Developing a Response

Identifying threats is a complicated task in itself. But once you have identified what those threats are and you’ve assessed the damage, what do you do next? A response team can encompass multiple departments. As we have been discussing, a combination of staff from HR, IT, and Marketing will usually need to be called upon for most large-scale threats.

If you are in charge of defending the company website and an attack is launched from an IP address in Russia and you only do business in the United States, you could easily block that IP address from even being able to see your website. If you see a new virus launching attacks, you could easily update your virus scanner with new attack signatures. But with social media attacks, ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.