SlideShare a Scribd company logo
1
SOCIAL MEDIA RISK AND THE AUDIT PROCESS
• Organizational social media use is rising and growing increasingly important from a risk management standpoint,
yet formal processes for it remain a rarity.
• Evaluating and monitoring social media risk is or will soon become a key part of audit plans.
• The precise nature of organizational social media risk is rapidly changing, which generates confusion as well as
obstacles internal audit must recognize and address.
Key Findings
I am not sure everyone is trained to understand the risks of social media.
– Director of Auditing, Midsize Hospitality Company
2
RISKS OF A CORPORATE SOCIAL MEDIA PRESENCE
(1/2)
Threats and
Vulnerabilities
Risks Risk Mitigation Techniques
Viruses and malware
are introduced to the
organizational
network.
• Data leakage/theft occurs.
• System downtime occurs.
• Resources to clean systems
are required.
• Ensure that antivirus and antimalware controls are
installed on all systems and updated daily.
• Consider using content filtering technology to restrict
or limit access to social media sites.
• Ensure that the appropriate controls are also installed
on mobile devices, such as smartphones.
• Establish or update policies and standards.
• Develop and conduct awareness training and
campaigns to inform employees of the risks involved
with using social media sites.
Customers and the
enterprise are
exposed through a
fraudulent or hijacked
corporate presence.
• Customer backlash/adverse
legal actions occur.
• Customer information is
exposed.
• Reputational damage can
happen.
• Targeted phishing attacks on
customers or employees
occur.
• Engage a brand protection firm that can scan the
internet and search out misuse of the enterprise’s
brand.
• Provide periodic informational updates to customers
to maintain the awareness of potential fraud and to
establish clear guidelines regarding what information
should be posted as part of the enterprise’s social
media presence.
Source: Social Media: Business Benefits and Security, Governance and Assurance Perspectives, ISACA, 2010
3
RISKS OF A CORPORATE SOCIAL MEDIA PRESENCE
(2/2)
Threats and
Vulnerabilities
Risks Risk Mitigation Techniques
Content rights to
information posted to
social media sites are
unclear or undefined.
• The enterprise loses
control/legal rights of
information posted to the
social media sites.
• Ensure that legal and communication teams carefully
review user agreements for social media sites that
are being considered.
• Establish clear policies that dictate to employees and
customers what information should be posted as part
of the enterprise’s social media presence.
• Ensure that there is a capability to capture and log all
communications (if feasible and appropriate).
A move to a digital
business model may
increase customer
service expectations.
• Customers are dissatisfied
with the responsiveness
received in this arena,
leading to potential
reputational damage for the
enterprise and customer
retention issues.
• Ensure that staffing is adequate to handle the amount
of traffic that could be created from social media
presence.
• Create notices that provide clear windows for
customer response.
Electronic
communications that
may be impacted by
retention regulations
or e-discovery are not
effectively managed.
• Regulatory sanctions and
fines are issued.
• Adverse legal actions are
taken.
• Establish appropriate policies, processes and
technologies to ensure that communications via
social media that may be impacted by litigation or
regulations are tracked and archived appropriately.
• Remember that maintaining an archive, depending
on the social media site, may not be a recommended
approach.
4
POLICY RISKS
Source: http://www.protiviti.com/en-UK/Pages/UK-Companies-at-Risk-from-Inadequate-Social-Media-Policies.aspx; online.wsj.com
• Companies without adequate social media policies place themselves at risk of security breaches and reputational
