SlideShare a Scribd company logo
1 of 72
Donald E. Hester
CISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+, CTT+
Director, Maze & Associates
University of San Francisco / San Diego City College
www.LearnSecurity.org | www.linkedin.com/in/donaldehester | www.facebook.com/LearnSec | www.twitter.com/sobca
DonaldH@MazeAssociates.com
Rev2/28/2011 © 2011 Maze & Associates 3
Pervasive By Nature
Social Tech
Private
Life
Work
Family
School
Rev2/28/2011 © 2011 Maze & Associates 4
Social Tech Issues
Rev2/28/2011 © 2011 Maze & Associates 5
M
• Marketing
• Brand Protection
• Customer
Relations
HR
• Hiring
• Personnel
Management
P
• Privacy
• Identity
• Home/Work
MARKETING & BRANDING USES
Rev2/28/2011 © 2011 Maze & Associates 6
Brand Protection - Concerns
• Fear of losing control
• Fear of losing customers
• Fear of losing money
• Fear of customers speaking up
• Avoiding social media
– Fear of the unknown
– Thinking it is a fade
• Not understanding social media
• How will you measure impact
Rev2/28/2011 © 2011 Maze & Associates 7
Brand Issues
Rev2/28/2011 © 2011 Maze & Associates 8
Monitor Social Media for your Brand
Rev2/28/2011 © 2011 Maze & Associates 9
Social Shopping
Rev2/28/2011 © 2011 Maze & Associates 10
How to get started
• Social Technology
– The train has left the building, are you on it?
• Get informed
• Get help (technical and soft skills)
• Develop a social media marketing
strategic plan
• Create short term goals
• Execute and Adapt
Rev2/28/2011 © 2011 Maze & Associates 11
Marketing
• Manger's Guide to Social Media
– by Scott Klososky
• The FaceBook Era
– by Clara Shih
• Facebook Marketing: An Hour a Day
– by Chris Treadaway and Mari Smith
• New Rules of Marketing and PR
– by David Meerman Scott
• The Zen of Social Media Marketing: An Easier Way to
Build Credibility, Generate Buzz, and Increase
Revenue
– by Shama Kabani and Chris Brogan
Rev2/28/2011 © 2011 Maze & Associates 12
Establish Brand in Social Media
Rev2/28/2011 © 2011 Maze & Associates 13
Market Saturation
Rev2/28/2011 © 2011 Maze & Associates 14
Integration
Your
Website
Facebook
Twitter
LinkedIn
Other
Rev2/28/2011 © 2011 Maze & Associates 15
Deceptive Marketing
Rev2/28/2011 © 2011 Maze & Associates 16
Endorsements
• If you are being paid to endorse a product, you
must make that clear to consumers.
Rev2/28/2011 © 2011 Maze & Associates 17
http://www.ftc.gov/opa/2009/10/endortest.shtm
HUMAN RESOURCES USES
Rev2/28/2011 © 2011 Maze & Associates 18
Social Media Uses in HR
• The use of social media outside of
personal lives has increased and
continues to increase
• Concern that potential employers will
misconstrue what is seen
• Used for monitoring current employees
• Used for screening job applicants
– Employees see it as a good way to “get to
know” the applicant
Rev2/28/2011 © 2011 Maze & Associates 19
http://www.ajc.com/news/barrow-teacher-fired-over-733625.html
Rev2/28/2011 © 2011 Maze & Associates 20
http://www.dailyfinance.com/story/media/facebook-spying-costs-canadian-woman-her-health-benefits/19250917/
Rev2/28/2011 © 2011 Maze & Associates 21
Rev2/28/2011 © 2011 Maze & Associates 22
http://smallbiztrends.com/2009/09/social-media-background-checks.html
Horns of a dilemma
• If employers use social media to do
background checks on employees
– The company is open to discrimination
charges
– The candidates is vulnerable to
discrimination
Rev2/28/2011 © 2011 Maze & Associates 23
Horns of a dilemma
• If employers don’t use social media to do
background checks on employees
– The company is open to negligent hires
– Good candidates are missed
– Bad candidates are hired
Rev2/28/2011 © 2011 Maze & Associates 24
Use of Social Media at Work
• Does your company have a social media
policy?
• How much time do employees use social
media?
• Does it effect employee productivity?
• How much cross over between work /
home life?
Rev2/28/2011 © 2011 Maze & Associates 25
PERSONAL USES
Rev2/28/2011 © 2011 Maze & Associates 26
Computer Security: Malware
Rev2/28/2011 © 2011 Maze & Associates 27
Online Privacy
• Do you have control of what is posted?
• Not all fame is good!
• People use anonymity to post stuff
about others!
• Embarrassing, loss of credibility
Rev2/28/2011 © 2011 Maze & Associates 28
Information about you online
• Do I have control of
what is posted about
me?
• Look yourself up!
• All but one of these
is about me.
• One of these I was
completely unaware
of.
• Even if you are not
on the web, you may
