{"id":220,"date":"2012-07-10T00:00:00","date_gmt":"2012-07-10T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/"},"modified":"2024-06-12T19:55:17","modified_gmt":"2024-06-12T19:55:17","slug":"social-media-and-data-integrity","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/","title":{"rendered":"Social Media and Data Integrity"},"content":{"rendered":"<p>by <em><strong>Jane Ginn<\/strong><\/em><\/p>\n<p>More businesses are gleaning personal information and other types of data from social media and online sites, importing it to their internal databases and using it to make business decisions. What types of risks does this create for the business? How could this practice impact data integrity?<\/p>\n<p>In a 2011 report from M86 Labs (<a title=\"M86 Security, 2011 #211\" href=\"\/Users\/Jane\/Documents\/_Learning\/Norwich\/Sem1\/_W6\/DQ3-noImages.docx#_ENREF_1\">2011<\/a>) the authors describe several social media campaigns used to lure unsuspecting users to click on hyperlinks infected with malicious code.\u00a0 Twitter users were \u2018notified\u2019 of activity on their account and lured into clicking on a link to visit their account.\u00a0 The report also detailed a cyber-campaign using LinkedIn notifications in a blended threat spam campaign.\u00a0 In the linked-in campaign the users were taken to a server hosting the Blackhole Exploit kit which then \u201cattempted to exploit vulnerabilities in Java, PDF readers and other client-side software applications\u201d (<em>ibid<\/em>, pg. 13).<\/p>\n<p>Companies using Twitter and other social media sites to generate metrics run into problems that are two-fold:<\/p>\n<ul>\n<li>Spoofed sites designed to exploit users are not legitimate traffic from people seeking information on the product or service offering; and<\/li>\n<li>Company representatives that perform social media functions run the risk of having their computers infected with malware which could, in turn, open the enterprise up to more widespread infection and loss of valuable PII or intellectual property.<\/li>\n<\/ul>\n<p><span style=\"text-decoration: underline;\">Spoofed Sites<\/span><\/p>\n<p>If a user with a computer that has not been updated with all of the latest security patches visits a spoofed site they open themselves up to many different types of exploits.<\/p>\n<p>Adobe vulnerabilities accounted for 6 of the top ten, and the Java Web Start vulnerability moved from 15<sup>th<\/sup> to 11<sup>th<\/sup> position in just 6 months.<\/p>\n<p>Apart from the infection risk is the use by companies of analytical data for business decision-making.\u00a0 Companies use network traffic to gauge effectiveness of ad campaigns, product launches, channel ratings and many other things.\u00a0 Budget decisions are often based on these data.\u00a0 If the integrity of the data has been compromised by malware infection the accuracy of all subsequent decisions is diminished.<\/p>\n<p><span style=\"text-decoration: underline;\">Network Infections<\/span><\/p>\n<p>An infected computer on a network behind the firewall and behind intrusion detection devices can infect an entire enterprise network.\u00a0 Malicious scripts can include code for privilege escalation, code for facilitating remote access, code for botnet usage or a number of other exploit types. Often these malicious scripts use \u201cpackers\u201d as a way to compress the code while applying encryption.\u00a0 This design is for evading detection and reducing their memory footprint.<\/p>\n<p>Infections can lead to not only data loss, but also use of network resources, such as Web servers, as nodes on a criminal network.\u00a0 The 2012 Trustwave Global Security Report (<a title=\"Trustwave, 2012 #212\" href=\"\/Users\/Jane\/Documents\/_Learning\/Norwich\/Sem1\/_W6\/DQ3-noImages.docx#_ENREF_2\">2012<\/a>) indicated that since 2010 attacks to web servers and fraud attempts are on the rise.\u00a0 They note that \u201cWeb server attacks are, for the most part, to host phishing, Trojans, malicious scripts and tools to attack other Web servers\u201d (<em>ibid<\/em>, pg. 16).<\/p>\n<p>Of great concern to many companies is data loss and leakage, sometimes known as data exfiltration.<\/p>\n<p>Over 70% of the data exfiltration reported by Trustwave was over port 80, for HTTPS, and port 443 for FTP.<\/p>\n<p><span style=\"text-decoration: underline;\">Conclusion<\/span><\/p>\n<p>In conclusion, the use of social media opens the enterprise up to specific data integrity risks that need to be accounted for in both the patching policies of the social media representative(s), and in the architecture of the network itself.\u00a0 A defensive network design that significantly limits access of social media representatives to other mission-critical network resources can help to ameliorate these risks.<\/p>\n<p>____________________________________________________________<\/p>\n<p><span style=\"text-decoration: underline;\">References:<\/span><\/p>\n<p>M86 Security. (2011). <em>Security Labs Report: January &#8211; June 2011 Recap<\/em>. Irvine, CA: M86 Security.<\/p>\n<p>Trustwave. (2012). <em>Global Security Report<\/em>. In S. Brown (Ed.). Chicago, IL.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program?  Here is a comment on that question.  <\/p>\n","protected":false},"author":2,"featured_media":4142,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[76],"tags":[82,83,85,86,87,89,92,93,99,100],"class_list":["post-220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-socialmedia","tag-business-decisions","tag-client-side-software","tag-comparative-analysis","tag-data-integrity","tag-impact-data","tag-internal-databases","tag-latest-security","tag-legitimate-traffic","tag-security-patches","tag-unsuspecting-users"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question.