damage among other issues.
• There are a growing number of cases where firms have vague or out-of-date social media policies that are
unenforceable if inappropriate activity takes place.
• Companies should provide their employees real guidance regarding the use of social media sites and should
have very clear policies targeted at issues specific to social networking.
• Companies should develop or update not only their social media policies, but they should also review all their
human resources (HR) and IT policies as many have become outdated in the era of social networking.
In May 2012, Houston-based fashion retailer Francesca's Holdings Corp. fired their CFO for improperly
communicating company information through social media. The CFO had mentioned the company’s board
meetings, earnings calls and sale of shares multiple times on various social media platforms.
Social Media Policy Breach Example
5
SECURITY RISKS
Five Social
Media
Security
Risks
Malware
Intellectual
Property
Leakage
Phishing
Attacks
Physical or
Connected
Threats
Privacy
Settings Left
Open to All
Source: en.community.dell.com; Global Survey on Social Media Risks,; www.adp.com, http://www.huffingtonpost.com/eliyahu-federman/social-media-addiction_b_2480109.html
• Employees may intentionally or
inadvertently use social media – whether
on-the-job or at home – in a way that
poses risks for their employers.
• Virus and malware attacks against
organizations have increased because
of employees using Facebook, Twitter,
LinkedIn and other social media in the
workplace. In 2012, Americans spent 74
billion minutes on social media sites
(20% of their time).
• Organizations are most concerned with
employees downloading apps or widgets
from social media sites, posting
uncensored content and uncensored
blog entries.
6
RISK MANAGEMENT FOR SOCIAL NETWORKING
• Who has access to post authorized information about your company?
− That user/account should be identified as the official representative for your company.
• Define the social networking policy.
− This policy states who can/cannot post information about your company and the objective of using
social networking sites.
− What types of information can be shared publicly?
− Are there any approvals required to post information?
− Should the information be publicly available or only to friends/subscribers?
• Identify what types of content are currently being shared that are not authorized and try to mitigate issues
with it.
− Try to get in front of the postings/issues.
• Determine if social networking is working depending on the number of subscribers/users.
− If a program is not providing value to the organization, discontinue it.
7
KEY QUESTIONS TO CONSIDER
• Can mobile commerce solutions be integrated effectively, efficiently and securely with your overall IT
infrastructure and existing management tools?
• Does your IT function maintain and update clear mobile commerce and social media policies that clearly convey
the acceptable use and security requirements of these capabilities to employees who engage in mobile commerce
and/or social media activities? How are these policies monitored and audited?
• How robust are your information security measures? Are these measures applied differently depending on the
sensitivity or importance of the data being processed and stored?
• Is your organization in compliance with all relevant industry standards for security and privacy as well as
applicable laws and regulations?
• Does your organization have efficient systems and processes for monitoring the quality of compliance as well as
processes for monitoring ongoing regulatory issues and anticipating new rules and regulations?
• Is the overall state of your company’s social media security sufficient? How can social media capabilities be
integrated more extensively into appropriate business processes to deliver value?
8

More Related Content

What's hot

CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
InfosecTrain
 
Working in Compliance vs. Working On Compliance
Working in Compliance vs. Working On ComplianceWorking in Compliance vs. Working On Compliance
Working in Compliance vs. Working On Compliance
360factors
 
it grc
it grc it grc
it grc
9535814851
 
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 PresentationRisk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
360factors
 
Compliance framework
Compliance frameworkCompliance framework
Compliance framework
Manoj Agarwal
 
Fix nix, inc
Fix nix, incFix nix, inc
Fix nix, inc
FixNix Inc.,
 
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
PECB
 
Regulatory Change Management
Regulatory Change ManagementRegulatory Change Management
Regulatory Change Management
360factors
 
The Importance of IT Compliance Management
The Importance of IT Compliance Management The Importance of IT Compliance Management
The Importance of IT Compliance Management
360factors
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
goreankush1
 
Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
Ismail aboulezz
 
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and SafetyREGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
360factors
 
Sap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftSap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftPennonSoft
 
Information technology risks
Information technology risksInformation technology risks
Information technology riskssalman butt
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT Governance
Bill Lisse
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
Hafiz Sheikh Adnan Ahmed
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011
Hiten Sethi
 
COSO 2013: What you need to know
COSO 2013: What you need to knowCOSO 2013: What you need to know
COSO 2013: What you need to know
jennyhollingworth
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
Dam Frank
 

What's hot (20)

CISA Domain- 1 - InfosecTrain
CISA Domain- 1  - InfosecTrainCISA Domain- 1  - InfosecTrain
CISA Domain- 1 - InfosecTrain
 
Working in Compliance vs. Working On Compliance
Working in Compliance vs. Working On ComplianceWorking in Compliance vs. Working On Compliance
Working in Compliance vs. Working On Compliance
 
it grc
it grc it grc
it grc
 
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 PresentationRisk and Regulatory Change Management - 360factors EUEC 2015 Presentation
Risk and Regulatory Change Management - 360factors EUEC 2015 Presentation
 
Compliance framework
Compliance frameworkCompliance framework
Compliance framework
 
Fix nix, inc
Fix nix, incFix nix, inc
Fix nix, inc
 
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...Assessing the Impact of a Disruption: Building an Effective Business Impact A...
Assessing the Impact of a Disruption: Building an Effective Business Impact A...
 
Regulatory Change Management
Regulatory Change ManagementRegulatory Change Management
Regulatory Change Management
 
The Importance of IT Compliance Management
The Importance of IT Compliance Management The Importance of IT Compliance Management
The Importance of IT Compliance Management
 
Simplifying IT GRC
Simplifying IT GRCSimplifying IT GRC
Simplifying IT GRC
 
IT Risk assessment and Audit Planning
IT Risk assessment and Audit PlanningIT Risk assessment and Audit Planning
IT Risk assessment and Audit Planning
 
Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
 
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and SafetyREGULATORY CHANGE MANAGEMENT  (RCM)   In Environmental Health and Safety
REGULATORY CHANGE MANAGEMENT (RCM) In Environmental Health and Safety
 
Sap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoftSap security compliance tools_PennonSoft
Sap security compliance tools_PennonSoft
 
Information technology risks
Information technology risksInformation technology risks
Information technology risks
 
What Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT GovernanceWhat Every Executive Needs To Know About IT Governance
What Every Executive Needs To Know About IT Governance
 
CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016CISA Training - Chapter 2 - 2016
CISA Training - Chapter 2 - 2016
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011
 
COSO 2013: What you need to know
COSO 2013: What you need to knowCOSO 2013: What you need to know
COSO 2013: What you need to know
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 

Similar to Social media risks guide

Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
Pepovski Darko
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSchleighS
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013
KINSHIP digital
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12Louise Spiteri
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Smarsh
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
Jay McLaughlin
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
JyotiPandey43595
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
Jon Koelle Christensen
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
Social media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov streamSocial media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov stream
Craig Thomler
 
Social Media
Social MediaSocial Media
Social Media
J.L+C.L
 
Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013 Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013
Craig Thomler
 
Social Media MTL Conference Ppt
Social Media MTL Conference PptSocial Media MTL Conference Ppt
Social Media MTL Conference Ppt
rajpatelplantemoran
 
Social Media for Medical Technology Companies
Social Media for Medical Technology Companies Social Media for Medical Technology Companies
Social Media for Medical Technology Companies
Grey Matter Marketing
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
Ben Rothke
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
PBeisty
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social Media
Gerardo A Dada
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013
Amarach Research
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
WebMarketingEfficace
 

Similar to Social media risks guide (20)

Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
Social Media & Enterprise Security Presentation
Social Media & Enterprise Security PresentationSocial Media & Enterprise Security Presentation
Social Media & Enterprise Security Presentation
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
Social media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov streamSocial media impacts - Technology in Government Conference, Connected Gov stream
Social media impacts - Technology in Government Conference, Connected Gov stream
 
Social Media
Social MediaSocial Media
Social Media
 
Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013 Social Media Impacts on ICT Teams - Connected government 2013
Social Media Impacts on ICT Teams - Connected government 2013
 
Social Media MTL Conference Ppt
Social Media MTL Conference PptSocial Media MTL Conference Ppt
Social Media MTL Conference Ppt
 
Social Media for Medical Technology Companies
Social Media for Medical Technology Companies Social Media for Medical Technology Companies
Social Media for Medical Technology Companies
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social Media
 
William Fry Employment Report 2013
William Fry Employment Report 2013William Fry Employment Report 2013
William Fry Employment Report 2013
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 

Recently uploaded

This Is The First All Category Quiz That I Made
This Is The First All Category Quiz That I MadeThis Is The First All Category Quiz That I Made
This Is The First All Category Quiz That I Made
Aarush Ghate
 
Panchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdfPanchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdf
Suleman Rana
 
Skeem Saam in June 2024 available on Forum
Skeem Saam in June 2024 available on ForumSkeem Saam in June 2024 available on Forum
Skeem Saam in June 2024 available on Forum
Isaac More
 
Create a Seamless Viewing Experience with Your Own Custom OTT Player.pdf
Create a Seamless Viewing Experience with Your Own Custom OTT Player.pdfCreate a Seamless Viewing Experience with Your Own Custom OTT Player.pdf
Create a Seamless Viewing Experience with Your Own Custom OTT Player.pdf
Genny Knight
 
I Know Dino Trivia: Part 3. Test your dino knowledge
I Know Dino Trivia: Part 3. Test your dino knowledgeI Know Dino Trivia: Part 3. Test your dino knowledge
I Know Dino Trivia: Part 3. Test your dino knowledge
Sabrina Ricci
 
Meet Crazyjamjam - A TikTok Sensation | Blog Eternal
Meet Crazyjamjam - A TikTok Sensation | Blog EternalMeet Crazyjamjam - A TikTok Sensation | Blog Eternal
Meet Crazyjamjam - A TikTok Sensation | Blog Eternal
Blog Eternal
 
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
Rodney Thomas Jr
 
Christina's Baby Shower Game June 2024.pptx
Christina's Baby Shower Game June 2024.pptxChristina's Baby Shower Game June 2024.pptx
Christina's Baby Shower Game June 2024.pptx
madeline604788
 
Hollywood Actress - The 250 hottest gallery
Hollywood Actress - The 250 hottest galleryHollywood Actress - The 250 hottest gallery
Hollywood Actress - The 250 hottest gallery
Zsolt Nemeth
 
Young Tom Selleck: A Journey Through His Early Years and Rise to Stardom
Young Tom Selleck: A Journey Through His Early Years and Rise to StardomYoung Tom Selleck: A Journey Through His Early Years and Rise to Stardom
Young Tom Selleck: A Journey Through His Early Years and Rise to Stardom
greendigital
 
A TO Z INDIA Monthly Magazine - JUNE 2024
A TO Z INDIA Monthly Magazine - JUNE 2024A TO Z INDIA Monthly Magazine - JUNE 2024
A TO Z INDIA Monthly Magazine - JUNE 2024
Indira Srivatsa
 
Tom Selleck Net Worth: A Comprehensive Analysis
Tom Selleck Net Worth: A Comprehensive AnalysisTom Selleck Net Worth: A Comprehensive Analysis
Tom Selleck Net Worth: A Comprehensive Analysis
greendigital
 
Scandal! Teasers June 2024 on etv Forum.co.za
Scandal! Teasers June 2024 on etv Forum.co.zaScandal! Teasers June 2024 on etv Forum.co.za
Scandal! Teasers June 2024 on etv Forum.co.za
Isaac More
 
240529_Teleprotection Global Market Report 2024.pdf
240529_Teleprotection Global Market Report 2024.pdf240529_Teleprotection Global Market Report 2024.pdf
240529_Teleprotection Global Market Report 2024.pdf
Madhura TBRC
 
