Top Banner
Chris Crosby chris@inflectionpointglob al.com (312) 285-0301 Social Network Privacy & Security
28

Social Network Privacy, Security and Identity:One

Jun 21, 2015

Download

Data & Analytics

Social Network Privacy, Security and Reputation Management.

What are the threats on social networks?

How can you help your customers manage their online identity?
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Social Network Privacy, Security and Identity:One

Chris [email protected](312) 285-0301

Social Network Privacy & Security

Page 2: Social Network Privacy, Security and Identity:One

What’s on your customers’ minds?

Page 3: Social Network Privacy, Security and Identity:One

Risks:• Increased occurrence rate of identity theft• Social Engineering/Phishing• SPAM• Hacked accounts

Risks:• Cyber bullying• Sexual Predators• Reputation damaging posts and photos• Lost privacy over sharing of location data

3

A Typical Online Family

Page 4: Social Network Privacy, Security and Identity:One

• Over half of adolescents have been bullied online.1

• 20% of children on social networks have been approached by a stranger in a sexual nature.2

• Malicious Facebook “apps” are designed to lure children to give access to their personal data, making them more exposed to identity theft and privacy invasion.

41. i-Safe America Foundation – Cyber bullying statistics.2. Crimes Against Children Research Center.

Growing online threats for children

Page 5: Social Network Privacy, Security and Identity:One

35% of college admissions officers report finding something on an applicant’s social network page that negatively impacted their admissions chances.*

*Kaplan’s 2012 Prep Test Survey

Page 6: Social Network Privacy, Security and Identity:One

68% of employers have turned down a job candidate based on negative information found on social network sites.

Page 7: Social Network Privacy, Security and Identity:One

Personal Data Breaches

Page 8: Social Network Privacy, Security and Identity:One

LinkedIn users are

106% more likely to be a victim of identity fraud…

and social media users who check-in using GPS are

67% more likely.

Page 9: Social Network Privacy, Security and Identity:One

One PlatformOne APIOne Partner

Social Network Security

Reputation Management

Internet Privacy

Cyber bullying detection

Identity Theft Prevention

Personal Data Discovery and Control

Identity:One

Page 10: Social Network Privacy, Security and Identity:One

• Child Social Network Protection– Cyber bullying and sexual predator detection

• Adult Social Network Management– Monitor Reputation, Privacy, Security

• Social Language Analysis– Proprietary Social Network Threat Detection– Language analysis designed for social media

The Identity:One Platform

Page 11: Social Network Privacy, Security and Identity:One

• Consolidated view of all social activity– Photos, Posts, Tweets– See privacy settings on a per-post level

• Reputation Management – See how you look to others– Alerting to potential privacy infringements

• Identity Protection– Prevent Identity Leakage and Theft– Locate Personally Identifiable Information

Customer Benefits

Page 12: Social Network Privacy, Security and Identity:One

Alert and Action• Notify and alert users of

potential threats• Remove social activity and

photos

Analyze• Scan social network

profiles and activities for potential threats.

Monitor• Ongoing Monitoring

of Social Networks.

How it Works

Page 13: Social Network Privacy, Security and Identity:One

Privacy & Profile Alerts

Privacy AlertsPhone # Exposed

Email Address Exposed

Address Exposed

Date of Birth Exposed

Employer & Length of Employment Exposed

Current Position Exposed

IM Account Exposed

Hometown Found

Location data found in social content items

Privacy Settings of Posts and Photos

Content Related AlertsAlcohol & Drug RelatedProfanity and Vulgarity

SPAM

Bullying and Threats

Grooming (actions deliberately undertaken with the aim of befriending and establishing an emotional connection with a child, to lower the child's inhibitions in preparation for sexual activity with the child, or exploitation.)

Sexual in NatureHarm or other AbuseBigotry-RacismWeapons

Page 14: Social Network Privacy, Security and Identity:One

End User Actions

Remove Photos, Posts, CommentsBlock UsersUnfollowExpert Tips and Resources

Page 15: Social Network Privacy, Security and Identity:One

Developer Friendly

Rapid development• build and launch products in 6-8 weeks.

Create your own user experience• choose what features and alerts to integrate

Page 16: Social Network Privacy, Security and Identity:One

Build YourOwn Apps

Core Platform

Privacy & Security

Monitoring

The Identity:One Platform

Social Network Authentication Data Normalization Content Filtering

Alerts Customer Analytics

API for Partner Application Development

Behavioral Analysis

Identity Risk Analysis

Lead Acquisition & Customer

InsightCustom

Page 17: Social Network Privacy, Security and Identity:One

Improve Customer Experience

Increase Customer Acquisition & Retention

Page 18: Social Network Privacy, Security and Identity:One

• Social data is living and breathing– Send periodic summary emails recapping information that

you’ve monitored on their behalf:“Hi Mary, just wanted to let you know that last month we scanned over 1,200 posts and comments in your social networks. Great news, we detected no threats. Also, we know that you’re a busy professional and mom, so we thought you might enjoy these quick tips on...”

• Become a Trusted Advisor– Use their social profile information to create targeted and value

added advice and insight to your customers.

Create Meaningful Customer Experiences

Page 19: Social Network Privacy, Security and Identity:One

Use Social to get customers into your sales funnel

Page 20: Social Network Privacy, Security and Identity:One

• Provide website visitors a free social identity risk assessment.

• Social Authentication can increase web sign-ups by up to 90%1

• Build Trust. Build Your Sales Funnel.

Connect with more customers and prospects

1: Source, Gigya.com

Page 21: Social Network Privacy, Security and Identity:One

• Demonstrate Immediate Value to Customer– Low Cost to You, High Value to Customer = AWESOME

• Personalized Awareness of a Person’s Risk for ID theft. – Give them a reason to take the next step.

• Create Your Own Variations– Customize your assessment or Freemium offer to best position

your existing product offer.– I.E. – if you know they’re a parent of a young teen, position

Cyber Bullying prevention.

Identity Risk Assessment [Freemium]

Page 22: Social Network Privacy, Security and Identity:One

Sample Dashboards and Reports

Page 23: Social Network Privacy, Security and Identity:One

Easy and simple sign-up process

Page 24: Social Network Privacy, Security and Identity:One

Sample Alert Dashboard

Page 25: Social Network Privacy, Security and Identity:One

Cross Platform Alerting and Analysis

Page 26: Social Network Privacy, Security and Identity:One

Personal and Financial Information Discovery

A zoomed-in version

Page 27: Social Network Privacy, Security and Identity:One

Sample User Experience

Page 28: Social Network Privacy, Security and Identity:One

Thank you