Actions for How to use Web 2.0 and social networking sites securely
How to use Web 2.0 and social networking sites securely / IT Governance Research Team
- Published
- Ely, U.K. : IT Governance Pub., [2009]
- Copyright Date
- ©2009
- Physical Description
- 1 online resource (75 pages) : illustrations
- Additional Creators
- IT Governance (Organization). Research Team
Access Online
- Contents
- HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY; INTRODUCTION; CHAPTER 1: WEB 2.0 THREATS; Malware and blended attacks; Hacking attacks; Phishing; Social engineering; Loss of productivity; Reputational risk; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness training; Protecting an organisation from reputational risk; Checking a commercial website's credentials; Filtering; Vulnerability management; APPENDIX A: GLOSSARY; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG RESOURCES; Pocket Guides; Toolkits; Best Practice Reports; Training and Consultancy.
- Summary
- Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected.
- Subject(s)
- ISBN
- 1905356870
9781905356874
9781905356867
1905356862 (Trade Paper) - Bibliography Note
- Includes bibliographical references.
View MARC record | catkey: 37420434