SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
Seven	
  Stats	
  on	
  	
  
Social	
  
Social	
   Media	
  Security	
  
Findings	
  from	
  analysis	
  of	
  more	
  than	
  100	
  million	
  pieces	
  of	
  social	
  media	
  data.	
  
Security	
  and	
  compliance	
  risks	
  are	
  
up	
  nearly	
  400%	
  in	
  2013.	
  
12%	
  of	
  all	
  risky	
  social	
  media	
  content	
  
contains	
  security	
  risks,	
  including	
  spam,	
  
malware,	
  and	
  criminal	
  and	
  illegal	
  acBvity.	
  
YouTube	
  has	
  5	
  Bmes	
  more	
  bad	
  content	
  
than	
  Facebook,	
  TwiGer,	
  Google+,	
  and	
  the	
  
other	
  leading	
  social	
  networks.	
  
	
  
5%	
  of	
  social	
  spam	
  contains	
  personal	
  
informaBon,	
  such	
  as	
  emails	
  and	
  phone	
  
numbers,	
  to	
  lure	
  consumers.	
  
Roughly	
  80%	
  of	
  posts	
  made	
  between	
  1	
  AM	
  and	
  3	
  AM	
  	
  
are	
  by	
  fake	
  social	
  accounts.	
  
Financial	
  organizaBons	
  have	
  3	
  Truth	
  in	
  Lending	
  
Act/RegulaBon	
  Z	
  violaBons	
  per	
  month	
  –	
  on	
  
average	
  –	
  on	
  their	
  social	
  media	
  accounts.	
  
Social	
  spam	
  is	
  growing	
  100%	
  faster	
  
than	
  good	
  comments	
  and	
  posts.	
  
	
  
Want	
  to	
  Learn	
  More?	
  
VISIT	
  NEXGATE.COM	
  

Más contenido relacionado

La actualidad más candente

Raymond Payne | Cyber Security Breaches 2015
Raymond Payne | Cyber Security Breaches 2015Raymond Payne | Cyber Security Breaches 2015
Raymond Payne | Cyber Security Breaches 2015Raymond Payne
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentationAbigail Ewart
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentationAbigail Ewart
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risksrothl
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentationAbigail Ewart
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia WatsonPatricia M Watson
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesPaubox, Inc.
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parentsAl Rowell
 

La actualidad más candente (18)

Protecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile PhishingProtecting Yourself Against Mobile Phishing
Protecting Yourself Against Mobile Phishing
 
Raymond Payne | Cyber Security Breaches 2015
Raymond Payne | Cyber Security Breaches 2015Raymond Payne | Cyber Security Breaches 2015
Raymond Payne | Cyber Security Breaches 2015
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentation
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentation
 
What Are My Risks
What Are My RisksWhat Are My Risks
What Are My Risks
 
Foundations final presentation
Foundations final presentationFoundations final presentation
Foundations final presentation
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Using tech safely
Using tech safelyUsing tech safely
Using tech safely
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
NASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection StrategiesNASA Cyber Security Webinar: Phishing Detection Strategies
NASA Cyber Security Webinar: Phishing Detection Strategies
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Internet Safety 2013 update for parents
Internet Safety 2013 update for parentsInternet Safety 2013 update for parents
Internet Safety 2013 update for parents
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 

Destacado

Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementNexgate
 
La perfección en la vida del creyente
La perfección en la vida del creyenteLa perfección en la vida del creyente
La perfección en la vida del creyenteGian Carlo
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20mcneel8
 
Speech thingy
Speech thingySpeech thingy
Speech thingySammie527
 
Journal Positioning a bank service in nigeria
Journal Positioning a bank service in nigeriaJournal Positioning a bank service in nigeria
Journal Positioning a bank service in nigeriaElsa Agustina
 
Remote Client Authentication
Remote Client AuthenticationRemote Client Authentication
Remote Client AuthenticationMarkus Meyer
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20mcneel8
 
Home Automation Catalog
Home Automation CatalogHome Automation Catalog
Home Automation CatalogAbhay S
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20mcneel8
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20mcneel8
 
Optimizing market segmentation for a global mobile phone
Optimizing market segmentation for a global mobile phoneOptimizing market segmentation for a global mobile phone
Optimizing market segmentation for a global mobile phoneElsa Agustina
 
7 incidents that forever changed social
7 incidents that forever changed social7 incidents that forever changed social
7 incidents that forever changed socialNexgate
 

Destacado (20)

Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk Management
 
La perfección en la vida del creyente
La perfección en la vida del creyenteLa perfección en la vida del creyente
La perfección en la vida del creyente
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
 
Speech thingy
Speech thingySpeech thingy
Speech thingy
 
Journal Positioning a bank service in nigeria
Journal Positioning a bank service in nigeriaJournal Positioning a bank service in nigeria
Journal Positioning a bank service in nigeria
 
Poetic Disposition
Poetic DispositionPoetic Disposition
Poetic Disposition
 
Remote Client Authentication
Remote Client AuthenticationRemote Client Authentication
Remote Client Authentication
 
MT-C - company presentation
MT-C - company presentationMT-C - company presentation
MT-C - company presentation
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
 
Evaluation question 2
Evaluation question 2Evaluation question 2
Evaluation question 2
 
