SlideShare a Scribd company logo
1 of 33
Managing social media risk 
across the whole organisation 
Jeremy Swinfen Green MA MBA CMC FIC, Managing Partner 
Social Media Risk Consulting Ltd
Social media risk 
• Damaging content on social media platforms 
– Employees, ex-employees, customers and detractors 
• A big opportunity for marketers - but also a big risk 
for business 
• Reputational risk is generally acknowledged, but risks 
exist across the organisation
Risks extend across organisations 
Leadership Finance 
Legal 
Marketing 
IT & Security 
Operations 
§ 
 
§ 
 
§ 
 
§   
 
§ 
 
§ 
 
§ 
§ 
§ 
§ 
 
 
 
 
 
 
 
 
 
 
 
 
 
Human resources Sales & CRM 
 
 
§ 
 
Reputational 
Asset loss 
Regulatory 
Operational 
 
PPRR ccrriissiiss 

Why is it such a problem? 
• Culture 
– Unofficial communications (It’s private, isn’t it?...) 
– Ephemeral communications (Did we really say that?) 
– Anonymous communications (Catch me if you can!) 
• The web 
– Speed of online communications with multiple 
connections globally 
– Potential for viral growth and amplification by the media 
• Lack of control 
– Private vs corporate social media accounts 
– Bring your own device
Size of the risk 
• April 2013: Syrian Electronic Army hack into AP’s 
Twitter feed 
– They plant rumours of bombs at the White House 
• Result: the Dow Jones drops 143 points 
– $136 bn is erased from the market
Why are social media threats growing? 
• Continued monetisation of cyberspace 
• Growth of mass market mobile technology 
• Growing dependency on the web and the IoT 
• Increasing corporate use of big data 
• Rise in social media use by consumers
The result of risk events 
• Legal suits and compliance breaches 
• Reduced operational efficiency 
• Loss of value or assets 
• Damage to brand and reputation
Compliance 
• Data protection 
• Financial reporting information 
• Advertising standards 
• Regulated industries e.g. financial services
Example: Misleading endorsements 
• Allergy Pathway (Australia) fined $15000 for failing 
to remove misleading endorsements on its website
Example: Astro-turfing
Example: Non-compliant marketing 
• WKD Facebook ads banned for linking alcohol with 
confidence 
• You can’t ignore the rules on social media
Efficiency risks 
• Reduced productivity 
– Privacy actions: monitoring employee activity 
• HR issues 
– Damage to “company as employer” brand 
– Discrimination actions: searching candidate profiles 
– Bullying and harassment at work 
– Duty of care: Abuse when replying to posts; privacy, 
personal security and identity theft 
• Information leakage 
• IT security: viruses and malware
Example: Unhappy ex-employees 
• Recruiting the best talent 
is essential 
• But ex-employees can 
damage “employer brand” 
• Monitoring posts and 
rebutting claims in the 
right way is a key skill
Keeping key staff 
• PayPal’s Director of Strategy was fired after a series 
of very inappropriate 1 a.m. tweets 
• Justine Sacco, communications director of 
InterActive, sent a racist tweet before boarding a 
flight, and was fired before she had landed
Example: Information leakage
Value risks 
• Lower revenues 
– Inadvertent contracts 
– Employee comments that affect sales 
• Higher costs 
– Wasted campaign investments (e.g. Likes) 
– Libel actions (e.g. tagged party photos) 
– Legal actions for breach of NDA 
• Lost value 
– Loss of social media assets 
– Loss of IP and trademark/patent protection 
– ID theft (e.g. CEO) that affects share price
Example: share price movement 
• Social media can cause rapid share price movements 
– Tweets about a train crash in Maryland resulted in a 
$500m market capitalisation in 90 minutes 
– Quindell lost £950m after Gotham City, who stood to gain 
if the shares fell, tweeted a link to a highly critical report 
• (in the USA, Ebix, Tile Shop & Blucora also suffered from GC)
Example: Loss of social media assets 
• Social media assets e.g. Facebook pages not owned 
by the business 
• Set up by employee who then leaves 
• Appropriate protocols are needed for setting up and 
maintaining social media assets 
vs
Reputational risks 
• Inappropriate and accidental comments by 
employees 
• Marketing 
– Low-grade marketing activity 
– Obsolete marketing campaigns 
• Points of presence 
– Brand-jacking and hate sites 
– Fan sites and the lawyers 
– Phishing and pharming
Example: accidental posting
Example: opening doors to criticism 
• Why would a “low emotion” brand like NYPD expect 
people not to share criticism 
What they wanted What they got
Example: Brand-jacking 
• Organisation pages being taken over 
– “123456” and “password” are most common passwords 
– Social media management systems can impose protocols 
– But problems like Heartbleed will always occur 
• Yahoo, Pinterest, Facebook and Wordpress possibly affected 
“Burger King just got sold to 
McDonalds…” 
DCMS Twitter feed gets hacked
Example: Pharming 
• Any site where users can download text is at risk 
– Social media are particularly at risk 
• 100+ fraudulent eBay product links found recently 
– Visitors accounts hijacked to enable fraudulent sales
Social PR crisis 
• Things that happen… 
– Product problems cause unhappy customers to complain 
– Unhappy ex-employees post defamatory comments 
– Unacceptable executive behaviour is uncovered 
– Rumours of takeovers, financial troubles are circulated 
• Consumer disquiet gets “amplified” by media
Social media losses 
• 90% of organisations who experienced a social media 
incident suffered negative consequences, including: 
– reduced stock price (average cost: $1,038,401) 
– litigation costs (average cost: $650,361) 
– direct financial costs (average cost: $641,993) 
– damaged brand reputation/loss of customer trust (average 
cost: $638,496) 
– lost revenue (average cost: $619,360) 
Symantec, 2011, reported by CBR
Managing social media risk 
• Audit 
• Listen 
• Manage 
• Prepare 
• Archive
Audit 
• Identify risks: history, scenario development 
– Evaluate current mitigations and develop improved 
processes for reduced risk 
• Evaluate organisation 
– Board preparedness 
– Individual business operations 
– Company culture 
• Develop Social Media Protocol 
– Train all staff in social media guidelines & sanctions
Listen 
• Listen to identify potential problems 
– Where are you listening? 
– Who is doing the listening? 
– How is data collected and analysis conducted? 
• React to social media appropriately 
– Triage social media activity (ignore, respond, escalate) 
– Direct to appropriate business functions
Manage 
• Develop and customised social media guidelines and 
train employees 
• Manage content: moderate inbound and outbound 
posts 
• Ensure appropriate tools are used: 
– Listening, PoP monitoring, Moderation, Archiving
Prepare 
• Prepare for potential crisis 
– Identify possible “worst case” problems 
– Develop tone of voice guidelines 
– Prepare holding and position statements 
– Develop escalation process 
• Practice: Set up artificial crisis and enable response 
team to practice 
– Handling stress 
– Testing processes
Archive 
• All businesses can benefit from archiving 
conversations with the public 
– Regulated industries are likely to be required to archive 
static AND interactive content 
• Choosing the right tool is essential 
– What is being archived (e.g. web vs API) 
– How easy is it to find content and resurrect conversations 
– How far back can you go
Conclusions 
• Constantly changing landscape 
• Impossible to anticipate all risks 
• But structured analysis of business process can 
deliver an effective risk register that demonstrates a 
“reasonable” level of care
Thank you 
jeremy@SocialMediaRisk.co.uk 
07855 341 589

More Related Content

What's hot

Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security IssuesMangesh Gunjal
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crimeatifkhanniazi
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network Noori Sadeq
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet useBurkeV
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
Is your privacy, private?
Is your privacy, private?Is your privacy, private?
Is your privacy, private?DionShawMSPM
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devicesJ A Bhavsar
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 

What's hot (20)

Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Ethical and safe internet use
Ethical and safe internet useEthical and safe internet use
Ethical and safe internet use
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Is your privacy, private?
Is your privacy, private?Is your privacy, private?
Is your privacy, private?
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Internet security
Internet securityInternet security
Internet security
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
LIFARS - Financial Cybercrime
LIFARS - Financial CybercrimeLIFARS - Financial Cybercrime
LIFARS - Financial Cybercrime
 
