how to like social media network security

Post on 21-May-2015

1.168 Views

Category:

Technology

1 Downloads

Preview:

Click to see full reader

DESCRIPTION

This is my presentation from Source Dublin 2014 on cyber crime and social media. Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.

TRANSCRIPT

Social Media&

Security @brianhonan

Who Am I?

@brianhonan

What is

Social Media?

Websites and applications that enable users to create and share content or to participate in social networking.

- Oxford English Dictionary

Forms of electronic communication (as Web sites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (as videos) .

- Mirriam-Webster Dictionary

“A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content."

- Wikipedia

Courtesy of Instantcheckmate.com

Government Official Sacked

Forgot Boss was Facebook Friend

Posting They Are Not at Home

Yes; 53%

No; 47%

Courtesy of Legal & General Group PLC

Yes; 60%

No; 40%

Post About Nights Out

Courtesy of Legal & General Group PLC

Shared Images of Expensive Items

Yes; 24%

No; 76%

Courtesy of Legal & General Group PLC

Courtesy of Instantcheckmate.com

Courtesy of Instantcheckmate.com

Social Media Scams

Competition Winners ??

Click on This Link …

Twitter Threats

Koobface

Courtesy TrendMicro

Zeus?

Do You Trust That App?

Co

urt

esy

of

Bit

reb

els.

com

Courtesy of Instantcheckmate.com

Courtesy of Instantcheckmate.com

Courtesy of Instantcheckmate.com

Anthony Stancl

Secure Passwords?

Common Passwords

Password Reset

My Name is Marie

How Did I Steal Her ID?

Corporate Issues

Password Reuse

IT Pros

General

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

81%

61%

19%

39%

Courtesy Darkreading.com & welivesecurity.com

Social Media Treasure Trove

The Gift That Keeps on Giving

Social Engineering

Emily Williams & Robin Pagehttp://www.thesecurityblogger.com/?p=1903

Misinformation

Manipulation?

How To Defend

Establish Policies

Awareness

Be CarefulWhat You

Share

Update Privacy Settings

Twitterfall

Handling Security Breaches

Bad News

Use All Channels.

Use Social Media to Direct People to More Information

Update Regularly (Timezones, etc.)

Keep Webpage Updated

Have Staff Trained

Trust Employees

Get Senior Representative to Talk Early and Often

Engage With Others

Use Social Media in IR

Monitor & Respond

Brian.honan@bhconsulting.ie@brianhonan

top related