CHAPTER 2Security Strategy Analysis: Foundation of Your Security Policy

Every corporation has a process to accomplish every goal. The process could be good or bad. Companies that do not follow a set process tend to make mistakes, achieve unexpected results, have teams going in different directions, and miss their targets. As the motivational speaker and author Zig Ziglar pointed out, “People don’t plan to fail; they fail to plan!”

In this chapter, we define the first steps toward developing a secure social media framework so you can track, measure, and monitor your social media usage over time. More specifically, you will learn about the different aspects of the H.U.M.O.R. Matrix and how you can use it to assess your current environment. A framework ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.