Book description
This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.
Table of contents
- Copyright
- Foreword
- Introduction
-
1. Web 2.0 Threats
- Malware and blended attacks
- Hacking attacks
- Phishing
- Social engineering
-
Loss of productivity
- Data leakage
- The different types of personal and company data and associated risks
- The volume of personal and company data stored on the Internet
- Length of time personal and company data is stored on the Internet
- Subsequent uses of personal and company data
- Personal and company profiles and the broad meaning of ‘friends’
- Reputational risk
- 2. Protecting Organisations from Risk
- A. Glossary
- B. Social Networking Screenshots
- ITG Resources
Product information
- Title: How to Use Web 2.0 and Social Networking Sites Securely
- Author(s):
- Release date: January 2009
- Publisher(s): IT Governance Publishing
- ISBN: 9781905356867
You might also like
book
Machine Learning, 2nd Edition
A Proven, Hands-On Approach for Students without a Strong Statistical FoundationSince the best-selling first edition was …
audiobook
The Design of Everyday Things
First, businesses discovered quality as a key competitive edge; next came science. Now, Donald A. Norman, …
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …
book
Clean Code: A Handbook of Agile Software Craftsmanship
Even bad code can function. But if code isn’t clean, it can bring a development organization …