Social Media Risk and Reputation Management
-
Upload
claudiu-popa -
Category
Social Media
-
view
310 -
download
0
description
Transcript of Social Media Risk and Reputation Management
![Page 1: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/1.jpg)
By:
Claudiu PopaInformatica Corporation
Online Reputation Management Secrets that Will Make or Break Your (e)Business
![Page 2: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/2.jpg)
© InformaticaEducation.com© InformaticaEducation.comsource: Manta 2012
![Page 3: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/3.jpg)
© InformaticaEducation.com© InformaticaEducation.com
![Page 4: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/4.jpg)
© InformaticaEducation.com© InformaticaEducation.com
so what’s the problem?so what’s the problem?
Source: Smarsh, Gartner, Ponemon, Symantec IDC
![Page 5: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/5.jpg)
© InformaticaEducation.com© InformaticaEducation.com
takeawaystakeaways
• presence > control
• one password / site
• identity > trust
• permission > profit
• policy > legitimacy
• oversharing < validation
![Page 6: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/6.jpg)
© InformaticaEducation.com© InformaticaEducation.com
presence means controlpresence means control
![Page 7: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/7.jpg)
© InformaticaEducation.com© InformaticaEducation.com
... if you control access... if you control access
![Page 8: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/8.jpg)
© InformaticaEducation.com© InformaticaEducation.com
social damagesocial damage
![Page 9: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/9.jpg)
© InformaticaEducation.com© InformaticaEducation.com
password management is key ... literallypassword management is key ... literally
![Page 10: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/10.jpg)
© InformaticaEducation.com© InformaticaEducation.com
password management > social media password management > social media policypolicy
![Page 11: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/11.jpg)
© InformaticaEducation.com© InformaticaEducation.com
![Page 12: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/12.jpg)
© InformaticaEducation.com© InformaticaEducation.com
privacy > legitimacyprivacy > legitimacy
![Page 13: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/13.jpg)
© InformaticaEducation.com© InformaticaEducation.com
![Page 14: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/14.jpg)
© InformaticaEducation.com© InformaticaEducation.com
embrace socialembrace social
![Page 15: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/15.jpg)
© InformaticaEducation.com© InformaticaEducation.com
restrict posts > open commentsrestrict posts > open comments
![Page 16: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/16.jpg)
© InformaticaEducation.com© InformaticaEducation.com
identity > trustidentity > trust
![Page 17: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/17.jpg)
© InformaticaEducation.com© InformaticaEducation.comSource: McAfee
![Page 18: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/18.jpg)
© InformaticaEducation.com© InformaticaEducation.com
social hates noise - demands substancesocial hates noise - demands substance
![Page 19: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/19.jpg)
© InformaticaEducation.com© InformaticaEducation.com
permission > profitpermission > profit
![Page 20: Social Media Risk and Reputation Management](https://reader033.fdocuments.net/reader033/viewer/2022061113/5458f15daf79592b448b55a6/html5/thumbnails/20.jpg)
© InformaticaEducation.com© InformaticaEducation.com
FollowFollow Twitter.ClaudiuPopa.comTwitter.ClaudiuPopa.com for a short read for a short read
ReadRead Subscribe.ClaudiuPopa.comSubscribe.ClaudiuPopa.com for a long read for a long read
Connect Connect LinkedIn.ClaudiuPopa.com LinkedIn.ClaudiuPopa.com