be on the web!
• Do what you can to
control what is out
there.
• What is you social
relevancy
(Reputation)?
Rev2/28/2011 © 2011 Maze & Associates 29
Sony Play Station Network Breach
Rev2/28/2011 © 2011 Maze & Associates 30
SOCIAL MEDIA & POLITICS
Rev2/28/2011 © 2011 Maze & Associates 31
Elections
Rev2/28/2011 © 2011 Maze & Associates 32
Social Media and Politics
Rev2/28/2011 © 2011 Maze & Associates 33
IDENTITY THEFT
Rev2/28/2011 © 2011 Maze & Associates 34
Social Media (Web 2.0)
 Services are extremely popular and useful
 Almost a must today, (if you are not in, you are
out)
 People post too much information about
themselves or their kids
 Be aware of your aggregate information
 The key is to be aware of what you are sharing
Rev2/28/2011 © 2011 Maze & Associates 35
Online Privacy
• Would you invite
a stranger into
your house to
look at your
children's photo
album?
• Public v. Private
• Aggregate
information
sources could
give someone
more information
than intended.
Rev2/28/2011 © 2011 Maze & Associates 36
Situation
• Why does someone want your
personal information?
– In an information age information
becomes a commodity
– Information has a value
– Some information has a greater
value
– Your personal information is
potentially worth more than you
think
Rev2/28/2011 © 2011 Maze & Associates 37
What is PII
• Personally Identifiable Information
– Name and account number
– Name and social security number
– Name and address
– Credit Card Number
• Where you might find it
– Tax files
– Account Statements
– Records (Medical, Public and other)
– Businesses you do business with
Rev2/28/2011 © 2011 Maze & Associates 38
ID Theft vs. ID Fraud
• “Identity fraud," consists mainly of
someone making unauthorized charges
to your credit card.
• “Identity theft,” is when someone
gathers your personal information and
assumes your identity as their own.
"Identify theft is one of the fastest
growing crimes in the US."
John Ashcroft
79th US Attorney General
Rev2/28/2011 © 2011 Maze & Associates 39
• March 20th 2001, MSNBC reported the first
identity theft case to gain widespread public
attention
• Thief assumed the identities of Oprah Winfrey
and Martha Stewart, took out new credit cards in
their names, and accessed their bank accounts
• Stole more than $7 million from 200 of the
world’s super rich - Warren Buffet and George
Soros, tech tycoons Paul Allen and Larry Ellison
• Used a library computer, public records, a cell
phone, a fax machine, a PO Box, and a copy of
Forbes Richest People
• 32-year-old Abraham Abdallah was described as
“a high school dropout, a New York City busboy, a
pudgy, disheveled, career petty criminal.”
The Busboy That Started It All
Rev2/28/2011 © 2011 Maze & Associates 40
ID Theft & Fraud
• PII exposed by others (Data Breaches)
• PII exposed by ourselves (online & others)
• Malware (Spyware, Viruses, etc…)
• Social Engineering
– Phone
– Internet (Phishing, social websites etc…)
– In Person (at your door, in a restaurant etc…)
• Physical theft
– Mail box
– Trash (Dumpster diving)
– ATMs (skimming)
– Home break-ins
Rev2/28/2011 © 2011 Maze & Associates 41
What do they do with stolen IDs?
Rev2/28/2011 © 2011 Maze & Associates 42
Drug Trafficking and ID Theft
Meth users see mail theft and check washing as a low risk
way to pay for their habit.
The same chemicals used in Meth production are used in
check washing.
Meth users, dealers and fraudsters are partners in crime.
Rev2/28/2011 © 2011 Maze & Associates 43
FTC 2009 Stats
• Top counties with ID theft
– Solano County 18 out of 375
• Average per victim loss
– $10,000
• Total complaints filed in 2009
– 1.3 Million
Rev2/28/2011 © 2011 Maze & Associates 44
FTC http://www.ftc.gov/opa/2010/02/2009fraud.shtm
HOW MIGHT YOU EXPOSE YOUR
PII
Rev2/28/2011 © 2011 Maze & Associates 45
Watch what you put online
Rev2/28/2011 © 2011 Maze & Associates 46
http://www.youtube.com/watch?v=Soq3jzttwiA
Can someone use what you post
against you?
Rev2/28/2011 © 2011 Maze & Associates 47
P2P (Peer to Peer file sharing)
• Napster used to fit in this category
• Used to ‘share’ computer files
• Legal issues with copyright
• Malware issues, often the P2P software
will install adware or tracking software.
• Privacy issues, do you know what you
are sharing?
Rev2/28/2011 © 2011 Maze & Associates 48
HOW BAD GUYS MIGHT GET
YOUR PII
Rev2/28/2011 © 2011 Maze & Associates 49
Malware
• Malware (Viruses, Worms, Spyware,
etc…)
– 1999 Melissa, Kevin Mitnick,
