The Internet belongs to everyone. Let’s keep it that way.

Protect Net Neutrality
Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Social Media Engagement

Social Media Problems at companies

S Hender

on 5 March 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Social Media Engagement

Why should I like You?
And more...
Millennial Mindset

... Have always gotten
What dial?
Percentage of social media users who have...
Power Users
Twitter & Mellennials
& Context
It's not the social networks that cause the issue
It's the People!
at the company

Viruses and Malware
Social Engineering
Reputation & Legal Liability
Streaming music, videos or games uses bandwidth costs the company money
Social Engineering
Company's Reputation
-Posting nonpublic information
Employees' Reputation
-Individual business reputation
Legal Liability
Still being assessed on federal and state levels.
The Business has THREE options:
1. The company to remove all access to social networking sites on each employees computers as well as internet.

2. Set limits and restrictions on usage.

3. Allow all unmonitored access to social media.
1. Keep an Up-to-date anti-virus software

2. Install a firewall

3. Monitor the use of the Internet

Ability to monitor social networking sites in particular.
To Ban Media in the Workplace??
Strike a Balance!
Lag time created by multiple users on the internet
Additional staffing needed to monitor internet access
Rethink Resources
Virus and Malware
Hackers work through social media sites to infect computers
Click jacking attack is a type of Cyber-scam that aims at tricking you into clicking a seemingly harmless link
Tweets carrying malware threats
Data or identity theft
From 2005 to 2014

Number of breaches = 5,029

Number of Records = 677,749,785
Reputation and Legal Liability
Basic tips for Social Media use
Restrict Access
Educate the staff through training
Set social media policies
Thank you

Virus and Malware
Concerns with Social Media within the Workplace
"While 76% of the companies used social networks, such as LinkedIn and Facebook, for business purposes, stunningly, more than 40% of the respondents have reported employee misuse of social networks, and nearly a third have had to impose disciplinary actions on employees."
- Proskauer International Labor & Employment Group
Relies on human interactions
Involves tricking people into breaking security policies
5 Problems
A recent survey by staffing agency Intelligent Office found that one-third of workers use social media at work for at least an hour a day.
Make Social Media work for your company
Build your brand
Promote your services
Showcase your talents
Build your Presence
Market your company through the proper social media avenues.
Build your profile:
Pinterest sites

Developing Social Your Presence
Commit resources to promoting your business through:
Monitoring Tools
Make social media work for your company:
Use of organizational dashboards
Set budget
Drive customer engagement
Manage Social Media
Protecting from Malware & Viruses
Install anti-virus and anti-spyware software on all computers.
Stay up to date on new malware
Educate employees to understand threats
Protective limits on social media through social media policies
Malware & Viruses
Hackers enter through links in social media through that slow down or corrupt the computer.

Malicious Unwanted Software:
computer viruses
trojan horses
Understand limitations of Firewalls
Will not protect from:

• most viruses
• spam messages
• a poorly configured Wireless Network
• malware software installations
Educate & Train staff
Most employees are not aware of how their actions can cause security issues for the organization.

Set security & usage policies
Monitoring all web activity is important, and employees should be aware that their actions are being recorded and that failure to adhere to company policy can result in disciplinary action.
Restrict access
Allow employees to access social networking sites during their break, before and after office hours. This may relieve the urge to be on social media if it is scheduled. This also allows the administrators the ability to implement time based access to these and other sites.
46 percent of workers say their productivity has improved thanks to social media and social media tools
A further 37 percent wish their organization’s management would embrace social media tools in the workplace in order to increase productivity
Research by the University of California, Irvine team found occasionally “grazing” social media sites like Facebook can work as a mood booster. These social media breaks can act as a mental palate cleanser, helping workers with a quick mood enhancer, allowing you to return back to the task at hand refreshed
If every employee in a 50-strong workforce
spent 30 minutes on a social networking site every day
that would work out to a loss of 6,500 hours of productivity in one year!
Loss of Productivity
Social Engineers Tools
LinkedIn (#1 used)
Rucker, J. (2011, August 15). Should Businesses Ban Or Encourage Workplace Social Media? Retrieved from
Connolly, M., & McIntosh, S. (2013, February 26). Workplace Social Media Policies: The Need to Strike a Balance. Retrieved from
Employees must be aware of being monitored
Employee not required to disclose personal user names and passwords.
Company does not face liability in investigations
Full transcript