How to use Web 2.0 and social networking sites securely
<span>This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.</span>
Main Author: | |
---|---|
Corporate Author: | |
Format: | eBook |
Language: | Inglés |
Published: |
Ely, U.K. :
IT Governance Pub
2009.
|
Edition: | 1st edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627535906719 |
Table of Contents:
- HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY; INTRODUCTION ; CHAPTER 1: WEB 2.0 THREATS ; Malware and blended attacks ; Hacking attacks ; Phishing ; Social engineering ; Loss of productivity ; Reputational risk ; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness training; Protecting an organisation from reputational risk; Checking a commercial website's credentials; Filtering ; Vulnerability management ; APPENDIX A: GLOSSARY ; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG RESOURCES ; Pocket Guides ; Toolkits ; Best Practice Reports
- Training and Consultancy Newsletter