SlideShare a Scribd company logo
1 of 8
5 Reasons to Backup Twitter
Do Users Trust Twitter? 51% of Twitter business users are very concerned with data leakage on Twitter 17% of users have been involved with investigations from data exposure Confidential Sensitive Private
Backup Reason 1: Employee Error Employee error is #1 cause of data loss (PCWorld) 1/3 of all data loss in business is from user error (SANS Technology Institute) Types of errors: Accidental deletions Insecure passwords Sending unencrypted data 3rd party sites with access to an account Backups can restore lost or deleted tweets
Backup Reason 2: The Unexpected: Fail Whale Twitter only has a 98-99% uptime (ideal service uptime is 99%+) Tweet streams go blank  Followers/following lists drop to zero Personal tweets go missing Backups ensure your data will always be available
Backup Reason 3: Buggy 3rd Party Programs Most Twitter users use a 3rd party program to access Twitter  Worst case scenario, these programs can wipe your account data More access you give providers, higher chances for data loss Backups ensure you can restore data if something goes wrong
Backup Reason 4: The Public Demands It Tweets can be used in court False promises, derogatory statements, incriminating comments on Twitter can get you sued During discovery, you will be asked to produce all related tweets Backups ensure complete documentation of tweets
Backup Reason 5: Compliance Regulations FINRA releasedRegulatory Notice 10-06 - social media compliance regulations Regulates what, where and how you talk on social media Companies must record social media activity to ensure they are complying Backups help record all messages
Twitter Backup Combine employee error, Twitter server error, 3rd party programs, FINRA and the court, and you get a recipe for failure if you don’t protect your data Register for a Backupify Twitter backup for free here to begin protecting your social life

More Related Content

What's hot

CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!Nicole Payne
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaWikki Verma
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and removejreidmichele
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and removejreidmichele
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and removejreidmichele
 
Security awareness
Security awarenessSecurity awareness
Security awarenessSanoop Nair
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attackClaranet UK
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]justin johnson
 
Phishing: Training Your Help Desk
Phishing: Training Your Help DeskPhishing: Training Your Help Desk
Phishing: Training Your Help DeskBeth Sallay
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and securityImran Khan
 
Test Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizTest Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizAkilah Kamaria
 
App examining
App examiningApp examining
App examiningErkamDoan
 
Safety And Security Of Data 1
Safety And Security Of Data 1Safety And Security Of Data 1
Safety And Security Of Data 1Wynthorpe
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety TechniquesAnup Dixit
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breachesAjay Jassi
 

What's hot (19)

CISA Issues Emotet Warning!
CISA Issues Emotet Warning!CISA Issues Emotet Warning!
CISA Issues Emotet Warning!
 
How to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki VermaHow to Improve Computer Security - Wikki Verma
How to Improve Computer Security - Wikki Verma
 
Security
SecuritySecurity
Security
 
User wareness
User warenessUser wareness
User wareness
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and remove
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and remove
 
Symptoms of aol and remove
Symptoms of aol and removeSymptoms of aol and remove
Symptoms of aol and remove
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Email: still the favourite route of attack
Email: still the favourite route of attackEmail: still the favourite route of attack
Email: still the favourite route of attack
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Phishing: Training Your Help Desk
Phishing: Training Your Help DeskPhishing: Training Your Help Desk
Phishing: Training Your Help Desk
 
Mobile device privacy and security
Mobile device privacy and securityMobile device privacy and security
Mobile device privacy and security
 
Test Your Internet Security IQ Quiz
Test Your Internet Security IQ QuizTest Your Internet Security IQ Quiz
Test Your Internet Security IQ Quiz
 
Cyber security
Cyber securityCyber security
Cyber security
 
App examining
App examiningApp examining
App examining
 
Safety And Security Of Data 1
Safety And Security Of Data 1Safety And Security Of Data 1
Safety And Security Of Data 1
 
Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Impact on IT system breaches
Impact on IT system breachesImpact on IT system breaches
Impact on IT system breaches
 

