SlideShare a Scribd company logo
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
“Social Media – The Good, The Bad And The Ugly”Presenter:  Helen Levinson
Social Media FearsMost Common Reasons:• Lack of Knowledge & Understanding• Brand Management & PR Concerns• Lack of Time and Personnel• It’s a Passing Fad
Social Media Trends2011 Stats:96% of Millennials have joined a social network
Facebook tops Google for weekly traffic in the U.S.
50 million Tweets per day  - 80% are outside of Twitter
If Facebook were a country, it would be the world’s 3rd largest
Over 200,000,000 Blogs
80% of companies use LinkedIn as primary tool to find employeesSource Mashable.com &  Socialnomics.net
Click to view video: http://www.youtube.com/watch?v=lFZ0z5Fm-Ng&feature=player_embedded: Source Socialnomics.net – Eric Qualman
Managing Your Brand
Positive Exposure
Click to view case study: http://blog.thoughtpick.com/2010/01/learn-sm-by-example-dunkin-donuts-campaign.html
Negative Exposure
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Source - YouTube http://www.youtube.com/watch?v=5YGc4zOqozo
Click to view video: http://www.youtube.com/watch?v=-QDkR-Z-69Y
Brand Protection74% of employed Americans surveyed believe it is easy to damage a brand’s reputation via sites such as Facebook, Twitter and YouTube.
1/3rd of employed respondents say they never consider what their boss would think before posting materials online.
61% of employees say that even if employers are monitoring their social networking profiles or activities, they won’t change what they are doing online.
54% of employees say a company policy won’t change how they behave online.Source Deloitte Ethics & Workplace Survey, 2009
Risk Management & Compliance27% of executives regularly discuss how to best leverage social networks while mitigating risks.
54% of CIOs said their firms do not allow employees to visit social networking sites for any reason while at work. Source Deloitte Ethics & Workplace Survey & Robert Half Technology 2009
Data Leakage17% of US companies investigated the exposure of confidential, sensitive or private information via a posting to a social networking site
13% of US companies investigated the exposure of confidential, sensitive or private information via a an SMS text or micro-blogging serviceSource Twitter, Outbound email and data loss prevention in today’s enterprise, 2009
Social Media Best PracticesWhat Should I Know? • Corporate Guidelines• Personal vs. Corporate?• Employee & Customer Interaction• Damage Control • Etiquette• Guard Your Information
Protecting Your ImageBest Practice No. 1:Establish CorporateGuidelines
IBM and IntelIBM and Intel each established guidelines for their employees who participate in social media. These market leaders were essentially saying, “have at it out there on blogs, social networks, Twitter, etc. But make sure you know the company’s expectations.” These guidelines represent a milestone in large enterprises’ comfort with social media.Source Hutch Carpenter - bhc3.wordpress.com/2008/12/
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Source IBM - http://www.ibm.com/blogs/zz/en/social_computing_guidelines.html
Source IBM - http://www.ibm.com/blogs/zz/en/social_computing_guidelines.html
Source IBM - http://www.ibm.com/blogs/zz/en/social_computing_guidelines.html
Source IBM - http://www.ibm.com/blogs/zz/en/social_computing_guidelines.html
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Intel Social Media GuidelinesSource Intel - http://www.intel.com/sites/sitewide/en_US/social-media.htm
ConsequencesWhat happens with no guidelines in place? • PR Nightmares• Lawsuits• Loss of Time and Money
Posting InformationBest Practice No. 2:Personal vs. Corporate
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Keep it personal … or keep it strictly business
People InteractionBest Practice No. 3:Employee and Customer Interaction
Managing Negative Feedback
Source: http://alloveralbany.com/archive/2010/09/21/the-odd-story-involving-price-chopper-twitter-and
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Cover Your RiskBest Practice No. 4:Think “Damage Control”
Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media
Click to view video: http://www.youtube.com/watch?v=g-Z2x4SClaE&feature=related
Domino’s ChallengeChallenge: Domino’s Pizza was faced with the challenge of re-establishing their clients’ and investors’ trustDiscredit the content of the video and its producers
Respond fast and efficiently in order to stop the snowball effect
Minimize the issue to avoid alarming investors, since the company’s share value had been dancing up and down with the lowest rates in the last 5 years.Domino’s SolutionSolution:Utilize the same means of communication.  Replied with a YouTube video message and created @dpzinfo an official Twitter account.
Re-focused the attention of clients back to the product “pizza” by building alliances with bloggers and giving away free food in order to reconcile with the product.
Showed enough pro-activity to investors to reach the highest share value in the last 6 months.Rules of EngagementBest Practice No. 5:Have some etiquette
Wal-Mart Concocts Fake Community Group to Gain Chicago Support
Create Your RulesRules of Engagement:Establish a point of contact or team
Be proactive in response
Operate by a code of conduct
Own up if you’ve screwed upStay In ControlBest Practice No. 6:Guard Your Information
Are You Exposed?Exposure over 12 months:Email number 1 threat
35% leaked proprietary information
Blog Breaches
25% data loss via blogs
Video Exposure
 21% disciplined employees
Friends or Foes?
20% offenses made on Facebook & LinkedInSource Marketwire.com
Listen, Monitor & TrackPopular Investigative ToolsAlerts
 Blog Posts
 Discussion Boards