– 2000 Mafiaboy, DoS Assault,
– 2001 Code Red, Nimda,
– 2002 Root Rot, Slapper,
– 2003 SQL Slammer,
– 2004 MyDoom, BerBew,
– 2005 Samy (MySpace),
– 2007 Storm Worm, Botnets, etc..
Malware has cost
trillions of dollars in
the last decade
Rev2/28/2011 © 2011 Maze & Associates 50
Viruses
• In the past they were primarily
destructive
• Today they focus on stealing information
• Using your computer as a Bot (Zombie)
to send out SPAM
Rev2/28/2011 © 2011 Maze & Associates 51
Phishing: Internet Fraud
• Oldest trick in the book,
there are examples in the
1500s
• One particular fraud is called
the “Nigerian 419” scam or
“Advanced Fee Fraud”
• Started as a letter, then it
showed up in faxes and now
it is sent by email.
• Many variations on the story
the message contains
http://www.secretservice.gov/fraud_email_advisory.shtml
Rev2/28/2011 © 2011 Maze & Associates 52
Rev2/28/2011 © 2011 Maze & Associates 53
Phishing Example
Rev2/28/2011 © 2011 Maze & Associates 54
Spyware
Rev2/28/2011 © 2011 Maze & Associates 55
Cell Phone Spyware
Rev2/28/2011 © 2011 Maze & Associates 56
http://www.youtube.com/watch?v=uCyKcoDaofg
http://news.rutgers.edu/medrel/news-releases/2010/02/rutgers-researchers-20100222
http://www.youtube.com/watch?v=UZgf32wVTd4
Physical theft
• Dumpster diving
• ATM – Credit Card skimming
• Mailbox
• Home Break-in
Rev2/28/2011 © 2011 Maze & Associates 57
Close to Home
Rev2/28/2011 © 2011 Maze & Associates 58
“Lock Bumping”
http://cbs11tv.com/seenon/Bump.Key.Safety.2.499252.html
Rev2/28/2011 © 2011 Maze & Associates 59
ATM Skimming
Rev2/28/2011 © 2011 Maze & Associates 60
http://www.youtube.com/watch?v=m3qK46L2b_c
Credit Card Skimming
Rev2/28/2011 © 2011 Maze & Associates 61
Credit Card Skimming Stats
TOP MERCHANT GROUPS
RESTAURANTS
GAS
HOTELS
CAR RENTALS
ALL OTHER
SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET
SERVICERev2/28/2011 © 2011 Maze & Associates 62
Credit Card Skimming Stats
BY MERCHANT LOCATIONS
CALIFORNIA
FLORIDA
NEW YORK
NEW JERSEY
TEXAS
MEXICO
ILLINOIS
ALL OTHER
SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET
SERVICERev2/28/2011 © 2011 Maze & Associates 63
HOW OTHERS MIGHT EXPOSE
YOUR PII
Rev2/28/2011 © 2011 Maze & Associates 64
How others might expose your PII
• Data Breach
– Lack of security on the part of businesses
– Organization may post information online
– Loss of a laptop, hard drive or paper work
– Data loss by a third party
– Hacker (Organized Crime & Nation State)
– Organizations may break into your
computer
Rev2/28/2011 © 2011 Maze & Associates 65
Sony PlayStaion Network Breach
Rev2/28/2011 © 2011 Maze & Associates 66
Public Records
Rev2/28/2011 © 2011 Maze & Associates 67
“The federal government is the
biggest offender.”
Paul Stephens
Privacy Rights Clearinghouse
Others losing your ID
4.2 million customer card transactions were compromised by hackers
Rev2/28/2011 © 2011 Maze & Associates 68
Unknown Exposure
Rev2/28/2011 © 2011 Maze & Associates 69
Top 10 Largest Breaches*
Records Date Organizations
130,000,000 2009-01-20 Heartland Payment Systems
94,000,000 2007-01-17 TJX Companies Inc.
90,000,000 1984-06-01 TRW, Sears Roebuck
76,000,000 2009-10-05 National Archives and Records Administration
40,000,000 2005-06-19 CardSystems, Visa, MasterCard, American Express
30,000,000 2004-06-24 America Online
26,500,000 2006-05-22 U.S. Department of Veterans Affairs
25,000,000 2007-11-20 HM Revenue and Customs, TNT
17,000,000 2008-10-06 T-Mobile, Deutsche Telekom
16,000,000 1986-11-01 Canada Revenue Agency
Rev2/28/2011 © 2011 Maze & Associates 70
*Top ten data breaches as of 22 Feb 2010. Data provided by DataLoss db.
725,797,885 breached records out of 2466 reported incidents.
Repeat Offenders*
Company Number of
Reported Breaches
LPL Financial 12
Nationwide 11
Equifax 11
Experian 11
Blue Cross 10
B of A 9
Cornell University 9
University of Iowa 9
HSBC 8
Pfizer 8
Rev2/28/2011 © 2011 Maze & Associates 71
*As of 22 Feb 2010. Data provided by DataLoss db.
725,797,885 breached records out of 2466 reported incidents.
Sony Root kit
• Sony, in its efforts to preserve control
over its product, installed root kits on
consumers computers
• Consumers were not aware it was
installed (on copy-protected CDs)
• Gave Sony and potentially hackers the
ability to remotely control your computer
• Removal of software disabled CD drives
on consumers computers
http://www.cnet.com/4520-6033_1-6376177-1.html?tag=nl.e501
Rev2/28/2011 © 2011 Maze & Associates 72

