Social Network Privacy, Security and Identity:One

Post on 21-Jun-2015

324 views 1 download

Tags:

description

Social Network Privacy, Security and Reputation Management. What are the threats on social networks? How can you help your customers manage their online identity?

Transcript of Social Network Privacy, Security and Identity:One

Chris Crosbychris@inflectionpointglobal.com(312) 285-0301

Social Network Privacy & Security

What’s on your customers’ minds?

Risks:• Increased occurrence rate of identity theft• Social Engineering/Phishing• SPAM• Hacked accounts

Risks:• Cyber bullying• Sexual Predators• Reputation damaging posts and photos• Lost privacy over sharing of location data

3

A Typical Online Family

• Over half of adolescents have been bullied online.1

• 20% of children on social networks have been approached by a stranger in a sexual nature.2

• Malicious Facebook “apps” are designed to lure children to give access to their personal data, making them more exposed to identity theft and privacy invasion.

41. i-Safe America Foundation – Cyber bullying statistics.2. Crimes Against Children Research Center.

Growing online threats for children

35% of college admissions officers report finding something on an applicant’s social network page that negatively impacted their admissions chances.*

*Kaplan’s 2012 Prep Test Survey

68% of employers have turned down a job candidate based on negative information found on social network sites.

Personal Data Breaches

LinkedIn users are

106% more likely to be a victim of identity fraud…

and social media users who check-in using GPS are

67% more likely.

One PlatformOne APIOne Partner

Social Network Security

Reputation Management

Internet Privacy

Cyber bullying detection

Identity Theft Prevention

Personal Data Discovery and Control

Identity:One

• Child Social Network Protection– Cyber bullying and sexual predator detection

• Adult Social Network Management– Monitor Reputation, Privacy, Security

• Social Language Analysis– Proprietary Social Network Threat Detection– Language analysis designed for social media

The Identity:One Platform

• Consolidated view of all social activity– Photos, Posts, Tweets– See privacy settings on a per-post level

• Reputation Management – See how you look to others– Alerting to potential privacy infringements

• Identity Protection– Prevent Identity Leakage and Theft– Locate Personally Identifiable Information

Customer Benefits

Alert and Action• Notify and alert users of

potential threats• Remove social activity and

photos

Analyze• Scan social network

profiles and activities for potential threats.

Monitor• Ongoing Monitoring

of Social Networks.

How it Works

Privacy & Profile Alerts

Privacy AlertsPhone # Exposed

Email Address Exposed

Address Exposed

Date of Birth Exposed

Employer & Length of Employment Exposed

Current Position Exposed

IM Account Exposed

Hometown Found

Location data found in social content items

Privacy Settings of Posts and Photos

Content Related AlertsAlcohol & Drug RelatedProfanity and Vulgarity

SPAM

Bullying and Threats

Grooming (actions deliberately undertaken with the aim of befriending and establishing an emotional connection with a child, to lower the child's inhibitions in preparation for sexual activity with the child, or exploitation.)

Sexual in NatureHarm or other AbuseBigotry-RacismWeapons

End User Actions

Remove Photos, Posts, CommentsBlock UsersUnfollowExpert Tips and Resources

Developer Friendly

Rapid development• build and launch products in 6-8 weeks.

Create your own user experience• choose what features and alerts to integrate

Build YourOwn Apps

Core Platform

Privacy & Security

Monitoring

The Identity:One Platform

Social Network Authentication Data Normalization Content Filtering

Alerts Customer Analytics

API for Partner Application Development

Behavioral Analysis

Identity Risk Analysis

Lead Acquisition & Customer

InsightCustom

Improve Customer Experience

Increase Customer Acquisition & Retention

• Social data is living and breathing– Send periodic summary emails recapping information that

you’ve monitored on their behalf:“Hi Mary, just wanted to let you know that last month we scanned over 1,200 posts and comments in your social networks. Great news, we detected no threats. Also, we know that you’re a busy professional and mom, so we thought you might enjoy these quick tips on...”

• Become a Trusted Advisor– Use their social profile information to create targeted and value

added advice and insight to your customers.

Create Meaningful Customer Experiences

Use Social to get customers into your sales funnel

• Provide website visitors a free social identity risk assessment.

• Social Authentication can increase web sign-ups by up to 90%1

• Build Trust. Build Your Sales Funnel.

Connect with more customers and prospects

1: Source, Gigya.com

• Demonstrate Immediate Value to Customer– Low Cost to You, High Value to Customer = AWESOME

• Personalized Awareness of a Person’s Risk for ID theft. – Give them a reason to take the next step.

• Create Your Own Variations– Customize your assessment or Freemium offer to best position

your existing product offer.– I.E. – if you know they’re a parent of a young teen, position

Cyber Bullying prevention.

Identity Risk Assessment [Freemium]

Sample Dashboards and Reports

Easy and simple sign-up process

Sample Alert Dashboard

Cross Platform Alerting and Analysis

Personal and Financial Information Discovery

A zoomed-in version

Sample User Experience

Thank you