The Lighter Side Of The Cloud – Fear Of Heights
The Lighter Side Of The Cloud: Magical
The Lighter Side Of The Cloud – Cloud Ready
The Lighter Side Of The Cloud – The Name Game
The Lighter Side Of The Cloud: Disaster Recovery Plan

Social Media and Social Engineering – How To Win The War

Social Media and Social Engineering – How to Win the War

Man is by nature a social animal.

                          – Aristotle (384 BC – 322 BC), Greek philosopher and polymath.

Let me begin by putting forth some interesting numbers:

  • 62% of adults worldwide now use social media
  • If Facebook were a country, it would be the third most populous in the world (twice US population)

How’s that important to business, you say? Well, how about the following facts?

  • Social commerce is expected to be $14.25 billion in 2013 and $30 billion in 2015
  • 12% of consumers have purchased a product online because of info they found on Twitter
  • 90% of marketers use social media channels for business

Now, where does social media support stand in this picture?

  • Social media users are willing to pay a 21% premium for brands that deliver great service through social media
  • 17% have used social media in past year to obtain a service response
  • Social media users who receive great service tell an average of 42 people (compared to just 9 for those not active on social media)

In the difficult world of IT support, social media can be the key differentiator that takes you ahead of the competition. This white paper titled Making IT Support Social does a great job in showing you how.

Social engineering is the negative aspect of social media that seems to be on the rise. Social engineering, in the context of information security, is understood to mean the art of manipulating people into performing actions or divulging confidential information. While social engineering predates social media, the spread of Facebook and Twitter has opened up new avenues to criminals to exploit human vulnerabilities.

It seems like we’ve been hearing a lot about phishing in the news in recent years, and this threat hasn’t abated yet. Why are attacks via phishing, and social engineering in general, so prevalent and so effective?  This whitepaper titled Protect Your Organization against Social Engineering examines the many different methods employed in phishing attacks and social engineering campaigns, and offers a solution-based approach to mitigating risk from these attack vectors.

The assets mentioned above are free to download, requiring only a 1-minute registration. If you have registered with CloudTweaks before, you don’t have to register again.

By Sourya Biswas

sourya

Sourya Biswas is a former risk analyst who has worked with several financial organizations of international repute, besides being a freelance journalist with several articles published online. After 6 years of work, he has decided to pursue further studies at the University of Notre Dame, where he has completed his MBA. He holds a Bachelors in Engineering from the Indian Institute of Information Technology. He is also a member of high-IQ organizations Mensa and Triple Nine Society and has been a prolific writer to CloudTweaks over the years... http://www.cloudtweaks.com/author/sourya/

Sorry, comments are closed for this post.

Recent

Finland and The Future of The Internet

Finland and The Future of The Internet

Finlands Internet Future In so many ways, the nations of Northern Europe seem to be a few steps ahead of the rest of the world – countries like Norway, Sweden, Denmark, and Finland are frequently singled out for praise in areas as diverse as education, technology, and sheer happiness (despite the grey skies and bitter…

Technologies That Work Nicely With The Cloud

Technologies That Work Nicely With The Cloud

New Technologies And The Cloud Asides from all the security concerns that has been in the news over the past while, there are still some very exciting and ambitious opportunities available for those who stick it out. Lets take a look at some of the more exciting emerging technologies that can be used in conjunction…

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Wearable Technology is a very exciting industry and the sky’s the limit with new possibilities for businesses and consumers. The new technologies will make our lives easier in terms of convenience, while in other ways more complicated due to learning curve of each new product. Lets take a look at wearable tech in…

Popular Archives

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats Each week on CloudTweaks we provide a few shoutouts to companies who provide engaging and interesting infographics that reflect our readers interests.  In this case, we have an excellent infographic provided by the team at arellia.com which takes a closer look at cyber-security and some of the biggest malware threats…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Sponsors

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

Selling Your Business To Your Employees

Selling Your Business To Your Employees

Mobility For Your Employees It may seem a radical notion, the idea of selling your business to the people who work for you, but this is the era in which we now work. Employees of all levels are all incredibly aware of their options when it comes to mobility and employability. This doesn’t mean that…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising