Social Media and Social Engineering – How To Win The War

Social Media and Social Engineering – How to Win the War

Man is by nature a social animal.

                          – Aristotle (384 BC – 322 BC), Greek philosopher and polymath.

Let me begin by putting forth some interesting numbers:

  • 62% of adults worldwide now use social media
  • If Facebook were a country, it would be the third most populous in the world (twice US population)

How’s that important to business, you say? Well, how about the following facts?

  • Social commerce is expected to be $14.25 billion in 2013 and $30 billion in 2015
  • 12% of consumers have purchased a product online because of info they found on Twitter
  • 90% of marketers use social media channels for business

Now, where does social media support stand in this picture?

  • Social media users are willing to pay a 21% premium for brands that deliver great service through social media
  • 17% have used social media in past year to obtain a service response
  • Social media users who receive great service tell an average of 42 people (compared to just 9 for those not active on social media)

In the difficult world of IT support, social media can be the key differentiator that takes you ahead of the competition. This white paper titled Making IT Support Social does a great job in showing you how.

Social engineering is the negative aspect of social media that seems to be on the rise. Social engineering, in the context of information security, is understood to mean the art of manipulating people into performing actions or divulging confidential information. While social engineering predates social media, the spread of Facebook and Twitter has opened up new avenues to criminals to exploit human vulnerabilities.

It seems like we’ve been hearing a lot about phishing in the news in recent years, and this threat hasn’t abated yet. Why are attacks via phishing, and social engineering in general, so prevalent and so effective?  This whitepaper titled Protect Your Organization against Social Engineering examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.

The assets mentioned above are free to download, requiring only a 1-minute registration. If you have registered with CloudTweaks before, you don’t have to register again.

By Sourya Biswas

sourya

Sourya Biswas is a former risk analyst who has worked with several financial organizations of international repute, besides being a freelance journalist with several articles published online. After 6 years of work, he has decided to pursue further studies at the University of Notre Dame, where he has completed his MBA. He holds a Bachelors in Engineering from the Indian Institute of Information Technology. He is also a member of high-IQ organizations Mensa and Triple Nine Society and has been a prolific writer to CloudTweaks over the years... http://www.cloudtweaks.com/author/sourya/

Sorry, comments are closed for this post.

Popular Archives

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is that despite being a hot issue for years, the topic of…

Recent

Unlimited Cloud Storage Is Often Anything But

Unlimited Cloud Storage Is Often Anything But

Unlimited Cloud Storage The promise of unlimited technology has always enamored consumers. From unlimited texts to unlimited data, users want more, they want better and they want it now. This obsession with unlimited is influencing the cloud computing field. Many cloud storage providers now offer affordable, unlimited storage systems to house the growing volume of…

Layering Governance Over Cloud: Do Not Re-Build Perpetually!

Layering Governance Over Cloud: Do Not Re-Build Perpetually!

Layering Governance Over Cloud  As the latest Amazon earnings announcement for AWS suggests, enterprises have adopted cloud at a rapid pace over the last few years as a part of the emerging Bimodal IT paradigm. However, given the focus on cost and agile development, the sourcing of cloud vendors has typically been cost-based, and the…

Cloud Pinup: HappyApps Streamlines Application and System Monitoring

Cloud Pinup: HappyApps Streamlines Application and System Monitoring

HappyApps New Monitoring Experience This is part of our ongoing CloudTweaks Pinup series featuring new startups. Contact us for more information on how to get involved.  Happyapps.io is a young yet promising start-up that provides cloud-based, real-time monitoring services for applications across a wide range of platforms. Founded in 2015, the company is a newcomer to…

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising