SlideShare une entreprise Scribd logo
1  sur  14
Does Social Media
 Pose a Security
     Threat?
With the use of Facebook, Twitter,
 LinkedIn, and others on the rise, so
   are many new potential security
threats to small to midsize businesses
  working with these sites. As we all
know social media sites can grow our
 SMB’s exposure and generate more
  revenue for the company in some
                cases.
Marketing on social media sites is a
     must for all different types of
 businesses, so shutting down access
to them in the workplace all together
    in order to curb security risks is
               impossible.
However since there are so many new
    cases of accounts on Facebook,
Twitter, and other sites being hacked,
it is extremely easy for a user to click
on a link that a friend posted on their
   wall and cause their computer to
     become infected with a virus.
So now that we know that using social
   media is essential these days for our
SMB to grow, how can SMB owners or IT
      guys protect the security of the
 company? Right now, Wedge Networks
  is beefing up their content inspection
  network to also monitor social media
 and Web application traffic to prevent
      viruses and other security risks
Wedge Networks CEO Hongwen Zhang
says that the “allow-or-block” paradigm
      for social media is extremely
counterproductive in this technological
                   age.
“For SMBs to really have an iron-clad
security grasp–basically, banning social
 media–is simply not possible,” Zhang
          said in an interview.
That’s not to say that companies
  should encourage the use of social
    media in any shape or form. For
example employees shouldn’t be using
   social media to tweet about their
lunch plans on the clock. This of course
should be something that CEOs should
      include in their policies and
          procedures manual.
Wedge Networks new BeSecure
feature will act as an online traffic cop
 for social media sites to try and track
down malware and nip the problem in
the bud. Wedge Networks will monitor
 the things coming in and out of social
   media sites even if it is supposedly
      coming from a safe source.
Think about how much time that is
  going to save you as an IT guy.
    According to an article on
        InformationWeek:
“Rather than categorize sources as
   “good” or “bad,” it takes a look at
      what’s behind it–looking for
  something like a recently injected
    malicious script in an otherwise
    “good” site. Likewise, the device
monitors outbound traffic for sensitive
data; administrators can enact policy-
  based rules that look for particular
 types or formats of information that
           could pose a risk.”
The most difficult aspect of protecting
  your computer from social media
security threats is that each individual
 at a company sets up his or her own
  security settings on their personal
  desktops or laptops, this is why if
   companies choose to use Wedge
Networks services, all computers that
 are a part of your SMB can be easily
              monitored.
While large companies can block social
  media sites across the board, SMB’s
   need the access to these sites for
 exposure and marketing needs across
the board. Check out Wedge Networks
   right here for more information.

Contenu connexe

Plus de Black Box Social Media

Plus de Black Box Social Media (20)

What is facebook premium ads
What is facebook premium adsWhat is facebook premium ads
What is facebook premium ads
 
When to tweet 3 tools for finding your audience on social media
When to tweet 3 tools for finding your audience on social mediaWhen to tweet 3 tools for finding your audience on social media
When to tweet 3 tools for finding your audience on social media
 
Facebook offers share directly with fans
Facebook offers  share directly with fansFacebook offers  share directly with fans
Facebook offers share directly with fans
 
Lesson learned from dan kennedy
Lesson learned from dan kennedyLesson learned from dan kennedy
Lesson learned from dan kennedy
 
What is the new facebook search engine
What is the new facebook search engineWhat is the new facebook search engine
What is the new facebook search engine
 
Using the benefits of facebook timeline for brands to your advantage
Using the benefits of facebook timeline for brands to your advantageUsing the benefits of facebook timeline for brands to your advantage
Using the benefits of facebook timeline for brands to your advantage
 
Social media for sports teams
Social media for sports teamsSocial media for sports teams
Social media for sports teams
 
The value of facebook real time insights
The value of facebook real time insightsThe value of facebook real time insights
The value of facebook real time insights
 
Tips to create a rave with social media marketing world wide
Tips to create a rave with social media marketing world wideTips to create a rave with social media marketing world wide
Tips to create a rave with social media marketing world wide
 