Viewers also liked

Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...Abraham Pattikawa
 
Ira de gender energy budgeting
Ira de gender energy budgetingIra de gender energy budgeting
Ira de gender energy budgetingkitturashmikittu
 
Guide To Selecting A Laptop
Guide To Selecting A LaptopGuide To Selecting A Laptop
Guide To Selecting A LaptopEKMom
 
Peralatan Teknologi Komunikasi
Peralatan Teknologi KomunikasiPeralatan Teknologi Komunikasi
Peralatan Teknologi Komunikasikusnindar
 
Antibioticos combo 30 y 20
Antibioticos combo 30 y 20Antibioticos combo 30 y 20
Antibioticos combo 30 y 20guestc8851a
 
Chanlycuocdoi
ChanlycuocdoiChanlycuocdoi
ChanlycuocdoiDamPhan
 
C:\Documents And Settings\Teacher\Desktop\Elevation & Depression Intro
C:\Documents And Settings\Teacher\Desktop\Elevation & Depression IntroC:\Documents And Settings\Teacher\Desktop\Elevation & Depression Intro
C:\Documents And Settings\Teacher\Desktop\Elevation & Depression IntroKustumele Kustu
 
Purdue owl mla style guide
Purdue owl mla style guidePurdue owl mla style guide
Purdue owl mla style guideclover66
 
Datidalle cose digitalfestival2013
Datidalle cose digitalfestival2013Datidalle cose digitalfestival2013
Datidalle cose digitalfestival2013CSP Scarl
 
C re ate-cirma-def-060611
C re ate-cirma-def-060611C re ate-cirma-def-060611
C re ate-cirma-def-060611CSP Scarl
 
MLA Style Guide
MLA Style GuideMLA Style Guide
MLA Style Guideclover66
 
UN Report: Ethnic Cleansing in the Central African Republic
UN Report: Ethnic Cleansing in the Central African Republic UN Report: Ethnic Cleansing in the Central African Republic
UN Report: Ethnic Cleansing in the Central African Republic Tawanda Kanhema
 

Viewers also liked (20)

Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
Kemiri sunan The Renewable Energy Sources Cheaper, Cleaner and Greener than P...
 
Mason Taff
Mason TaffMason Taff
Mason Taff
 
Ira de gender energy budgeting
Ira de gender energy budgetingIra de gender energy budgeting
Ira de gender energy budgeting
 
Larynx modified
Larynx modifiedLarynx modified
Larynx modified
 
Guide To Selecting A Laptop
Guide To Selecting A LaptopGuide To Selecting A Laptop
Guide To Selecting A Laptop
 
Peralatan Teknologi Komunikasi
Peralatan Teknologi KomunikasiPeralatan Teknologi Komunikasi
Peralatan Teknologi Komunikasi
 
Antibioticos combo 30 y 20
Antibioticos combo 30 y 20Antibioticos combo 30 y 20
Antibioticos combo 30 y 20
 
Chanlycuocdoi
ChanlycuocdoiChanlycuocdoi
Chanlycuocdoi
 
La ultima
La ultimaLa ultima
La ultima
 
C:\Documents And Settings\Teacher\Desktop\Elevation & Depression Intro
C:\Documents And Settings\Teacher\Desktop\Elevation & Depression IntroC:\Documents And Settings\Teacher\Desktop\Elevation & Depression Intro
C:\Documents And Settings\Teacher\Desktop\Elevation & Depression Intro
 
Purdue owl mla style guide
Purdue owl mla style guidePurdue owl mla style guide
Purdue owl mla style guide
 
MLA Guide
MLA GuideMLA Guide
MLA Guide
 
Datidalle cose digitalfestival2013
Datidalle cose digitalfestival2013Datidalle cose digitalfestival2013
Datidalle cose digitalfestival2013
 
C re ate-cirma-def-060611
C re ate-cirma-def-060611C re ate-cirma-def-060611
C re ate-cirma-def-060611
 
De colegio
De colegioDe colegio
De colegio
 
Return of blood_diamond
Return of blood_diamondReturn of blood_diamond
Return of blood_diamond
 
