Items Tagged with "Social Media"


37d5f81e2277051bc17116221040d51c

Parents Navigating the Social Media Mess

April 14, 2010 Added by:Robert Siciliano

Children say and do things that make them vulnerable to dangers in the outside world. A parent can parent all day long and do everything possible to protect their kids from themselves, but a child’s persistence to have their way can wear a parent down. It’s a constant fight that makes a parent adopt a philosophy where they “pick their battles.”

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Zuckerburg: Privacy is No Longer a Social Norm

April 12, 2010 Added by:Theresa Payton

Are you one of the over 350 Million people that use Facebook to keep in touch with friends and family? According to Hitwise, Facebook briefly surpassed Google as the most visited site in the world during the Christmas season. The founder of Facebook said that privacy is no longer a social norm.

Comments  (2)

49afa3a1bba5280af6c4bf2fb5ea7669

Fed Guidelines for Social Media Review part II

April 07, 2010 Added by:Mike Meikle

I promised in my last post to walk you through the various supporting documents that are tied to the Feds’ Social Media Guidelines.  Also, I will act as translator for all the corporate/government  speak.   This way lies madness, abandon all hope ye who enter, etc.

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Quandary of Social Media Security

April 05, 2010 Added by:Mike Meikle

I was recently asked a question regarding the top IT concerns for social media (Web 2.0) implementation plan. Well, in my view information security is at the top.

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Federal Guidelines for Social Media Review

April 05, 2010 Added by:Mike Meikle

In my last post, I referenced the relatively new (Sept 09) federal guidelines for Social Media security by the federal government. I went ahead and put the guidelines in the  online storage widget for anyone to access.

Comments  (0)

37d5f81e2277051bc17116221040d51c

Social Media and Identity Theft Risks PT II

March 30, 2010 Added by:Robert Siciliano

Now that the 3 major search engines Google, Bing and Yahoo index real-time search for Twitter and other social networks, consumers and employees must be aware that not all relevant search is a safe click. Scammers and identity thieves see this as real-time free advertising for their malware.

Comments  (2)

37d5f81e2277051bc17116221040d51c

Social Media and Identity Theft Risks PT I

March 24, 2010 Added by:Robert Siciliano

Whether or not you believe social media to be as asset or liability to your organization, believe this; there are close to a half a billion people signed up to and involved in social media. Some say social media sites such as Facebook and other combined have close to a billion views per month. WEB 2.0 is alive and well and has changed the game for the IT professional.

Comments  (0)

B3f8f23c67988f1d4f507a11b1442cc0

Clash of Security and Social Network Marketing

March 16, 2010 Added by:Crystal Craven

Information Security Gurus and Marketing Professionals are often at odds with each other in the business realm. Marketing used to primarily be a print and face to face business function. Thanks to the over-haul of standard marketing strategies, marketing has grown new roots on the web and has found itself buried deep within social networking sites like LinkedIn, Facebook and Twitter.

Comments  (9)

37d5f81e2277051bc17116221040d51c

Social Media Sticky Situations

March 15, 2010 Added by:Robert Siciliano

Maybe you’re a Mom or a Dad, a Student or a Grad. No matter what you are, you have a reputation to protect. How we are viewed in society matters to most people. Being viewed as someone who is respectable, responsible, someone who has integrity and is generally a decent person is what most people strive for.

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »