SlideShare a Scribd company logo
1 of 69
“Social Media – The Good, The Bad And The Ugly” Presenter:  Helen Levinson
Social Media Fears Most Common Reasons: • Lack of Knowledge & Understanding • Brand Management & PR Concerns • Lack of Time and Personnel • It’s a Passing Fad
Social Media Trends 2011 Stats: ,[object Object]
Facebook tops Google for weekly traffic in the U.S.
50 million Tweets per day  - 80% are outside of Twitter
If Facebook were a country, it would be the world’s 3rd largest
Over 200,000,000 Blogs
80% of companies use LinkedIn as primary tool to find employeesSource Mashable.com &  Socialnomics.net
Click to view video: http://www.youtube.com/watch?v=lFZ0z5Fm-Ng&feature=player_embedded: Source Socialnomics.net – Eric Qualman
Managing Your Brand
Positive Exposure
Click to view case study: http://blog.thoughtpick.com/2010/01/learn-sm-by-example-dunkin-donuts-campaign.html
Negative Exposure
Source - YouTube http://www.youtube.com/watch?v=5YGc4zOqozo
Click to view video: http://www.youtube.com/watch?v=-QDkR-Z-69Y
Brand Protection ,[object Object]
1/3rd of employed respondents say they never consider what their boss would think before posting materials online.
61% of employees say that even if employers are monitoring their social networking profiles or activities, they won’t change what they are doing online.
54% of employees say a company policy won’t change how they behave online.Source Deloitte Ethics & Workplace Survey, 2009
Risk Management & Compliance ,[object Object]
54% of CIOs said their firms do not allow employees to visit social networking sites for any reason while at work. Source Deloitte Ethics & Workplace Survey & Robert Half Technology 2009
Data Leakage ,[object Object]
13% of US companies investigated the exposure of confidential, sensitive or private information via a an SMS text or micro-blogging serviceSource Twitter, Outbound email and data loss prevention in today’s enterprise, 2009
Social Media Best Practices What Should I Know?  • Corporate Guidelines• Personal vs. Corporate?• Employee & Customer Interaction• Damage Control • Etiquette• Guard Your Information
Protecting Your Image Best Practice No. 1:Establish CorporateGuidelines
IBM and Intel IBM and Intel each established guidelines for their employees who participate in social media. These market leaders were essentially saying, “have at it out there on blogs, social networks, Twitter, etc. But make sure you know the company’s expectations.” These guidelines represent a milestone in large enterprises’ comfort with social media. Source Hutch Carpenter - bhc3.wordpress.com/2008/12/
Source IBM - http://www.ibm.com/blogs/zz/en/social_computing_guidelines.html
Source IBM - http://www.ibm.com/blogs/zz/en/social_computing_guidelines.html
Source IBM - http://www.ibm.com/blogs/zz/en/social_computing_guidelines.html
Source IBM - http://www.ibm.com/blogs/zz/en/social_computing_guidelines.html
Intel Social Media Guidelines Source Intel - http://www.intel.com/sites/sitewide/en_US/social-media.htm
Consequences What happens with no guidelines in place?  • PR Nightmares• Lawsuits• Loss of Time and Money
Posting Information Best Practice No. 2:Personal vs. Corporate
Keep it personal … or keep it strictly business
People Interaction Best Practice No. 3:Employee and Customer Interaction
Managing Negative Feedback
Source: http://alloveralbany.com/archive/2010/09/21/the-odd-story-involving-price-chopper-twitter-and
Cover Your Risk Best Practice No. 4:Think “Damage Control”
Click to view video: http://www.youtube.com/watch?v=g-Z2x4SClaE&feature=related
Domino’s Challenge Challenge: Domino’s Pizza was faced with the challenge of re-establishing their clients’ and investors’ trust ,[object Object]
Respond fast and efficiently in order to stop the snowball effect
Minimize the issue to avoid alarming investors, since the company’s share value had been dancing up and down with the lowest rates in the last 5 years.,[object Object]
Re-focused the attention of clients back to the product “pizza” by building alliances with bloggers and giving away free food in order to reconcile with the product.
Showed enough pro-activity to investors to reach the highest share value in the last 6 months.,[object Object]
Wal-Mart Concocts Fake Community Group to Gain Chicago Support
Create Your Rules Rules of Engagement: ,[object Object]
Be proactive in response
Operate by a code of conduct
Own up if you’ve screwed up,[object Object]
Are You Exposed? Exposure over 12 months: ,[object Object]
35% leaked proprietary information
Blog Breaches
25% data loss via blogs
Video Exposure
 21% disciplined employees
Friends or Foes?
20% offenses made on Facebook & LinkedInSource Marketwire.com
Listen, Monitor & Track Popular Investigative Tools ,[object Object]
 Blog Posts
 Discussion Boards

