The “What If” Scenario

Your social media security policy needs to address the “what if” scenario surrounding possible leaks of confidential information. Apple Computer found out firsthand what a leak of confidential information combined with a wired population can do to a brand’s global image and competitive advantage.

The short version goes like this: A guy walks into a bar with a coveted, yet-to-be-realized Apple iPhone 4 prototype. The guy has one too many drinks. He loses his phone in the bar. His phone ends up in the hands of one of the most widely read Internet gadget websites, Gizmodo.com. The website writes a detailed blog post on every aspect of the phone generating over 13,049,935 visits to the article (see http://gizmodo.com/5520164/this-is-apples-next-iphone ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.