The desire to appear at the top of a search engine results page gave birth to the entire practice of search engine optimization (SEO) beginning around 1991. Google's SEO guidelines soon became the de facto rules webmasters use to provide a “good user experience” to people searching for information. Unfortunately, some of those very same SEO guidelines are being used to poison Google search results and damage social media pages. Now, because social platforms have become such primary sources of information, hackers have shifted their attention to the users of social media and are using black hat SEO techniques to target users in yet another effort to deceive, damage and steal from people and companies.... Read more »
Whether you want to admit it or not...and whether you want to see it all or not...there are known and unknown components across the social media landscape that every company has to deal with. ... Read more »
Tags: BlogSocial Media SecurityFacebook PagesLinkedin PagesDigital Risk
ABC News, Good Morning America, HBO, Senator Ted Cruz, Mark Zuckerburg, CEO's of Uber, Zendesk, Oculus, Spotify, Twitter and dozens of C-suite executives along with now-deceased Beatle George Harrison and NASA's Kepler space telescope. What do these people, companies, top executives and space telescopes have in common? They've all had their Twitter accounts hacked. [1]... Read more »
Tags: BlogOtavio FreireTwitter Cyber ThreatsPublic Sectorresearch alertAustralia
Social SafeGuard is transforming the way organizations can protect themselves from the mounting risk posed by digital channels across the enterprise, and within small to mid-sized business globally.... Read more »
All companies have a known and unknown social media presence whether they are aware of it or not. The large majority of companies have corporate social media accounts that they own and operate, however in addition they have a variety of other accounts that they may not know about. These unknown accounts can include impersonation accounts, brand smashing accounts, or employees using social media on behalf of the company without the company’s knowledge. Our DAST (Discover, Analyze, Secure, Test) process ensures that you will start to secure your digital footprint. The first step is Discover: There are three steps every company should take in order to identify, discover, and control their digital and social media landscape:... Read more »
If you’re reading the latest news, the newest frontier for sexual harassment risk is in social media. It’s a particularly sensitive subject, however, the usage of readily-available, and instantaneous technology make potentially combustible conversations and content on social media more accessible and easier to carry out.... Read more »
Tags: BlogJim ZuffolettiSocial Media SecuritySocial SafeGuard
We’re going to paint a picture here for you. You are just doing your job.... Read more »
This week several Twitter accounts were compromised, where the perpetrators sent racially charged tweets from each account – including Nazi-related content and swastikas.... Read more »
Tags: BlogTwitter Cyber ThreatsSocial Media SecuritySocial SafeGuard
Social SafeGuard is thrilled to be announced as a Security, Archiving, and Compliance partner for Salesforce Financial Services Cloud.... Read more »
Tags: BlogFinancial ServicesSFDC Financial Services CloudSocial SafeGuard Compliance Partner
There are 2.3 billion active social media users worldwide. A new Facebook profile is added every six seconds and there are over 80 million photos uploaded to Instagram every day. With staggering numbers like these, it is inevitable that companies feel overwhelmed just thinking about their social media presence. In the age of social media, we are constantly operating in a state of social chaos, there is constant communication, networking, marketing, lead generation, sales and many other activities all happening simultaneously. In order to make sense of this social chaos and convert it into a well-organization and easily digestible social media presence, organizations need to take the following steps:... Read more »
- ← Previous
- 1
- 2
- 3
- 4
- Next →