\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Social Media and Data Integrity - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2012-07-10T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-12T19:55:17+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Social Media and Data Integrity - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#blogposting\",\"name\":\"Social Media and Data Integrity - CTIN\",\"headline\":\"Social Media and Data Integrity\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/WomanProfile-AI-RS.png\",\"width\":1636,\"height\":917,\"caption\":\"Abstract image of profile\"},\"datePublished\":\"2012-07-10T00:00:00+00:00\",\"dateModified\":\"2024-06-12T19:55:17+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#webpage\"},\"articleSection\":\"SocialMedia, business decisions, client side software, comparative analysis, data integrity, impact data, internal databases, latest security, legitimate traffic, security patches, unsuspecting users\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/#listItem\",\"name\":\"SMTH\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/#listItem\",\"position\":3,\"name\":\"SMTH\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/socialmedia\\\/#listItem\",\"name\":\"SocialMedia\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/socialmedia\\\/#listItem\",\"position\":4,\"name\":\"SocialMedia\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/socialmedia\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#listItem\",\"name\":\"Social Media and Data Integrity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/#listItem\",\"name\":\"SMTH\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#listItem\",\"position\":5,\"name\":\"Social Media and Data Integrity\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/smth\\\/socialmedia\\\/#listItem\",\"name\":\"SocialMedia\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/\",\"name\":\"Social Media and Data Integrity - CTIN\",\"description\":\"How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/WomanProfile-AI-RS.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#mainImage\",\"width\":1636,\"height\":917,\"caption\":\"Abstract image of profile\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2012\\\/07\\\/10\\\/social-media-and-data-integrity\\\/#mainImage\"},\"datePublished\":\"2012-07-10T00:00:00+00:00\",\"dateModified\":\"2024-06-12T19:55:17+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Social Media and Data Integrity - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Social Media and Data Integrity - CTIN","description":"How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question.","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#blogposting","name":"Social Media and Data Integrity - CTIN","headline":"Social Media and Data Integrity","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/06\/WomanProfile-AI-RS.png","width":1636,"height":917,"caption":"Abstract image of profile"},"datePublished":"2012-07-10T00:00:00+00:00","dateModified":"2024-06-12T19:55:17+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#webpage"},"articleSection":"SocialMedia, business decisions, client side software, comparative analysis, data integrity, impact data, internal databases, latest security, legitimate traffic, security patches, unsuspecting users"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/#listItem","name":"SMTH"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/#listItem","position":3,"name":"SMTH","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/#listItem","name":"SocialMedia"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/#listItem","position":4,"name":"SocialMedia","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#listItem","name":"Social Media and Data Integrity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/#listItem","name":"SMTH"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#listItem","position":5,"name":"Social Media and Data Integrity","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/#listItem","name":"SocialMedia"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/","name":"Social Media and Data Integrity - CTIN","description":"How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/06\/WomanProfile-AI-RS.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#mainImage","width":1636,"height":917,"caption":"Abstract image of profile"},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/#mainImage"},"datePublished":"2012-07-10T00:00:00+00:00","dateModified":"2024-06-12T19:55:17+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Social Media and Data Integrity - CTIN","og:description":"How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question.","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2012-07-10T00:00:00+00:00","article:modified_time":"2024-06-12T19:55:17+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Social Media and Data Integrity - CTIN","twitter:description":"How does the participation of employees from a business in the various social media platforms affect the corporate image and branding program? Here is a comment on that question.","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"220","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:35:34","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2021-08-07 21:52:25","updated":"2025-08-25 22:35:34"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/\" title=\"SMTH\">SMTH<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/\" title=\"SocialMedia\">SocialMedia<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tSocial Media and Data Integrity\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"SMTH","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/"},{"label":"SocialMedia","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/smth\/socialmedia\/"},{"label":"Social Media and Data Integrity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2012\/07\/10\/social-media-and-data-integrity\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=220"}],"version-history":[{"count":3,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/220\/revisions"}],"predecessor-version":[{"id":877,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/220\/revisions\/877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/4142"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}