Your SlideShare is downloading. ×
0
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Does Social Media Pose a Security Threat?
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Does Social Media Pose a Security Threat?

634

Published on

For more of the latest information on social media marketing, please visit our official blog page at http://blackboxsocialmedia.com/topics/blog/

For more of the latest information on social media marketing, please visit our official blog page at http://blackboxsocialmedia.com/topics/blog/

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
634
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Does Social Media Pose a Security Threat?
  • 2. With the use of Facebook, Twitter, LinkedIn, and others on the rise, so are many new potential securitythreats to small to midsize businesses working with these sites. As we allknow social media sites can grow our SMB’s exposure and generate more revenue for the company in some cases.
  • 3. Marketing on social media sites is a must for all different types of businesses, so shutting down accessto them in the workplace all together in order to curb security risks is impossible.
  • 4. However since there are so many new cases of accounts on Facebook,Twitter, and other sites being hacked,it is extremely easy for a user to clickon a link that a friend posted on their wall and cause their computer to become infected with a virus.
  • 5. So now that we know that using social media is essential these days for ourSMB to grow, how can SMB owners or IT guys protect the security of the company? Right now, Wedge Networks is beefing up their content inspection network to also monitor social media and Web application traffic to prevent viruses and other security risks
  • 6. Wedge Networks CEO Hongwen Zhangsays that the “allow-or-block” paradigm for social media is extremelycounterproductive in this technological age.
  • 7. “For SMBs to really have an iron-cladsecurity grasp–basically, banning social media–is simply not possible,” Zhang said in an interview.
  • 8. That’s not to say that companies should encourage the use of social media in any shape or form. Forexample employees shouldn’t be using social media to tweet about theirlunch plans on the clock. This of courseshould be something that CEOs should include in their policies and procedures manual.
  • 9. Wedge Networks new BeSecurefeature will act as an online traffic cop for social media sites to try and trackdown malware and nip the problem inthe bud. Wedge Networks will monitor the things coming in and out of social media sites even if it is supposedly coming from a safe source.
  • 10. Think about how much time that is going to save you as an IT guy. According to an article on InformationWeek:
  • 11. “Rather than categorize sources as “good” or “bad,” it takes a look at what’s behind it–looking for something like a recently injected malicious script in an otherwise “good” site. Likewise, the devicemonitors outbound traffic for sensitivedata; administrators can enact policy- based rules that look for particular types or formats of information that could pose a risk.”
  • 12. The most difficult aspect of protecting your computer from social mediasecurity threats is that each individual at a company sets up his or her own security settings on their personal desktops or laptops, this is why if companies choose to use WedgeNetworks services, all computers that are a part of your SMB can be easily monitored.
  • 13. While large companies can block social media sites across the board, SMB’s need the access to these sites for exposure and marketing needs acrossthe board. Check out Wedge Networks right here for more information.

×