Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

Wrap Up

Social media security threats should be viewed separately from other IT threats such as virus attacks and hacker attacks; dedicated tools have to be identified and purchased and specific social media budgets developed to manage social media risk correctly. All monetary requirements have to address threats, vulnerabilities, and the cost of response.

The threat assessment process identifies the ease of exploitation, impact, and mitigation tactics necessary to reduce risk. The overall costs of modifying your typical IT security tactics have to be implemented into your budgeting process. Because social media poses a risk of uncontrolled threats, such as customers posting on blogs and Facebook, you have to redefine your acceptable risk standards and shift budgets to reputation management, employee training, and crisis control rather than more traditional direct software and hardware tools. As social media tools and cloud services change almost on a monthly basis, your budgeting process has to be more flexible than the typical yearly cycle of most IT security budgeting processes.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint