SlideShare a Scribd company logo
Seven	
  Stats	
  on	
  	
  
Social	
  
Social	
   Media	
  Security	
  
Findings	
  from	
  analysis	
  of	
  more	
  than	
  100	
  million	
  pieces	
  of	
  social	
  media	
  data.	
  
Security	
  and	
  compliance	
  risks	
  are	
  
up	
  nearly	
  400%	
  in	
  2013.	
  
12%	
  of	
  all	
  risky	
  social	
  media	
  content	
  
contains	
  security	
  risks,	
  including	
  spam,	
  
malware,	
  and	
  criminal	
  and	
  illegal	
  acBvity.	
  
YouTube	
  has	
  5	
  Bmes	
  more	
  bad	
  content	
  
than	
  Facebook,	
  TwiGer,	
  Google+,	
  and	
  the	
  
other	
  leading	
  social	
  networks.	
  
	
  
5%	
  of	
  social	
  spam	
  contains	
  personal	
  
informaBon,	
  such	
  as	
  emails	
  and	
  phone	
  
numbers,	
  to	
  lure	
  consumers.	
  
Roughly	
  80%	
  of	
  posts	
  made	
  between	
  1	
  AM	
  and	
  3	
  AM	
  	
  
are	
  by	
  fake	
  social	
  accounts.	
  
Financial	
  organizaBons	
  have	
  3	
  Truth	
  in	
  Lending	
  
Act/RegulaBon	
  Z	
  violaBons	
  per	
  month	
  –	
  on	
  
average	
  –	
  on	
  their	
  social	
  media	
  accounts.	
  
Social	
  spam	
  is	
  growing	
  100%	
  faster	
  
than	
  good	
  comments	
  and	
  posts.	
  
	
  
Want	
  to	
  Learn	
  More?	
  
VISIT	
  NEXGATE.COM	
  

More Related Content

What's hot

Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
Alliance Data card services - Know More Sell More
 
Raymond Payne | Cyber Security Breaches 2015
Raymond Payne | Cyber Security Breaches 2015Raymond Payne | Cyber Security Breaches 2015
Raymond Payne | Cyber Security Breaches 2015
Raymond Payne
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
Sanjay Kumar
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
jpeters_securitysnapshot
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentation
Abigail Ewart
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentation
Abigail Ewart
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
rothl
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentation
Abigail Ewart
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
rinushalu
 
Using tech safely
Using tech safelyUsing tech safely
Using tech safely
Paul OBriant
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
Patricia M Watson
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
Paubox, Inc.
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Kushal Mondal
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
UltraUploader
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
Al Rowell
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
ArrayShield Technologies Private Limited
 

What's hot (18)

Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Raymond Payne | Cyber Security Breaches 2015
Raymond Payne | Cyber Security Breaches 2015Raymond Payne | Cyber Security Breaches 2015
Raymond Payne | Cyber Security Breaches 2015
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentation
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentation
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentation
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Using tech safely
Using tech safelyUsing tech safely
Using tech safely
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 

Viewers also liked

Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk Management
Nexgate
 
La perfección en la vida del creyente
La perfección en la vida del creyenteLa perfección en la vida del creyente
La perfección en la vida del creyente
Gian Carlo
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
mcneel8
 
Speech thingy
Speech thingySpeech thingy
Speech thingy
Sammie527
 
Journal Positioning a bank service in nigeria
Journal Positioning a bank service in nigeriaJournal Positioning a bank service in nigeria
Journal Positioning a bank service in nigeria
Elsa Agustina
 
Poetic Disposition
Poetic DispositionPoetic Disposition
Poetic Disposition
Kelley Huebner
 
Remote Client Authentication
Remote Client AuthenticationRemote Client Authentication
Remote Client Authentication
Markus Meyer
 
MT-C - company presentation
MT-C - company presentationMT-C - company presentation
MT-C - company presentation
Valéry Guilleaume
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
mcneel8
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
ashprincess122
 
Ravi
RaviRavi
Home Automation Catalog
Home Automation CatalogHome Automation Catalog
Home Automation Catalog
Abhay S
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
mcneel8
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
mcneel8
 
Pedagogia y educacion 1
Pedagogia y educacion 1Pedagogia y educacion 1
Pedagogia y educacion 1
ARSENIO DE JESUS ZULUAGA OLIVEIRA
 
Gaby condoy
Gaby condoy Gaby condoy
Gaby condoy
Gaby Condoy
 
Optimizing market segmentation for a global mobile phone
Optimizing market segmentation for a global mobile phoneOptimizing market segmentation for a global mobile phone
Optimizing market segmentation for a global mobile phone
Elsa Agustina
 
7 incidents that forever changed social
7 incidents that forever changed social7 incidents that forever changed social
7 incidents that forever changed social
Nexgate
 

Viewers also liked (20)

Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk Management
 
La perfección en la vida del creyente
La perfección en la vida del creyenteLa perfección en la vida del creyente
La perfección en la vida del creyente
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
 
Speech thingy
Speech thingySpeech thingy
Speech thingy
 
Journal Positioning a bank service in nigeria
Journal Positioning a bank service in nigeriaJournal Positioning a bank service in nigeria
Journal Positioning a bank service in nigeria
 
Poetic Disposition
Poetic DispositionPoetic Disposition
Poetic Disposition
 
Remote Client Authentication
Remote Client AuthenticationRemote Client Authentication
Remote Client Authentication
 
MT-C - company presentation
MT-C - company presentationMT-C - company presentation
MT-C - company presentation
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
Ravi
RaviRavi
Ravi
 
Home Automation Catalog
Home Automation CatalogHome Automation Catalog
Home Automation Catalog
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
 