Ravi
RaviRavi
Ravi
 
Home Automation Catalog
Home Automation CatalogHome Automation Catalog
Home Automation Catalog
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
 
Groundhog%20 day%20
Groundhog%20 day%20Groundhog%20 day%20
Groundhog%20 day%20
 
Pedagogia y educacion 1
Pedagogia y educacion 1Pedagogia y educacion 1
Pedagogia y educacion 1
 
Gaby condoy
Gaby condoy Gaby condoy
Gaby condoy
 
Urządzenia
UrządzeniaUrządzenia
Urządzenia
 
Pert3 ecommerce
Pert3 ecommercePert3 ecommerce
Pert3 ecommerce
 
Optimizing market segmentation for a global mobile phone
Optimizing market segmentation for a global mobile phoneOptimizing market segmentation for a global mobile phone
Optimizing market segmentation for a global mobile phone
 
7 incidents that forever changed social
7 incidents that forever changed social7 incidents that forever changed social
7 incidents that forever changed social
 

Similar a Seven Stats on Social Media Security (Nov 2013)

Comtechchange
ComtechchangeComtechchange
Comtechchangeraphmay
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social TakeoverZeroFOX
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Website Security Threats: September 2013 Update
Website Security Threats: September 2013 UpdateWebsite Security Threats: September 2013 Update
Website Security Threats: September 2013 UpdateSymantec Website Security
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your AdvantageTrost, Micki
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
 
The modern day bully
The modern day bully The modern day bully
The modern day bully meganct
 
The modern day bully part 2
The modern day bully part 2The modern day bully part 2
The modern day bully part 2Fran1234cesca
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 

Similar a Seven Stats on Social Media Security (Nov 2013) (20)

Comtechchange
ComtechchangeComtechchange
Comtechchange
 
Facebook danger
Facebook dangerFacebook danger
Facebook danger
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
The Social Takeover
The Social TakeoverThe Social Takeover
The Social Takeover
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Website Security Threats: September 2013 Update
Website Security Threats: September 2013 UpdateWebsite Security Threats: September 2013 Update
Website Security Threats: September 2013 Update
 
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
Colorado DHSEM:  Understanding Social Media and Using it to Your AdvantageColorado DHSEM:  Understanding Social Media and Using it to Your Advantage
Colorado DHSEM: Understanding Social Media and Using it to Your Advantage
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Oula 9 a
Oula   9 aOula   9 a
Oula 9 a
 
The modern day bully
The modern day bully The modern day bully
The modern day bully
 
The modern day bully part 2
The modern day bully part 2The modern day bully part 2
The modern day bully part 2
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 

Último

Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutioneliklein8
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensSocioCosmos
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...samuelcoulson30
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSheikhSaifAli1
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenSapana Sha
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfeliklein8
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for siteAshtonCains
 
Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.AFFFILIATE
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazinesamuelcoulson30
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the siteAshtonCains
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrSapana Sha
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for siteAshtonCains
 
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCRElite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCRDelhi Call girls
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...SocioCosmos
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRDelhi Call girls
 

Último (20)

Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...This is a Powerpoint about research into the codes and conventions of a film ...
This is a Powerpoint about research into the codes and conventions of a film ...
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Palam Vihar Gurgaon >༒8448380779 Escort Service
 
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking MenCall Girls In South Ex. Delhi O9654467111 Women Seeking Men
Call Girls In South Ex. Delhi O9654467111 Women Seeking Men
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Tilak Nagar ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.Generate easy money from tiktok using this simple steps on the book.
Generate easy money from tiktok using this simple steps on the book.
 
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 76 Noida Escorts >༒8448380779 Escort Service
 
Website research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazineWebsite research Powerpoint for Bauer magazine
Website research Powerpoint for Bauer magazine
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncrCall Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
Call Girls In Gurgaon Dlf pHACE 2 Women Delhi ncr
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCRElite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
Elite Class ➥8448380779▻ Call Girls In Nehru Place Delhi NCR
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
 

Seven Stats on Social Media Security (Nov 2013)

  • 1. Seven  Stats  on     Social   Social   Media  Security   Findings  from  analysis  of  more  than  100  million  pieces  of  social  media  data.  
  • 2. Security  and  compliance  risks  are   up  nearly  400%  in  2013.  
  • 3. 12%  of  all  risky  social  media  content   contains  security  risks,  including  spam,   malware,  and  criminal  and  illegal  acBvity.  
  • 4. YouTube  has  5  Bmes  more  bad  content   than  Facebook,  TwiGer,  Google+,  and  the   other  leading  social  networks.    
  • 5. 5%  of  social  spam  contains  personal   informaBon,  such  as  emails  and  phone   numbers,  to  lure  consumers.  
  • 6. Roughly  80%  of  posts  made  between  1  AM  and  3  AM     are  by  fake  social  accounts.  
  • 7. Financial  organizaBons  have  3  Truth  in  Lending   Act/RegulaBon  Z  violaBons  per  month  –  on   average  –  on  their  social  media  accounts.  
  • 8. Social  spam  is  growing  100%  faster   than  good  comments  and  posts.    
  • 9. Want  to  Learn  More?   VISIT  NEXGATE.COM