COMMUNITY MANAGEMENT - CM2
14.9K views | +0 today
Follow
COMMUNITY MANAGEMENT - CM2
I Provide services for clients to manage and optimize their image on Social Networks.especially on FACEBOOK to begin, then TWITTER, LINKED IN, FOURSQUARE, FLICK'R, SCOOP.IT, and at least G+.This presence represents a major stake today for any organization, profit-seeking or not, and requires a very good expertise of the social networks. It also requires a pad of consequent and contacts multi channels, hours spent to stay up the net, and to lead groups or communities. It is thus crucial to become attached to it and, so that it is assured in optimal conditions of success, to outsource it to an expert. At last, it requires to be multi lingual. Concerning me, it's : French, of course, then English, and Spanish. Philippe TREBAUL - 06 42 97 88 47 - @TheMisterFavor - @Socialfave - FACEBOOK  : https://www.facebook.com/CommunityManager2 Cies on IN: https://www.linkedin.com/company/c_m_2 AND: https://www.linkedin.com/company/socialfave Cie on G+: https://plus.google.com/104411165325240595169 Join me on FB: https://www.facebook.com/philippe.trebaul.bis Join me on IN: https://fr.linkedin.com/in/philippetrebaul FB Pages: https://www.facebook.com/SOCIALFAVE https://www.facebook.com/SOCIALFAVE.ON.TWITTER Cie on FB: https://www.facebook.com/pages/Socialfave/1662118604050540 Follow us! Philippe CEO of Socialfave www.socialfave.net contact@socialfave.net support@socialfave.net
Your new post is loading...
Your new post is loading...
Scooped by Philippe Trebaul
Scoop.it!

The 12 most infamous hackers of all time

The 12 most infamous hackers of all time | COMMUNITY MANAGEMENT - CM2 | Scoop.it
A look back at the biggest hacks in history
more...
No comment yet.
Scooped by Philippe Trebaul
Scoop.it!

IBM is training Watson to hunt hackers

IBM is training Watson to hunt hackers | COMMUNITY MANAGEMENT - CM2 | Scoop.it
How IBM's cognitive computing system is learning about cybersecurity.
more...
No comment yet.
Scooped by Philippe Trebaul
Scoop.it!

A Ukrainian hacker has pleaded guilty to an insider trading scheme that netted $30 million

A Ukrainian hacker has pleaded guilty to an insider trading scheme that netted $30 million | COMMUNITY MANAGEMENT - CM2 | Scoop.it
Vadym Iermolovych is the first convicted hackers involved in the scheme.
more...
No comment yet.
Rescooped by Philippe Trebaul from visualizing social media
Scoop.it!

How and Why Social Engineering Works [Infographic]

How and Why Social Engineering Works [Infographic] | COMMUNITY MANAGEMENT - CM2 | Scoop.it

For many people in today’s world, being “online” has become a constant status. High-speed internet, smart phones and tablet PC’s have enabled us to stay connected whenever and wherever we are.

Social hackers capitalize on vulnerabilities when it comes to keeping personal details private, and the problem has only seemed to get worse as the digital age has developed.

Techniques as simple as looking over a shoulder as someone enters bank details or passwords are often used, as well as sending out deceiving emails ridden with malware and viruses that can take control of your computer. Hackers pose as a trusted entity in email blasts that utilize mind tricks to get the viewer to click on the link that will trigger the infection of your computer.

Everyone with an internet connection is vulnerable, and public awareness is the first step in ending this growing problem...


Via Lauren Moss
more...
Cam's curator insight, March 12, 2013 4:50 AM

Infographics are always fun!