Balancing Security & Authencity Final

Post on 12-Nov-2014

516 views 0 download

Tags:

description

 

Transcript of Balancing Security & Authencity Final

Social Media: Balancing Security & Authenticity w/o Controlling the Message

Cindy Kim, Dir. Of Corp Comm (@CindyKimPR)Chris Hewitt, Sr. Dir. Of Marketing Ops (@chewitt)

SOCIAL MEDIA REVOLUTION

3PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

• Use of web 2.0 applications is growing within enterprises at astonishing rates as companies take advantage of increased productivity and younger workers demand access.

• Web 2.0 opens new risk vectors to cybercriminals as they can quickly exploit the desire of the community members to “trust” each other in order to quickly gain control of passwords and further infiltrate the community and/or endpoint of the of the end-user.

• As TCO pressures mount enterprises will turn increasingly towards the use of web 2.0 and laptop subsidy programs where company employees can go and purchase any PC or mobile phone they desire from retail store fronts.

• IT now finds itself in the role of saying yes, and in doing so must look to educate the organization in defining what its appetite for risk is.

4PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION

It’s a Web 2.0 World Today

The applications we use today for productivityCollaborative / Browser-based / Open Source

Social Communities, Gadgets, Blogging and Widgets open up our networks to increasing risk everyday.

Web 2.0

SECURITY THE ACHILLES HEEL OF SOCIAL MEDIA?

The number of people using the Web will increase by 45% to 2.2B by 2013

Total global Internet audience is 625M

2/3 have joined social networking (427M)

Security risks are equally substantial

*Forrester Research, 2009

Businesses are NOW at RISK…

• Cyber attacks take advantage of TRUST

• They can quickly capture passwords to INFILTRATE social networks

12

Memberaccount

Koobface unleashed

Phishing Scam

Hacked

Social Networking Phishing Attacks….

…up by 240%

AUTHENTICITY WITHOUT LOSING CONTROL

Protect the BRAND without Controlling the Message…

EngageListen & MonitorEducateCreate a Policy

TRENDS IN SOCIAL MEDIA: A LOOK AT 2010 & BEYOND

Social Media Evolution

Key Takeaways…• No simple solution to manage these risks

• Blocking hinders productivity and morale

• Adopt Acceptable Use of Policy & Work w/ IT Teams

• Don’t be naïve – before you CLICK, verify information & link

• Change your Password ASAP if hacked

• Alert your network if you suspect that they’ve been hacked!

DETAILS:Cindy Kim: http://cindykimblog.wordpress.com

Chris Hewitt: http://whatdoesmarketingreallydo.wordpress.com