More Related Content

What's hot

The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsCorinne Weisgerber
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networksblogzilla
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorialtutorialsruby
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingIshfaq Majid
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeParag Deodhar
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYgailmowal
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Kirsten Thompson
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk ManagementConnectSafely
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected SocietyCentraComm
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High SchoolLiftPotential
 
Slideshare online identity construction
Slideshare   online identity constructionSlideshare   online identity construction
Slideshare online identity constructionApinya Anphanlam
 

What's hot (20)

The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Social media risk
Social media riskSocial media risk
Social media risk
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Digital Self
Digital SelfDigital Self
Digital Self
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITYPresentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
Presentation 2SOCIAL MEDIA AND THE FUTURE OF PRIVACY & SECURITY
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Social Media for Families
Social Media for FamiliesSocial Media for Families
Social Media for Families
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management3Rs of Internet Safety: Rights, Responsibilities and Risk Management
3Rs of Internet Safety: Rights, Responsibilities and Risk Management
 
Security In A Connected Society
Security In A Connected SocietySecurity In A Connected Society
Security In A Connected Society
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 
Slideshare online identity construction
Slideshare   online identity constructionSlideshare   online identity construction
Slideshare online identity construction
 

Similar to Social Media Security 2011

Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Donald E. Hester
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposureLDdsng
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017Steve Mckee
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaElizabeth T. "Eli" Edwards
 
Measurement is Sexy - Wikibrands
Measurement is Sexy - WikibrandsMeasurement is Sexy - Wikibrands
Measurement is Sexy - WikibrandsSean Moffitt
 
Sentiment Analysis and Social Media: How and Why
Sentiment Analysis and Social Media: How and WhySentiment Analysis and Social Media: How and Why
Sentiment Analysis and Social Media: How and WhyDavide Feltoni Gurini
 
Social media broadview_washto
Social media broadview_washtoSocial media broadview_washto
Social media broadview_washtoLloyd Brown
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal lifeNathan Lesser
 
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data DayTransforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data DayAndreas Weigend
 

Similar to Social Media Security 2011 (20)

Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Social Media and Employment Issues
Social Media and Employment IssuesSocial Media and Employment Issues
Social Media and Employment Issues
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
New media and privacy
New media and privacyNew media and privacy
New media and privacy
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Policy primer net303 study period 3, 2017
Policy primer net303  study period 3, 2017Policy primer net303  study period 3, 2017
Policy primer net303 study period 3, 2017
 
Intellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social MediaIntellectual Freedom, Privacy and Social Media
Intellectual Freedom, Privacy and Social Media
 
Why You Need a Social Media Policy
Why You Need a Social Media PolicyWhy You Need a Social Media Policy
Why You Need a Social Media Policy
 
Measurement is Sexy - Wikibrands
Measurement is Sexy - WikibrandsMeasurement is Sexy - Wikibrands
Measurement is Sexy - Wikibrands
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Sentiment Analysis and Social Media: How and Why
Sentiment Analysis and Social Media: How and WhySentiment Analysis and Social Media: How and Why
Sentiment Analysis and Social Media: How and Why
 
Social media broadview_washto
Social media broadview_washtoSocial media broadview_washto
Social media broadview_washto
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
protecting your digital personal life
protecting your digital personal lifeprotecting your digital personal life
protecting your digital personal life
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data DayTransforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
Transforming Big Data into Decisions -- keynote at IBM/s 2014 Big Data Day
 
State bar 2012a
State bar 2012aState bar 2012a
State bar 2012a
 

More from Donald E. Hester

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGDonald E. Hester
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local GovDonald E. Hester
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About RansomwareDonald E. Hester
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows ClientDonald E. Hester
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud EnvironmentDonald E. Hester
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...Donald E. Hester
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local GovernmentsDonald E. Hester
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearDonald E. Hester
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationDonald E. Hester
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB updateDonald E. Hester
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGDonald E. Hester
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Donald E. Hester
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorDonald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Donald E. Hester
 

More from Donald E. Hester (20)

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 

Recently uploaded

Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...baharayali
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...makika9823
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comSagar Sinha
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project17mos052
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...AJHSSR Journal
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!andrekr997
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeMs Riya
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...SejarahLokal
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Floridajorirz24
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...AJHSSR Journal
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170Komal Khan
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfAlexander Sirach
 

Recently uploaded (20)

Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
Top Astrologer, Kala ilam specialist in USA and Bangali Amil baba in Saudi Ar...
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
 
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Noida Sector 93 Escorts Delhi NCR
 
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.comUnlock Your Social Media Potential with IndianLikes - IndianLikes.com
Unlock Your Social Media Potential with IndianLikes - IndianLikes.com
 
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
IMPACT OF FISCAL POLICY AND MONETARY POLICY ON THE ECONOMIC GROWTH OF NIGERIA...
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!
 
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking JusticeBicycle Safety in Focus: Preventing Fatalities and Seeking Justice
Bicycle Safety in Focus: Preventing Fatalities and Seeking Justice
 
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call MeCall^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
Call^ Girls Delhi Independent girls Chanakyapuri 9711199012 Call Me
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...
 
Spotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of FloridaSpotify AI DJ Deck - The Agency at University of Florida
Spotify AI DJ Deck - The Agency at University of Florida
 
Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...Impact Of Educational Resources on Students' Academic Performance in Economic...
Impact Of Educational Resources on Students' Academic Performance in Economic...
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
 

Social Media Security 2011

  • 1.
  • 2. Donald E. Hester CISSP, CISA, CAP, MCT, MCITP, MCTS, MCSE Security, Security+, CTT+ Director, Maze & Associates University of San Francisco / San Diego City College www.LearnSecurity.org | www.linkedin.com/in/donaldehester | www.facebook.com/LearnSec | www.twitter.com/sobca DonaldH@MazeAssociates.com
  • 3. Rev2/28/2011 © 2011 Maze & Associates 3
  • 4. Pervasive By Nature Social Tech Private Life Work Family School Rev2/28/2011 © 2011 Maze & Associates 4
  • 5. Social Tech Issues Rev2/28/2011 © 2011 Maze & Associates 5 M • Marketing • Brand Protection • Customer Relations HR • Hiring • Personnel Management P • Privacy • Identity • Home/Work
  • 6. MARKETING & BRANDING USES Rev2/28/2011 © 2011 Maze & Associates 6
  • 7. Brand Protection - Concerns • Fear of losing control • Fear of losing customers • Fear of losing money • Fear of customers speaking up • Avoiding social media – Fear of the unknown – Thinking it is a fade • Not understanding social media • How will you measure impact Rev2/28/2011 © 2011 Maze & Associates 7
  • 8. Brand Issues Rev2/28/2011 © 2011 Maze & Associates 8
  • 9. Monitor Social Media for your Brand Rev2/28/2011 © 2011 Maze & Associates 9
  • 10. Social Shopping Rev2/28/2011 © 2011 Maze & Associates 10
  • 11. How to get started • Social Technology – The train has left the building, are you on it? • Get informed • Get help (technical and soft skills) • Develop a social media marketing strategic plan • Create short term goals • Execute and Adapt Rev2/28/2011 © 2011 Maze & Associates 11
  • 12. Marketing • Manger's Guide to Social Media – by Scott Klososky • The FaceBook Era – by Clara Shih • Facebook Marketing: An Hour a Day – by Chris Treadaway and Mari Smith • New Rules of Marketing and PR – by David Meerman Scott • The Zen of Social Media Marketing: An Easier Way to Build Credibility, Generate Buzz, and Increase Revenue – by Shama Kabani and Chris Brogan Rev2/28/2011 © 2011 Maze & Associates 12
  • 13. Establish Brand in Social Media Rev2/28/2011 © 2011 Maze & Associates 13
  • 14. Market Saturation Rev2/28/2011 © 2011 Maze & Associates 14
  • 16. Deceptive Marketing Rev2/28/2011 © 2011 Maze & Associates 16
  • 17. Endorsements • If you are being paid to endorse a product, you must make that clear to consumers. Rev2/28/2011 © 2011 Maze & Associates 17 http://www.ftc.gov/opa/2009/10/endortest.shtm
  • 18. HUMAN RESOURCES USES Rev2/28/2011 © 2011 Maze & Associates 18
  • 19. Social Media Uses in HR • The use of social media outside of personal lives has increased and continues to increase • Concern that potential employers will misconstrue what is seen • Used for monitoring current employees • Used for screening job applicants – Employees see it as a good way to “get to know” the applicant Rev2/28/2011 © 2011 Maze & Associates 19
  • 22. Rev2/28/2011 © 2011 Maze & Associates 22 http://smallbiztrends.com/2009/09/social-media-background-checks.html
  • 23. Horns of a dilemma • If employers use social media to do background checks on employees – The company is open to discrimination charges – The candidates is vulnerable to discrimination Rev2/28/2011 © 2011 Maze & Associates 23
  • 24. Horns of a dilemma • If employers don’t use social media to do background checks on employees – The company is open to negligent hires – Good candidates are missed – Bad candidates are hired Rev2/28/2011 © 2011 Maze & Associates 24
  • 25. Use of Social Media at Work • Does your company have a social media policy? • How much time do employees use social media? • Does it effect employee productivity? • How much cross over between work / home life? Rev2/28/2011 © 2011 Maze & Associates 25
  • 26. PERSONAL USES Rev2/28/2011 © 2011 Maze & Associates 26
  • 27. Computer Security: Malware Rev2/28/2011 © 2011 Maze & Associates 27
  • 28. Online Privacy • Do you have control of what is posted? • Not all fame is good! • People use anonymity to post stuff about others! • Embarrassing, loss of credibility Rev2/28/2011 © 2011 Maze & Associates 28
  • 29. Information about you online • Do I have control of what is posted about me? • Look yourself up! • All but one of these is about me. • One of these I was completely unaware of. • Even if you are not on the web, you may be on the web! • Do what you can to control what is out there. • What is you social relevancy (Reputation)? Rev2/28/2011 © 2011 Maze & Associates 29
