Social Media and its influence
44.2K views | +0 today
Social Media and its influence
Social Medias and its influence...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...
Scooped by Gust MEES
Scoop.it!

Google rachète Divide, un spécialiste de la sécurité des mobiles en entreprise

Google rachète Divide, un spécialiste de la sécurité des mobiles en entreprise | Social Media and its influence | Scoop.it
Google vient d'annoncer le rachat de la start-up new-yorkaise Divide, spécialisée dans la sécurité et le contrôle des appareils mobiles utilisés en entreprise.




Learn more:


http://www.scoop.it/t/social-media-and-its-influence/?tag=acquisitions


Gust MEES's insight:

Learn more:


http://www.scoop.it/t/social-media-and-its-influence/?tag=acquisitions


No comment yet.
Rescooped by Gust MEES from 21st Century Learning and Teaching
Scoop.it!

View from the IT desk: Securing social networking in the workplace

View from the IT desk: Securing social networking in the workplace | Social Media and its influence | Scoop.it
In this age of "instant information" is it shortsighted to block social networking sites within an organisation purely because of stories in the press relating to scams, misuse and threats?

 

Is it time for a re-think?

With the increase in the number of organisations embracing Bring Your Own Device (BYOD) this trend is only going to grow.

So perhaps now is the time to look at educating users about the issues, and empowering them to use these tools responsibly, rather than trying to block access; after all, this may turn into a battle you can’t win.

 

So, how do you educate users about social networking sites and the issues around them?

 

- Passwords


Teach users about good password management including password strength (difficult to guess but easy to remember), password security (keep it to yourself) and using different passwords for different sites (a password is only as strong as the weakest system you use it on).


- Scams, clickjacking and fake apps


Teach users how to spot something that is attempting to drive traffic, harvest data or steal identities. If people are aware of what can happen they may be less inclined to click anything-and-everything in the hope of a free gift.

 

- Sensible sharing


Social networking sites can be restricted to allow only a limited number of people to access data and information. If you have a target audience, do you need to tell ‘everyone’ or only those you wish to educate? Teaching people how to amend these settings to protect themselves will help you protect any corporate data you wish to place on there.

 

- Monitoring (for employees)


Social networks send emails relating to access, posts and mentions. Monitoring these will highlight any potential misuse which can be stopped before it gets too severe.

 

- Monitoring (for employers)


Regular checks of internet usage will show any misuse of social networking sites. All employees should be aware you are monitoring internet access and that misuse will be investigated. This should act as a deterrent for anyone who wishes to misuse the privilege and use corporate resources to "check their CityVille..." or "click that link for a free iPad..."

 

Read more:

http://nakedsecurity.sophos.com/2012/08/20/securing-social-networking/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+nakedsecurity+%28Naked+Security+-+Sophos%29

 

No comment yet.
Rescooped by Gust MEES from Apps and Widgets for any use, mostly for education and FREE
Scoop.it!

Poison Text Messages, Malicious Mobile Apps on the Rise

Poison Text Messages, Malicious Mobile Apps on the Rise | Social Media and its influence | Scoop.it

Nearly one in five (20%) mobile phone users have experienced some type of security threat with their device. That's the finding of a Cloudmark survey of 1,000 cellphone users, scheduled to be released Tuesday.


Via Gust MEES
No comment yet.
Scooped by Gust MEES
Scoop.it!

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke

Vorsicht: Tausende iPhone-Apps mit Sicherheitslücke | Social Media and its influence | Scoop.it
Security-SuperGAU für alle Nutzer von iPhones und iPads: Experten haben eine Lücke in iOS-Apps entdeckt, die es erlaubt, die komplette Kommunikation über fremde Server umzuleiten. Tausende Apps sollen betroffen sein.

 

Über HTTP Request Hijacking sollen sich Hacker in iOS-Apps einschleichen und so den Datentraffic über eigene Server umleiten können. Nach erfolgreichem Angriff soll die Umleitung dann permanent aktiv sein.

 

===> Einzige Abhilfe schafft ein Update oder eine Neuinstallation der App. <===

 

 

Gust MEES's insight:

 

Learn more:

 

http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security

 

http://www.scoop.it/t/apps-for-any-use-mostly-for-education-and-free

 

Rescooped by Gust MEES from ICT Security-Sécurité PC et Internet
Scoop.it!

Practical IT: How your firm can better secure access to social networks

Practical IT: How your firm can better secure access to social networks | Social Media and its influence | Scoop.it
Facebook’s potential to ruin (or make) your business is a common news topic. We've looked into the risks, and how businesses might provide a more secure way of accessing social networks.

 

 

 

 

 

 

Read more:

http://nakedsecurity.sophos.com/2012/06/21/how-secure-access-social-networks/?utm_source=gplus&amp;amp;amp;amp;utm_medium=status%2Bmessage&amp;amp;amp;amp;utm_campaign=naked%2Bsecurity

 

No comment yet.