More Related Content

What's hot

Social Media hosted by RocketMatter
Social Media hosted by RocketMatterSocial Media hosted by RocketMatter
Social Media hosted by RocketMatter
Natalie Alesi
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10
lindseymgift
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler Seminar
Don Grauel
 
2011.07.14 center-for-np-success-li
2011.07.14 center-for-np-success-li2011.07.14 center-for-np-success-li
2011.07.14 center-for-np-success-li
The Toolbox, Inc.
 
Social media for senior leaders
Social media for senior leadersSocial media for senior leaders
Social media for senior leaders
epselamp
 

What's hot (20)

Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Social Media Case Studies Dec09 V1.0
 
Yammer's Social Media Policy
Yammer's Social Media PolicyYammer's Social Media Policy
Yammer's Social Media Policy
 
Why Community Managers Won't Exist in 5 Years (and why that's a good thing)
Why Community Managers Won't Exist in 5 Years (and why that's a good thing)Why Community Managers Won't Exist in 5 Years (and why that's a good thing)
Why Community Managers Won't Exist in 5 Years (and why that's a good thing)
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 
Social Media hosted by RocketMatter
Social Media hosted by RocketMatterSocial Media hosted by RocketMatter
Social Media hosted by RocketMatter
 
Digital Marketing: Driving Business Growth With An Eye to In-House Counsel
Digital Marketing: Driving Business Growth With An Eye to In-House CounselDigital Marketing: Driving Business Growth With An Eye to In-House Counsel
Digital Marketing: Driving Business Growth With An Eye to In-House Counsel
 
It's a Public World, After All
It's a Public World, After AllIt's a Public World, After All
It's a Public World, After All
 
Using Social Media In HR & Recruiting - Jennifer McClure - Oct 2012
Using Social Media In HR & Recruiting - Jennifer McClure - Oct 2012Using Social Media In HR & Recruiting - Jennifer McClure - Oct 2012
Using Social Media In HR & Recruiting - Jennifer McClure - Oct 2012
 
Social Media And The Law 2 23 10
Social Media And The Law 2 23 10Social Media And The Law 2 23 10
Social Media And The Law 2 23 10
 
Paul Madden Frokostseminar Slides
Paul Madden Frokostseminar SlidesPaul Madden Frokostseminar Slides
Paul Madden Frokostseminar Slides
 
Sabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler SeminarSabrena Sally 2010 Fowler Seminar
Sabrena Sally 2010 Fowler Seminar
 
2011.07.14 center-for-np-success-li
2011.07.14 center-for-np-success-li2011.07.14 center-for-np-success-li
2011.07.14 center-for-np-success-li
 
Social Media - The Good, The Bad, and The Ugly
Social Media  - The Good, The Bad, and The UglySocial Media  - The Good, The Bad, and The Ugly
Social Media - The Good, The Bad, and The Ugly
 
Corporate Social Media Education – Social Media Academy
Corporate Social Media Education – Social Media AcademyCorporate Social Media Education – Social Media Academy
Corporate Social Media Education – Social Media Academy
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)How Law Firms Build Trust for Your Business Online (Social Media Policy)
How Law Firms Build Trust for Your Business Online (Social Media Policy)
 
Internet Awareness10
Internet Awareness10Internet Awareness10
Internet Awareness10
 
Will you accept love in a technology-dependent society?
Will you accept love in a technology-dependent society?Will you accept love in a technology-dependent society?
Will you accept love in a technology-dependent society?
 
What's a government department doing on Twitter?
What's a government department doing on Twitter?What's a government department doing on Twitter?
What's a government department doing on Twitter?
 
