As a former gymnast, I am an Olympics nut. I’m pretty much going to turn into a couch potato for the next 2+ weeks. I wholeheartedly admire the athletes that represent any country and I believe in the spirit of the Games. Those of you who have competed in or committed to a sport in some shape or form know the discipline, persistence, sacrifices and hard work it takes to perfect a skill or improve your speed.
As I think about gymnastics, inevitably my mind starts drawing parallels between this graceful yet challenging sport and social media. Here are 8 lessons social media practitioners can learn from gymnasts. Read More »
Tags: best practices, engagement, experiment, how to, Listening, London 2012 Olympics, social media, sports
My busy schedule allows no time for negativity or newsfeeds with an agenda. Pinterest connects me to the brighter side of womankind.
Read More »
Tags: best practices, collaboration, internet generation, Pinterest, social media
Not too long ago, we featured Greg Smith (@gregsmit68), a Cisco Service Provider Marketing Manager, in a “Meet Our SMEs” series blog post (“Meet Greg Smith: Mastermind Behind 2 Award-Winning Social Programs”). Greg was noted for his blogging best practices and for leveraging innovative social media programs to effictvely connect with fans. When we got the opportunity to interact with him face-to-face at the recent Ragan Social Media Conference, we managed to pull him aside to ask for some social words of advice to share with our Cisco Social Media Blog readers.
Hear some of Greg’s social media tips in this short 2-minute video: Read More »
Tags: best practices, greg smith, lessons learned, meet our SMEs, tips
Social business is about using diverse social technologies to easily connect with one another. In my previous video blog post, we learned some present and future trends within this realm, and how it’s evolving. Let’s continue that train of thought and delve deeper.
Let’s Get This Social Media Party Started
According to Industry Analyst Jeremiah Owyang, “the social business space is still very immature, and things are just heating up” (Owyang, “Social Business: We’re Just Getting Started”). As more and more companies jump on the social media bandwagon, it’s essential that they remember to holistically integrate social business into the corporation. Before getting started with social, Jeremiah recommends conducting an internal analysis of your organization to figure out which of the 5 organizational models your company is currently in and which you aspire to be in. Afterward, employees must realize that incorporating social into their business is likely to be a slow process since it’s much of a major cultural change that their company will undergo.
The Role of the Social Strategist Amidst It All
Many people know that social media is not free – it requires a lot of time, money and people resources. One of the key players that constitute social business is the social strategist. As this realm continues to develop, how will the role of the social strategist change? Will it disappear or become further embedded into a corporation somehow? We wanted to hear what “social media guy at LinkedIn” Mario Sundar (@mariosundar) and Jeremiah (@jowyang) thought about this topic. Watch this short video recapping their words of wisdom:
Read More »
Tags: Altimeter Group, best practices, evolving social strategist, lessons learned, linkedin, Social Business, tips
LinkedIn is believed to have suffered a password hash breach (updated: LinkedIn has confirmed the breach), thanks to a forum post that quickly caught the attention of security researchers on Twitter and other social outlets. The posted archive contained a 270+ MB text file of SHA-1 hashes, and forum discussions suggested that it was related to the popular business-centric social site.
At the moment, little is known and speculation is running wild. LinkedIn has not finished investigating whether they have been breached, however many security pros are confirming for the media that the SHA-1 hashes of their passwords are found in the file. The file is constructed in a hash-per-line fashion, with no evident plaintext that suggests it is anything other than passwords (such as usernames, etc.). However, it’s possible that anyone gaining the original access to hashes had or has access to additional details.
I obtained a copy of the hash list, produced a SHA-1 hash of my old LinkedIn password, and did indeed find it in the list. I have also spot-checked several other hashes posted by security pros on Twitter, and have found them as well. Given the nature of my own password (16 random characters comprised of A-Z, a-z, and 0-9) the likelihood that my SHA-1 hash of my password (that was unique to LinkedIn) would be present in a file that did NOT come (at least in part) from a source that had access to hashes of LinkedIn passwords is statistically impossible.
Read More »
Tags: best practices, Breach, Hash, infosec, it security, linkedin, password breach, passwords, security, SHA-1