Social Media Safety/Security: Online Reputation Management
There was a time when we carefully “minded our P’s and Q’s,” but now everything is out there for everyone to see because the mole on the inside is us, and we are giving away all the data. The risks we face from sharing too much information include everything, including personal security risks, damaged reputations, and significant business liabilities that put all operations in jeopardy.
In the social media security program, you will recognize what puts you, your business, your data and your reputation at risk. Learn from others’ mistakes and develop policies to prevent employees, families and even you from saying, doing or posting things that you’ll regret later. Robert will answer all your questions and show you how to create a fool (fool being the operative word) proof plan.
You Learn How To:
- Develop Skills for Cyber Safety.
- Navigate Social Networking Sites.
- Understand Instant Messaging Language.
- Determine What Risks Kids and Adults Face.
- Search for Dangerous Content.
- Set up Safe and Secure Surfing.
- Protect Yourself and Kids Online.
- Talk Technology and Be Cyber-Smart.
- Find Out if Your Kids are at Risk.
- Manage You and Your Companies Online Reputation.
Download PDF version
Similar Posts from the Security Blog
- Cyberbullying: Its Uniqueness & Prevention
Unfortunately, cyberbullying is prevalent, and a growing threat in today’s always-connected world. Cyberbullying refers to bullying done via computers, or similar technologies, such as cell phones. This kind of bullying usually includes mean or threatening comments, or public posts through texts, emails, voice mails, social media posts, all intended to embarrass the victim.
Cyberbullying can happen
- Evaluating Physical and Information Security Risks
When it comes to protecting an organization’s information, flaws with this can involve either implementing strong technology to protect too much trivial data, or inadequate protection of important and sensitive data.
In short, not enough attention is cast upon a company’s most important information; there’s a gap between the IT department and the operational units of
- Managing Your Online Reputation
You’ve been “Googled.” No matter how small a speck you think you are in this universe, you have without a doubt created an online footprint that is attached to your name. Chances are high that someone out there has followed this footprint of yours via a Google search.
Whether by a business colleague, family member or
- Do You Know What Your Kids Are Hiding?
Many of you as parents may think, “not much” when asked this question. But in reality, it’s probably a lot more than you think. So it should come as no surprise to anyone that McAfee’s 2013 study, Digital Deception: Exploring the Online Disconnect between Parents and Kids, which examines the online habits and interests of tweens, teens, and
- A Quarter of all Underage Kids Will Meet with Complete Strangers
According to a new Intel Security study, more than 2,000 American parents and kids ages 8-16 were surveyed to unveil some interesting things.
79% of the juvenile respondents learned online safety from their parents.
35% of them said they’ve been a cyberbully.
27% of them said they have met, or would meet, a person in real life who