At a software development conference some time ago, I found myself standing in a small circle of software experts. Suddenly it became apparent how integral a social media presence had become and how much of a missed opportunity it was for me to not pursue. For criminals engaging in this type of attack, social media offers a goldmine of useful information. The companies I work with need to leverage social media for business growth and visibility, as well as granting authentication into their systems for identity and access management purposes. For example, let’s take a quick look at three risks involved with using social networks.”]

