Sunday, February 23, 2014

Security in Social Media: Team 5 Discussion Leader


Welcome to Week 6, Team 5!!

 Congratulations on getting over the hump and completing the mid-term exam.

ABOUT WEEK 6:
 
This week, we are considering the importance of policies, privacy, and security in social media. 

Retrieved from www.thedailysheeple.com
The National Labor Relations Board (NLRB) provided recommended social media policy guidelines based on a review of legal cases, along with a proposed template. Click here and click here (or open attachments in iLearn) to read reviews of the NLRB policy and its rulings. Also, click here to read about the NLRB's recommended social media policy template (or open the attachment).

Various military and government agencies provided guidelines and training resources to protect operational security (OPSEC) and privacy of our information online. After you read and review this week's materials, click the caption for the following image to complete an official U.S. government social networking training module, which is designed for military members, civilians, and family members.


http://iase.disa.mil/eta/sns_v1/sn/launchPage.htm
http://iase.disa.mil/eta/sns_v1/sn/launchPage.htm
WEEK 6 DISCUSSION ASSIGNMENT 
 
At the conclusion of this module, go to your blog and publish a post of appropriate length that represents your recommended social media (networking) checklist for the readers of your blog. Write this blog post as if you were training or teaching your readers about policy, security, and privacy.
Begin each item with a bullet point and short descriptive phrase (e.g. o Update Antivirus Software), followed by a brief description of action required for that point. Choose as many points as you deem reasonable for your checklist (within reason), but include the following items at a minimum:
  • Introduction: Briefly define the concepts of of 1) social media (network) security and b) social media policy.
  • Checklist: Your security and privacy checklist, in bullet points. Include at least one bullet with your recommendations about social media training, and at least one bullet with your recommendations about social media policy.
  • Conclusion: Explain what you learned from the readings and training module that have affected your point of view about social media policy, security, and privacy.
Be sure to review Week 6 in our Source Book for a full list of material and readings.
 
Check your social media security.
Before posting this week, open the following links and use the security guidelines to ensure you have applied the appropriate settings to your social media sites to protect your privacy and security:
Remember, to optimize your blog post, insert a combination of images, hyperlinks, videos, and key words into your post. Integrate your work by also publishing a tweet(s) and pin(s) with links that drive traffic to your blog.
 
I'm excited to be leading this important discussion! If you have any questions this week, you can either use the comment section below or send an email to bobbi.s.tellitocci@marist.edu.
 
Good luck!

2 comments:

  1. Bobbi,

    I found it interesting in researching this week that other than healthcare, education is the highest targeted industry by hackers on social media (Daly, 2013).

    This has to do with the wealth of personal information higher education institutions contain for their student body. Online criminals target social media because "that's where the victims are" (Daly, 2013).

    The threat most popular for criminals when hacking into higher education's social media channels is the stealing of information. It's this information that can be used for a vast array of criminal identity theft. The challenge today is for individuals and organizations to secure their social media channels, along with keeping on top of needed security measures.

    Have you heard of any stories of higher education sites being hacked and what is recommended to resolve such issues?

    Fortunately, in our seminary, we haven't had any malicious attacks or breaches that have led to such a disaster.

    References:

    Daly, J. (2013, June 4). Why Higher Education Is the Target of Hackers, Phishers and Spammers.
    Retrieved February 25, 2014, from Edtech website: http://www.edtechmagazine.com/higher/article/
    2013/06/why-higher-education-target-hackers-phishers-and-spammers

    ReplyDelete
  2. Isaac, thanks for sharing this great article on the risk institutes of higher education are facing as a result of social media and hackers. Over in my department I’m not privy to all the inner workings of IT but I’ve heard rumblings of an issue years ago where students used technology to make grade changes. As the article states, schools must take extreme action to protect all the information it maintains. Daly (2013) says, “In order to successfully defend against hacker attacks, colleges need to develop and maintain a well-rounded security infrastructure, ensuring that all endpoints are protected, to prevent infiltration into data centers, networks and databases (para. 7).” Unfortunately, this same need to protect data complicates my job in the alumni office. Alumni have access to an email -for-life account that they can use to view their transcript and access an alumni data base. But, to change expired passwords, these alumni now have to fax a copy of a government issued photo ID. As you can imagine, this is a bit of a deterrent and frustrates alumni. Thankfully we haven’t had a any major issues where information has been compromised but it takes a small army over in IT and TON of red-tape to keep it safe!

    References:

    Daly, J. (2013, June 4). Why higher education is the target of hackers, phishers and spammers. EDTECH. Retrieved http://www.edtechmagazine.com/higher/article/
    2013/06/why-higher-education-target-hackers-phishers-and-spammers

    ReplyDelete