The Evolution of Animation in Film - Mark Murphy Director
The Evolution of Animation in Film - Mark Murphy DirectorThe Evolution of Animation in Film - Mark Murphy Director
The Evolution of Animation in Film - Mark Murphy Director
Mark Murphy Director
 
Meet Dinah Mattingly – Larry Bird’s Partner in Life and Love
Meet Dinah Mattingly – Larry Bird’s Partner in Life and LoveMeet Dinah Mattingly – Larry Bird’s Partner in Life and Love
Meet Dinah Mattingly – Larry Bird’s Partner in Life and Love
get joys
 
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdfMaximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Xtreame HDTV
 
Reimagining Classics - What Makes a Remake a Success
Reimagining Classics - What Makes a Remake a SuccessReimagining Classics - What Makes a Remake a Success
Reimagining Classics - What Makes a Remake a Success
Mark Murphy Director
 
Treasure Hunt Puzzles, Treasure Hunt Puzzles online
Treasure Hunt Puzzles, Treasure Hunt Puzzles onlineTreasure Hunt Puzzles, Treasure Hunt Puzzles online
Treasure Hunt Puzzles, Treasure Hunt Puzzles online
Hidden Treasure Hunts
 

Recently uploaded (19)

This Is The First All Category Quiz That I Made
This Is The First All Category Quiz That I MadeThis Is The First All Category Quiz That I Made
This Is The First All Category Quiz That I Made
 
Panchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdfPanchayat Season 3 - Official Trailer.pdf
Panchayat Season 3 - Official Trailer.pdf
 
Skeem Saam in June 2024 available on Forum
Skeem Saam in June 2024 available on ForumSkeem Saam in June 2024 available on Forum
Skeem Saam in June 2024 available on Forum
 
Create a Seamless Viewing Experience with Your Own Custom OTT Player.pdf
Create a Seamless Viewing Experience with Your Own Custom OTT Player.pdfCreate a Seamless Viewing Experience with Your Own Custom OTT Player.pdf
Create a Seamless Viewing Experience with Your Own Custom OTT Player.pdf
 
I Know Dino Trivia: Part 3. Test your dino knowledge
I Know Dino Trivia: Part 3. Test your dino knowledgeI Know Dino Trivia: Part 3. Test your dino knowledge
I Know Dino Trivia: Part 3. Test your dino knowledge
 
Meet Crazyjamjam - A TikTok Sensation | Blog Eternal
Meet Crazyjamjam - A TikTok Sensation | Blog EternalMeet Crazyjamjam - A TikTok Sensation | Blog Eternal
Meet Crazyjamjam - A TikTok Sensation | Blog Eternal
 
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
From Slave to Scourge: The Existential Choice of Django Unchained. The Philos...
 
Christina's Baby Shower Game June 2024.pptx
Christina's Baby Shower Game June 2024.pptxChristina's Baby Shower Game June 2024.pptx
Christina's Baby Shower Game June 2024.pptx
 
Hollywood Actress - The 250 hottest gallery
Hollywood Actress - The 250 hottest galleryHollywood Actress - The 250 hottest gallery
Hollywood Actress - The 250 hottest gallery
 
Young Tom Selleck: A Journey Through His Early Years and Rise to Stardom
Young Tom Selleck: A Journey Through His Early Years and Rise to StardomYoung Tom Selleck: A Journey Through His Early Years and Rise to Stardom
Young Tom Selleck: A Journey Through His Early Years and Rise to Stardom
 
A TO Z INDIA Monthly Magazine - JUNE 2024
A TO Z INDIA Monthly Magazine - JUNE 2024A TO Z INDIA Monthly Magazine - JUNE 2024
A TO Z INDIA Monthly Magazine - JUNE 2024
 
Tom Selleck Net Worth: A Comprehensive Analysis
Tom Selleck Net Worth: A Comprehensive AnalysisTom Selleck Net Worth: A Comprehensive Analysis
Tom Selleck Net Worth: A Comprehensive Analysis
 
