5 Reasons Why You Should Care About Internal Auditing

Posted by Natasha Vadori

Tue, May 13, 2014

One of the questions that customers ask BrandProtect most often is about social media policies and monitoring.   Luckily, there are many great examples of processes and procedures in parallel areas of business that can be applied to this issue.  At BrandProtect, we recommend an approach which is modelled around the “internal audit” procedures used at many companies to assess financial risks.  The purpose of internal audit is to ensure that the proper "controls" (procedures and policies) are in place and are effectively being followed.  They target “situations” that have a high risk score (high likelihood of happening and a high impact if they do happen).  The best Internal auditing practices look not only at abstract metrics (such as incident frequency and risk exposure)  but also at  a company’s strategic goals – different strategic goals will change a company’s willingness to take on risk.   Adding social media activity to the scope of an internal auditing practice will strengthen a company’s understanding of risk exposures that could affect its business.

Here are the main areas where social media can be greatly impacted by the internal auditing team:

1. Brand and Reputation Damage

Read More

Topics: Brand Protection, data breach, Privacy Protect, Reputation Management, internal auditing

Deflecting the Social Engineer: CSO Guidance from BrandProtect

Posted by Ben Bradley

Fri, Sep 20, 2013

The grifter, conman and the thief makes a great story and an even better film. But in today’s reality, what once was the debonair Paul Newman in the Sting, has become a social engineer.

Read More

Topics: Identity Theft, Brand Protection, Security, data breach, scam, risk management, Privacy Protect, defamatory

Privacy and Proxy services: A heated debate

Posted by Omri Benhaim

Mon, Oct 22, 2012

Your first question probably is: What is a Privacy and Proxy services and how does it affect me? To answer that we must first answer what is Whois? The Internet Corporation for Assigned Names and Numbers (known as ICANN) regulates registrars. Whenever someone registers a domain (gTLD) though an ICANN accredited reseller or registrar, they are required to post their contact information on the Whois database (non-centralized) which is publicly accessible.

Read More

Topics: Privacy Protect, Domain Management, ICANN, gTLD

Employer Access to Social Media Accounts

Posted by Rosemary Brkopac

Fri, Oct 05, 2012

One of the most interesting rulings I’ve read about recently was made a couple of weeks ago in California, where a federal judge quashed Home Depot's attempt to access all images and posts made by a former employee via a variety of social media platforms over the course of seven years. The poster, a former Home Depot employee, had sued the retail giant over a claim of termination due to unlawful discrimination.  Briefly, Home Depot stated they wanted access to the accounts in order to establish the mental state of the ex-employee.  Home Depot was granted access to some information – but it was limited to posts concerning her job only.  Although the judge ruled the original demand by Home Depot was too broad, their startling request will be of no surprise to readers of my blog posts, who may recall that back in March of 2011 I reported (Facebook Password Shocker) incidents of a similar nature:   

Read More

Topics: Privacy Protect, Social Media Monitoring, social media, Home Depot, Lawon

Subscribe to our weekly CyberThreat Digest

Each week, our Cyber Threat Analyst team prepares a digest of the latest cyber threat news and alerts. Subscribe today and begin receiving it on Monday.

  Get the Weekly CyberDigest

 

Subscribe to receive a weekly summary of our latest posts

Posts by Topic

see all