Your company should have social media policy because social media changes what your employees can say, when and where they can say it. Here’s what I mean:
Dave is the kind of salesman that every company wants. Driven, slightly aggressive, persistent and a contact list a mile wide. He has lots of followers on his Facebook page and Twitter feed and is growing even more quickly on Pinterest, thanks to the photos of your company’s products that he posts.
When Dave closes a deal he takes the team out for beers, treats his family to a nice dinner out and brags about it on his social media accounts. Lots of people reply with congratulations or words of encouragement.
Amy, in your accounting department has a different social media presence that reflects her more reserved personality. She blogs regularly on Tumblr and posts selfies on Instagram while in pensive poses when problems overwhelm her. She doesn’t have as many followers as Dave, but the people who care about her have followers of their own and whatever she posts, they re-post, “like” or tweet about so many others see what Amy is thinking and feeling, too.
Both Dave and Amy represent major risks for your company.
Now phishing attacks have become personal. Very personal. And very frightening.
It’s hard to imagine that it’s come to this already. As if phishing attacks aren’t bad enough we’ve all been exposed to “spearphishing” attacks – which add a level of information that makes them more likely to get their victims to click on the link bait. Now we’ve got a highly sophisticated, very personalized and downright frightening form of phishing never seen before. Continue reading “Phishing Attacks Have Become Highly Sophisticated”
It’s bad enough when your login credentials are stolen from your favorite website, but it can be way, WAY worse when those credentials are for your Facebook or Google account.
People often ask my why it can be a total nightmare if your Facebook login is stolen. There are two reasons why.
First, these are what I like to call “gateway logins.” There’s another name for them in technical circles but the point is that many of these logins, such as those for Facebook, Google, Twitter and a couple of others can be used to login to many other sites.
What Is Ransomware And How To Avoid Being A Victim
Do you know the answer to this question: What Is Ransomware And How To Avoid Being A Victim?
If you think you’re not a target for a cyberattack recent “ransomware” incidents should make you think again.
What’s it like to be held hostage? I never want to find out and I’ll bet you don’t either. But given today’s environment executives might find themselves held hostage in a way they never expected. Ransomware, as it is known because it holds your entire computer system hostage, is quickly becoming the hacker’s method of choice because it’s simple, fast and virtually untraceable. Continue reading “What Is Ransomware And How To Avoid Being A Victim”
Cybersecurity Information for Board Directors and C-Level Executives In Partnership With BoardProspects.com
I am proud to make the following announcement regarding cybersecurity information for Board Directors:
BoardProspects.com, the online destination for recruitment for board members, prospective board members and corporations has teamed up with Scott Goldman, noted technology thought leader and cybersecurity patentee, to provide regular information and updates about cybersecurity issues tailored to the needs of Board Directors and C-Level executives. Mr. Goldman will be publishing a bi-weekly article for the website and responding to questions in online forums about how various cybersecurity threats and challenges affect Directors and how the latest hacks and intrusions could impact their companies. Continue reading “BoardProspects.com and Scott Goldman Team Up To Provide Cybersecurity Information for Board Directors”