social media risk and reputation management
DESCRIPTION
Of the biggest business risks presented by cyber threats such as hacking, identity theft, privacy breaches and other security events, reputation damage is the one that concerns individuals and businesses the most. Social media is a global phenomenon that can't be ignored. Being online makes you feel vulnerable, but paradoxically, NOT having an active online presence exposes your business to even greater risks of brand damage, credibility and reputation impact. How do you craft your Facebook, Twitter, LinkedIn and other social channels to maximize your positive exposure and limit your risk? Learn how reputation is part of the Threat/Impact Triad and how proper management can avert disaster.TRANSCRIPT
By:
Claudiu PopaInformatica Corporation
Online Reputation Management Secrets that Will Make or Break Your (e)Business
© InformaticaEducation.com© InformaticaEducation.comsource: Manta 2012
© InformaticaEducation.com© InformaticaEducation.com
© InformaticaEducation.com© InformaticaEducation.com
so what’s the problem?so what’s the problem?
Source: Smarsh, Gartner, Ponemon, Symantec IDC
© InformaticaEducation.com© InformaticaEducation.com
takeawaystakeaways
• presence > control
• one password / site
• identity > trust
• permission > profit
• policy > legitimacy
• oversharing < validation
© InformaticaEducation.com© InformaticaEducation.com
presence means controlpresence means control
© InformaticaEducation.com© InformaticaEducation.com
... if you control access... if you control access
© InformaticaEducation.com© InformaticaEducation.com
social damagesocial damage
© InformaticaEducation.com© InformaticaEducation.com
password management is key ... literallypassword management is key ... literally
© InformaticaEducation.com© InformaticaEducation.com
password management > social media password management > social media policypolicy
© InformaticaEducation.com© InformaticaEducation.com
© InformaticaEducation.com© InformaticaEducation.com
privacy > legitimacyprivacy > legitimacy
© InformaticaEducation.com© InformaticaEducation.com
© InformaticaEducation.com© InformaticaEducation.com
embrace socialembrace social
© InformaticaEducation.com© InformaticaEducation.com
restrict posts > open commentsrestrict posts > open comments
© InformaticaEducation.com© InformaticaEducation.com
identity > trustidentity > trust
© InformaticaEducation.com© InformaticaEducation.comSource: McAfee
© InformaticaEducation.com© InformaticaEducation.com
social hates noise - demands substancesocial hates noise - demands substance
© InformaticaEducation.com© InformaticaEducation.com
permission > profitpermission > profit
© InformaticaEducation.com© InformaticaEducation.com
FollowFollow Twitter.ClaudiuPopa.comTwitter.ClaudiuPopa.com for a short read for a short read
ReadRead Subscribe.ClaudiuPopa.comSubscribe.ClaudiuPopa.com for a long read for a long read
Connect Connect LinkedIn.ClaudiuPopa.com LinkedIn.ClaudiuPopa.com