Read more
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Defend against corporate espionage launched from social networks
Protect your organization from devastating social media attacks with instruction from a team of information security experts.
Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive volume.
- Assess your global social media presence and identify vulnerabilities
- Establish solid security policies at every level of your organization
- Allocate resources for planning, administration, and corrective action
- Monitor usage by employees, clients, competitors, and the public
- Block cyberstalking. phishing, malware, and identity theft exploits
- Guard intellectual property rights, trademarks, copyrights, and logos
- Preserve your brand image using online reputation management tools
Gary Bahadur is the founder and CEO of KRAA Security [www.kraasecurity.com/social-media-security], which protects organizations from threats through a combination of prevention services. He was the cofounder and CIO of Foundstone, Inc.
Jason Inasi is CEO and cofounder of The Factory Interactive {www.thefactoryi.com], a digital design and marketing agency, and president of Inasi Group, an international, multidisciplinary, technology advisory firm.
Alex de Carvalho is vice president of business development and community at VoxMed, cofounder of The Startup Forum, director of social media at Medimix International, and adjunct professor of social media at the University of Miami.
List of contents
Part I: Assessing Social Media SecurityChapter 1. The Social Media Security Process
Chapter 2. Security Strategy Analysis: Foundation of Your Security Policy
Chapter 3. Monitoring in the Social Media Landscape
Part II: Assessing Social Media ThreatsChapter 4. Threat Assessment
Chapter 5. What Can Go Wrong
Part III: Operations, Policies, & ProcessesChapter 6. Social Media Security Policy Best Practices
Chapter 7. Human Resources: Strategy & Collaboration
Chapter 8. Utilization of Resources: Strategy & Collaboration
Chapter 9. Monetary Considerations: Strategy & Collaboration
Chapter 10. Operations Management: Strategy & Collaboration
Chapter 11. Reputation Management: Strategy & Collaboration
Part IV: Monitoring & ReportingChapter 12. Human Resources Monitoring & Reporting
Chapter 13. Utilization Monitoring & Reporting
Chapter 14. Monetary Monitoring & Reporting
Chapter 15. Operations Management Monitoring & Reporting
Chapter 16. Reputation Management Monitoring & Reporting
Part V: Social Media 3.0Chapter 17. Assessing Your Social Media Strategy
Chapter 18. The Future of Social Media Security
Appendix: Resource GuideIndex