Book description
This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.
Table of contents
- Copyright
- Foreword
- Introduction
-
1. Web 2.0 Threats
- Malware and blended attacks
- Hacking attacks
- Phishing
- Social engineering
-
Loss of productivity
- Data leakage
- The different types of personal and company data and associated risks
- The volume of personal and company data stored on the Internet
- Length of time personal and company data is stored on the Internet
- Subsequent uses of personal and company data
- Personal and company profiles and the broad meaning of ‘friends’
- Reputational risk
- 2. Protecting Organisations from Risk
- A. Glossary
- B. Social Networking Screenshots
- ITG Resources
Product information
- Title: How to Use Web 2.0 and Social Networking Sites Securely
- Author(s):
- Release date: January 2009
- Publisher(s): IT Governance Publishing
- ISBN: 9781905356867
You might also like
book
Chatelaine Earn Spend Save: The savvy guide to a richer, smarter, debt-free life
An Outstanding Financial Guide from the Experts at Chatelaine Most Canadian women would rather talk about …
book
Theory and Methods of Statistics
Theory and Methods of Statistics covers essential topics for advanced graduate students and professional research statisticians. …
book
Microsoft® Computer Dictionary
Over 10,000 entries! The Fifth Edition of this award-winning dictionary has been fully updated with the …
book
Official Google Cloud Certified Professional Cloud Architect Study Guide
Sybex's proven Study Guide format teaches Google Cloud Architect job skills and prepares you for this …