After years of steadily picking up steam, online learning is experiencing undeniable explosive growth. The market is racing toward $1 trillion, with the corporate e-learning space expected to skyrocket 250% in the coming years. As e-learning continues to expand beyond the walls of academia, another game-changing phenomenon is going mainstream in a big way: artificial intelligence (AI).
Yahoo and purpose-led ad platform Good-Loop announced a global partnership offering carbon neutral private marketplace (PMP) media opportunities to advertisers to help them become more sustainable.
SenseTime hosted a Tech Day event, sharing their strategic plan for advancing AGI (Artificial General Intelligence) development through the combination of "foundation models + large-scale computing" systems. The leading AI software company is focused on creating a better AI-empowered future through innovation and committed to advancing the state of the art in AI research, developing scalable and affordable AI software platforms that benefit businesses, people and society as a whole.
At its annual Think conference, IBM announced IBM watsonx, a new AI and data platform, planned to be released in July 2023, that will enable enterprises to scale and accelerate the impact of the most advanced AI with trusted data.
The global technology intelligence firm ABI Research just announced the release of Research Spotlights, suites of research focused on key technologies and trends within the vast ABI Research Library.
Yahoo Advertising announced a new integration with Twilio Segment Customer Data Platform (CDP) to drive greater advertising reach and relevance, without relying on third-party cookies.
A 2023 Emotional Intelligence Market study citing “heavy growth” of $49.93 billion USD by 2027 exemplifies the extent to which mastering “EQ” versus IQ is taking brands to exciting new levels of success … and why not embracing EQ can result in extreme opportunity loss or, far worse, be an outright brand buster. This as today’s highly discriminating and demanding marketplace is seemingly rife with substitutable solutions. Whether the B2B or B2C sector, more often than not today’s consumers have alternate options—and they know it.
Ogury, a global leader in personified advertising, commissioned IDC to conduct a global survey on 1,000 major brand and media agency executives to get their perspective and understanding of the future of digital advertising in a cookieless world.
In response to the growing number of breaches, SecurityHQ released their latest white paper to highlight analyst predictions for threats and vulnerabilities in H2 2023.
Meltwater, a global leader in media intelligence and data analytics, today announced the availability of Meltwater Enterprise Intelligence Suite, a comprehensive offering that promises vital insights and transformative impact to enterprise clients.
The democratization and acceleration of generative Artificial Intelligence (AI) originated in the business-to-consumer (B2C) market with the release of popular applications like ChatGPT and Stable Diffusion. But the B2C market will barely scratch the surface of generative AI’s potential economic value.
IBM announced plans to expand its relationship with Amazon Web Services to help more mutual clients operationalize and derive value from generative artificial intelligence.
Organizations in Singapore are increasing their reliance on the cloud. Nearly nine in ten organizations in the country are using cloud services, with about 70% taking a hybrid cloud approach.
At its Experience ‘24 conference, Medallia, Inc. announced four ground-breaking innovations that will fundamentally alter the way organizations can personalize customer and employee experience
New research commissioned by IBM found that about 42% of enterprise-scale organizations (over 1,000 employees) surveyed have AI actively in use in their businesses. Early adopters are leading the way,
Zendesk, Inc. today released its annual Customer Experience(CX) Trends Report, the findings of which signal a rapid transition towards intelligent CX. In this era, the shift to AI-driven service will
Prioritizing which vulnerabilities to fix is a challenge for software developers, and the complexities of modern apps and the software supply chain have only made things more difficult. SentinelOne, a
Google and the Cyber Security Agency of Singapore (CSA) announced a strategic collaboration to bolster Singapore’s cyber resilience. This partnership covers four key pillars: threat intelligence
Social media websites can be an asset to businesses, but they also enable cyber-criminals to steal users’ personal information and wreak havoc with corporate IT systems. Learn the many ways in which social media websites can pose a threat to corporate networks. Find out the steps that IT managers can take to ensure that critical business data remains secure and protected while simultaneously taking advantage of these exciting new business opportunities.
Introduction
The phenomenal growth and popularity of social media websites has created promising opportunities for businesses as well as dangerous new ways for cyber-criminals to create havoc on corporate networks.
Since its inception in 2005, YouTube has grown to 445 million users, an increase of 359%. Facebook now has 390 million users, an increase of 153% since it started in 2004. Twitter, with 55 million users, has increased 1,171% since it began in 2006. According to Alexa.com, in the past six months, Twitter.com traffic increased steadily to a peak of more than four million users. In the most recent three months from when this report was written (November 2009), traffic had increased by 49%. Facebook traffic increased steadily over the past six months to more than 20 million users. Traffic increased by 11% over the same three month time span.
