Social Media: Social Media and keeping your big mouth shut!!
This is classic!! I love it!! Lol
What people don’t understand is that, although our speech is free (freedom of speech) it does have consequences and sometimes dangerous outcomes!
In this case, the girl offended her boss, and also kind of dragged his name threw the mud. In return, she lost her job and was made to look the fool for eternity!
I’m some cases, like twitter or Facebook status it can be quite harmful and potentially life threatening!
I am talking about OPSEC and INFOSEC and I’ll throw in a little business insight also for free!
OPSEC – Operational Security
Potential hazard: life threatening!
Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.
Though the above statement is true in its official military format, OPSEC is the process of protecting little pieces of data that could be grouped together to give the bigger picture. OPSEC is the protecting of critical information deemed mission essential from military commanders. Protecting this critical information is through the use of email encryption software, careful of who may be listening to you (like in a hotel bar), paying close attention to a picture you have taken (background) or not talking openly on social media sites about information on the unit’s critical information list (military deployments, shortages of equipment or movement of VIPs).
OPSEC can be as simple as “me(a girl),Sylvia and the girls are going to Hoboken tonight! Woot woot!”
Then you tweet: 😦 other girls couldn’t make it, staying home alone 😦
Or just me and Sylvia going out come join us!
Danger: a stalker, pedofile, rapist, disgruntled ex boyfriend etc could stalk you and hurt you very bad or even kill you!
It’s not just a military thing!
How about: “just made a killing at work today, sold a blah blah blah”
Danger: tonight when you go to the bank to drop off the nights receipts you get mugged and possibly stabbed or shot.
Watch what you say! It could be your life, a loved ones or a co-workers!
INFOSEC – Information Security
Potential Danger: bankruptcy, financial ruin, corporate damage, law charges, jail time etc…
Who has the greatest information security in the world?
That damn recipe has been around 1892!! And no one is talking!! If the recipe was released and everyone could make it, the company would be out of business! Millions of employees would be out of work!! We wouldn’t even have any cool Superbowl Commercials!!
Information Security Attributes: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to help identify and apply information security industry standards, as mechanisms of protection and prevention, at three levels or layers: physical, personal and organizational. Essentially, procedures or policies are implemented to tell people (administrators, users and operators)how to use products to ensure information security within the organizations.
Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
The terms information security, computer security and information assurance are frequently used interchangeably. These fields are interrelated often and share the common goals of protecting the confidentiality, integrity and availability of information; however, there are some subtle differences between them.
These differences lie primarily in the approach to the subject, the methodologies used, and the areas of concentration. Information security is concerned with the confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print, or other forms. Computer security can focus on ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer. Information assurance focuses on the reasons for assurance that information is protected, and is thus reasoning about information security.
Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research, and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers.
Should confidential information about a business’ customers or finances or new product line fall into the hands of a competitor, such a breach of security could lead to negative consequences. Protecting confidential information is a business requirement, and in many cases also an ethical and legal requirement.
For the individual, information security has a significant effect on privacy, which is viewed very differently in different cultures.
The field of information security has grown and evolved significantly in recent years. There are many ways of gaining entry into the field as a career. It offers many areas for specialization including: securing network(s) and allied infrastructure, securing applications and databases, security testing, information systems auditing, business continuity planning and digital forensics science, etc.
This article presents a general overview of information security and its core concepts.
Information put on Social Media Sites can be quite damaging to your financial life as well! Be careful what you post!
Free Business Insight:
The company you work for doesn’t want to air their laundry! They don’t want to see or hear about company business in someone’s status or for that matter someone’s blog… Notice how I talk about a bunch of subjects, but I don’t talk about company business… Some topics might be embarrassing or dangerous to their image, and some might be topics that they deem classified, so its better to stay away! Don’t make the same mistake the British girl in the beginning of the article did!