How to use Web 2.0 and social networking sites securely

<span>This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.</span>

Detalles Bibliográficos
Autor principal: IT Governance Research Team.
Autor Corporativo: IT Governance Research Team (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Ely, U.K. : IT Governance Pub 2009.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627535906719
Tabla de Contenidos:
  • HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY; INTRODUCTION ; CHAPTER 1: WEB 2.0 THREATS ; Malware and blended attacks ; Hacking attacks ; Phishing ; Social engineering ; Loss of productivity ; Reputational risk ; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness training; Protecting an organisation from reputational risk; Checking a commercial website's credentials; Filtering ; Vulnerability management ; APPENDIX A: GLOSSARY ; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG RESOURCES ; Pocket Guides ; Toolkits ; Best Practice Reports
  • Training and Consultancy Newsletter