How Are Security Processes Handled?
The initial reaction of IT security is to block, block, and block some more. Blocking is a very limited capability in social media, especially if some people do and some people do not have access to certain social media websites in the organization. Implementing URL filtering technologies is easy, but that only controls employees in the workplace. What happens when they are on the road with their laptops and using a hotel’s Wi-Fi to connect? What happens when they are at home? What happens when they use their company-provided, web-enabled smart phones?
As we have mentioned, educating the user about what they put into the social media universe is part of securing that data. By combining user education about ...
Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.