SlideShare a Scribd company logo
Social Media
&
Security @brianhonan
Who Am I?
@brianhonan
What
is
Social Media?
Websites and applications that
enable users to create and share
content or to participate in social
networking.
- Oxford English Dictionary
Forms of electronic communication
(as Web sites for social networking
and microblogging) through which
users create online communities to
share information, ideas, personal
messages, and other content (as
videos) .
- Mirriam-Webster Dictionary
“A group of Internet-based
applications that build on the
ideological and technological
foundations of Web 2.0, and that
allow the creation and exchange of
user-generated content."
- Wikipedia
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
Courtesy of Instantcheckmate.com
How to Like Social Media Network Security
Government Official Sacked
Forgot Boss was Facebook Friend
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
Posting They Are Not at Home
Yes, 53%
No, 47%
Courtesy of Legal & General Group PLC
Yes, 60%
No, 40%
Post About Nights Out
Courtesy of Legal & General Group PLC
Shared Images of Expensive Items
Yes, 24%
No, 76%
Courtesy of Legal & General Group PLC
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Social Media Scams
Competition Winners ??
Click on This Link …
Twitter Threats
Koobface
Courtesy TrendMicro
Zeus?
Do You Trust That App?
CourtesyofBitrebels.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Courtesy of Instantcheckmate.com
Anthony Stancl
Secure Passwords?
Common Passwords
Password Reset
How to Like Social Media Network Security
How to Like Social Media Network Security
My Name is Marie
How to Like Social Media Network Security
How Did I Steal Her ID?
Corporate Issues
Password Reuse
81%
61%
19%
39%
0% 20% 40% 60% 80% 100%
IT Pros
General
Courtesy Darkreading.com & welivesecurity.com
Social Media Treasure Trove
How to Like Social Media Network Security
How to Like Social Media Network Security
How to Like Social Media Network Security
The Gift That Keeps on Giving
Social Engineering
Emily Williams & Robin Page
http://www.thesecurityblogger.com/?p=1903
How to Like Social Media Network Security
How to Like Social Media Network Security
Misinformation
Manipulation?
How To Defend
Establish Policies
Awareness
Be Careful
What You
Share
Update Privacy Settings
How to Like Social Media Network Security
How to Like Social Media Network Security
Twitterfall
How to Like Social Media Network Security
How to Like Social Media Network Security
Handling Security Breaches
Bad News
How to Like Social Media Network Security
How to Like Social Media Network Security
 Use All Channels.
 Use Social Media to Direct
People to More Information
 Update Regularly (Timezones,
etc.)
 Keep Webpage Updated
 Have Staff Trained
 Trust Employees
 Get Senior Representative to
Talk Early and Often
 Engage With Others
Use Social Media in IR
Monitor & Respond
Brian.honan@bhconsulting.ie
@brianhonan

More Related Content

PPTX
Social media and Security: How to Ensure Safe Social Networking
PDF
Social media and security essentials.pptx
PDF
How Safe Is YOUR Social Network?
PPT
Social media and Security risks
PDF
Social Media Security Risk Slide Share Version
PPTX
Social Media Basics: Security Loopholes with Twitter & Other Social Media
PPT
Social media & cyber crime
PDF
SOCIAL NETWORK SECURITY
Social media and Security: How to Ensure Safe Social Networking
Social media and security essentials.pptx
How Safe Is YOUR Social Network?
Social media and Security risks
Social Media Security Risk Slide Share Version
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social media & cyber crime
SOCIAL NETWORK SECURITY

What's hot (20)

PPTX
Social network privacy & security
PDF
Online Social Networks: 5 threats and 5 ways to use them safely
PPTX
Privacy issues in social networking
PPTX
Security threats in social networks
PPT
Privacy and Social Networks
PPT
Social media risk
PDF
The Social Media Bait - Fraud & Cybercrime
PPT
Security Dangers of Social Networking
PPTX
Social Media Security 2011
PPTX
Social media privacy issues
PPTX
Social Network Privacy, Security and Identity:One
PPTX
Security and social media
PPTX
Social Media Security
PPTX
20160317 ARMA Wyoming Social Media Security Threats
PDF
The Dark Side of Social Media: Privacy Concerns
PPTX
Misuse of social media
PPTX
Social Media And Privacy October 9 2009
PDF
Privacy and Security in Online Social Media : Privacy and Social Media
PDF
Dangers to social media
PDF
parent_teacher_tutorial
Social network privacy & security
Online Social Networks: 5 threats and 5 ways to use them safely
Privacy issues in social networking
Security threats in social networks
Privacy and Social Networks
Social media risk
The Social Media Bait - Fraud & Cybercrime
Security Dangers of Social Networking
Social Media Security 2011
Social media privacy issues
Social Network Privacy, Security and Identity:One
Security and social media
Social Media Security
20160317 ARMA Wyoming Social Media Security Threats
The Dark Side of Social Media: Privacy Concerns
Misuse of social media
Social Media And Privacy October 9 2009
Privacy and Security in Online Social Media : Privacy and Social Media
Dangers to social media
parent_teacher_tutorial
Ad

