Welcome to Week 6,
Team 5!!
ABOUT WEEK 6:
This week, we are
considering the importance of policies, privacy, and security in social media.
The National Labor Relations Board (NLRB) provided recommended social media
policy guidelines based on a review of legal cases, along with a proposed
template. Click here and click here (or open attachments in iLearn) to read reviews of
the NLRB policy and its rulings. Also, click here to read about the NLRB's recommended social media
policy template (or open the attachment).
Check your social media security.
![]() |
| Retrieved from www.thedailysheeple.com |
Various military and
government agencies provided guidelines and training resources to protect
operational security (OPSEC) and privacy of our information online. After you
read and review this week's materials, click the caption for the following image to complete an
official U.S. government social networking training module, which is designed
for military members, civilians, and family members.
![]() |
| http://iase.disa.mil/eta/sns_v1/sn/launchPage.htm |
WEEK 6 DISCUSSION ASSIGNMENT
At the conclusion of
this module, go to your blog and publish a post of appropriate length that
represents your recommended social media (networking) checklist for the readers
of your blog. Write this blog post as if you were training or teaching your
readers about policy, security, and privacy.
Begin each item with a bullet point and short descriptive phrase (e.g. o Update
Antivirus Software), followed by a brief description of
action required for that point. Choose as many points as you deem reasonable
for your checklist (within reason), but include the following items at a
minimum:
- Introduction: Briefly define the concepts of of 1) social media (network) security and b) social media policy.
- Checklist: Your security and privacy checklist, in bullet points. Include at least one bullet with your recommendations about social media training, and at least one bullet with your recommendations about social media policy.
- Conclusion: Explain what you learned from the readings and training module that have affected your point of view about social media policy, security, and privacy.
Be sure to review Week 6 in our Source Book for a full list of
material and readings.
Check your social media security.
Before posting this week, open the following links and use the
security guidelines to ensure you have applied the appropriate settings to your
social media sites to protect your privacy and security:
Remember, to optimize your blog
post, insert a combination of images, hyperlinks, videos, and key words into
your post. Integrate your work by also publishing a tweet(s) and pin(s) with
links that drive traffic to your blog.
I'm excited to be leading this important discussion! If you have any questions this week, you can either use the comment section below or send an email to bobbi.s.tellitocci@marist.edu.
Good luck!


Bobbi,
ReplyDeleteI found it interesting in researching this week that other than healthcare, education is the highest targeted industry by hackers on social media (Daly, 2013).
This has to do with the wealth of personal information higher education institutions contain for their student body. Online criminals target social media because "that's where the victims are" (Daly, 2013).
The threat most popular for criminals when hacking into higher education's social media channels is the stealing of information. It's this information that can be used for a vast array of criminal identity theft. The challenge today is for individuals and organizations to secure their social media channels, along with keeping on top of needed security measures.
Have you heard of any stories of higher education sites being hacked and what is recommended to resolve such issues?
Fortunately, in our seminary, we haven't had any malicious attacks or breaches that have led to such a disaster.
References:
Daly, J. (2013, June 4). Why Higher Education Is the Target of Hackers, Phishers and Spammers.
Retrieved February 25, 2014, from Edtech website: http://www.edtechmagazine.com/higher/article/
2013/06/why-higher-education-target-hackers-phishers-and-spammers
Isaac, thanks for sharing this great article on the risk institutes of higher education are facing as a result of social media and hackers. Over in my department I’m not privy to all the inner workings of IT but I’ve heard rumblings of an issue years ago where students used technology to make grade changes. As the article states, schools must take extreme action to protect all the information it maintains. Daly (2013) says, “In order to successfully defend against hacker attacks, colleges need to develop and maintain a well-rounded security infrastructure, ensuring that all endpoints are protected, to prevent infiltration into data centers, networks and databases (para. 7).” Unfortunately, this same need to protect data complicates my job in the alumni office. Alumni have access to an email -for-life account that they can use to view their transcript and access an alumni data base. But, to change expired passwords, these alumni now have to fax a copy of a government issued photo ID. As you can imagine, this is a bit of a deterrent and frustrates alumni. Thankfully we haven’t had a any major issues where information has been compromised but it takes a small army over in IT and TON of red-tape to keep it safe!
ReplyDeleteReferences:
Daly, J. (2013, June 4). Why higher education is the target of hackers, phishers and spammers. EDTECH. Retrieved http://www.edtechmagazine.com/higher/article/
2013/06/why-higher-education-target-hackers-phishers-and-spammers