How does your organization encourage the kind of nimble thinking required to match social customer engagement needs? Learn more from our panel of experts on #SMTLive. Register now!

data security's picture

Protecting Your Brand: Privacy, Risk and Compliance

The following is a podcast for "Protecting Your Brand: Privacy, Risk and Compliance." This webinar is brought to you by Tracx and Social Media Today. Listen to the audio recording to learn more:

About You
About Your Work
For This Webinar
July 20, 2014
How important is your privacy? It’s important, right? And, if you were asked about the importance of your security, you would inevitably also put a high value on your protection, right?
May 19, 2014
The more you know about your customers, the better you can serve and give them the products they want. In return, the more they trust and become loyal to your brand. But with all the information you gather from your customers to provide one-to-one service and personalized products comes the responsibility to take care of their personal data.
April 17, 2014
Do you think it’s legal to collect data transmitted over unencrypted WiFi networks? Google does. This month, Google asked the U.S. Supreme Court to review an earlier federal appeals court decision that could make it liable for hijacking data from unencrypted WiFi networks in neighborhoods that were part of its Street View program.
February 11, 2014
It seems an insane irony that amid the more than $60 billion dollars we spend annually around the world on information security, we routinely fail to secure some of the most mission-critical information from a totally obvious risk. The problem may be old, but there is a new solution.
November 18, 2013
They're so popular, those ubiquitous mobile devices. For better or worse, we've evolved into a society that is a texting, online-banking, TMI-ing, forever-connected, 24/7-kind of world. But have you ever considered the negatives when you're doing all that in a public wireless hotspot?
September 24, 2013
It has never been top-secret that online activity is far from being private. Chat, email, photos, videos, file transfers, social networking data: they may be accessed through the click of a button, at any given time or place. Here are a few methods for keeping your private data away from Internet companies, and even the public.
February 13, 2013
Using no more processing power than what’s found inside a basic smartphone, it is now possible to generate all possible 8-letter passwords in a few hours. It’s shocking how many companies still rely on nothing more than username and password to secure sensitive data.
February 10, 2013
How well do you know your social network? With the way our online identities are increasingly linked, all it takes is one less-than-discriminating friend in your circle for a hacker to gain access to and destroy your online life.