Pedagogia y educacion 1
Pedagogia y educacion 1Pedagogia y educacion 1
Pedagogia y educacion 1
 
Gaby condoy
Gaby condoy Gaby condoy
Gaby condoy
 
Urządzenia
UrządzeniaUrządzenia
Urządzenia
 
Pert3 ecommerce
Pert3 ecommercePert3 ecommerce
Pert3 ecommerce
 
Optimizing market segmentation for a global mobile phone
Optimizing market segmentation for a global mobile phoneOptimizing market segmentation for a global mobile phone
Optimizing market segmentation for a global mobile phone
 
7 incidents that forever changed social
7 incidents that forever changed social7 incidents that forever changed social
7 incidents that forever changed social
 

Similar to Seven Stats on Social Media Security (Nov 2013)

Comtechchange
ComtechchangeComtechchange
Comtechchange
raphmay
 
Facebook danger
Facebook dangerFacebook danger
Facebook danger
rihabswilah
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
Jody Sullivan
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
Charlie Lewis M.S.
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
Charlie Lewis M.S.
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
seadeloitte
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
Alexander Berta
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
Benjamin Morley
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
IRJET Journal
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
essay-writing-help.us
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
ZeroFOX
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
Copper Mobile, Inc.
 
Website Security Threats: September 2013 Update
Website Security Threats: September 2013 UpdateWebsite Security Threats: September 2013 Update
Website Security Threats: September 2013 Update
Symantec Website Security
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Trost, Micki
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
Impulse Digital
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
Anumod E Nair
 
The modern day bully
The modern day bully The modern day bully
The modern day bully
meganct
 
The modern day bully part 2
The modern day bully part 2The modern day bully part 2
The modern day bully part 2
Fran1234cesca
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
Write My Essay
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
Ken Spencer Brown
 

Similar to Seven Stats on Social Media Security (Nov 2013) (20)

Comtechchange
ComtechchangeComtechchange
Comtechchange
 
Facebook danger
Facebook dangerFacebook danger
Facebook danger
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Website Security Threats: September 2013 Update
Website Security Threats: September 2013 UpdateWebsite Security Threats: September 2013 Update
Website Security Threats: September 2013 Update
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
The modern day bully
The modern day bully The modern day bully
The modern day bully
 
The modern day bully part 2
The modern day bully part 2The modern day bully part 2
The modern day bully part 2
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 

Recently uploaded

Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
SocioCosmos
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
Digital Marketing Lab
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
ryxqoswi
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
ClarissaAlanoCredito
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
digitalcourseshop4
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
SocioCosmos
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
Charles Bayless
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
zeqirielmedina8
 
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
Febless Hernane
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
lorraineandreiamcidl
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
ClarissaAlanoCredito
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
Febless Hernane
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
SocioCosmos
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
mediavestfzllc
 

Recently uploaded (14)

Dominate Reddit Discussions.............
Dominate Reddit Discussions.............Dominate Reddit Discussions.............
Dominate Reddit Discussions.............
 
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing AgencyThe Evolution of SEO: Insights from a Leading Digital Marketing Agency
The Evolution of SEO: Insights from a Leading Digital Marketing Agency
 
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
快速办理(BCR毕业证书)加州大学河滨分校毕业证文凭证书一模一样
 
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa CreditoHOW TO USE THREADS an Instagram App_ by Clarissa Credito
HOW TO USE THREADS an Instagram App_ by Clarissa Credito
 
Surat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculumSurat Digital Marketing School - course curriculum
Surat Digital Marketing School - course curriculum
 
Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......Your LinkedIn Success Starts Here.......
Your LinkedIn Success Starts Here.......
 
HMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docxHMS Facebook Stories All V1 06092024.docx
HMS Facebook Stories All V1 06092024.docx
 
Project Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docxProject Serenity — 33% Life-time Commissions.docx
Project Serenity — 33% Life-time Commissions.docx
 
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE REMINI BY: FEBLESS HERNANE
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAMLORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TELEGRAM
 
HOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa CreditoHOW TO USE FACEBOOK _ by Clarissa Credito
HOW TO USE FACEBOOK _ by Clarissa Credito
 
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANEEASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE G-TEAMS BY: FEBLESS HERNANE
 
Transform Your Presence Now!..............
Transform Your Presence Now!..............Transform Your Presence Now!..............
Transform Your Presence Now!..............
 
Lifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond HandsLifecycle of a GME Trader: From Newbie to Diamond Hands
Lifecycle of a GME Trader: From Newbie to Diamond Hands
 

Seven Stats on Social Media Security (Nov 2013)

  • 1. Seven  Stats  on     Social   Social   Media  Security   Findings  from  analysis  of  more  than  100  million  pieces  of  social  media  data.  
  • 2. Security  and  compliance  risks  are   up  nearly  400%  in  2013.  
  • 3. 12%  of  all  risky  social  media  content   contains  security  risks,  including  spam,   malware,  and  criminal  and  illegal  acBvity.  
  • 4. YouTube  has  5  Bmes  more  bad  content   than  Facebook,  TwiGer,  Google+,  and  the   other  leading  social  networks.    
  • 5. 5%  of  social  spam  contains  personal   informaBon,  such  as  emails  and  phone   numbers,  to  lure  consumers.  
  • 6. Roughly  80%  of  posts  made  between  1  AM  and  3  AM     are  by  fake  social  accounts.  
  • 7. Financial  organizaBons  have  3  Truth  in  Lending   Act/RegulaBon  Z  violaBons  per  month  –  on   average  –  on  their  social  media  accounts.  
  • 8. Social  spam  is  growing  100%  faster   than  good  comments  and  posts.    
  • 9. Want  to  Learn  More?   VISIT  NEXGATE.COM