere they go online via
  42. 42. Social networking sites leak personal informationThe study looked at twelve social networking sites: Bebo, Digg, Facebook, Friendster, Hi5, Imeem, LinkedIn, LiveJournal, MySpace, Orkut, Twitter, and Xanga via
  43. 43. Social networking sites leak personal information "Not only do they know where Im visiting, they know who I am," said Wills. "And thats disconcerting." via
  44. 44. Social networking sites leak personal information The report found that between 55% and 90% of users keep the default privacy settings via
  45. 45. Can it be dangerous? Yes.But the time is now!
  46. 46. Keepingyourself safe
  47. 47. PrivacySettingsGet to know who can andcan’t see your information
  48. 48. it e t!, e i s e n ar y a h Privacy c s e n th SettingsIf y ca theGet to know who can and can’t see your information
  49. 49. Photo by Jennifer Daniel Only friend friends It’s not a popularity contest Facebook will cap you at 5,001 anyway
  50. 50. Checking-in is okay... But do it as you leave, not as you arrive
  51. 51. Don’t check-in at home And don’t let your friends do it either
  52. 52. Frank Annie Photo-tagging Is generally associated with Geo-Tagging
  53. 53. Keeping your clients safe
  54. 54. Have a plan Know the dangers & pitfalls before you start out
  55. 55. State your termsof use clearlyAnd report violatorsto Facebook, Twitter,YouTube, etc.
  56. 56. Don’t feed the trolls The only want to incite riot— just report, then ignore them
  57. 57. Choosea partner Maximize opportunity & avoid pitfalls
  58. 58. If not, choose a good tool
  59. 59. Verify age Well... do what you can.
  60. 60. Asking for check- ins is risky Make sure your clients are aware of the dangers
  61. 61. ASLDon’t ask for, or require Age, Sex, Location
  62. 62. Moderate theconversationIt’s okay to delete other’s comments,or use profanity filtering
  63. 63. It may be risky, but go forth and conquer!
  64. 64. Because✓ Over 50% of the ✓ If Facebook were a world is under 30 country it would be the world’s 3rd✓ In 10 years over largest and 2x the 40% of the Fortune size of the U.S. 500 won’t be here ✓ 2009 study revealed✓ Facebook tops that online students Google for weekly out performed those traffic in the U.S. receiving face-to- face instruction
  65. 65. Where youraudience is hiding
  66. 66. There’s plenty ofinfo out there on the big boys
  67. 67. The new kid on the block
  68. 68. A total mystery to marketers:they aren’t playing by the rules!
  69. 69. Google+ is about individuals — not businesses, organizations, corporations
  70. 70. Individuals are authentic
  71. 71. Individuals are flawed
  72. 72. Individuals areinteresting
  73. 73. Individuals areidentifiable
  74. 74. Who’sdone itright?
  75. 75. Until...
  76. 76. That’s Fabio!
  77. 77. That’s Fabio!No... really!
  78. 78. Individuals are willing toadvocate agood cause
  79. 79. Conclusion✓ Brave it... the ✓ Be authentic. time is now! That’s what the ever-growing 50%,✓ It may be under 30 dangerous, but population wants with a little from brands common sense, it’s worth the investment and risk
  80. 80. And remember.What happens inVegas......stays on Facebook,YouTube, and Flickr
  81. 81. Q&Aw ariaagency.comt @jordanwollmanf /jordanwollman

×