Your company should have social media policy because social media changes what your employees can say, when and where they can say it. Here’s what I mean:
Dave is the kind of salesman that every company wants. Driven, slightly aggressive, persistent and a contact list a mile wide. He has lots of followers on his Facebook page and Twitter feed and is growing even more quickly on Pinterest, thanks to the photos of your company’s products that he posts.
When Dave closes a deal he takes the team out for beers, treats his family to a nice dinner out and brags about it on his social media accounts. Lots of people reply with congratulations or words of encouragement.
Amy, in your accounting department has a different social media presence that reflects her more reserved personality. She blogs regularly on Tumblr and posts selfies on Instagram while in pensive poses when problems overwhelm her. She doesn’t have as many followers as Dave, but the people who care about her have followers of their own and whatever she posts, they re-post, “like” or tweet about so many others see what Amy is thinking and feeling, too.
Both Dave and Amy represent major risks for your company.
Now phishing attacks have become personal. Very personal. And very frightening.
It’s hard to imagine that it’s come to this already. As if phishing attacks aren’t bad enough we’ve all been exposed to “spearphishing” attacks – which add a level of information that makes them more likely to get their victims to click on the link bait. Now we’ve got a highly sophisticated, very personalized and downright frightening form of phishing never seen before. Continue reading “Phishing Attacks Have Become Highly Sophisticated”
It’s bad enough when your login credentials are stolen from your favorite website, but it can be way, WAY worse when those credentials are for your Facebook or Google account.
People often ask my why it can be a total nightmare if your Facebook login is stolen. There are two reasons why.
First, these are what I like to call “gateway logins.” There’s another name for them in technical circles but the point is that many of these logins, such as those for Facebook, Google, Twitter and a couple of others can be used to login to many other sites.
What Is Ransomware And How To Avoid Being A Victim
Do you know the answer to this question: What Is Ransomware And How To Avoid Being A Victim?
If you think you’re not a target for a cyberattack recent “ransomware” incidents should make you think again.
What’s it like to be held hostage? I never want to find out and I’ll bet you don’t either. But given today’s environment executives might find themselves held hostage in a way they never expected. Ransomware, as it is known because it holds your entire computer system hostage, is quickly becoming the hacker’s method of choice because it’s simple, fast and virtually untraceable. Continue reading “What Is Ransomware And How To Avoid Being A Victim”
The folks that live next door to me are as nice as they come. They watch our house while we’re gone, bring over cookies and holiday gifts and even bought a bucket of toys for our new puppy. I figure that they are representative of most of the people that everyone knows. At least I hope so. Continue reading “The Package Nobody Ordered”