Scandal! Teasers June 2024 on etv Forum.co.za
Scandal! Teasers June 2024 on etv Forum.co.zaScandal! Teasers June 2024 on etv Forum.co.za
Scandal! Teasers June 2024 on etv Forum.co.za
 
240529_Teleprotection Global Market Report 2024.pdf
240529_Teleprotection Global Market Report 2024.pdf240529_Teleprotection Global Market Report 2024.pdf
240529_Teleprotection Global Market Report 2024.pdf
 
The Evolution of Animation in Film - Mark Murphy Director
The Evolution of Animation in Film - Mark Murphy DirectorThe Evolution of Animation in Film - Mark Murphy Director
The Evolution of Animation in Film - Mark Murphy Director
 
Meet Dinah Mattingly – Larry Bird’s Partner in Life and Love
Meet Dinah Mattingly – Larry Bird’s Partner in Life and LoveMeet Dinah Mattingly – Larry Bird’s Partner in Life and Love
Meet Dinah Mattingly – Larry Bird’s Partner in Life and Love
 
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdfMaximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
Maximizing Your Streaming Experience with XCIPTV- Tips for 2024.pdf
 
Reimagining Classics - What Makes a Remake a Success
Reimagining Classics - What Makes a Remake a SuccessReimagining Classics - What Makes a Remake a Success
Reimagining Classics - What Makes a Remake a Success
 
Treasure Hunt Puzzles, Treasure Hunt Puzzles online
Treasure Hunt Puzzles, Treasure Hunt Puzzles onlineTreasure Hunt Puzzles, Treasure Hunt Puzzles online
Treasure Hunt Puzzles, Treasure Hunt Puzzles online
 