Using social media, businesses now have increased capabilities to interact with their many customers, prospects, vendors, supporters, shareholders and stakeholders. Corporate leaders can run blog postings on social media sites to discuss business issues or introduce new products. As part of their corporate communication efforts, companies rely on social networking to spread the word about community events they sponsor or worthy causes they support. These new channels are lightning-fast, cost-effective and even provide bi-directional communication.
How the Damage Is Done
Workplace Internet use, while often necessary, increases the chances of web based viruses and spyware infiltrating a company’s IT system.
One of the most common tactics used to accomplish this through social networking occurs when a user accesses a social media website that has been compromised. When the user enters the website to send a message that includes a harmless link or video and the message is opened by another user, spyware hosted on the site lures them to fake websites that trick them into divulging personal details and passwords.
For example, mashable.com warns that there is a new Twitter phishing scam making the rounds and spreading quickly via direct message. The infected message, which seems to be an iteration of a previous phishing scam, simply reads, “Hi, this you on here?” Clicking on the link will take you to a phishing site where scammers can take your personal information and hijack your account. This tactic, known as a phishing attack, can compromise users’ business accounts without their knowledge. Once the account is compromised, the cyber-criminals can infiltrate the user’s list of contacts and repeat the attack on other victims.
Cyber-criminals redirect users to websites where profit is made from selling products that make fraudulent claims. For example, a customer who visits a site and buys tools that supposedly remove viruses or spyware is actually paying to download even more malicious malware. The scam artists also try to elicit private information such as passwords and bank-account numbers to commit other misdeeds.
Monitoring and Educating
Although there are powerful tools for blocking social website access, determined users can in some cases find ways—however obfuscated—around them. To counteract these threats, companies must monitor Internet use by both in-house and roaming users and educate all employees about proper use of the web.
Companies of all sizes should establish an acceptable use policy—a set of rules that define the ways in which an organization’s IT network may be used — and take steps to educate employees about the policy and the ways it will be enforced.
The top five social media threats of 2009 used a variety of techniques to infect corporate systems: 6
Koobface Probably the best-known social-networking virus, Koobface infiltrated corporate computers in 2009 when it appeared on MySpace, Facebook, LinkedIn and Twitter. Koobface sends messages to the contacts of an infected account, tricking users into downloading a Trojan from a malicious website.
The Mikeyy Worm In April 2009, Twitter was hit several times by the Mikeyy Worm, which took advantage of a cross-site scripting weakness to hijack users’ accounts. The worm used the infected accounts to send out a stream of nuisance messages—all a user had to do to contract the virus was view an infected profile.
Acai Attack The Acai berry has been hyped as a wonder dietary supplement, but it has also been the focus of pyramid schemes and free-trial offer scams. In May 2009, weight-loss spammers seized control of hundreds of Twitter accounts and steered message recipients to a site where they could sign up for a phony Acai trial.
Facebook Phishing6 In April and May 2009, Facebook was targeted for waves of phishing attacks from malevolent sites based in Latvia and China. To recruit an army of spam “zombies,” hackers used Facebook’s internal messaging system to trick users into giving up their credentials on a fake Facebook log-in screen.
Michael Fabricant A phishing attack that reels in a high-profile user can raise awareness of social media’s vulnerabilities. In June 2009, hackers used U.K. Parliament member Michael Fabricant’s Facebook account to send corrupted links to 1,500 of his friends. After this incident, Fabricant said that he felt “outlawed from cyberspace.”
Social Networking Gone Awry In 2008, the CEO of Whole Foods Market, John Mackey, placed anonymous social-media posts about his own company’s stock and the stock of a competitor that Whole Foods was trying to acquire.
In his posts, Mackey disparaged the competitor’s stock in an attempt to weaken its value and improve Whole Foods’ bargaining position for the acquisition. A respected executive, Mackey had his reputation tarnished; was forced to issue a public apology; and endured investigation by both the U.S. Securities and Exchange Commission (SEC) as well as an internal committee within his own company. Ultimately, no charges were filed against Mackey, but the embarrassing incident cast a shadow over the Whole Foods brand.
When President Barack Obama was running for election, malicious software penetrated his campaign website (my.barackobama.com) and allowed hackers to gain access to campaign workers’ computers and install a Trojan. The Trojan enabled the cyber-criminals7 to register multiple bogus user accounts on the website and install a virus-infected video that quickly spread the infected code.
In May of 2008, there was a similar incident at the website that flooded the site’s comment forums with links that deceived the online blogging community into downloading the Trojan onto their own machines
How Can a Company Protect Itself? Every organization should take action to protect itself from the threats that social networking presents. There are several things that companies can do, but some practices and procedures are more effective than others.
Establish policies for employee use of the Internet Many organizations don’t have adequate Internet Acceptable Usage policies. In fact, many don’t have Internet policies at all. An employee focused policy on proper use of the web—though difficult to enforce— should list the types of websites that employees are allowed to visit and those that aren’t permissible, as well as penalties for violating the rules.
Establish anti-virus and anti-spyware protection These tools must be deployed throughout a company’s network, preferably at the server, gateway and end-user levels. While expensive to deploy, installing these capabilities on individual desktop machines, laptops and mobile devices can help to protect against threats that can enter via a USB storage device or a user’s CD-ROM.
Block non-business related websites Another option is the deployment of URL-filtering tools that block access to non-approved websites. Many organizations use these filters, and they provide valuable first defense against inappropriate sites. However, new social networking websites and tools are frequently released, so URL filtering should be used as part of a larger proactive strategy.
Filter content for unwanted file types Blocking file types based on content can help prevent some types of web threats from entering a network, particularly files that are associated with malware. Content-filtering tools can preserve bandwidth and storage by blocking unwanted, space-consuming audio and video files. According to Osterman Research, a policy only approach won’t protect an organization from employees who forget the policy or choose to ignore it and a systems-only method without a clear, well-enforced policy to support it could cause confusion and resentment among employees. Instead, organizations should use several different methods in a layered approach to ensure the highest levels of protection.
Enter Hosted Web Security In the past, customers often used software installed on users’ PCs or on an internet gateway device, such as a firewall, to prevent malware infection, security breaches and data loss. These on-premise solutions, however, drain financial resources, consume employees’ time, are difficult to scale and most important, don’t provide 100% protection.
With the rapid pace of development and expansion of the Internet, hosted web security services are becoming more and more popular. A hosted service is operated and maintained by an off-site company; it has a lower cost of ownership than on-site solutions; it reduces the need for internal staff; and it is easily scalable. This type of service, which is highly proactive against web threats including the growing number of threats from social media, provides these advantages:
Effectively blocks users from visiting non-business-related websites, which boosts user productivity and organizational compliance.
Saves bandwidth and storage by blocking large media files such as video, audio and image files “in the cloud” before they are downloaded into the customer infrastructure
Frees staff from the tasks associated with managing an in-house deployment
Is much more scalable than on-premise solutions. If the amount of web content scanned or the number of users increases, a hosted solution can scale quickly with a change of settings in a web interface.
Provides lower, more predictable costs—even for large numbers of users— than is possible with an on-premise solutions.
By Bjorn Engelhardt, VP of Symantec Hosted Services, APJ
Category: Apr–June 2023 - Artificial Intelligence (AI) in Marketing
SenseTime hosted a Tech Day event, sharing their strategic plan for advancing AGI (Artificial General Intelligence) development through the combination of "foundation models + large-scale computing" systems. The leading AI software company is focused on creating a better AI-empowered future through innovation and committed to advancing the state of the art in AI research, developing scalable and affordable AI software platforms that benefit businesses, people and society as a whole.
Category: Apr–June 2023 - Artificial Intelligence (AI) in Marketing
Cisco unveiled the latest progress towards its vision of the Cisco Security Cloud, a unified, AI-driven, cross-domain security platform. Cisco's new XDR solution and the release of advanced features for Duo MFA will help organizations better protect the integrity of their entire IT ecosystem.
Category: Apr–June 2023 - Artificial Intelligence (AI) in Marketing
Ogury, a global leader in personified advertising, commissioned IDC to conduct a global survey on 1,000 major brand and media agency executives to get their perspective and understanding of the future of digital advertising in a cookieless world.
MediaBUZZ is the first ‘pure’ digital publisher in the region, making an impact in Asia Pacific since 2004. Designed to empower marketers in the vibrant, ever-changing electronic marketing environment, its publication Asian eMarketing covers the digital age and zooms in on the most valuable and indispensable tools of today’s marketers. Circulated weekly to more than 60,000 top management and marketing decision-makers, the useful and informative articles support e-marketers in finding a sound marketing strategy, vital for their growing business success.