Developing a Response

Identifying threats is a complicated task in itself. But once you have identified what those threats are and you’ve assessed the damage, what do you do next? A response team can encompass multiple departments. As we have been discussing, a combination of staff from HR, IT, and Marketing will usually need to be called upon for most large-scale threats.

If you are in charge of defending the company website and an attack is launched from an IP address in Russia and you only do business in the United States, you could easily block that IP address from even being able to see your website. If you see a new virus launching attacks, you could easily update your virus scanner with new attack signatures. But with social media attacks, ...

Get Securing the Clicks Network Security in the Age of Social Media now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.