How to get your facebook fan page back if it was disabled by facebook
How to get your facebook fan page back if it was disabled by facebookHow to get your facebook fan page back if it was disabled by facebook
How to get your facebook fan page back if it was disabled by facebook
 
Some useful twitter tips and tricks
Some useful twitter tips and tricksSome useful twitter tips and tricks
Some useful twitter tips and tricks
 
How to market the easy way through social media sites
How to market the easy way through social media sitesHow to market the easy way through social media sites
How to market the easy way through social media sites
 
Instant customer revolution review
Instant customer revolution reviewInstant customer revolution review
Instant customer revolution review
 
Facebook timeline for brands new admin levels
Facebook timeline for brands new admin levelsFacebook timeline for brands new admin levels
Facebook timeline for brands new admin levels
 
Facebook timeline for brands new admin levels
Facebook timeline for brands new admin levelsFacebook timeline for brands new admin levels
Facebook timeline for brands new admin levels
 
Sure fire signs that your website sucks
Sure fire signs that your website sucksSure fire signs that your website sucks
Sure fire signs that your website sucks
 
Guide To Article Marketing: Little Known Secrets To Success
Guide To Article Marketing: Little Known Secrets To SuccessGuide To Article Marketing: Little Known Secrets To Success
Guide To Article Marketing: Little Known Secrets To Success
 
Move over facebook and twitter, google’s new google+ local enhances opportuni...
Move over facebook and twitter, google’s new google+ local enhances opportuni...Move over facebook and twitter, google’s new google+ local enhances opportuni...
Move over facebook and twitter, google’s new google+ local enhances opportuni...
 
Find your niche and the income will follow
Find your niche and the income will followFind your niche and the income will follow
Find your niche and the income will follow
 
10 must have business apps
10 must have business apps10 must have business apps
10 must have business apps
 

Dernier

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Dernier (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Does Social Media Pose a Security Threat?

  • 1.
  • 2. Does Social Media Pose a Security Threat?
  • 3. With the use of Facebook, Twitter, LinkedIn, and others on the rise, so are many new potential security threats to small to midsize businesses working with these sites. As we all know social media sites can grow our SMB’s exposure and generate more revenue for the company in some cases.
  • 4. Marketing on social media sites is a must for all different types of businesses, so shutting down access to them in the workplace all together in order to curb security risks is impossible.
  • 5. However since there are so many new cases of accounts on Facebook, Twitter, and other sites being hacked, it is extremely easy for a user to click on a link that a friend posted on their wall and cause their computer to become infected with a virus.
  • 6. So now that we know that using social media is essential these days for our SMB to grow, how can SMB owners or IT guys protect the security of the company? Right now, Wedge Networks is beefing up their content inspection network to also monitor social media and Web application traffic to prevent viruses and other security risks
  • 7. Wedge Networks CEO Hongwen Zhang says that the “allow-or-block” paradigm for social media is extremely counterproductive in this technological age.
  • 8. “For SMBs to really have an iron-clad security grasp–basically, banning social media–is simply not possible,” Zhang said in an interview.
  • 9. That’s not to say that companies should encourage the use of social media in any shape or form. For example employees shouldn’t be using social media to tweet about their lunch plans on the clock. This of course should be something that CEOs should include in their policies and procedures manual.
  • 10. Wedge Networks new BeSecure feature will act as an online traffic cop for social media sites to try and track down malware and nip the problem in the bud. Wedge Networks will monitor the things coming in and out of social media sites even if it is supposedly coming from a safe source.
  • 11. Think about how much time that is going to save you as an IT guy. According to an article on InformationWeek:
  • 12. “Rather than categorize sources as “good” or “bad,” it takes a look at what’s behind it–looking for something like a recently injected malicious script in an otherwise “good” site. Likewise, the device monitors outbound traffic for sensitive data; administrators can enact policy- based rules that look for particular types or formats of information that could pose a risk.”
  • 13. The most difficult aspect of protecting your computer from social media security threats is that each individual at a company sets up his or her own security settings on their personal desktops or laptops, this is why if companies choose to use Wedge Networks services, all computers that are a part of your SMB can be easily monitored.
  • 14. While large companies can block social media sites across the board, SMB’s need the access to these sites for exposure and marketing needs across the board. Check out Wedge Networks right here for more information.