Why are people such a security risk at work? This is particularly the case when it comes to cyber security. For instance why do people so often seem to forget common-sense and share passwords or leave secret documents exposed for others to see? There are…
Here are some easy-to-follow tips!
Take a look at this blog about offering customer support on Facebook (and other social networks) for more info: http://www.o2-v2.com/en/blog/social-media-marketing-7-tips-for-good-customer-support-on-facebook
#Facebook #CustomerSupport #SocialMedia
The hilarious-if-it-wasn’t-so-tragic incident of Tory minister Brooks Newmark sending dodgy pictures to a male journalist pretending to be a female party worker raises an interesting data security issue for business. It would be very easy to build a…
The recent hack of the US Government agency Centcom’s Twitter and YouTube accounts is embarrassing but not a security threat. After all Twitter servers are totally separate from US Government servers and there is no way that a hacker could use their…
Smart devices, devices that are connected to the internet, are here to stay creating a parallel internet of devices conencted to other devices that is called “The Internet of Things”. But as more and more devices are connected to the internet (it’s…
Phishing is getting to be a massive problem. Scammers are getting more sophisticated at sending highly believable emails that fool people into parting with their log in details, or simply take them to a page where key-logging software is downloaded to…
- Social Media Risk ConsultingPrincipal Consultant, 2013 - presentPrincipal Consultant for a group of specialist business consultants focusing on the governance, system, employee, public and hacking risks resulting from social media
- mosoco.co.ukmanaging partner, 2013 - presentFounder of mosoco, a boutique digital transformation consultancy focused on internal opportunities (process, HR, knowledge mnanagement) and external opportunities (marketing, customer experience) from digital technology as well as the risks of implementing digital technologies
- smart cookie, amberlight, MC&C, i-level, Carat, emap
07855 341 589
- Hazlegrove School, Allhallows School, Oxford University (Lincoln College), City University
Asia to lead the way from mobile-first to mobile-only
TAIPEI — Five years from now, you could wake up in the morning, turn to the screen on your wall, and ask if you need to get up from bed. Aft
8 Steps to Protecting the Organization Against Social Media Risks
According to Marc Gobé, in his book Emotional Branding, “the Web has fast-tracked careers, turned unknowns into celebrities, built and destr
Find And Manage Hashtags Like A Pro – Free! | Hashtagified!
After months of testing and improving our hashtagify.me beta features, today we are ready to release them all, for everybody, for free, fore
INFLUENCE AT WORK (IAW) : Two Types of Proposals. Which One is More Pers...
Dr. Robert B. Cialdini, President of INFLUENCE AT WORK (IAW), Arizona State University Regents’ Professor Emeritus of Psychology and Marketi