How to use Web 2.0 and social networking sites securely
<span>This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.</span>
Autor principal: | |
---|---|
Autor Corporativo: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Ely, U.K. :
IT Governance Pub
2009.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627535906719 |
Tabla de Contenidos:
- HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY; INTRODUCTION ; CHAPTER 1: WEB 2.0 THREATS ; Malware and blended attacks ; Hacking attacks ; Phishing ; Social engineering ; Loss of productivity ; Reputational risk ; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness training; Protecting an organisation from reputational risk; Checking a commercial website's credentials; Filtering ; Vulnerability management ; APPENDIX A: GLOSSARY ; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG RESOURCES ; Pocket Guides ; Toolkits ; Best Practice Reports
- Training and Consultancy Newsletter