More Related Content

PPTX
Social Media's Dark Side: Risks, Reasons & Remedies
Richard M
 
PDF
Social Media Policies, Procedures
 and Governance part 1: Employees
NikComm Inc.
 
PDF
Drawbacks of Social Networks
University of Hertfordshire
 
PPTX
G3 Social Media Security
Jerry Gamblin
 
PDF
A guide to to building your company reputation online
Igniyte
 
PPTX
Privacy Issues in Social Media
Baljot Saral
 
PPTX
Social Media Introduction
Essential Communications
 
PPTX
Facebook and the CIO
dltcahill
 
Social Media's Dark Side: Risks, Reasons & Remedies
Richard M
 
Social Media Policies, Procedures
 and Governance part 1: Employees
NikComm Inc.
 
Drawbacks of Social Networks
University of Hertfordshire
 
G3 Social Media Security
Jerry Gamblin
 
A guide to to building your company reputation online
Igniyte
 
Privacy Issues in Social Media
Baljot Saral
 
Social Media Introduction
Essential Communications
 
Facebook and the CIO
dltcahill
 

What's hot (20)

PPT
Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Digital Marketing Agency
 
PDF
Yammer's Social Media Policy
Yammer
 
POTX
Why Community Managers Won't Exist in 5 Years (and why that's a good thing)
Evan Hamilton
 
PPTX
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
North Texas Chapter of the ISSA
 
PPTX
Internet & Social Media issues for brand owners
David Green
 
PPTX
Social Media hosted by RocketMatter
Natalie Alesi
 
PPT
Digital Marketing: Driving Business Growth With An Eye to In-House Counsel
Full Tilt Communications
 
PDF
It's a Public World, After All
Julia Partington
 
PDF
Using Social Media In HR & Recruiting - Jennifer McClure - Oct 2012
Jennifer McClure
 
PPT
Social Media And The Law 2 23 10
lindseymgift
 
PDF
Paul Madden Frokostseminar Slides
LinkRisk
 
PPTX
Sabrena Sally 2010 Fowler Seminar
Don Grauel
 
PPTX
2011.07.14 center-for-np-success-li
The Toolbox, Inc.
 
PPTX
Social Media - The Good, The Bad, and The Ugly
Dr. Joel Evans
 
PPTX
Corporate Social Media Education – Social Media Academy
Society3
 
PPT
How Law Firms Build Trust for Your Business Online (Social Media Policy)
Mike Mintz
 
PPT
Internet Awareness10
The Daring Librarian Experience
 
PDF
Will you accept love in a technology-dependent society?
katherinegregs
 
PPT
What's a government department doing on Twitter?
Steph Gray
 
PPTX
Social media for senior leaders
epselamp
 
Digital Insights - Social Media Case Studies Dec09 V1.0
Digital Insights - Digital Marketing Agency
 
Yammer's Social Media Policy
Yammer
 
Why Community Managers Won't Exist in 5 Years (and why that's a good thing)
Evan Hamilton
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
North Texas Chapter of the ISSA
 
Internet & Social Media issues for brand owners
David Green
 
Social Media hosted by RocketMatter
Natalie Alesi
 
Digital Marketing: Driving Business Growth With An Eye to In-House Counsel
Full Tilt Communications
 
It's a Public World, After All
Julia Partington
 
Using Social Media In HR & Recruiting - Jennifer McClure - Oct 2012
Jennifer McClure
 
Social Media And The Law 2 23 10
lindseymgift
 
Paul Madden Frokostseminar Slides
LinkRisk
 
Sabrena Sally 2010 Fowler Seminar
Don Grauel
 
2011.07.14 center-for-np-success-li
The Toolbox, Inc.
 
