On the 18th of October, the Mayo Clinic Center for Social Media announced the publication of “Bringing the Social Media #Revolution to Health Care” (Mayo Clinic) – for those involved in the health care vertical and with social media responsibilities you owe it to yourself to get this book. More than 20 individual contributors made ...
Last updated byat .
Yesterday I had a an interesting sequence of events happen within my Twitter footprint that I had not seen previously. I had 11+ new followers, all who had over 100, some over 1000 followers. These new followers all arrived in my follower list in sequence over the course of the early morning. Each of these *individuals* had sent between 2-10 tweets, none of which were original content – all of them being RT (re-tweets) of pieces from trusted sources such as Mashable. The Twitter handle/name had the format of “given name” + “3 to 5 random characters”. Click on the Figure-1 o the left to see all of these names which arrived in my follower list and you’ll understand the naming convention. Every single one of these names is a “bot” generated name. read more…Tags: Crime, crimeware, cyber safety, cyber security, internet safety, malware, online safety, social media, social networks, TwitterNews, Online Safety, Safety & Security
Bully Bullying Cyberbullying Bullycide – These four words continue to appear with ever greater frequency in the lexicon of the modern American family. We hear these words on the evening news, in our newspapers, and online in all forums. We live in 2011, but to see how we treat one and other from afar, you’d think perhaps the calendar had rolled back a few centuries. You see – individuals be they young or not-so-young are bullied both at school and at work. The tragedy is, our youth of today, by and large are not prepared for today’s always-on world, even though they live it 24/7. The fact that in 2010 we lost 34 children where bullying was a principal issue in their decision to end their lives speaks volumes. There were 33 who committed suicide. Then there was one young man who was killed while trying to extricate his sibling from two bullies who were pummeling his sibling, he was shot and killed. Each of them has a story, I share these…
A question which every parent should be asking themselves, “How does my child access the internet?” “With whom is my child engaging?” The array of answers may startle you. So make no assumptions. Why does it matter? Knowing how your child accesses the internet and with whom they are engaging are the first steps in crafting an online safety plan for your child. I have said it before and will repeat, our family is our responsibility.
The following appeared in the Canadian online magazine Security Matters: Location Based Services: Do you know where your data is? Do you know where your data is? By Christopher Burgess Everywhere you look, retailers and other entities are offering to collect your data using one of the many location-based services available to collate your whereabouts ...
In October, I had the pleasure of being the guest on Talk2Cisco and to discuss social media and cyber security. Here is the write-up and recap of the event: Talk2Cisco . I took a moment and watched the video, and thought, this is something beneficial to small, medium and large businesses. I also think the ...Tags: christopher burgess, Cisco, Cisco Security, Information Technology, Infosec, security, Social Engineering, social media, Social Network, Talk2CiscoInformation Security, Safety & Security
My 2010 speaking schedule took me to all corners of the world. I traveled to Hong Kong, where I was honored to be an industry plenary speaker at the Interpol/Hong Kong Customs Intellectual Property Crime conference, also visited Canada, Toronto specifically, where I spoke at the Ontario government’s town hall, and not far from home, I was pleased to be asked to ...Tags: Arkansas, Canada, Cisco, CSI, Global Threat, Hong Kong, Identity, Intellectual Property, Interpol, IT, Mons, NATO, Ontario, security, SMCSEA, social media, Speaker, TorontoPresentations
By Christopher Burgess Do you work for an enterprise or a small-to-medium-size business? If so, odds are you have an information technology department supporting you. If you work for yourself, you may leverage the knowledge of others in cobbling together an information technology infrastructure to support your daily work. I work for a conglomerate and ...Tags: Cisco, Cisco Security, Connected World Report, Consumerization, IT Policy, Security Thought Leadership, social media, Social Network, Technology NewsInformation Security, Safety & Security
By Christopher Burgess When you access your email each day, do you do so at a distance of 15 paces because you’re just not sure what might jump out of that inbox? You can just about anticipate an email detailing how another user has caused a “blip” that will stretch your capabilities to protect both ...Tags: christopher burgess, Cisco, Cisco Security, Connected World Report, Consumerization, IT Policy, security, Security Thought Leadership, social media, Social Network, Technology NewsInformation Security, News, Safety & Security
I recently spoke at an event in Seattle on the security aspects of Social Media, both from the business and personal perspective. One question which I fielded surrounded whether or not there is risk to children via the various social media networks (i.e., Facebook) or should one accept that if someone really wants to hurt ...Tags: children, Facebook, family, online safety, parents, privacy, security, social media, social networks, TwitterNews, Online Safety, Safety & Security
Miles and miles proved to be the mantra of 2009, as I traveled to all corners of the world again, speaking to industry and government on a wide variety of topics. The book, Secrets Stolen, Fortunes Lost proved to be a prognostication piece, as world events showed the threat vectors highlighted in the book, all ...Tags: christopher burgess, Corportae Espionage, Delaware, Industrial Espionage, Intellectual Property, IP, IP Theft, Rotman, security, Security Strategy, social media, TelusPresentations