Book description
This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.
Table of contents
- Copyright
- Foreword
- Introduction
-
1. Web 2.0 Threats
- Malware and blended attacks
- Hacking attacks
- Phishing
- Social engineering
-
Loss of productivity
- Data leakage
- The different types of personal and company data and associated risks
- The volume of personal and company data stored on the Internet
- Length of time personal and company data is stored on the Internet
- Subsequent uses of personal and company data
- Personal and company profiles and the broad meaning of ‘friends’
- Reputational risk
- 2. Protecting Organisations from Risk
- A. Glossary
- B. Social Networking Screenshots
- ITG Resources
Product information
- Title: How to Use Web 2.0 and Social Networking Sites Securely
- Author(s):
- Release date: January 2009
- Publisher(s): IT Governance Publishing
- ISBN: 9781905356867
You might also like
book
Künstliche Intelligenz - Eine Einführung
Eine allgemeine und leicht zugängliche Einführung in die Grundlagen der Künstlichen Intelligenz Auswirkungen Künstlicher Intelligenz auf …
book
Web 2.0 Knowledge Technologies and the Enterprise
Whilst enterprise technology departments have been steadily building their information and knowledge management portfolios, the Internet …
video
Panel: Real-time Discussions on Real-time Data processing
How do streaming experts define “streaming”? What are their favorite use cases of real-time streaming, and …
book
StarOffice™ 5.2 Calc Handbook
The easy-access, task-oriented guide to StarOffice Calc! Absolute basics to advanced data analysis Communicate your data: …