{"id":219,"date":"2012-07-09T00:00:00","date_gmt":"2012-07-09T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/"},"modified":"2024-06-12T18:09:54","modified_gmt":"2024-06-12T18:09:54","slug":"is-it-worth-it-to-do-social-media","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/","title":{"rendered":"Is it Worth it to do &#8220;Social Media&#8221;?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"219\" class=\"elementor elementor-219\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21db3cdb e-flex e-con-boxed e-con e-parent\" data-id=\"21db3cdb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7399f36e elementor-widget elementor-widget-text-editor\" data-id=\"7399f36e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Within the past year Osterman Research completed a major study on the costs and benefits of social media, co-sponsored by Commvault and McAfee (<a title=\"Osterman Research, 2011, June #201\" href=\"\/Users\/Jane\/Documents\/_Learning\/Norwich\/Sem1\/_W5\/DQ3.docx#_ENREF_2\">2011, June<\/a>).\u00a0 They recognized the importance of the media for some organizations given the \u201csheer numbers\u201d of people engaging in the various platforms, and the opportunities for channel build-out, market visibility, and enhanced market value from such engagement.\u00a0 They also pointed out the increased potential for injection of malware into corporate systems via social media channels and encouraged companies to specify explicit policies for employees on whether or not employees are authorized to engage in social networking under the auspices of the corporate umbrella.<\/p><p>With respect to the \u201csheer numbers\u201d they note that:<\/p><ul><li>Facebook had 687.1 million users in June, 2011;<\/li><li>Linked-in had 70.2 million unique visitors worldwide in March 2011;<\/li><li>Twitter had 175 million accounts by February, 2011.<\/li><\/ul><p>Carol Huang (<a title=\"Huang, 2011, June 6 #202\" href=\"\/Users\/Jane\/Documents\/_Learning\/Norwich\/Sem1\/_W5\/DQ3.docx#_ENREF_1\">2011, June 6<\/a>) has argued that, because news media are using these platforms effectively they have become an important source of real-time international news both for major news networks, and for specialized news feeds.\u00a0 In some circumstances, especially during the various uprisings in the Arab world, the social media feeds have been one of the only ways to obtain real-time information on what has been happening on the ground.<\/p><p><a href=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-scaled.jpeg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft size-medium wp-image-2816 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-300x194.jpeg\" alt=\"Social media marketing concept image with business icons and copyspace.\" width=\"300\" height=\"194\" \/><noscript><img decoding=\"async\" class=\"alignleft size-medium wp-image-2816 lazyload\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-300x194.jpeg\" alt=\"Social media marketing concept image with business icons and copyspace.\" width=\"300\" height=\"194\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-300x194.jpeg 300w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-1024x662.jpeg 1024w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-768x496.jpeg 768w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-1536x992.jpeg 1536w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-2048x1323.jpeg 2048w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-585x378.jpeg 585w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-1110x717.jpeg 1110w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-100x65.jpeg 100w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/04\/Social-Media-Graphic-Image-scaled.jpeg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/noscript><\/a>But, as Osterman Research argues, with social media usage comes very specialized threat vectors.\u00a0 For example, the <strong><em>Koobface Worm<\/em><\/strong> targeted Facebook, Twitter and MySpace and was used to recruit unprotected MS OS computers to a peer-to-peer botnet.\u00a0 A similar threat for the Mac OS was the <strong><em>Boonana Worm<\/em><\/strong>, first reported in October 2010.\u00a0 <strong><em>Bugat<\/em><\/strong> was a ZeuS-like piece of malware that \u201cdelivered a large-scale phishing attack against Linked-In (2011, June, p. 3).<\/p><p>A number of different vulnerabilities in the bring-your-own-device (BYOD) enterprise network are introduced through these social media platforms.\u00a0 Importantly, entire networks can be compromised by worm-like malware that is introduced on a single end-point in the network.\u00a0 There are also other risks to intellectual property protection and\/or risks to the release of confidential or sensitive information that come from industrial espionage-type malware like, for example, <strong><em>Flame<\/em><\/strong>.<\/p><p>Impacts to data integrity can be significant; especially if the malware variant corrupts data or applications on the infected network.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25c4410 e-flex e-con-boxed e-con e-parent\" data-id=\"25c4410\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-138b790 elementor-widget elementor-widget-text-editor\" data-id=\"138b790\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To counter this threat, some companies are identifying specific personnel within public relations or marketing channels to manage this outreach.\u00a0 The more security conscious firms are placing the outreach personnel&#8217;s\u2019 computers in a de-militarized zone (DMZ) to avoid network infection if social media outreach personnel do come under attack.<\/p><p>Other firms that deal with especially confidential or sensitive data are prohibiting it entirely.<\/p><p>Still, some firms, especially those classified as small and medium enterprises (SMEs) have no explicit policy. \u00a0These firms are especially vulnerable to malware infection events and\/or subject to mixed messages being disseminated into the public domain. \u00a0Some of these messages may not conform to corporate branding objectives and are potential to reputation damage as a result.<\/p><p>What does your company do?<\/p><p><strong>References<\/strong><\/p><p>Huang, C. (2011, June 6). Facebook and Twitter key to Arab Spring uprisings: report,<em> The National<\/em>. Retrieved from <a href=\"http:\/\/www.thenational.ae\/news\/uae-news\/facebook-and-twitter-key-to-arab-spring-uprisings-report\">http:\/\/www.thenational.ae\/news\/uae-news\/facebook-and-twitter-key-to-arab-spring-uprisings-report<\/a><\/p><p>Osterman Research. (2011, June). <em>The risks of social media and what can be done to manage them<\/em>. Black Diamond, WA: Commvault &amp; McAfee.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Is it worth it for companies to actively engage in social media?  The risks must be weighed.  <\/p>\n","protected":false},"author":2,"featured_media":906,"comment_status":"closed","ping_status":"open","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[76],"tags":[77,78,80,81],"class_list":["post-219","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-socialmedia","tag-networks","tag-social-networking","tag-twitter","tag-uprisings"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Is it worth it for companies to actively engage in social media? The risks must be weighed.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Is it Worth it to do \u201cSocial Media\u201d? - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"Is it worth it for companies to actively engage in social media? The risks must be weighed.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2012-07-09T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-12T18:09:54+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Is it Worth it to do \u201cSocial Media\u201d? - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Is it worth it for companies to actively engage in social media? The risks must be weighed.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#blogposting\",\"name\":\"Is it Worth it to do \\u201cSocial Media\\u201d? - CTIN\",\"headline\":\"Is it Worth it to do &#8220;Social Media&#8221;?\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2012\\\/07\\\/Puppets.jpg\",\"width\":1920,\"height\":1440},\"datePublished\":\"2012-07-09T00:00:00+00:00\",\"dateModified\":\"2024-06-12T18:09:54+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#webpage\"},\"articleSection\":\"SocialMedia, networks, social networking, Twitter, uprisings\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/#listItem\",\"name\":\"SMTH\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/#listItem\",\"position\":3,\"name\":\"SMTH\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/socialmedia\\\/#listItem\",\"name\":\"SocialMedia\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/socialmedia\\\/#listItem\",\"position\":4,\"name\":\"SocialMedia\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/socialmedia\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#listItem\",\"name\":\"Is it Worth it to do &#8220;Social Media&#8221;?\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/#listItem\",\"name\":\"SMTH\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#listItem\",\"position\":5,\"name\":\"Is it Worth it to do &#8220;Social Media&#8221;?\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/socialmedia\\\/#listItem\",\"name\":\"SocialMedia\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/\",\"name\":\"Is it Worth it to do \\u201cSocial Media\\u201d? - CTIN\",\"description\":\"Is it worth it for companies to actively engage in social media? The risks must be weighed.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2012\\\/07\\\/Puppets.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#mainImage\",\"width\":1920,\"height\":1440},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/09\\\/is-it-worth-it-to-do-social-media\\\/#mainImage\"},\"datePublished\":\"2012-07-09T00:00:00+00:00\",\"dateModified\":\"2024-06-12T18:09:54+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Is it Worth it to do \u201cSocial Media\u201d? - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Is it Worth it to do \u201cSocial Media\u201d? - CTIN","description":"Is it worth it for companies to actively engage in social media? The risks must be weighed.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#blogposting","name":"Is it Worth it to do \u201cSocial Media\u201d? - CTIN","headline":"Is it Worth it to do &#8220;Social Media&#8221;?","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2012\/07\/Puppets.jpg","width":1920,"height":1440},"datePublished":"2012-07-09T00:00:00+00:00","dateModified":"2024-06-12T18:09:54+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#webpage"},"articleSection":"SocialMedia, networks, social networking, Twitter, uprisings"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/#listItem","name":"SMTH"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/#listItem","position":3,"name":"SMTH","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/#listItem","name":"SocialMedia"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/#listItem","position":4,"name":"SocialMedia","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#listItem","name":"Is it Worth it to do &#8220;Social Media&#8221;?"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/#listItem","name":"SMTH"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#listItem","position":5,"name":"Is it Worth it to do &#8220;Social Media&#8221;?","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/#listItem","name":"SocialMedia"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/","name":"Is it Worth it to do \u201cSocial Media\u201d? - CTIN","description":"Is it worth it for companies to actively engage in social media? The risks must be weighed.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2012\/07\/Puppets.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#mainImage","width":1920,"height":1440},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/#mainImage"},"datePublished":"2012-07-09T00:00:00+00:00","dateModified":"2024-06-12T18:09:54+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Is it Worth it to do \u201cSocial Media\u201d? - CTIN","og:description":"Is it worth it for companies to actively engage in social media? The risks must be weighed.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2012-07-09T00:00:00+00:00","article:modified_time":"2024-06-12T18:09:54+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Is it Worth it to do \u201cSocial Media\u201d? - CTIN","twitter:description":"Is it worth it for companies to actively engage in social media? The risks must be weighed.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"219","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":{"category":76},"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:35:38","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2021-08-07 21:52:25","updated":"2025-08-25 22:35:38"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/\" title=\"SMTH\">SMTH<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/\" title=\"SocialMedia\">SocialMedia<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tIs it Worth it to do \u201cSocial Media\u201d?\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"SMTH","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/"},{"label":"SocialMedia","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/"},{"label":"Is it Worth it to do &#8220;Social Media&#8221;?","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/09\/is-it-worth-it-to-do-social-media\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=219"}],"version-history":[{"count":22,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/219\/revisions"}],"predecessor-version":[{"id":4179,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/219\/revisions\/4179"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/906"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}