Social media risks guide

  • 1. 1
  • 2. SOCIAL MEDIA RISK AND THE AUDIT PROCESS • Organizational social media use is rising and growing increasingly important from a risk management standpoint, yet formal processes for it remain a rarity. • Evaluating and monitoring social media risk is or will soon become a key part of audit plans. • The precise nature of organizational social media risk is rapidly changing, which generates confusion as well as obstacles internal audit must recognize and address. Key Findings I am not sure everyone is trained to understand the risks of social media. – Director of Auditing, Midsize Hospitality Company 2
  • 3. RISKS OF A CORPORATE SOCIAL MEDIA PRESENCE (1/2) Threats and Vulnerabilities Risks Risk Mitigation Techniques Viruses and malware are introduced to the organizational network. • Data leakage/theft occurs. • System downtime occurs. • Resources to clean systems are required. • Ensure that antivirus and antimalware controls are installed on all systems and updated daily. • Consider using content filtering technology to restrict or limit access to social media sites. • Ensure that the appropriate controls are also installed on mobile devices, such as smartphones. • Establish or update policies and standards. • Develop and conduct awareness training and campaigns to inform employees of the risks involved with using social media sites. Customers and the enterprise are exposed through a fraudulent or hijacked corporate presence. • Customer backlash/adverse legal actions occur. • Customer information is exposed. • Reputational damage can happen. • Targeted phishing attacks on customers or employees occur. • Engage a brand protection firm that can scan the internet and search out misuse of the enterprise’s brand. • Provide periodic informational updates to customers to maintain the awareness of potential fraud and to establish clear guidelines regarding what information should be posted as part of the enterprise’s social media presence. Source: Social Media: Business Benefits and Security, Governance and Assurance Perspectives, ISACA, 2010 3
  • 4. RISKS OF A CORPORATE SOCIAL MEDIA PRESENCE (2/2) Threats and Vulnerabilities Risks Risk Mitigation Techniques Content rights to information posted to social media sites are unclear or undefined. • The enterprise loses control/legal rights of information posted to the social media sites. • Ensure that legal and communication teams carefully review user agreements for social media sites that are being considered. • Establish clear policies that dictate to employees and customers what information should be posted as part of the enterprise’s social media presence. • Ensure that there is a capability to capture and log all communications (if feasible and appropriate). A move to a digital business model may increase customer service expectations. • Customers are dissatisfied with the responsiveness received in this arena, leading to potential reputational damage for the enterprise and customer retention issues. • Ensure that staffing is adequate to handle the amount of traffic that could be created from social media presence. • Create notices that provide clear windows for customer response. Electronic communications that may be impacted by retention regulations or e-discovery are not effectively managed. • Regulatory sanctions and fines are issued. • Adverse legal actions are taken. • Establish appropriate policies, processes and technologies to ensure that communications via social media that may be impacted by litigation or regulations are tracked and archived appropriately. • Remember that maintaining an archive, depending on the social media site, may not be a recommended approach. 4
  • 5. POLICY RISKS Source: http://www.protiviti.com/en-UK/Pages/UK-Companies-at-Risk-from-Inadequate-Social-Media-Policies.aspx; online.wsj.com • Companies without adequate social media policies place themselves at risk of security breaches and reputational damage among other issues. • There are a growing number of cases where firms have vague or out-of-date social media policies that are unenforceable if inappropriate activity takes place. • Companies should provide their employees real guidance regarding the use of social media sites and should have very clear policies targeted at issues specific to social networking. • Companies should develop or update not only their social media policies, but they should also review all their human resources (HR) and IT policies as many have become outdated in the era of social networking. In May 2012, Houston-based fashion retailer Francesca's Holdings Corp. fired their CFO for improperly communicating company information through social media. The CFO had mentioned the company’s board meetings, earnings calls and sale of shares multiple times on various social media platforms. Social Media Policy Breach Example 5
  • 6. SECURITY RISKS Five Social Media Security Risks Malware Intellectual Property Leakage Phishing Attacks Physical or Connected Threats Privacy Settings Left Open to All Source: en.community.dell.com; Global Survey on Social Media Risks,; www.adp.com, http://www.huffingtonpost.com/eliyahu-federman/social-media-addiction_b_2480109.html • Employees may intentionally or inadvertently use social media – whether on-the-job or at home – in a way that poses risks for their employers. • Virus and malware attacks against organizations have increased because of employees using Facebook, Twitter, LinkedIn and other social media in the workplace. In 2012, Americans spent 74 billion minutes on social media sites (20% of their time). • Organizations are most concerned with employees downloading apps or widgets from social media sites, posting uncensored content and uncensored blog entries. 6
  • 7. RISK MANAGEMENT FOR SOCIAL NETWORKING • Who has access to post authorized information about your company? − That user/account should be identified as the official representative for your company. • Define the social networking policy. − This policy states who can/cannot post information about your company and the objective of using social networking sites. − What types of information can be shared publicly? − Are there any approvals required to post information? − Should the information be publicly available or only to friends/subscribers? • Identify what types of content are currently being shared that are not authorized and try to mitigate issues with it. − Try to get in front of the postings/issues. • Determine if social networking is working depending on the number of subscribers/users. − If a program is not providing value to the organization, discontinue it. 7
  • 8. KEY QUESTIONS TO CONSIDER • Can mobile commerce solutions be integrated effectively, efficiently and securely with your overall IT infrastructure and existing management tools? • Does your IT function maintain and update clear mobile commerce and social media policies that clearly convey the acceptable use and security requirements of these capabilities to employees who engage in mobile commerce and/or social media activities? How are these policies monitored and audited? • How robust are your information security measures? Are these measures applied differently depending on the sensitivity or importance of the data being processed and stored? • Is your organization in compliance with all relevant industry standards for security and privacy as well as applicable laws and regulations? • Does your organization have efficient systems and processes for monitoring the quality of compliance as well as processes for monitoring ongoing regulatory issues and anticipating new rules and regulations? • Is the overall state of your company’s social media security sufficient? How can social media capabilities be integrated more extensively into appropriate business processes to deliver value? 8