Facebook the Mega Monopoly When you think about social media the first thing most people think about is Facebook. Facebook is a huge monopoly in the social media market space. Every person I know has a Facebook account even if they have other social media accounts like Instagram, Snap Chat, and Twitter Facebook is typically the one that is most used by my friends. Facebook dominates the social media space with 71% of adults using Facebook and this is a staggering percentage. This translates to about 900 million users using Facebook on a monthly basis.
The loss of PII not only affects individuals but also companies responsible for the safekeeping of PII. To understand how one can protect their personally identifiable information, one must first understand the threats and the consequences that come from that data being compromised. The main threat one’s personally identifiable information is by hackers . Hackers utilize a number of vulnerabilities to gain access to a computer system for the sole purpose of gaining information. The system is not limited to a person’s own personal computer, but also includes the systems that businesses use to store customer information.
• Repairing damaged computer systems when needed • Maintenance of the company’s website. This also includes improvement of the current websites if needed. • Controlling backup systems for important data so that it can be gathered in the case of an emergency • Upholding the company IT policy by observing computer use to make sure everyone complies with the company’s IT policy. This means rules and regulations when dealing with the computer systems. • Installing and maintain a security system to protect the company’s information from viruses, hackers and other possible threats.
• Employ a date leak prevention solution to monitor potential information leaks at the point of use. • Secure your endpoints with a comprehensive security solution that includes web, email and file reputation. • Limit chat and other potentially dangerous communications channels to prevent unnecessary protocols from entering the corporate
Change should be managed well. 2. Microsoft would do well to take a lesson from Yahoo-Tumblr, when the expectation of Yahoo were very high and that reflected in public domain. They should refrain from making bold public announcements to not reduce the morale of LinkedIn employees. Financial results should not be over-reacted and proper research should be conducted for performance 3.
So, it is no doubt our real world social lives are seeing some changes. Social media is the driver behind that connection. It is about sharing and broadcasting your life online, conversing with friends as well as strangers. III. POSITIVE AND NEGATIVE EFFECTS OF SOCIAL MEDIA Positive effects of Social Media:- 1.
Training can include; employee indoctrinations, security- awareness briefings, and periodic newsletters [14.] Users can go through trainings such as workshops or handed newsletters that emphasises on how to avoid social engineering. The employees need to be trained on how to challenge strangers and ask for some form of authentication or identification. To be effective, policies, procedures and standards must be taught and reinforced to the employees. It is also important to make a standard that stipulates that sharing of passwords via phone or email is not allowed.
The US’s governments goal is to protect all their citizens at all costs, because of this, data can be breached and used to make sure the user is safe. According to the 2010 National Security Strategy “cybersecurity threats represent one of the most serious national security, public safety, and economic challenges we face as a nation.” This is used to give the United States government the ability to not only look into potential terrorist plots but to also stop them before they ever happen. “The threats encompassed by our cybersecurity are created by three elements: (1) knowledge of a vulnerability, (2) access to it, and (3) a payload. (38) All cyber insecurities require some vulnerability--that is, a flaw or weakness”. (Finnmore and Duncan) The US has tried to limit these flaws or weaknesses online but has not been able to completely get rid of them because they allow their citizens to have more privacy and the problem won’t be stopped until they can access and assess all data from their citizens.
Children’s lives have quickly shifted onto the Internet in the twenty-first century. Even the President of the United States has nearly forty thousand Twitter and Instagram posts. Social networks are websites that allow users to interact over the Internet. There are 600 million Facebook users across the globe (Rosenwald 2). 300 million visit Twitter every month (Maney 3).