  • 30. Sony Play Station Network Breach Rev2/28/2011 © 2011 Maze & Associates 30
  • 31. SOCIAL MEDIA & POLITICS Rev2/28/2011 © 2011 Maze & Associates 31
  • 32. Elections Rev2/28/2011 © 2011 Maze & Associates 32
  • 33. Social Media and Politics Rev2/28/2011 © 2011 Maze & Associates 33
  • 34. IDENTITY THEFT Rev2/28/2011 © 2011 Maze & Associates 34
  • 35. Social Media (Web 2.0)  Services are extremely popular and useful  Almost a must today, (if you are not in, you are out)  People post too much information about themselves or their kids  Be aware of your aggregate information  The key is to be aware of what you are sharing Rev2/28/2011 © 2011 Maze & Associates 35
  • 36. Online Privacy • Would you invite a stranger into your house to look at your children's photo album? • Public v. Private • Aggregate information sources could give someone more information than intended. Rev2/28/2011 © 2011 Maze & Associates 36
  • 37. Situation • Why does someone want your personal information? – In an information age information becomes a commodity – Information has a value – Some information has a greater value – Your personal information is potentially worth more than you think Rev2/28/2011 © 2011 Maze & Associates 37
  • 38. What is PII • Personally Identifiable Information – Name and account number – Name and social security number – Name and address – Credit Card Number • Where you might find it – Tax files – Account Statements – Records (Medical, Public and other) – Businesses you do business with Rev2/28/2011 © 2011 Maze & Associates 38
  • 39. ID Theft vs. ID Fraud • “Identity fraud," consists mainly of someone making unauthorized charges to your credit card. • “Identity theft,” is when someone gathers your personal information and assumes your identity as their own. "Identify theft is one of the fastest growing crimes in the US." John Ashcroft 79th US Attorney General Rev2/28/2011 © 2011 Maze & Associates 39
  • 40. • March 20th 2001, MSNBC reported the first identity theft case to gain widespread public attention • Thief assumed the identities of Oprah Winfrey and Martha Stewart, took out new credit cards in their names, and accessed their bank accounts • Stole more than $7 million from 200 of the world’s super rich - Warren Buffet and George Soros, tech tycoons Paul Allen and Larry Ellison • Used a library computer, public records, a cell phone, a fax machine, a PO Box, and a copy of Forbes Richest People • 32-year-old Abraham Abdallah was described as “a high school dropout, a New York City busboy, a pudgy, disheveled, career petty criminal.” The Busboy That Started It All Rev2/28/2011 © 2011 Maze & Associates 40
  • 41. ID Theft & Fraud • PII exposed by others (Data Breaches) • PII exposed by ourselves (online & others) • Malware (Spyware, Viruses, etc…) • Social Engineering – Phone – Internet (Phishing, social websites etc…) – In Person (at your door, in a restaurant etc…) • Physical theft – Mail box – Trash (Dumpster diving) – ATMs (skimming) – Home break-ins Rev2/28/2011 © 2011 Maze & Associates 41
  • 42. What do they do with stolen IDs? Rev2/28/2011 © 2011 Maze & Associates 42
  • 43. Drug Trafficking and ID Theft Meth users see mail theft and check washing as a low risk way to pay for their habit. The same chemicals used in Meth production are used in check washing. Meth users, dealers and fraudsters are partners in crime. Rev2/28/2011 © 2011 Maze & Associates 43
  • 44. FTC 2009 Stats • Top counties with ID theft – Solano County 18 out of 375 • Average per victim loss – $10,000 • Total complaints filed in 2009 – 1.3 Million Rev2/28/2011 © 2011 Maze & Associates 44 FTC http://www.ftc.gov/opa/2010/02/2009fraud.shtm
  • 45. HOW MIGHT YOU EXPOSE YOUR PII Rev2/28/2011 © 2011 Maze & Associates 45
  • 46. Watch what you put online Rev2/28/2011 © 2011 Maze & Associates 46 http://www.youtube.com/watch?v=Soq3jzttwiA
  • 47. Can someone use what you post against you? Rev2/28/2011 © 2011 Maze & Associates 47
  • 48. P2P (Peer to Peer file sharing) • Napster used to fit in this category • Used to ‘share’ computer files • Legal issues with copyright • Malware issues, often the P2P software will install adware or tracking software. • Privacy issues, do you know what you are sharing? Rev2/28/2011 © 2011 Maze & Associates 48
  • 49. HOW BAD GUYS MIGHT GET YOUR PII Rev2/28/2011 © 2011 Maze & Associates 49