Viewers also liked (20)

PPTX
Cyber Crime and Social Media Security
PDF
Social Media & Crime
PPTX
Family Online Safety: Truth and Consequences
PDF
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
PPTX
Online safety and malwares
PPTX
PACE-IT: Common Network Security Issues
PDF
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
PPTX
Voimaa verkostoitumalla
PPT
Juliana New York
PPS
PPTX
Learning from History
PDF
P Gross Portfolio2008
PDF
Optime 8 9 E 10 Giugno Frodi Assicurative
PPTX
Askartelukerho kevät 2011
PPT
eTwinning - lyhyt johdatus työpajatyöskentelyyn
PPT
KMUTNB - Internet Programming 5/7
PDF
One Source Solutions
PPTX
etwinning Learning Events - Pedagogical Objectives
PPT
PPT
Tactiek verdedigen
Cyber Crime and Social Media Security
Social Media & Crime
Family Online Safety: Truth and Consequences
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Online safety and malwares
PACE-IT: Common Network Security Issues
A SERVEY ON WIRELESS SENSOR NETWORK SECURITY ISSUES & CHALLENGES
Voimaa verkostoitumalla
Juliana New York
Learning from History
P Gross Portfolio2008
Optime 8 9 E 10 Giugno Frodi Assicurative
Askartelukerho kevät 2011
eTwinning - lyhyt johdatus työpajatyöskentelyyn
KMUTNB - Internet Programming 5/7
One Source Solutions
etwinning Learning Events - Pedagogical Objectives
Tactiek verdedigen
Ad

Similar to How to Like Social Media Network Security (20)

PPT
Nonprofit Congress: Innovation
PPTX
Social media in hospitality
PDF
The State of Social Media (and How to Use It and Not Lose Your Job)
PPT
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
DOCX
Web 2.0 Presentation
PPT
Social Media101
PPT
CNCS Web 2.0
PPT
Social Media For Social Change
PPT
social media for social change
PPTX
Social Media & Civic Engagement
PPT
Social media colleges- t seymour
PPT
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
PPTX
Group 4 IT (Chapter 8) yes just (2).pptx
PPTX
PPTX
Social Media Forensics for Investigators
PDF
Empowerment Technologies Lesson 1: Introduction to ICT (pdf)
PPT
Abjs 2008 Veillette Web 20
PPT
Merged may 19 webinar
PPT
Online Marketing to Seniors via Social Media - Alpro Marketing Forum
Nonprofit Congress: Innovation
Social media in hospitality
The State of Social Media (and How to Use It and Not Lose Your Job)
AYN Brand : T3 Workshop - Social Media & Web 2.0 Primer
Web 2.0 Presentation
Social Media101
CNCS Web 2.0
Social Media For Social Change
social media for social change
Social Media & Civic Engagement
Social media colleges- t seymour
Accelerating Social Innovation: NGOs, Open Networks & Developing Marketplaces
Group 4 IT (Chapter 8) yes just (2).pptx
Social Media Forensics for Investigators
Empowerment Technologies Lesson 1: Introduction to ICT (pdf)
Abjs 2008 Veillette Web 20
Merged may 19 webinar
Online Marketing to Seniors via Social Media - Alpro Marketing Forum

More from Brian Honan (20)

PPTX
Brian honan ipexpo keynote
PPTX
GDPR & Brexit - What Does the Future Hold?
PDF
Ransomware Prevention Guide
PPTX
Brian honan
PPTX
The dark side of the internet
PPTX
Data security brian honan
PPTX
Presentation on EU Directives Impacting Cyber Security for Information Securi...
PPTX
Incident Response in the Cloud
PDF
Bridging the air gap
PDF
Proactive incident response
PPTX
Incident response cloud
PPTX
Preparing for Failure - Best Practise for Incident Response
PPT
Best practises for log management
PPT
Cloud security
PPTX
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
PPTX
Creating a CERT at WARP Speed
PDF
The Case for Mandatory Data Breach Disclosure Laws
PPTX
Ic Sconf2010presentation Dp Bh
PPT
Knowing Me Knowing You
PDF
Scare Ware From Ireland
Brian honan ipexpo keynote
GDPR & Brexit - What Does the Future Hold?
Ransomware Prevention Guide
Brian honan
The dark side of the internet
Data security brian honan
Presentation on EU Directives Impacting Cyber Security for Information Securi...
Incident Response in the Cloud
Bridging the air gap
Proactive incident response
Incident response cloud
Preparing for Failure - Best Practise for Incident Response
Best practises for log management
Cloud security
Layer 8 Security - Securing the Nut Between the Keyboard & Screen
Creating a CERT at WARP Speed
The Case for Mandatory Data Breach Disclosure Laws
Ic Sconf2010presentation Dp Bh
Knowing Me Knowing You
Scare Ware From Ireland

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Machine Learning_overview_presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Review of recent advances in non-invasive hemoglobin estimation
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine Learning_overview_presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
A Presentation on Artificial Intelligence
20250228 LYD VKU AI Blended-Learning.pptx

How to Like Social Media Network Security