MLA Style Guide
MLA Style GuideMLA Style Guide
MLA Style Guide
 
Uncover opportunities i
Uncover opportunities iUncover opportunities i
Uncover opportunities i
 
Sentences
SentencesSentences
Sentences
 
UN Report: Ethnic Cleansing in the Central African Republic
UN Report: Ethnic Cleansing in the Central African Republic UN Report: Ethnic Cleansing in the Central African Republic
UN Report: Ethnic Cleansing in the Central African Republic
 

Similar to 5 Reasons to Backup Twitter

Prepare a 3 to 5 paragraph briefing statement which explains the 3 mos.docx
Prepare a 3 to 5 paragraph briefing statement which explains the 3 mos.docxPrepare a 3 to 5 paragraph briefing statement which explains the 3 mos.docx
Prepare a 3 to 5 paragraph briefing statement which explains the 3 mos.docxhelenc18
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in webMaher Alshammari
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_Tahmid Munaz
 
The Future of Social Media for the Health Industry
The Future of Social Media for the Health IndustryThe Future of Social Media for the Health Industry
The Future of Social Media for the Health IndustryKyle Lacy
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextBrian Pichman
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...
[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...
[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...George K. Karagiannidis
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfCIOWomenMagazine
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Conceptsguest0e7119
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial PlannersMichael O'Phelan
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Dr. Khaled Bakro
 
It is true that information management is key for confidentialit.docx
It is true that information management is key for confidentialit.docxIt is true that information management is key for confidentialit.docx
It is true that information management is key for confidentialit.docxjesssueann
 

Similar to 5 Reasons to Backup Twitter (20)

Twitter terms of service
Twitter terms of serviceTwitter terms of service
Twitter terms of service
 
Prepare a 3 to 5 paragraph briefing statement which explains the 3 mos.docx
Prepare a 3 to 5 paragraph briefing statement which explains the 3 mos.docxPrepare a 3 to 5 paragraph briefing statement which explains the 3 mos.docx
Prepare a 3 to 5 paragraph briefing statement which explains the 3 mos.docx
 
Document-3.docx
Document-3.docxDocument-3.docx
Document-3.docx
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
 
Security and privacy in web
Security and privacy in webSecurity and privacy in web
Security and privacy in web
 
Need for security
Need for securityNeed for security
Need for security
 
Information security a new era technology_
Information security a new era technology_Information security a new era technology_
Information security a new era technology_
 
The Future of Social Media for the Health Industry
The Future of Social Media for the Health IndustryThe Future of Social Media for the Health Industry
The Future of Social Media for the Health Industry
 
I’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take nextI’ve been hacked  the essential steps to take next
I’ve been hacked  the essential steps to take next
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...
[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...
[For Dummies (Computer_Tech)] Joseph Steinberg - Cybersecurity For Dummies (F...
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
COMPUTER ETHICS.pptx
COMPUTER ETHICS.pptxCOMPUTER ETHICS.pptx
COMPUTER ETHICS.pptx
 
Understanding SaaS Concepts
Understanding SaaS ConceptsUnderstanding SaaS Concepts
Understanding SaaS Concepts
 
Cyber Security for Financial Planners
Cyber Security for Financial PlannersCyber Security for Financial Planners
Cyber Security for Financial Planners
 
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
Introduction to Engineering and Profession Ethics Lecture9-Computer Ethics, P...
 
It is true that information management is key for confidentialit.docx
It is true that information management is key for confidentialit.docxIt is true that information management is key for confidentialit.docx
It is true that information management is key for confidentialit.docx
 

More from Datto

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?Datto
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data ProtectionDatto
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your SchoolDatto
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. PublicDatto
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessDatto
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins Datto
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for EducationDatto
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Datto
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupDatto
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationDatto
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestDatto
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Datto
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyDatto
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Datto
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Datto
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Datto
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]Datto
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps UserDatto
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps SecurityDatto
 

More from Datto (20)

What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?What is Network Continuity? Why Does it Matter for Small Businesses?
What is Network Continuity? Why Does it Matter for Small Businesses?
 
