CHAPTER 2Security Strategy Analysis: Foundation of Your Security Policy

Every corporation has a process to accomplish every goal. The process could be good or bad. Companies that do not follow a set process tend to make mistakes, achieve unexpected results, have teams going in different directions, and miss their targets. As the motivational speaker and author Zig Ziglar pointed out, “People don’t plan to fail; they fail to plan!”

In this chapter, we define the first steps toward developing a secure social media framework so you can track, measure, and monitor your social media usage over time. More specifically, you will learn about the different aspects of the H.U.M.O.R. Matrix and how you can use it to assess your current environment. A framework ...

Get Securing the Clicks Network Security in the Age of Social Media now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.