Virtual Event Today: Ransomware Resilience & Recovery Summit - Login to Live Event
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

Cyveillance Announces Secure Social Media Management Solution

Social Media Monitoring and Management Solution Addresses Major Areas

Social Media Monitoring and Management Solution Addresses Major Areas

Cyveillance, a provider of cyber intelligence solutions, today launched a solution to help organizations review and analyze social media policies and guidelines, as well as policy enforcement and cyber safety awareness education. The new solution, “Cyveillance Secure Social Media Management” also helps organizations securely manage corporate identities with a comprehensive social media strategy to manage their identity and brand footprint among social networking sites. Social Media Monitoring from Cyveillance

With the Cyveillance Secure Social Media Management solution, each online identity or brand registered through the system can be managed through the secure customer portal where customers can assume control of accounts and exclusively use the associated pages for marketing or promotional purposes.

The solution will help users review and evaluate existing social media policies, and help with generating clearly defined policies on consistent use of company messaging, ongoing educational programs to train company users, and a monitor and enforce programs to ensure those guidelines are followed.

“The Internet has changed dramatically as the rise of social networking has become a far more prolific environment for interpersonal and informational exchanges between people and businesses,” said Panos Anastassiadis, COO of Cyveillance. “Unfortunately, with this growth has come the opportunity for individuals and groups to perpetrate fraud by registering and misusing identities, trademarks or brands that do not belong to them. Cyveillance Secure Social Media Management enables organizations to minimize the successful execution of these attacks through proper education and policy development combined with strong policy enforcement capabilities.”

The danger from increasing and constantly evolving online threats through social media channels is proving that organizations need solutions to address these and other security vulnerabilities.

Online criminals are targeting high-value executives that have access to valuable corporate intellectual property and information using sophisticated social engineering scams and leveraging social media to inconspicuously acquire the necessary data to gain undetected access to corporate networks. Victims are often unaware that their accounts have been compromised and these breaches frequently aren’t detected until after the damage is done. Greater security awareness across the enterprise will greatly improve security posture and reduce the potential for data breaches and loss of valuable corporate assets.


Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...