Social Media: Balancing Security & Authenticity w/o Controlling the MessageCindy Kim, Dir. Of Corp Comm (@CindyKimPR)Chris...
Social media revolution<br />
3<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br /><ul><li>Use of web 2.0 applications is growing within...
Web 2.0 opens new risk vectors to cybercriminals as they can quickly exploit the desire of the community members to “trust...
As TCO pressures mount enterprises will turn increasingly towards the use of web 2.0 and laptop subsidy programs where com...
IT now finds itself in the role of saying yes, and in doing so must look to educate the organization in defining what its ...
Web 2.0<br />The applications we use today for productivity<br />Collaborative  /  Browser-based  /  Open Source<br />Soci...
6<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />Think it’s Just a Fad?<br />
7<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />More than 50% of IT security and operations professio...
8<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />38<br />13<br />4<br />3<br />Years to Reach 50M User...
In Just 9 Months:<br />9<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />100M Users<br />1B Downloads<b...
If Facebook were a country:<br />10<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />It would be the 4th...
Security the Achilles Heel of Social Media?<br />
The number of people using the Web will increase by 45% to 2.2B by 2013<br />Total global Internet audience is 625M<br />2...
Businesses are NOW at RISK…<br />
<ul><li> Cyber attacks take advantage of TRUST
 They can quickly capture passwords toINFILTRATEsocial networks</li></li></ul><li>17<br />Koobfaceunleashed<br />Member<br...
Phishing Scam<br />
Hacked<br />
Social Networking Phishing Attacks….<br />…up by 240%<br />
Authenticity without losing control<br />
Protect the BRAND without Controlling the Message…<br />		Engage<br />		Listen & Monitor<br />		Educate<br />		Create a Po...
Trends in social media: a look at 2010 & beyond<br />
Social Media Evolution<br />
Upcoming SlideShare
Loading in …5
×

Social Media Balancing Security & Authenticity without Controlling the Message

716
-1

Published on

Social media is all the rage. According to a recent report, 94 percent of Generation Y has joined a social networking site. Social media is believed to be leading the next social revolution. In fact, social networking has grown so dramatically that it is now the number one activity on the Web. In response to this social media phenomenon, businesses are moving at a rapid pace to take advantage of the untapped opportunity by making social media an integral part of their business strategy.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
716
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
37
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Use of web 2.0 applications is growing within enterprises at astonishing rates as companies take advantage of increased productivity and younger workers demand access.Web 2.0 opens new risk vectors to cybercriminals as they can quickly exploit the desire of the community members to “trust” each other in order to quickly gain control of passwords and further infiltrate the community and/or endpoint of the of the end-user.As TCO pressures mount enterprises will turn increasingly towards the use of web 2.0 and laptop subsidy programs where company employees can go and purchase any PC or mobile phone they desire from retail store fronts.IT now finds itself in the role of saying yes, and in doing so must look to educate the organization in defining what its appetite for risk is.
  • More than 50% of IT security and operations professionals see increasing use of web 2.0 technologies within your organizations in the next 12-24 months.* - Ponemon Survey
  • It took 9 monthsFacebook 100M UsersiPhone 1B DownloadsFacebook is would be the 4th largest country in the worldChinaIndiaUSFacebookIndonesiaBrazilPakistanBangladesh
  • New threat vector to steal identify, damage corporate brand, spreading malware, launching assaults on ind brand and company brandBusinesses that don’t listen – the bad guys can be an imposter and you wouldn’t know it. Risks include identity theft and malware to the letting careless potential employees – which can damage corporate brand and messaging. Extract profile information which would then be hosted at a third party location with obvious security implicationsPerpetrator registered a fraudulent account on MySpace under Triple H The adoption of Enterprise 2.0 applications is being driven by users, not by IT. The ease with which they can be accessed, combined with the fact that newer (younger) employees are accustomed to using them, points toward a continuation of this trend.These applications are delivering business value – they are rapidly becoming part of “how business gets done” – but the risks are not being weighed by users.Companies are seeing measurable benefits from the use of Enterprise 2.0 applications and technologies.The dominant underlying technology used to deliver these new community and collaborative based applications is the browser .Companies & users do not take into account the business and security risks that these applications present as Organizations are scrambling to determine policies, address security issues, and enable appropriate use.
  • Cyber attacks take advantage of the trust factor prevalent among users of social media tools and sites. They can quickly capture passwords, infiltrate the social network and replicate their attack and load key logger or other malware.May social networking sites run applications that can allow employees to download apps that run malicious code from third parties.
  • FB offers thousands of integrated applications that its users can install and run. Also – URL shortening links from trusted users. Very little regulations or standards to adhere to. Botnet driven operations--Worm spreads via address replicator--Members trust downloadsMALWARE installed: --Pitches scareware --Steals cookies --Installs Waldac email spamming engine --Installs ZeuS banking Trojan --Carries out click-through fraud
  • One of the best things about FB is that you know who you’re dealing with. You’ve verified every friend you’re connected to. Now scammers are using this trust to their advantage.
  • US extends its lead as No. 1 country hosting phishing attacks (according to Mark Monitor)More than 500 orgs worldwide were phished in the first quarter of this yearPhishing attacks rose by 240 percent compared to same time last year (June 29, 2009)7,400 cyber-squatted domains targeted four financial brands 40 percent of all phishing attacks in Q1 were against payment service providers
  • To proactively protect the business and the brand – register your domain name as you would on a website (on all major social networking sites)
  • Policy that states how social networking sites and applications can be used
  • Social Media Balancing Security & Authenticity without Controlling the Message

