Identifying the Threats
You have to determine the vectors of threats being launched against your company. Social media includes blogs, microblogs, instant messaging, mobile applications, and community pages on Facebook, real-world community networking groups organized through Meetups and Tweetups, YouTube, Flickr, and much more. New avenues of online social interaction develop every few months; these channels have to be assessed for potential threats, for damage they can cause, and for the company’s capability to respond immediately. In the summer of 2010, security firm ProofPoint commissioned a study1 on data loss prevention for U.S. companies and found the following:
1 Outbound Email and Data Loss Prevention in Today’s Enterprise, Proofpoint ...
Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.