This article kicked off an interesting discussion on our IT management team
about security and social networks. Not just the social engineering hack
used here, but also monitoring for the impact of articles, comments, blog
posts, etc. on a company and its reputation. Some of the questions included;
Who's responsible for monitoring and reporting on this type of information?
IT, HR, Legal, and Marketing are certainly all stakeholders.
IT is clearly involved, but do they own the process?
What kind of tools, if any, exist to address these kinds of needs.
Can you roll your own toolset easily through Google searches that send
notifications, LinkedIn queries, Twitter searches, etc?

http://fox2now.com/2012/03/12/linkedin-is-a-hackers-dream-tool/

RSA has a couple of videos from last year about some of these issues.
(disclaimer, I haven't watched these yet but plan on doing so).
http://365.rsaconference.com/community/archive/usa/blog/tags/social_networks

Thoughts, comments and sly remarks all welcome, as are links to additional
information, videos, and seminars addressing these topics.

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to