<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>corporate social media properties &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/corporate-social-media-properties/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Thu, 15 Oct 2020 08:15:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>corporate social media properties &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Social Media Security Risks Hidden in Your Shadow IT</title>
		<link>https://risk-academy.ru/the-social-media-security-risks-hidden-in-your-shadow-it/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Wed, 14 Oct 2020 22:11:20 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Shadow IT]]></category>
		<category><![CDATA[author]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[Mass media]]></category>
		<category><![CDATA[corporate social media footprint]]></category>
		<category><![CDATA[potential social media security risk]]></category>
		<category><![CDATA[corporate social media properties]]></category>
		<category><![CDATA[social media properties]]></category>
		<category><![CDATA[Pixabay]]></category>
		<category><![CDATA[Stock photography]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/the-social-media-security-risks-hidden-in-your-shadow-it/</guid>

					<description><![CDATA[Elchinator / Pixabay A universe of applications, many hidden from view, are connected to your corporate social media properties. Uncounted, unmonitored, and ungoverned, each is a potential social media security [&#8230;]]]></description>
										<content:encoded><![CDATA[<div>
<div id="attachment_2354073" class="wp-caption alignnone"><img fetchpriority="high" decoding="async" title="author" class="wp-image-2354073 size-large" src="https://cdn.business2community.com/wp-content/uploads/2020/10/cyber_risks_1602544435-900x535.jpg" alt="Security Alert sign for hidden security risks ini Social Media Footprint" width="900" height="535" /></p>
<p class="wp-caption-text">Elchinator / Pixabay</p>
</div>
<p>A universe of applications, many hidden from view, are connected to your corporate social media properties. Uncounted, unmonitored, and ungoverned, each is a potential social media security risk, as well as a real security risk to your enterprise.</p>
<p>Think about the many social media properties, which represent your enterprise, and ask yourself:</p>
<ul>
<li>Over time, how many people have had the ability to connect applications?</li>
<li>How many people still have the credentials or permission to connect applications?</li>
<li>How many applications now have access to these properties?</li>
<li>Have any of those applications been compromised?</li>
<li>Have any of the credentials used to log into those third-party applications been compromised?</li>
</ul>
<p>These are the questions that every corporate Security and Social Media Governance professional should be asking. Because there is a prevalence of hidden security risks from the corporate social media footprint.</p>
<h2>Numerous Attack Vectors from Social Media</h2>
<p>Consider these two examples: the author discovered 19 applications/websites connected to her Twitter account and a quick poll on Twitter shows that over 70% of respondents have more than five applications connected to their&#8230;</p>
</div>
<p><a href="https://www.business2community.com/cybersecurity/the-social-media-security-risks-hidden-in-your-shadow-it-02354072">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
