Category Archives: Social Media

Irony and Cyberbullying

Years ago, bullies were big and strong. They pushed us down the stairs, hit us in the nose, and stole our books. Today, they sit at computers or use mobile devices and have evolved into a new type of bully … Continue reading

Posted in Cyberbullying, Social Media | Leave a comment

Five Social Media #Security Tips

Many of the previous posts on this blog have been geared toward midsize businesses to assist them with their information security strategies and to keep their data safe. However, with the widespread use of social media, this post focuses on … Continue reading

Posted in Cybersecurity, data protection, Data Security, Email, Social Media | Tagged , , , , | Leave a comment

Five Tips for #CyberMonday

With #CyberMonday here, be careful – translation, very careful –  about your online activities today. For those of you who plan to make purchases either at lunch, break time, or at the end of the work day until midnight sales … Continue reading

Posted in Cybersecurity, data protection, Email, Mobile Computing, Online Privacy, Online Security, Social Media | Tagged , , , , | Leave a comment

Top 10 Tips to Share with Employees During Cyber Security Awareness Month (#NCSAM)

There is no dispute that data breaches are becoming more common, and as a result, online safety and the protection of personally identifiable information (PII) are hot topics in the mainstream media. Therefore, the month of October presents an excellent … Continue reading

Posted in Business Process, BYOD, Cloud Computing, Cybersecurity, Data Security, Disaster Recovery, Management and Technology, Mobile Computing, Network Security, Social Media | Tagged , , | 2 Comments

5 Ways to Prepare for Data Breaches – Before It’s Too Late

I read a recent post that has stuck with me. The question raised was how do businesses, especially midsize businesses, budget for insider threats: “Midsize firms simply cannot afford data breaches, no matter what the cause. [But] a company that … Continue reading

Posted in Business Process, BYOD, Data Security, Disaster Recovery, Management and Technology, Network Security, Social Media | Tagged , , , | 1 Comment

Who Protects Your Corporate Digital Footprint?

Business leaders must focus on many things every day. There are legal and compliance issues, personnel issues, product development issues, and much more. But in the era of Snowden vs. the NSA, Wikileaks, and a myriad of data breaches, who … Continue reading

Posted in Cybersecurity, Disaster Recovery, Search Technology, Social Media | Tagged , | Leave a comment

Does Your Business Conduct Undercover Reconnaissance on Your Customers?

Last year, there was a story in the news that an international airline would conduct Google searches on its passengers in an effort to create customized experiences for its repeat travelers. The head of customer analysis of British Airways explained … Continue reading

Posted in Business Process, Data Security, Network Security, Online Privacy, Online Security, Privacy Rights, Social Media | Leave a comment

Only You (IT and the Security Team) Can Prevent Data Breaches and Malware Attacks

In today’s world, social media plays a big part in the marketing strategy of many businesses. It’s a useful way for businesses to attract new customers, visitors, donors, media, and interested prospects. Furthermore, social media is a tool to create … Continue reading

Posted in Business Process, BYOD, Data Security, Network Security, Social Media | Leave a comment

Google Plus and Its TOS

By now, most of us have received the email from Google Plus inviting us to customize our Google Plus URL. Have you changed yours? Do you feel important since many months ago, customized Google Plus URLs were only available for … Continue reading

Posted in Social Media, Terms of Service | Leave a comment

Is Your Business Ready for Cyber Monday?

Cyber Monday is the day when all employers cringe. This is because many employees will spend a portion of their day making online holiday purchases instead of working. “Cyber Monday is the Monday after Black Friday, the Friday following Thanksgiving … Continue reading

Posted in Data Security, Mobile Computing, Online Privacy, Online Security, Social Media | 1 Comment