Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Cyveillance Announces Secure Social Media Management Solution

Social Media Monitoring and Management Solution Addresses Major Areas

Social Media Monitoring and Management Solution Addresses Major Areas

Cyveillance, a provider of cyber intelligence solutions, today launched a solution to help organizations review and analyze social media policies and guidelines, as well as policy enforcement and cyber safety awareness education. The new solution, “Cyveillance Secure Social Media Management” also helps organizations securely manage corporate identities with a comprehensive social media strategy to manage their identity and brand footprint among social networking sites. Social Media Monitoring from Cyveillance

With the Cyveillance Secure Social Media Management solution, each online identity or brand registered through the system can be managed through the secure customer portal where customers can assume control of accounts and exclusively use the associated pages for marketing or promotional purposes.

The solution will help users review and evaluate existing social media policies, and help with generating clearly defined policies on consistent use of company messaging, ongoing educational programs to train company users, and a monitor and enforce programs to ensure those guidelines are followed.

“The Internet has changed dramatically as the rise of social networking has become a far more prolific environment for interpersonal and informational exchanges between people and businesses,” said Panos Anastassiadis, COO of Cyveillance. “Unfortunately, with this growth has come the opportunity for individuals and groups to perpetrate fraud by registering and misusing identities, trademarks or brands that do not belong to them. Cyveillance Secure Social Media Management enables organizations to minimize the successful execution of these attacks through proper education and policy development combined with strong policy enforcement capabilities.”

The danger from increasing and constantly evolving online threats through social media channels is proving that organizations need solutions to address these and other security vulnerabilities.

Online criminals are targeting high-value executives that have access to valuable corporate intellectual property and information using sophisticated social engineering scams and leveraging social media to inconspicuously acquire the necessary data to gain undetected access to corporate networks. Victims are often unaware that their accounts have been compromised and these breaches frequently aren’t detected until after the damage is done. Greater security awareness across the enterprise will greatly improve security posture and reduce the potential for data breaches and loss of valuable corporate assets.


Written By

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Nation-State

The North Korean APT tracked as TA444 is either moonlighting from its previous primary purpose, expanding its attack repertoire, or is being impersonated by...

Risk Management

A threat-based approach to security often focuses on a checklist to meet industry requirements but overlooked the key component of security: reducing risk.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...

Cyberwarfare

The UK’s NCSC has issued a security advisory to warn about spearphishing campaigns conducted by two unrelated Russian and Iranian hacker groups.

Risk Management

CISA has published a report detailing the cybersecurity risks to the K-12 education system and recommendations on how to secure it.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.