13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection13 Ransomware Statistics That Will Make You Rethink Data Protection
13 Ransomware Statistics That Will Make You Rethink Data Protection
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School14 Ways to Increase Google Apps Adoption at Your School
14 Ways to Increase Google Apps Adoption at Your School
 
What's In a Cloud? Purpose-Built vs. Public
What's In a Cloud?  Purpose-Built vs. PublicWhat's In a Cloud?  Purpose-Built vs. Public
What's In a Cloud? Purpose-Built vs. Public
 
Follow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security SuccessFollow the Yellow Brick Road to Google Apps Setup & Security Success
Follow the Yellow Brick Road to Google Apps Setup & Security Success
 
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
The Wizards Behind Google Apps: 11 Google Apps Setup Tips for Admins by Admins
 
15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education15 Effective Tips for Schools Using Google Apps for Education
15 Effective Tips for Schools Using Google Apps for Education
 
Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014Midmarket CIO Forum Spring 2014
Midmarket CIO Forum Spring 2014
 
Protecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS BackupProtecting Data in the Cloud: The Truth about SaaS Backup
Protecting Data in the Cloud: The Truth about SaaS Backup
 
Midmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 PresentationMidmarket CIO Forum 2013 Presentation
Midmarket CIO Forum 2013 Presentation
 
Salesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild WestSalesforce Data Loss in the Wild Wild West
Salesforce Data Loss in the Wild Wild West
 
Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]Growing Up Google - Google Apps for EDU Adoption [Infographic]
Growing Up Google - Google Apps for EDU Adoption [Infographic]
 
CIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupifyCIO Cloud Summit nyc_backupify
CIO Cloud Summit nyc_backupify
 
Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]Google Apps Demographics Study [Infographic]
Google Apps Demographics Study [Infographic]
 
Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]Google Apps Data Loss [Infographic]
Google Apps Data Loss [Infographic]
 
Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]Data Liberation Awards [Infographic]
Data Liberation Awards [Infographic]
 
The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]The Value of Gmail Accounts [Infographic]
The Value of Gmail Accounts [Infographic]
 
13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User13 Steps to Safely Deprovision and Delete a Google Apps User
13 Steps to Safely Deprovision and Delete a Google Apps User
 
10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security10 Steps to Optimize Mozilla Firefox for Google Apps Security
10 Steps to Optimize Mozilla Firefox for Google Apps Security
 

5 Reasons to Backup Twitter

  • 1. 5 Reasons to Backup Twitter
  • 2. Do Users Trust Twitter? 51% of Twitter business users are very concerned with data leakage on Twitter 17% of users have been involved with investigations from data exposure Confidential Sensitive Private
  • 3. Backup Reason 1: Employee Error Employee error is #1 cause of data loss (PCWorld) 1/3 of all data loss in business is from user error (SANS Technology Institute) Types of errors: Accidental deletions Insecure passwords Sending unencrypted data 3rd party sites with access to an account Backups can restore lost or deleted tweets
  • 4. Backup Reason 2: The Unexpected: Fail Whale Twitter only has a 98-99% uptime (ideal service uptime is 99%+) Tweet streams go blank Followers/following lists drop to zero Personal tweets go missing Backups ensure your data will always be available
  • 5. Backup Reason 3: Buggy 3rd Party Programs Most Twitter users use a 3rd party program to access Twitter Worst case scenario, these programs can wipe your account data More access you give providers, higher chances for data loss Backups ensure you can restore data if something goes wrong
  • 6. Backup Reason 4: The Public Demands It Tweets can be used in court False promises, derogatory statements, incriminating comments on Twitter can get you sued During discovery, you will be asked to produce all related tweets Backups ensure complete documentation of tweets
  • 7. Backup Reason 5: Compliance Regulations FINRA releasedRegulatory Notice 10-06 - social media compliance regulations Regulates what, where and how you talk on social media Companies must record social media activity to ensure they are complying Backups help record all messages
  • 8. Twitter Backup Combine employee error, Twitter server error, 3rd party programs, FINRA and the court, and you get a recipe for failure if you don’t protect your data Register for a Backupify Twitter backup for free here to begin protecting your social life