Recent Posts

Whose Story Are You Telling?

TamaraDull
You have limited (if any) control over what others share about you, but you do have control over what you share about yourself and others. Just because you have someone’s personal information doesn’t mean you have to share or act on it. Remember: It may not be your story to tell.
Whose Story Are You Telling?

The Snappening: Over 200,000 Snapchat Photos Leaked Online

larrykim
Hackers leaked 200,000 photos of unwitting Snapchat users to popular websites 4chan and Reddit. Many of the photos are reported to contain nudity of minors.
The Snappening: Over 200,000 Snapchat Photos Leaked Online

The Impact of Wearable Technology on Workplace Security

Rick Delgado
There’s no avoiding the clear trend that will come as the general public adopts wearable technology. The risks that accompany wearable devices are real, but they can be managed by the company willing to prepare for what’s to come. Common sense approaches and the latest security technology can go a long way to ensure a company’s data is protected. Once preparations are complete, businesses can proceed to reap the benefits that wearable technology brings.
The Impact of Wearable Technology on Workplace Security

Dear Facebook, It’s Not You, It’s Us

TamaraDull
Dear Facebook: The fact is that without all this data—my data and the data of my 1.3+ billion “friends” on Facebook—you would shrivel up and die. You need our data to stay alive.
Dear Facebook, It’s Not You, It’s Us

We’re Traveling at the Speed of Cool to Creepy

TamaraDull
It is no longer good enough to make the connection or get the account. The challenge now for companies/brands/apps is to demonstrate that they are trustworthy, respectable, and care about safeguarding what customers have shared with them—i.e., their personal data.
We’re Traveling at the Speed of Cool to Creepy

Protecting Your Brand: The State of Social Infrastructure in the Enterprise

PaulDunay
Welcome to another Social Media Today webinar as part of our Best Thinker webinar series, this time on the topic of Protecting Your Brand: The State of Social Infrastructure in the Enterprise.
Protecting Your Brand: The State of Social Infrastructure in the Enterprise

How to Respect and Protect Your Users’ Privacy in the Internet of Things

PatrickSalyer
Notify your customers that you will protect their data privacy by stating clearly what you will do with the data collected by a device connected to the internet of things and how you will secure their data. For example, Preventice, maker of the BodyGuardian wearable device for people at risk of heart attack, clearly states its security strategies on its website.
How to Respect and Protect Your Users’ Privacy in the Internet of Things

The High Cost of Security Breaches: It's More Than You Think

Joey Sargent
The downstream cost of security breaches is enormous. Each one of these companies will get a bounced payment if I don’t update my records immediately. They’ll have to spend time and money tracking down customers for updated payment information.
The High Cost of Security Breaches: It's More Than You Think

Social Media: What It Knows About You

mishkatolentino
Social media membership is for free but there’s a cost to pay if you do not pay close attention to the information that can be stolen from you. Is social media in this aspect boon or bane? You decide.
Social Media: What It Knows About You

5 Things Employees Should Know Before Implementing BYOD

Rick Delgado
Most of the concern over adopting bring your own device policies usually centers around security. With so many new endpoint devices in use, there are more avenues where attackers can infiltrate an organization, often with damaging results.
5 Things Employees Should Know Before Implementing BYOD