Social Media Security
- Length: 346 pages
- Edition: 1
- Language: English
- Publisher: Syngress
- Publication Date: 2013-11-29
- ISBN-10: 1597499862
- ISBN-13: 9781597499866
- Sales Rank: #3817960 (See Top 100 Books)
Social Media Security: Leveraging Social Networking While Mitigating Risk
Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people’s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for “dialing it back” to retake control.
- Defines an organization’s goals for social networking
- Presents the risks present in social networking and how to mitigate them
- Explains how to maintain continuous social networking security
Table of Contents
Chapter 1. What is Social Media?
Chapter 2. Opportunities of Social Media
Chapter 3. Employment and Social Media
Chapter 4. Considerations for setting up Social Media
Chapter 5. Being Bold Versus being Overlooked
Chapter 6. Risks of Social Media
Chapter 7. The Dark Side
Chapter 8. Risk Management
Chapter 9. Policies and Privacy
Chapter 10. Security
Chapter 11. Where do We go from Here?