    1. 1. Social Media: Balancing Security & Authenticity w/o Controlling the MessageCindy Kim, Dir. Of Corp Comm (@CindyKimPR)Chris Hewitt, Sr. Dir. Of Marketing Ops (@chewitt)<br />
    2. 2. Social media revolution<br />
    3. 3. 3<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br /><ul><li>Use of web 2.0 applications is growing within enterprises at astonishing rates as companies take advantage of increased productivity and younger workers demand access.
    4. 4. Web 2.0 opens new risk vectors to cybercriminals as they can quickly exploit the desire of the community members to “trust” each other in order to quickly gain control of passwords and further infiltrate the community and/or endpoint of the of the end-user.
    5. 5. As TCO pressures mount enterprises will turn increasingly towards the use of web 2.0 and laptop subsidy programs where company employees can go and purchase any PC or mobile phone they desire from retail store fronts.
    6. 6. IT now finds itself in the role of saying yes, and in doing so must look to educate the organization in defining what its appetite for risk is.</li></li></ul><li>4<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />It’s a Web 2.0 World Today<br />
    7. 7. Web 2.0<br />The applications we use today for productivity<br />Collaborative / Browser-based / Open Source<br />Social Communities, Gadgets,Blogging and Widgets <br />open up our networks to increasing risk everyday.<br />
    8. 8. 6<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />Think it’s Just a Fad?<br />
    9. 9. 7<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />More than 50% of IT security and operations professionals see increasing use of web 2.0 technologies within your organizations in the next 12-24 months.*<br />
    10. 10. 8<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />38<br />13<br />4<br />3<br />Years to Reach 50M Users:<br />
    11. 11. In Just 9 Months:<br />9<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />100M Users<br />1B Downloads<br />
    12. 12. If Facebook were a country:<br />10<br />PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION<br />It would be the 4th largest country in the world<br />China<br />India<br />US<br />Facebook<br />Indonesia<br />Brazil<br />Pakistan<br />Bangladesh<br />
    13. 13. Security the Achilles Heel of Social Media?<br />
    14. 14.
    15. 15.
    16. 16. The number of people using the Web will increase by 45% to 2.2B by 2013<br />Total global Internet audience is 625M<br />2/3 have joined social networking (427M)<br />Security risks are equally substantial<br />*Forrester Research, 2009 <br />
    17. 17. Businesses are NOW at RISK…<br />
    18. 18. <ul><li> Cyber attacks take advantage of TRUST
    19. 19. They can quickly capture passwords toINFILTRATEsocial networks</li></li></ul><li>17<br />Koobfaceunleashed<br />Member<br />account<br />
    20. 20. Phishing Scam<br />
    21. 21. Hacked<br />
    22. 22. Social Networking Phishing Attacks….<br />…up by 240%<br />
    23. 23. Authenticity without losing control<br />
    24. 24.
    25. 25. Protect the BRAND without Controlling the Message…<br /> Engage<br /> Listen & Monitor<br /> Educate<br /> Create a Policy<br />
    26. 26. Trends in social media: a look at 2010 & beyond<br />
    27. 27. Social Media Evolution<br />
    28. 28.
    29. 29. Key Takeaways…<br /><ul><li>No simple solution to manage these risks
    30. 30. Blocking hinders productivity and morale
    31. 31. Adopt Acceptable Use of Policy & Work w/ IT Teams
    32. 32. Don’t be naïve – before you CLICK,verify information & link
    33. 33. Change your Password ASAP if hacked
    34. 34. Alert your network if you suspect that they’ve been hacked!</li></li></ul><li>Details:Cindy Kim: Blog: http://cindykimblog.wordpress.comChris Hewitt: Blog: http://whatdoesmarketingreallydo.wordpress.com<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×