Cyber security for women using mobile devices
Cyber security for women using mobile devicesCyber security for women using mobile devices
Cyber security for women using mobile devices
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 

Similar to Social media risk

Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersDavid Green
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightCBIZ, Inc.
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
PRSA presentation auditing social media presented by Pete Scott, APR @prscott
PRSA presentation auditing social media presented by Pete	Scott, APR @prscott PRSA presentation auditing social media presented by Pete	Scott, APR @prscott
PRSA presentation auditing social media presented by Pete Scott, APR @prscott Kevin McGee, MBA
 
Social media marketing (introduction)
Social media marketing (introduction)Social media marketing (introduction)
Social media marketing (introduction)Mosoco Ltd
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Craig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFestCraig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFestPRFest
 
How To Protect Your Company From Legal Threats on Social Media
How To Protect Your Company From Legal Threats on Social MediaHow To Protect Your Company From Legal Threats on Social Media
How To Protect Your Company From Legal Threats on Social MediaZuni
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRCharlie Pownall
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
Brookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 twoBrookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 twogvaughan
 
Online Listening and Opinion Analytics for Customer Care
Online Listening and Opinion Analytics for Customer CareOnline Listening and Opinion Analytics for Customer Care
Online Listening and Opinion Analytics for Customer CareHugo Zaragoza
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Friends, Fans, Connections & Tweeps: A social media primer for HR
Friends, Fans, Connections & Tweeps: A social media primer for HRFriends, Fans, Connections & Tweeps: A social media primer for HR
Friends, Fans, Connections & Tweeps: A social media primer for HRSharlyn Lauby
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small BusinessArt Ocain
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 

Similar to Social media risk (20)

Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory OversightKeeping an Eye On Risk - Current Concerns and Supervisory Oversight
Keeping an Eye On Risk - Current Concerns and Supervisory Oversight
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
PRSA presentation auditing social media presented by Pete Scott, APR @prscott
PRSA presentation auditing social media presented by Pete	Scott, APR @prscott PRSA presentation auditing social media presented by Pete	Scott, APR @prscott
PRSA presentation auditing social media presented by Pete Scott, APR @prscott
 
Social media marketing (introduction)
Social media marketing (introduction)Social media marketing (introduction)
Social media marketing (introduction)
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Social media security
Social media securitySocial media security
Social media security
 
Craig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFestCraig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFest
 
How To Protect Your Company From Legal Threats on Social Media
How To Protect Your Company From Legal Threats on Social MediaHow To Protect Your Company From Legal Threats on Social Media
How To Protect Your Company From Legal Threats on Social Media
 
How to handle data breach incidents under GDPR
How to handle data breach incidents under GDPRHow to handle data breach incidents under GDPR
How to handle data breach incidents under GDPR
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Brookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 twoBrookings sm presentation june 21 2013 two
Brookings sm presentation june 21 2013 two
 
Online Listening and Opinion Analytics for Customer Care
Online Listening and Opinion Analytics for Customer CareOnline Listening and Opinion Analytics for Customer Care
Online Listening and Opinion Analytics for Customer Care
 
3.RPCP-Social-media-case-studies
3.RPCP-Social-media-case-studies3.RPCP-Social-media-case-studies
3.RPCP-Social-media-case-studies
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Friends, Fans, Connections & Tweeps: A social media primer for HR
Friends, Fans, Connections & Tweeps: A social media primer for HRFriends, Fans, Connections & Tweeps: A social media primer for HR
Friends, Fans, Connections & Tweeps: A social media primer for HR
 
Be More Secure than your Competition: MePush Cyber Security for Small Business
Be More Secure than your Competition:  MePush Cyber Security for Small BusinessBe More Secure than your Competition:  MePush Cyber Security for Small Business
Be More Secure than your Competition: MePush Cyber Security for Small Business
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
6. IBAT-Social-Media-Case-Studies
6. IBAT-Social-Media-Case-Studies6. IBAT-Social-Media-Case-Studies
6. IBAT-Social-Media-Case-Studies
 

