SlideShare una empresa de Scribd logo
1 de 71
Social Media
&
Security @brianhonan
Who Am I?
@brianhonan
What
is
Social Media?
Websites and applications that
enable users to create and share
content or to participate in social
networking.
- Oxford English Dictionary
Forms of electronic communication
(as Web sites for social networking
and microblogging) through which
users create online communities to
share information, ideas, personal
messages, and other content (as
videos) .
- Mirriam-Webster Dictionary
“A group of Internet-based
applications that build on the
ideological and technological
foundations of Web 2.0, and that
allow the creation and exchange of
user-generated content."
- Wikipedia
Courtesy of Instantcheckmate.com
Government Official Sacked
Forgot Boss was Facebook Friend
Posting They Are Not at Home
Yes, 53%
No, 47%
Courtesy of Legal & General Group PLC
Yes, 60%
No, 40%
Post About Nights Out
Courtesy of Legal & General Group PLC
Shared Images of Expensive Items
Yes, 24%
No, 76%
Courtesy of Legal & General Group PLC
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Social Media Scams
Competition Winners ??
Click on This Link …
Twitter Threats
Koobface
Courtesy TrendMicro
Zeus?
Do You Trust That App?
CourtesyofBitrebels.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Anthony Stancl
Secure Passwords?
Common Passwords
Password Reset
My Name is Marie
How Did I Steal Her ID?
Corporate Issues
Password Reuse
81%
61%
19%
39%
0% 20% 40% 60% 80% 100%
IT Pros
General
Courtesy Darkreading.com & welivesecurity.com
Social Media Treasure Trove
The Gift That Keeps on Giving
Social Engineering
Emily Williams & Robin Page
http://www.thesecurityblogger.com/?p=1903
Misinformation
Manipulation?
How To Defend
Establish Policies
Awareness
Be Careful
What You
Share
Update Privacy Settings
Twitterfall
Handling Security Breaches
Bad News
 Use All Channels.
 Use Social Media to Direct
People to More Information
 Update Regularly (Timezones,
etc.)
 Keep Webpage Updated
 Have Staff Trained
 Trust Employees
 Get Senior Representative to
Talk Early and Often
 Engage With Others
Use Social Media in IR
Monitor & Respond
Brian.honan@bhconsulting.ie
@brianhonan

Más contenido relacionado

La actualidad más candente

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
nadikari123
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
Ryan Ward
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
tutorialsruby
 

La actualidad más candente (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
Social media risk
Social media riskSocial media risk
Social media risk
 
The Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & CybercrimeThe Social Media Bait - Fraud & Cybercrime
The Social Media Bait - Fraud & Cybercrime
 
Security Dangers of Social Networking
Security Dangers of Social NetworkingSecurity Dangers of Social Networking
Security Dangers of Social Networking
 
Social Media Security 2011
Social Media Security 2011Social Media Security 2011
Social Media Security 2011
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Security and social media
Security and social mediaSecurity and social media
Security and social media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Dangers to social media
Dangers to social mediaDangers to social media
Dangers to social media
 
parent_teacher_tutorial
parent_teacher_tutorialparent_teacher_tutorial
parent_teacher_tutorial
 

Destacado

Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011
Tiina Sarisalmi
 
One Source Solutions
One Source SolutionsOne Source Solutions
One Source Solutions
scaster
 
Tactiek verdedigen
Tactiek verdedigenTactiek verdedigen
Tactiek verdedigen
Johanda
 

Destacado (20)

Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Family Online Safety: Truth and Consequences
Family Online Safety: Truth and ConsequencesFamily Online Safety: Truth and Consequences
Family Online Safety: Truth and Consequences
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
Online safety and malwares
Online safety and malwaresOnline safety and malwares
Online safety and malwares
 
PACE-IT: Common Network Security Issues
PACE-IT: Common Network Security IssuesPACE-IT: Common Network Security Issues
PACE-IT: Common Network Security Issues
 
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGESA SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
 
Voimaa verkostoitumalla
Voimaa verkostoitumallaVoimaa verkostoitumalla
Voimaa verkostoitumalla
 
Juliana New York
Juliana  New YorkJuliana  New York
Juliana New York
 
Idea
IdeaIdea
Idea
 
Learning from History
Learning from HistoryLearning from History
Learning from History
 
P Gross Portfolio2008
P Gross Portfolio2008P Gross Portfolio2008
P Gross Portfolio2008
 
Optime 8 9 E 10 Giugno Frodi Assicurative
Optime 8 9 E 10 Giugno Frodi AssicurativeOptime 8 9 E 10 Giugno Frodi Assicurative
Optime 8 9 E 10 Giugno Frodi Assicurative
 
Askartelukerho kevät 2011
Askartelukerho kevät 2011Askartelukerho kevät 2011
Askartelukerho kevät 2011
 
eTwinning - lyhyt johdatus työpajatyöskentelyyn
eTwinning - lyhyt johdatus työpajatyöskentelyyneTwinning - lyhyt johdatus työpajatyöskentelyyn
eTwinning - lyhyt johdatus työpajatyöskentelyyn
 
KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7KMUTNB - Internet Programming 5/7
KMUTNB - Internet Programming 5/7
 
One Source Solutions
One Source SolutionsOne Source Solutions
One Source Solutions
 
etwinning Learning Events - Pedagogical Objectives
etwinning Learning Events - Pedagogical Objectivesetwinning Learning Events - Pedagogical Objectives
etwinning Learning Events - Pedagogical Objectives
 
Rok 09
Rok 09Rok 09
Rok 09
 
Tactiek verdedigen
Tactiek verdedigenTactiek verdedigen
Tactiek verdedigen
 

Similar a How to Like Social Media Network Security

Social media in hospitality
Social media in hospitalitySocial media in hospitality
Social media in hospitality
Anil Bilgihan
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Ayelet Baron
 
Merged may 19 webinar
Merged may 19 webinarMerged may 19 webinar
Merged may 19 webinar
sslesperance
 

Similar a How to Like Social Media Network Security (20)

Nonprofit Congress: Innovation
Nonprofit Congress:  InnovationNonprofit Congress:  Innovation
Nonprofit Congress: Innovation
 
Working with New Media
Working with New MediaWorking with New Media
Working with New Media
 
Social media in hospitality
Social media in hospitalitySocial media in hospitality
Social media in hospitality
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 PrimerAYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
 
Web 2.0 Presentation
Web 2.0 PresentationWeb 2.0 Presentation
Web 2.0 Presentation
 
Social Media101
Social Media101Social Media101
Social Media101
 
CNCS Web 2.0
CNCS Web 2.0CNCS Web 2.0
CNCS Web 2.0
 
Social Media For Social Change
Social Media For Social ChangeSocial Media For Social Change
Social Media For Social Change
 
social media for social change
social media for social changesocial media for social change
social media for social change
 
Social Media & Civic Engagement
Social Media & Civic EngagementSocial Media & Civic Engagement
Social Media & Civic Engagement
 
Social media colleges- t seymour
Social media   colleges- t seymourSocial media   colleges- t seymour
Social media colleges- t seymour
 
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing MarketplacesAccelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
 
Ppt2
Ppt2Ppt2
Ppt2
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
 
Abjs 2008 Veillette Web 20
Abjs 2008 Veillette Web 20Abjs 2008 Veillette Web 20
Abjs 2008 Veillette Web 20
 
Merged may 19 webinar
Merged may 19 webinarMerged may 19 webinar
Merged may 19 webinar
 
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing ForumOnline Marketing to Seniors via Social Media - Alpro Marketing Forum
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
 
Social Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian UsageSocial Media Marketing - Social Media Indian Usage
Social Media Marketing - Social Media Indian Usage
 
Social Media Marketing - Introduction
Social Media Marketing - IntroductionSocial Media Marketing - Introduction
Social Media Marketing - Introduction
 

Más de Brian Honan

Más de Brian Honan (20)

Brian honan ipexpo keynote
Brian honan ipexpo keynoteBrian honan ipexpo keynote
Brian honan ipexpo keynote
 
GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?GDPR & Brexit - What Does the Future Hold?
GDPR & Brexit - What Does the Future Hold?
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
Brian honan
Brian honanBrian honan
Brian honan
 
The dark side of the internet
The dark side of the internetThe dark side of the internet
The dark side of the internet
 
Data security brian honan
Data security   brian honanData security   brian honan
Data security brian honan
 
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...Presentation on EU Directives Impacting Cyber Security for Information Securi...
Presentation on EU Directives Impacting Cyber Security for Information Securi...
 
Incident Response in the Cloud
Incident Response in the CloudIncident Response in the Cloud
Incident Response in the Cloud
 
Bridging the air gap
Bridging the air gapBridging the air gap
Bridging the air gap
 
Proactive incident response
Proactive incident responseProactive incident response
Proactive incident response
 
Incident response cloud
Incident response cloudIncident response cloud
Incident response cloud
 
Preparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident ResponsePreparing for Failure - Best Practise for Incident Response
Preparing for Failure - Best Practise for Incident Response
 
Best practises for log management
Best practises for log managementBest practises for log management
Best practises for log management
 
Cloud security
Cloud securityCloud security
Cloud security
 
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & ScreenLayer 8 Security - Securing the Nut Between the Keyboard & Screen
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
 
Creating a CERT at WARP Speed
Creating a CERT at WARP SpeedCreating a CERT at WARP Speed
Creating a CERT at WARP Speed
 
The Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure LawsThe Case for Mandatory Data Breach Disclosure Laws
The Case for Mandatory Data Breach Disclosure Laws
 
Ic Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp BhIc Sconf2010presentation Dp Bh
Ic Sconf2010presentation Dp Bh
 
Knowing Me Knowing You
Knowing Me Knowing YouKnowing Me Knowing You
Knowing Me Knowing You
 
Scare Ware From Ireland
Scare Ware From IrelandScare Ware From Ireland
Scare Ware From Ireland
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

How to Like Social Media Network Security