This article kicked off an interesting discussion on our IT management team about security and social networks. Not just the social engineering hack used here, but also monitoring for the impact of articles, comments, blog posts, etc. on a company and its reputation. Some of the questions included; Who's responsible for monitoring and reporting on this type of information? IT, HR, Legal, and Marketing are certainly all stakeholders. IT is clearly involved, but do they own the process? What kind of tools, if any, exist to address these kinds of needs. Can you roll your own toolset easily through Google searches that send notifications, LinkedIn queries, Twitter searches, etc?
http://fox2now.com/2012/03/12/linkedin-is-a-hackers-dream-tool/ RSA has a couple of videos from last year about some of these issues. (disclaimer, I haven't watched these yet but plan on doing so). http://365.rsaconference.com/community/archive/usa/blog/tags/social_networks Thoughts, comments and sly remarks all welcome, as are links to additional information, videos, and seminars addressing these topics. ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
