In today’s digital world, personal security is directly tied to corporate security. Therefore, it is critical for organizations to implement employee security guidelines and best practices to improve not only the employees’ digital hygiene and personal security but also the company’s security.
The lessons learned following the Boston Marathon bombings were many, but one lesson that was learned rather quickly was that Twitter was going to become the go-to platform for gathering timely and accurate information from city, state and federal officials regarding the rapidly unfolding events of that week.
The NSA has been using its collections of data since November 2010 to create sophisticated graphs of some Americans’ social connections that can identify their associates, their locations at certain times, their traveling companions and other personal information, a New York Times article reports.
Mac’s Convenience Stores has joined Circle K, owned by Alimentation Couche-Tard, in using social media to identify thieves, according to a Net News Ledger report from Thunder Bay, Ontario.