Social media for senior leaders
Social media for senior leadersSocial media for senior leaders
Social media for senior leaders
 

Similar to Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media

Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
sdavis532
 
My Online Image
My Online ImageMy Online Image
My Online Image
aluthe
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
jrfields
 

Similar to Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media (20)

New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
 
Protecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media PresentationProtecting Your Profits - Social Media Presentation
Protecting Your Profits - Social Media Presentation
 
National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?National Retail Federation - Does Your Reputation Procede You?
National Retail Federation - Does Your Reputation Procede You?
 
NFSSC - The Good, the Bad and the Ugly of Social Media
NFSSC - The Good, the Bad and the Ugly of Social MediaNFSSC - The Good, the Bad and the Ugly of Social Media
NFSSC - The Good, the Bad and the Ugly of Social Media
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
New Jersey Food Council Social Media Presentation
New Jersey Food Council Social Media PresentationNew Jersey Food Council Social Media Presentation
New Jersey Food Council Social Media Presentation
 
From Apps To Tweets Insurance Agents and the Social Web 040310
From Apps To Tweets  Insurance Agents and the Social Web 040310From Apps To Tweets  Insurance Agents and the Social Web 040310
From Apps To Tweets Insurance Agents and the Social Web 040310
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
Social Media & Electronics Industry B2B Marketing
Social Media & Electronics Industry B2B MarketingSocial Media & Electronics Industry B2B Marketing
Social Media & Electronics Industry B2B Marketing
 
Social Media for Human Resources - Hire, Retain and Leverage Employees
Social Media for Human Resources - Hire, Retain and Leverage EmployeesSocial Media for Human Resources - Hire, Retain and Leverage Employees
Social Media for Human Resources - Hire, Retain and Leverage Employees
 
Digital Branding and Social Media
Digital Branding and Social MediaDigital Branding and Social Media
Digital Branding and Social Media
 
Social Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & AdaptingSocial Media Intelligence - Listening, Engaging & Adapting
Social Media Intelligence - Listening, Engaging & Adapting
 
Search social-media-&-reputation-management-thunder-seo
Search social-media-&-reputation-management-thunder-seoSearch social-media-&-reputation-management-thunder-seo
Search social-media-&-reputation-management-thunder-seo
 
My Online Image
My Online ImageMy Online Image
My Online Image
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
 
Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)
 
How to Operationalize Social Media TFMA 2011
How to Operationalize Social Media TFMA 2011How to Operationalize Social Media TFMA 2011
How to Operationalize Social Media TFMA 2011
 
The Business Owner's Media Mogul Manual: A Strategic Plan to Leverage Web-Bas...
The Business Owner's Media Mogul Manual: A Strategic Plan to Leverage Web-Bas...The Business Owner's Media Mogul Manual: A Strategic Plan to Leverage Web-Bas...
The Business Owner's Media Mogul Manual: A Strategic Plan to Leverage Web-Bas...
 
Investor Relations & Emerging Media – Presented at the NIRI Capital Area Chap...
Investor Relations & Emerging Media – Presented at the NIRI Capital Area Chap...Investor Relations & Emerging Media – Presented at the NIRI Capital Area Chap...
Investor Relations & Emerging Media – Presented at the NIRI Capital Area Chap...
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 

Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media

Editor's Notes

  1. Interesting Firesheep story: http://money.cnn.com/2010/12/14/technology/firesheep_starbucks/index.htmThere's been a lot of talk about Firesheep, a free Firefox extension that collects data broadcast over an unprotected Wi-Fi network without using SSL. You turn it on, and by default it collects cookies for Facebook, Twitter and 24 other sites. Then you can sidejack the account and gain access under the acquired identity.1021Email PrintCommentThis extension isn't shocking. If you're worth your weight as a developer, you've known this flaw has existed for a long time. But what about the rest of the world? What about the people who haven't heard about the newly accessible threat through their friends, or through Engadget or Slashdot?I thought I'd spread the word and help some laymen out after work. There's a large Starbucks (SBUX, Fortune 500) near my apartment. I dropped in, bought some unhealthy food, opened my laptop and turned on Firesheep.Less than one minute later, there were five or six identities sitting in the sidebar. Three of them were from Facebook.This wasn't at all surprising. Firesheep isn't magical, and anyone that's been to a Starbucks knows that a lot of people mindlessly refresh Facebook while sipping their lattés. I thought I'd give it more time, so I listened to some music, talked to a few friends -- and, most importantly (and difficultly) did not navigate to anything sent over vanilla HTTP (including, of course, Facebook).Aside from avoiding vulnerable services in the open, there isn't really any way for users to protect themselves from these attacks. While Firesheep runs within Firefox, all browsers are vulnerable to it. Logging on to https://www.facebook.com just redirects to an unsecured connection. And while a VPN would create a secure tunnel through the unprotected connection, most users don't have access to one. The best thing to do is to log out of Facebook and Twitter when using one of these connections.Half an hour later, I'd collected somewhere between 20 and 40 identities. Since Facebook was by far the most prevalent (and contains more personal information than Twitter), I decided to send the users messages from their own accounts to warn them of their exposure. I drafted a friendly, generic message that stated the location of the Starbucks, what the vulnerability was, and how to avoid it. I sent messages to around 20 people.I cleared the Firesheep sidebar, took off my headphones, and waited.Your Facebook ID is a goldmineI heard one expletive muttered a few feet away, and wondered if my message was the cause. Over the next 15 minutes, I didn't hear anyone talk about what had happened -- and folks at Starbucks are usually not ones to keep their conversations private. However, what I did see happen was a sharp decline in the number of identities I was collecting when I restarted Firesheep.This was relieving -- these people got the message. Hopefully they'll tell their friends. I cleared the sidebar once again, and after another 20 minutes of mindless conversation I saw five familiar names had returned to my herd.This was puzzling. Didn't they receive the first message?I logged into their accounts, and sure enough, they had. One of them was even on Amazon.com, which I had warned about in my first message.I targeted him first: I opened up his Amazon (AMZN, Fortune 500) homepage, identified something he had recently looked at, and then sent him a "no, seriously" message on Facebook from his account -- including the fun fact about his music choices.I cleared again the sidebar again and waited for 10 minutes. After I resumed Firesheep's collection, it appeared that he was gone. Yet the other four remained, persistently.A compromised Facebook account doesn't just mean someone can view your photos, likes and wall posts. A compromised Facebook account gives someone access to an identity, from which they can perform social engineering attacks and potentially ruin relationships -- both out of boredom and for gain.While much of this can be corrected, the time and energy it takes to do so is significant. Someone sending a fake message to one of your friends may not seem like a big deal, but someone sending a fake message to 500 of them is -- especially when that 500 may include colleagues, family, and clients.0:00 /2:38My private life revealed on the web So I didn't understand why my sheep were still grazing, unprotected. Perhaps, I reasoned, they thought the message was automatically generated and randomly targeted -- even though I'd mentioned their precise location. So, one last message was in order.I drafted a very short message (perhaps the first was too long?) and sent it to the four, once again from their own accounts: Really wasn't kidding about the insecurity thing. I won't send another message after this -- it's up to you to take your security seriously. You're at the [XYZ Street] Starbucks on an insecure connection, and absolutely anyone here can access your account with the right (free) tool.Twenty minutes passed, and all four were still actively using Facebook.Again, I considered that they may not have received the second message, but after viewing their accounts it was clear that they had.This is the most shocking thing about Internet security. Not that we are all on a worldwide system held together with duct tape that has appalling security vulnerabilities; not that a freely available tool could collect authentication cookies; and certainly not that there are people unaware of either of those.What's absolutely incomprehensible is that after someone has been alerted to the danger -- from their own account! -- they would casually ignore the warning and continue about their day.But, I kept my word and did not send another message. I packed my things, I walked around the store, and recognized several of the people I'd just introduced to their own vulnerability.On my way home, I considered what the experience meant about our society. No matter how many security measures we provide to the world, there will always be people who leave the door open, even after they've had an intruder. The weakest link in security has been, and always will be, the user's judgment.Back at my apartment, I began to settle in -- only to realize that throughout the entire night, my fly had been wide open. Just another demonstration: we're all walking around with vulnerabilities we have yet to discover.