Look both ways when you use Social Networks<br />Safe Use of Social Networks <br />** This work was possible only through significant help from several professional acquaintances, without them this work would not exist.<br />Your feedback will help to make this even better. <br />Feedback: Ravi.firstname.lastname@example.org<br />
Evolution: Websites to Social Networks<br />Yesterday<br />Today<br /><ul><li> Static web pages
Information is no longer competitive advantage, it’s organized knowledge</li></ul>Social Networks: Creates tendency to share more information than what we need to!<br />
Social Networks: Double Lane Road<br />OR<br />Look both ways when you use Social Networks<br />
Threats<br />Subversive techniques that leverage your trust relationship.<br />Hackers that scan sites for Personal Information or Proprietary Information.<br />Online Predators.<br />Peer pressure to participate and give out more information than needed - exposing your personal and professional data.<br />Fake online identities that can mislead you.<br />Why Did The Chicken Cross The Road? <br />
Beware!<br />Enticing Applications such as Online Quiz – could ask your DOB in a subtle way or entice you.<br />Installing Applications that have access to your Personal Profile information.<br />Exposure to Worms, Viruses and Malwares that poses risk to Personal Information.<br />Poorly Managed Trust Relationships – Accepting someone as a friend who you don’t know.<br />Posting too much Personal Information.<br />What route are your Security Guards taking to the bank today?<br />
Aware<br />Privacy Settings. <br /><ul><li>Example, my setting on Facebook:
What you write/post could be out there and could haunt you back some other time!
Don’t give our your mobile number or e-mail.</li></ul>Disclose with Care & Entrust with Caution<br />
Data Protection<br />Trust<br /><ul><li>Trust but verify by offline means, if you accept someone as a friend, verify informally.
Make good assessment on who you TRUST online.</li></ul>Trust but Verify<br />
Social Networks are Gaining Credibility<br />Social Networks are used as a tool to screen behavior of potential job candidates. <br />Social Networks data are used by Marketers, Forensic Investigators in various ways.<br />Your Social Networks behavior forms the “Zeroth” impression, you may not even get a chance to make the First impression…<br />Good online presence can enable your brand at the same time it can pose risks to your brand.<br />It’s a part of life! <br />
Social Networks Safe Usage<br />Do not disclose your company proprietary information on Social Networks – for example internal project, Intellectual Property.<br />Do not use Social Networks in a way that it violates company Information Security Policy.<br />Do not participate in online rumors, gossips and slandering related to work, colleagues or competitors.<br />When you represent company on a Social Network, ensure that the information is approved by your company – follow proper process. <br />Data leakage = Loss of customer trust = Negative business impact <br />
Social Networks Safe Usage Contd..<br /><ul><li>Participate in a very few Social Networks, so you can keep a tab on your personal data.
Professional Networking sites are no more trustworthy than Social Networking counterpart.
Think before you ink. Ensure the content is appropriate. Don’t use inappropriate language or photos.
Don’t brag or compelled to post data on Social Networks that you may regret later.
Ensure that your account is protected with a strong password. Some sites might not enforce this.
It may be a good idea to keep a tab on your kids activities on Social Networks.</li></ul>Social Networks: It is no fun being too careful, but being cautious and aware goes a long way.<br />
Social Networks Data Taxonomy<br />Service Data – Data you give to use service.<br />Meta Data – Derivative data from your use of service.<br />Disclosed Data – Data you provide on your site.<br />Entrusted Data – Data you submit on other sites – you have no control.<br />Incidental Data – Data that other people post about you, you have no control.<br />Behavioral Data – Data site collects, your online habits.<br />Social Networks: Different social networking sites give different level of user control for each data type. <br />
Thank you list<br />Larry Magid <br /><ul><li>http://www.larrysworld.com/about/</li></ul>Bruce Schneier<br /><ul><li>http://www.schneier.com/blog/</li></ul>Bank Info Security<br /><ul><li>http://www.bankinfosecurity.com</li></ul> Cliff Reeser, Director<br />Jit Singh, CEO, eBislogic<br /><ul><li>http://www.ebislogic.com</li></ul> Hari Shetty, CEO, Jiffle<br />http://www.jifflenow.com<br />