Social Media and Social Engineering – How to Win the War
“Man is by nature a social animal.”
Let me begin by putting forth some interesting numbers:
- 62% of adults worldwide now use social media
- If Facebook were a country, it would be the third most populous in the world (twice US population)
How’s that important to business, you say? Well, how about the following facts?
- Social commerce is expected to be $14.25 billion in 2013 and $30 billion in 2015
- 12% of consumers have purchased a product online because of info they found on Twitter
- 90% of marketers use social media channels for business
Now, where does social media support stand in this picture?
- Social media users are willing to pay a 21% premium for brands that deliver great service through social media
- 17% have used social media in past year to obtain a service response
- Social media users who receive great service tell an average of 42 people (compared to just 9 for those not active on social media)
In the difficult world of IT support, social media can be the key differentiator that takes you ahead of the competition. This white paper titled Making IT Support Social does a great job in showing you how.
Social engineering is the negative aspect of social media that seems to be on the rise. Social engineering, in the context of information security, is understood to mean the art of manipulating people into performing actions or divulging confidential information. While social engineering predates social media, the spread of Facebook and Twitter has opened up new avenues to criminals to exploit human vulnerabilities.
It seems like we’ve been hearing a lot about phishing in the news in recent years, and this threat hasn’t abated yet. Why are attacks via phishing, and social engineering in general, so prevalent and so effective? This whitepaper titled Protect Your Organization against Social Engineering examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.
The assets mentioned above are free to download, requiring only a 1-minute registration. If you have registered with CloudTweaks before, you don’t have to register again.
By Sourya Biswas
Latest posts by sourya (see all)
- In A World Without Windows, Who Needs Gates? – Windows 8 Migration - August 26, 2013
- 6 Common Challenges Of Private Cloud Implementations - August 23, 2013
- The Importance Of Monitoring Your IT Ecosystem - August 14, 2013