1 / 5100%
Runningd head:d STANDARDD OPERATIOND POLICIES 1
Apply:d Onlined Interactions
Universityd ofd Phoenix
CYBd 110d –d Foundationsd ofd Security
Abstract
Sociald Networkingd hasd changedd thed wayd wed interactd withd friendsd andd associates.d
Sociald Networks,d liked Facebook,d Instagram,d Twitter,d YouTube,d Google+,d andd Snapchatd
playd ad bigd roled ind ourd lives,d butd whatd wed don’td realize,d theyd ared alsod highd riskd ford
securityd threats.d Millionsd ofd usersd ared onlined usingd thesed networkingd tools,d theyd notd onlyd
attractd friendsd andd family,d butd theyd alsod attractd peopled wantingd tod caused harmd ford theird
benefit.d Wed willd explored threatsd thatd thesed typesd ofd interactionsd cand posed tod ad companyd
andd bestd wayd tod mitigated thesed threatsd atd ad companyd andd asd and individual.
Apply:d Onlined Interactions
Sociald Networkingd hasd changedd thed wayd wed interactd withd friendsd andd associates.d
Sociald Networks,d liked Facebook,d Instagram,d Twitter,d YouTube,d Google+,d andd Snapchatd playd
ad bigd roled ind ourd lives,d butd whatd wed don’td realize,d theyd ared alsod highd riskd ford securityd
threats.d
Wed willd created ad playd bookd thatd willd highlightd threatsd ofd sociald mediad andd whatd itd
posesd tod ad companyd ifd usingd itd ind yourd workplace.d Wed willd alsod lookd atd ad scenariod whered
and employeed hasd clickedd ond ad websited ind and emaild thatd wasd receivedd ond ad companyd
email.d Wed willd identifyd stepsd mitigate/resolved thesed threatsd andd securingd email.d
Threatsd ofd onlined Interactiond ford company
• Leakaged ofd confidentiald information
• Employeed distractiond fromd cored responsibilities
Potentiald riskd presentedd byd inappropriated used ofd sociald media
• Lossd ofd Intellectuald Propertyd –employeesd postingd informationd ofd projectsd thatd
theyd ared workingd on,d companyd developmentsd
• Hackingd –d leavesd usersd opend tod riskd suchd asd virus,d malware,d phishingd scamsd andd
identityd theft
Cyber-attacksd ond companiesd withd 250d ord fewerd employeesd doubledd ind thed firstd sixd
monthsd ofd lastd year—andd thed lossd perd attackd wasd mored thand $188,000d ond average.d Thed
effectd ofd cyber-attacksd ond thed Americand economyd isd ad highd costd ofd $100d billiond annually,d
accordingd tod thed Centerd ford Strategicd andd Internationald Studies.
Stepsd tod keepd Intellectuald propertyd safe
• Knowd whatd intellectuald propertyd yourd companyd has
• Knowd whered yourd intellectuald propertyd isd –d Printers,d Copiers,d Scannersd andd faxd
machines
• Prioritized yourd intellectuald propertyd –d mapd companyd asserts
• Educated employeesd aboutd intellectuald propertyd –d training
Stepsd tod securingd used ofd emaild atd company
• Encryptd emaild andd serverd connections
• Verify
• Bed waryd pfd web-basesd e-mail
• Educated employees
• Updated softwared andd operatingd system
• Scand e-maild content
• Vetd vendorsd
Resolutiond tod emaild beingd hacked
1. Rund trustedd Anti-Virusd Program
2. Changed passwords
3. Contactd otherd onlined servicesd attachedd tod thatd email
4. Notifyd peopled youd know
5. Changed securityd questions
6. Reportd hackd byd contactingd emaild providedd
7. Created ad newd emaild account
8. Contactd Creditd Agencies
9. Considerd yourd IDd Protectiond options
10. Getd totallyd secured
References
1. 5d Threatsd Tod Yourd Securityd Whend Usingd Sociald Media(2013).d Retrievedd fromd
https://www.adweek.com/digital/5-social-media-threats/
2. Topd fived risksd companiesd faced whend usingd sociald media().d Retrievedd fromd
https://techxb.com/top-five-risks-companies-face-when-using-social-media/
3. Whatd tod Dod ifd Yourd Emaild Accountd Hasd Beend Hacked(2020).d Retrievedd fromd
https://usa.kaspersky.com/resource-center/threats/what-to-do-if-your-email-account-has-
been-hacked
Students also viewed