Social Media - The Good, The Bad, and The Ugly
Dr. Joel Evans
 
Corporate Social Media Education – Social Media Academy
Society3
 
How Law Firms Build Trust for Your Business Online (Social Media Policy)
Mike Mintz
 
Internet Awareness10
The Daring Librarian Experience
 
Will you accept love in a technology-dependent society?
katherinegregs
 
What's a government department doing on Twitter?
Steph Gray
 
Social media for senior leaders
epselamp
 
Ad

Similar to Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media (20)

PPTX
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
Helen Levinson
 
PPTX
Protecting Your Profits - Social Media Presentation
nathanhenry
 
PPTX
National Retail Federation - Does Your Reputation Procede You?
Helen Levinson
 
PPTX
NFSSC - The Good, the Bad and the Ugly of Social Media
Helen Levinson
 
PPTX
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Raul Colon
 
PPTX
New Jersey Food Council Social Media Presentation
Helen Levinson
 
PPT
From Apps To Tweets Insurance Agents and the Social Web 040310
Rick Morgan
 
PDF
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
sdavis532
 
PPT
Social Media & Electronics Industry B2B Marketing
Julie Wright
 
PPTX
Social Media for Human Resources - Hire, Retain and Leverage Employees
Bryce Maddock
 
PPTX
Digital Branding and Social Media
Olivier Blanchard
 
PPT
Social Media Intelligence - Listening, Engaging & Adapting
Earthbound Media Group
 
PPTX
Search social-media-&-reputation-management-thunder-seo
Max Thomas
 
PPT
My Online Image
aluthe
 
PDF
Protecting Your Professional Reputation Online
Legal Media Matters
 
PPTX
Risks of social media for businesses (and how to manage them)
CrowdControlHQ
 
PPT
How to Operationalize Social Media TFMA 2011
Alterian
 
PPTX
The Business Owner's Media Mogul Manual: A Strategic Plan to Leverage Web-Bas...
Max Thomas
 
PPTX
Investor Relations & Emerging Media – Presented at the NIRI Capital Area Chap...
Michael Pranikoff
 
PDF
Ethics in Social Media
jrfields
 
New England Organized Retail Crime Symposium and Tradeshow - The Good, The Ba...
Helen Levinson
 
Protecting Your Profits - Social Media Presentation
nathanhenry
 
National Retail Federation - Does Your Reputation Procede You?
Helen Levinson
 
NFSSC - The Good, the Bad and the Ugly of Social Media
Helen Levinson
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Raul Colon
 
New Jersey Food Council Social Media Presentation
Helen Levinson
 
From Apps To Tweets Insurance Agents and the Social Web 040310
Rick Morgan
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
sdavis532
 
Social Media & Electronics Industry B2B Marketing
Julie Wright
 
Social Media for Human Resources - Hire, Retain and Leverage Employees
Bryce Maddock
 
Digital Branding and Social Media
Olivier Blanchard
 
Social Media Intelligence - Listening, Engaging & Adapting
Earthbound Media Group
 
Search social-media-&-reputation-management-thunder-seo
Max Thomas
 
My Online Image
aluthe
 
Protecting Your Professional Reputation Online
Legal Media Matters
 
Risks of social media for businesses (and how to manage them)
CrowdControlHQ
 
How to Operationalize Social Media TFMA 2011
Alterian
 
The Business Owner's Media Mogul Manual: A Strategic Plan to Leverage Web-Bas...
Max Thomas
 
Investor Relations & Emerging Media – Presented at the NIRI Capital Area Chap...
Michael Pranikoff
 
Ethics in Social Media
jrfields
 
Ad

Recently uploaded (20)

PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PDF
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
DOCX
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
PDF
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
PDF
DevOps & Developer Experience Summer BBQ
AUGNYC
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PPTX
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Software Development Company | KodekX
KodekX
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Shreyas_Phanse_Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
SHREYAS PHANSE
 
This slide provides an overview Technology
mineshkharadi333
 
Google’s NotebookLM Unveils Video Overviews
SOFTTECHHUB
 
Top AI API Alternatives to OpenAI: A Side-by-Side Breakdown
vilush
 
Chapter 2 Digital Image Fundamentals.pdf
Getnet Tigabie Askale -(GM)
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Revolutionize Operations with Intelligent IoT Monitoring and Control
Rejig Digital
 
DevOps & Developer Experience Summer BBQ
AUGNYC
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Smart Infrastructure and Automation through IoT Sensors
Rejig Digital
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Software Development Company | KodekX
KodekX
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 

Asset Protection Conference 2011 -The Good, The Bad and The Ugly of Social Media

Editor's Notes

  • #65: Interesting Firesheep story: http://money.cnn.com/2010/12/14/technology/firesheep_starbucks/index.htmThere's been a lot of talk about Firesheep, a free Firefox extension that collects data broadcast over an unprotected Wi-Fi network without using SSL. You turn it on, and by default it collects cookies for Facebook, Twitter and 24 other sites. Then you can sidejack the account and gain access under the acquired identity.1021Email PrintCommentThis extension isn't shocking. If you're worth your weight as a developer, you've known this flaw has existed for a long time. But what about the rest of the world? What about the people who haven't heard about the newly accessible threat through their friends, or through Engadget or Slashdot?I thought I'd spread the word and help some laymen out after work. There's a large Starbucks (SBUX, Fortune 500) near my apartment. I dropped in, bought some unhealthy food, opened my laptop and turned on Firesheep.Less than one minute later, there were five or six identities sitting in the sidebar. Three of them were from Facebook.This wasn't at all surprising. Firesheep isn't magical, and anyone that's been to a Starbucks knows that a lot of people mindlessly refresh Facebook while sipping their lattés. I thought I'd give it more time, so I listened to some music, talked to a few friends -- and, most importantly (and difficultly) did not navigate to anything sent over vanilla HTTP (including, of course, Facebook).Aside from avoiding vulnerable services in the open, there isn't really any way for users to protect themselves from these attacks. While Firesheep runs within Firefox, all browsers are vulnerable to it. Logging on to https://www.facebook.com just redirects to an unsecured connection. And while a VPN would create a secure tunnel through the unprotected connection, most users don't have access to one. The best thing to do is to log out of Facebook and Twitter when using one of these connections.Half an hour later, I'd collected somewhere between 20 and 40 identities. Since Facebook was by far the most prevalent (and contains more personal information than Twitter), I decided to send the users messages from their own accounts to warn them of their exposure. I drafted a friendly, generic message that stated the location of the Starbucks, what the vulnerability was, and how to avoid it. I sent messages to around 20 people.I cleared the Firesheep sidebar, took off my headphones, and waited.Your Facebook ID is a goldmineI heard one expletive muttered a few feet away, and wondered if my message was the cause. Over the next 15 minutes, I didn't hear anyone talk about what had happened -- and folks at Starbucks are usually not ones to keep their conversations private. However, what I did see happen was a sharp decline in the number of identities I was collecting when I restarted Firesheep.This was relieving -- these people got the message. Hopefully they'll tell their friends. I cleared the sidebar once again, and after another 20 minutes of mindless conversation I saw five familiar names had returned to my herd.This was puzzling. Didn't they receive the first message?I logged into their accounts, and sure enough, they had. One of them was even on Amazon.com, which I had warned about in my first message.I targeted him first: I opened up his Amazon (AMZN, Fortune 500) homepage, identified something he had recently looked at, and then sent him a "no, seriously" message on Facebook from his account -- including the fun fact about his music choices.I cleared again the sidebar again and waited for 10 minutes. After I resumed Firesheep's collection, it appeared that he was gone. Yet the other four remained, persistently.A compromised Facebook account doesn't just mean someone can view your photos, likes and wall posts. A compromised Facebook account gives someone access to an identity, from which they can perform social engineering attacks and potentially ruin relationships -- both out of boredom and for gain.While much of this can be corrected, the time and energy it takes to do so is significant. Someone sending a fake message to one of your friends may not seem like a big deal, but someone sending a fake message to 500 of them is -- especially when that 500 may include colleagues, family, and clients.0:00 /2:38My private life revealed on the web So I didn't understand why my sheep were still grazing, unprotected. Perhaps, I reasoned, they thought the message was automatically generated and randomly targeted -- even though I'd mentioned their precise location. So, one last message was in order.I drafted a very short message (perhaps the first was too long?) and sent it to the four, once again from their own accounts: Really wasn't kidding about the insecurity thing. I won't send another message after this -- it's up to you to take your security seriously. You're at the [XYZ Street] Starbucks on an insecure connection, and absolutely anyone here can access your account with the right (free) tool.Twenty minutes passed, and all four were still actively using Facebook.Again, I considered that they may not have received the second message, but after viewing their accounts it was clear that they had.This is the most shocking thing about Internet security. Not that we are all on a worldwide system held together with duct tape that has appalling security vulnerabilities; not that a freely available tool could collect authentication cookies; and certainly not that there are people unaware of either of those.What's absolutely incomprehensible is that after someone has been alerted to the danger -- from their own account! -- they would casually ignore the warning and continue about their day.But, I kept my word and did not send another message. I packed my things, I walked around the store, and recognized several of the people I'd just introduced to their own vulnerability.On my way home, I considered what the experience meant about our society. No matter how many security measures we provide to the world, there will always be people who leave the door open, even after they've had an intruder. The weakest link in security has been, and always will be, the user's judgment.Back at my apartment, I began to settle in -- only to realize that throughout the entire night, my fly had been wide open. Just another demonstration: we're all walking around with vulnerabilities we have yet to discover.