More from Mosoco Ltd

A process for measuring cyber security culture (very draft)
A process for measuring cyber security culture (very draft)A process for measuring cyber security culture (very draft)
A process for measuring cyber security culture (very draft)Mosoco Ltd
 
Digital transformation: knowledge management
Digital transformation: knowledge managementDigital transformation: knowledge management
Digital transformation: knowledge managementMosoco Ltd
 
Digital transformation: digital business process
Digital transformation: digital business processDigital transformation: digital business process
Digital transformation: digital business processMosoco Ltd
 
Digital transformation: the future of retail
Digital transformation: the future of retailDigital transformation: the future of retail
Digital transformation: the future of retailMosoco Ltd
 
Digital transformation: introduction to mobile marketing
Digital transformation: introduction to mobile marketingDigital transformation: introduction to mobile marketing
Digital transformation: introduction to mobile marketingMosoco Ltd
 
Digital transformation: the digital workplace
Digital transformation: the digital workplaceDigital transformation: the digital workplace
Digital transformation: the digital workplaceMosoco Ltd
 
Digital transformation: social media marketing
Digital transformation: social media marketingDigital transformation: social media marketing
Digital transformation: social media marketingMosoco Ltd
 
Digital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskDigital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskMosoco Ltd
 
Digital transformation: measuring your digital marketing returns
Digital transformation: measuring your digital marketing returnsDigital transformation: measuring your digital marketing returns
Digital transformation: measuring your digital marketing returnsMosoco Ltd
 
Social media security
Social media securitySocial media security
Social media securityMosoco Ltd
 
Planning successful social media marketing campaigns
Planning successful social media marketing campaignsPlanning successful social media marketing campaigns
Planning successful social media marketing campaignsMosoco Ltd
 
Research and truth
Research and truthResearch and truth
Research and truthMosoco Ltd
 
Introduction to user experience research (TechUK Designing Digital Health sem...
Introduction to user experience research (TechUK Designing Digital Health sem...Introduction to user experience research (TechUK Designing Digital Health sem...
Introduction to user experience research (TechUK Designing Digital Health sem...Mosoco Ltd
 
Interactive tv text input usability report 2011
Interactive tv text input usability report 2011Interactive tv text input usability report 2011
Interactive tv text input usability report 2011Mosoco Ltd
 

More from Mosoco Ltd (14)

A process for measuring cyber security culture (very draft)
A process for measuring cyber security culture (very draft)A process for measuring cyber security culture (very draft)
A process for measuring cyber security culture (very draft)
 
Digital transformation: knowledge management
Digital transformation: knowledge managementDigital transformation: knowledge management
Digital transformation: knowledge management
 
Digital transformation: digital business process
Digital transformation: digital business processDigital transformation: digital business process
Digital transformation: digital business process
 
Digital transformation: the future of retail
Digital transformation: the future of retailDigital transformation: the future of retail
Digital transformation: the future of retail
 
Digital transformation: introduction to mobile marketing
Digital transformation: introduction to mobile marketingDigital transformation: introduction to mobile marketing
Digital transformation: introduction to mobile marketing
 
Digital transformation: the digital workplace
Digital transformation: the digital workplaceDigital transformation: the digital workplace
Digital transformation: the digital workplace
 
Digital transformation: social media marketing
Digital transformation: social media marketingDigital transformation: social media marketing
Digital transformation: social media marketing
 
Digital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskDigital transformation: introduction to cyber risk
Digital transformation: introduction to cyber risk
 
Digital transformation: measuring your digital marketing returns
Digital transformation: measuring your digital marketing returnsDigital transformation: measuring your digital marketing returns
Digital transformation: measuring your digital marketing returns
 
Social media security
Social media securitySocial media security
Social media security
 
Planning successful social media marketing campaigns
Planning successful social media marketing campaignsPlanning successful social media marketing campaigns
Planning successful social media marketing campaigns
 
Research and truth
Research and truthResearch and truth
Research and truth
 
Introduction to user experience research (TechUK Designing Digital Health sem...
Introduction to user experience research (TechUK Designing Digital Health sem...Introduction to user experience research (TechUK Designing Digital Health sem...
Introduction to user experience research (TechUK Designing Digital Health sem...
 
Interactive tv text input usability report 2011
Interactive tv text input usability report 2011Interactive tv text input usability report 2011
Interactive tv text input usability report 2011
 

Recently uploaded

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...lizamodels9
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...lizamodels9
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 

Recently uploaded (20)

Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
Lowrate Call Girls In Laxmi Nagar Delhi ❤️8860477959 Escorts 100% Genuine Ser...
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc.../:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
/:Call Girls In Jaypee Siddharth - 5 Star Hotel New Delhi ➥9990211544 Top Esc...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 

Social media risk

  • 1. Managing social media risk across the whole organisation Jeremy Swinfen Green MA MBA CMC FIC, Managing Partner Social Media Risk Consulting Ltd
  • 2. Social media risk • Damaging content on social media platforms – Employees, ex-employees, customers and detractors • A big opportunity for marketers - but also a big risk for business • Reputational risk is generally acknowledged, but risks exist across the organisation
  • 3. Risks extend across organisations Leadership Finance Legal Marketing IT & Security Operations §  §  §  §    §  §  § § § §              Human resources Sales & CRM   §  Reputational Asset loss Regulatory Operational  PPRR ccrriissiiss 
  • 4. Why is it such a problem? • Culture – Unofficial communications (It’s private, isn’t it?...) – Ephemeral communications (Did we really say that?) – Anonymous communications (Catch me if you can!) • The web – Speed of online communications with multiple connections globally – Potential for viral growth and amplification by the media • Lack of control – Private vs corporate social media accounts – Bring your own device
  • 5. Size of the risk • April 2013: Syrian Electronic Army hack into AP’s Twitter feed – They plant rumours of bombs at the White House • Result: the Dow Jones drops 143 points – $136 bn is erased from the market
  • 6. Why are social media threats growing? • Continued monetisation of cyberspace • Growth of mass market mobile technology • Growing dependency on the web and the IoT • Increasing corporate use of big data • Rise in social media use by consumers
  • 7. The result of risk events • Legal suits and compliance breaches • Reduced operational efficiency • Loss of value or assets • Damage to brand and reputation
  • 8. Compliance • Data protection • Financial reporting information • Advertising standards • Regulated industries e.g. financial services
  • 9. Example: Misleading endorsements • Allergy Pathway (Australia) fined $15000 for failing to remove misleading endorsements on its website
  • 11. Example: Non-compliant marketing • WKD Facebook ads banned for linking alcohol with confidence • You can’t ignore the rules on social media
  • 12. Efficiency risks • Reduced productivity – Privacy actions: monitoring employee activity • HR issues – Damage to “company as employer” brand – Discrimination actions: searching candidate profiles – Bullying and harassment at work – Duty of care: Abuse when replying to posts; privacy, personal security and identity theft • Information leakage • IT security: viruses and malware
  • 13. Example: Unhappy ex-employees • Recruiting the best talent is essential • But ex-employees can damage “employer brand” • Monitoring posts and rebutting claims in the right way is a key skill
  • 14. Keeping key staff • PayPal’s Director of Strategy was fired after a series of very inappropriate 1 a.m. tweets • Justine Sacco, communications director of InterActive, sent a racist tweet before boarding a flight, and was fired before she had landed
  • 16. Value risks • Lower revenues – Inadvertent contracts – Employee comments that affect sales • Higher costs – Wasted campaign investments (e.g. Likes) – Libel actions (e.g. tagged party photos) – Legal actions for breach of NDA • Lost value – Loss of social media assets – Loss of IP and trademark/patent protection – ID theft (e.g. CEO) that affects share price
  • 17. Example: share price movement • Social media can cause rapid share price movements – Tweets about a train crash in Maryland resulted in a $500m market capitalisation in 90 minutes – Quindell lost £950m after Gotham City, who stood to gain if the shares fell, tweeted a link to a highly critical report • (in the USA, Ebix, Tile Shop & Blucora also suffered from GC)
