3. facebook
Ownership
Marc Zuckerberg
Eduardo Saverin, Andrew
McCollum, Dustin Moskovitz,
and Chris Hughes
Owned by American
company
Meta Platforms- Feb 4,2004
Users
2.94 Billion Monthly active users
( 31 March 2022)
4. Facebook founder Mark Zuckerberg has announced that his company would get a new
name, Meta. Zuckerberg has downplayed this rebranding, and this is the first in
Facebook's 17 years of existence, and is to divert a barrage of bad PR.
Zuckerberg has been pouring billions of dollars -- $10 billion this year alone, into building
the metaverse -- an expansive, immersive vision of the internet taken from the pages of
sci-fi novels like Snow Crash and Ready Player One.
Facebook has a net worth of $527 billion
5.
6. Privacy Threats
Nov 29,2011
Deceived
Consumers
By Failing to keep
Privacy promised
August 2013
Messenger
messages were
being accessed
by fb
April 4,2019
Half a billion
records of fb users
were found exposed
on Amazon Cloud
servers
June 7,2018
Bug caused 14
million users
having their
default sharing
as “public”
Sep 2019
200 million users
Phone no.
exposed online
7. Privacy Threats
Cambridge
Analytica
87 million fb
users info. Were
sold to Congress
Analytica
Phishing
Scam used by criminals to trick
people to revealing passwords,credit
card info. & other sensitive
information.
Internal Data
Leak
Facebook internal email accidently
reveals strategy to deal with data
breach-533 million users
9. Financial & Reputational Damage
Reputation
Loss due to
Data Privacy
In-efficiency
the shares dropped 25% at one
point, taking $240bn (£177bn)
off its market value, which in
turn led to a 2% drop in the
Nasdaq index.
10. Importance of IT team
Security Administrator
An IT security admin is a role that includes a wide range of skills and responsibilities to manage
the protection of the company’s data. Some of the most common admin’s responsibilities
include:
•Managing access
•Ensuring that data migration is secure
•Configuring security software
•Monitoring data behavior for abnormal activities
•Implementing security policies
•Testing company’s systems to locate potential risks and vulnerabilities
•Reporting security statuses and incidents (if any)
•Using software tools to automate some of the tasks
IT security consultants assess software, computer systems, and
networks for vulnerabilities, then design and implement the best security
solutions for an organization’s needs. They play the role of both the attacker
and the victim and are asked to locate and potentially exploit vulnerabilities
11. Cyber Security Tips-For users
Use strong password
Regular Software
Updates
Use of VPN
Manage Social Media
Settings