  • 50. Malware • Malware (Viruses, Worms, Spyware, etc…) – 1999 Melissa, Kevin Mitnick, – 2000 Mafiaboy, DoS Assault, – 2001 Code Red, Nimda, – 2002 Root Rot, Slapper, – 2003 SQL Slammer, – 2004 MyDoom, BerBew, – 2005 Samy (MySpace), – 2007 Storm Worm, Botnets, etc.. Malware has cost trillions of dollars in the last decade Rev2/28/2011 © 2011 Maze & Associates 50
  • 51. Viruses • In the past they were primarily destructive • Today they focus on stealing information • Using your computer as a Bot (Zombie) to send out SPAM Rev2/28/2011 © 2011 Maze & Associates 51
  • 52. Phishing: Internet Fraud • Oldest trick in the book, there are examples in the 1500s • One particular fraud is called the “Nigerian 419” scam or “Advanced Fee Fraud” • Started as a letter, then it showed up in faxes and now it is sent by email. • Many variations on the story the message contains http://www.secretservice.gov/fraud_email_advisory.shtml Rev2/28/2011 © 2011 Maze & Associates 52
  • 53. Rev2/28/2011 © 2011 Maze & Associates 53
  • 54. Phishing Example Rev2/28/2011 © 2011 Maze & Associates 54
  • 55. Spyware Rev2/28/2011 © 2011 Maze & Associates 55
  • 56. Cell Phone Spyware Rev2/28/2011 © 2011 Maze & Associates 56 http://www.youtube.com/watch?v=uCyKcoDaofg http://news.rutgers.edu/medrel/news-releases/2010/02/rutgers-researchers-20100222 http://www.youtube.com/watch?v=UZgf32wVTd4
  • 57. Physical theft • Dumpster diving • ATM – Credit Card skimming • Mailbox • Home Break-in Rev2/28/2011 © 2011 Maze & Associates 57
  • 58. Close to Home Rev2/28/2011 © 2011 Maze & Associates 58
  • 60. ATM Skimming Rev2/28/2011 © 2011 Maze & Associates 60 http://www.youtube.com/watch?v=m3qK46L2b_c
  • 61. Credit Card Skimming Rev2/28/2011 © 2011 Maze & Associates 61
  • 62. Credit Card Skimming Stats TOP MERCHANT GROUPS RESTAURANTS GAS HOTELS CAR RENTALS ALL OTHER SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICERev2/28/2011 © 2011 Maze & Associates 62
  • 63. Credit Card Skimming Stats BY MERCHANT LOCATIONS CALIFORNIA FLORIDA NEW YORK NEW JERSEY TEXAS MEXICO ILLINOIS ALL OTHER SOURCE: CALIFORNIA RESTAURANT ASSOCIATION, VISA USA, UNITED STATES SECRET SERVICERev2/28/2011 © 2011 Maze & Associates 63
  • 64. HOW OTHERS MIGHT EXPOSE YOUR PII Rev2/28/2011 © 2011 Maze & Associates 64
  • 65. How others might expose your PII • Data Breach – Lack of security on the part of businesses – Organization may post information online – Loss of a laptop, hard drive or paper work – Data loss by a third party – Hacker (Organized Crime & Nation State) – Organizations may break into your computer Rev2/28/2011 © 2011 Maze & Associates 65
  • 66. Sony PlayStaion Network Breach Rev2/28/2011 © 2011 Maze & Associates 66
  • 67. Public Records Rev2/28/2011 © 2011 Maze & Associates 67 “The federal government is the biggest offender.” Paul Stephens Privacy Rights Clearinghouse
  • 68. Others losing your ID 4.2 million customer card transactions were compromised by hackers Rev2/28/2011 © 2011 Maze & Associates 68
  • 69. Unknown Exposure Rev2/28/2011 © 2011 Maze & Associates 69
  • 70. Top 10 Largest Breaches* Records Date Organizations 130,000,000 2009-01-20 Heartland Payment Systems 94,000,000 2007-01-17 TJX Companies Inc. 90,000,000 1984-06-01 TRW, Sears Roebuck 76,000,000 2009-10-05 National Archives and Records Administration 40,000,000 2005-06-19 CardSystems, Visa, MasterCard, American Express 30,000,000 2004-06-24 America Online 26,500,000 2006-05-22 U.S. Department of Veterans Affairs 25,000,000 2007-11-20 HM Revenue and Customs, TNT 17,000,000 2008-10-06 T-Mobile, Deutsche Telekom 16,000,000 1986-11-01 Canada Revenue Agency Rev2/28/2011 © 2011 Maze & Associates 70 *Top ten data breaches as of 22 Feb 2010. Data provided by DataLoss db. 725,797,885 breached records out of 2466 reported incidents.
  • 71. Repeat Offenders* Company Number of Reported Breaches LPL Financial 12 Nationwide 11 Equifax 11 Experian 11 Blue Cross 10 B of A 9 Cornell University 9 University of Iowa 9 HSBC 8 Pfizer 8 Rev2/28/2011 © 2011 Maze & Associates 71 *As of 22 Feb 2010. Data provided by DataLoss db. 725,797,885 breached records out of 2466 reported incidents.
  • 72. Sony Root kit • Sony, in its efforts to preserve control over its product, installed root kits on consumers computers • Consumers were not aware it was installed (on copy-protected CDs) • Gave Sony and potentially hackers the ability to remotely control your computer • Removal of software disabled CD drives on consumers computers http://www.cnet.com/4520-6033_1-6376177-1.html?tag=nl.e501 Rev2/28/2011 © 2011 Maze & Associates 72