Technology

In Chapter 6, we outlined a number of processes that need to be present in your social media security policy. In actually managing your tools to enable secure utilization of social media, you are faced with the same challenges that you face with any other tools you use for other security activities, such as monitoring for malware or Trojans. You can utilize these tools to track “Where” this information is being used. From an internal perspective, you can track “Where” employees visit and the sites they use to post information.

URL Filtering

Since just about every social media site will be accessed via a web page (even internal wikis), URL filtering is a necessary component in your toolkit to monitor, block, and report on employee activity. ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.