  • 18. Example: Loss of social media assets • Social media assets e.g. Facebook pages not owned by the business • Set up by employee who then leaves • Appropriate protocols are needed for setting up and maintaining social media assets vs
  • 19. Reputational risks • Inappropriate and accidental comments by employees • Marketing – Low-grade marketing activity – Obsolete marketing campaigns • Points of presence – Brand-jacking and hate sites – Fan sites and the lawyers – Phishing and pharming
  • 21. Example: opening doors to criticism • Why would a “low emotion” brand like NYPD expect people not to share criticism What they wanted What they got
  • 22. Example: Brand-jacking • Organisation pages being taken over – “123456” and “password” are most common passwords – Social media management systems can impose protocols – But problems like Heartbleed will always occur • Yahoo, Pinterest, Facebook and Wordpress possibly affected “Burger King just got sold to McDonalds…” DCMS Twitter feed gets hacked
  • 23. Example: Pharming • Any site where users can download text is at risk – Social media are particularly at risk • 100+ fraudulent eBay product links found recently – Visitors accounts hijacked to enable fraudulent sales
  • 24. Social PR crisis • Things that happen… – Product problems cause unhappy customers to complain – Unhappy ex-employees post defamatory comments – Unacceptable executive behaviour is uncovered – Rumours of takeovers, financial troubles are circulated • Consumer disquiet gets “amplified” by media
  • 25. Social media losses • 90% of organisations who experienced a social media incident suffered negative consequences, including: – reduced stock price (average cost: $1,038,401) – litigation costs (average cost: $650,361) – direct financial costs (average cost: $641,993) – damaged brand reputation/loss of customer trust (average cost: $638,496) – lost revenue (average cost: $619,360) Symantec, 2011, reported by CBR
  • 26. Managing social media risk • Audit • Listen • Manage • Prepare • Archive
  • 27. Audit • Identify risks: history, scenario development – Evaluate current mitigations and develop improved processes for reduced risk • Evaluate organisation – Board preparedness – Individual business operations – Company culture • Develop Social Media Protocol – Train all staff in social media guidelines & sanctions
  • 28. Listen • Listen to identify potential problems – Where are you listening? – Who is doing the listening? – How is data collected and analysis conducted? • React to social media appropriately – Triage social media activity (ignore, respond, escalate) – Direct to appropriate business functions
  • 29. Manage • Develop and customised social media guidelines and train employees • Manage content: moderate inbound and outbound posts • Ensure appropriate tools are used: – Listening, PoP monitoring, Moderation, Archiving
  • 30. Prepare • Prepare for potential crisis – Identify possible “worst case” problems – Develop tone of voice guidelines – Prepare holding and position statements – Develop escalation process • Practice: Set up artificial crisis and enable response team to practice – Handling stress – Testing processes
  • 31. Archive • All businesses can benefit from archiving conversations with the public – Regulated industries are likely to be required to archive static AND interactive content • Choosing the right tool is essential – What is being archived (e.g. web vs API) – How easy is it to find content and resurrect conversations – How far back can you go
  • 32. Conclusions • Constantly changing landscape • Impossible to anticipate all risks • But structured analysis of business process can deliver an effective risk register that demonstrates a “reasonable” level of care

Editor's Notes

  1. BBC discovered that 49% of the reviews left on the Nottinghamshire Healthcare Trust profile were submitted from staff computers. In the commercial world this would have been a criminal offence! Employees need training so they know what is appropriate
  2. A google dork is someone who accidentally or irresponsibly posts strategic information online so that it can be found by Google. A special constable with Dorset Police resigned after posting a video of himself walking around Poole police station on YouTube. The Video contained information on station layout - a potential serious security issue More seriously, 4 US army helicopters were destroyed in Iraq after geo-tagged photos were posted on the internet
  3. It is very easy to post personal content on a corporate account – which is why technologies that deny access to certain sites/accounts are important