Cover image for Social Media Security : Leveraging Social Networking While Mitigating Risk.
Social Media Security : Leveraging Social Networking While Mitigating Risk.
Title:
Social Media Security : Leveraging Social Networking While Mitigating Risk.
Author:
Cross, Michael.
ISBN:
9781597499873
Personal Author:
Physical Description:
1 online resource (347 pages)
Contents:
Front Cover -- Social Media Security -- Copyright Page -- Contents -- Acknowledgements -- About the Author -- About the Technical Editor -- 1 What is Social Media? -- What is social media? -- Understanding social media -- Different types and classifications -- Collaboration -- Blogs -- Content communities -- Social networking sites -- Virtual worlds -- Sites that fall under multiple classifications -- The value of social media -- Value can be found in the potential -- Mobile social media -- Cutting edge versus bleeding edge -- Dealing with the "is it a fad?" question -- Brief history of social networking -- The problems that come with social media -- Is security really an issue? -- Taking the good with the bad -- Bibliography -- 2 Opportunities of Social Media -- Opportunities of social media -- New methods of marketing to customers -- Branding -- Building social authority -- Engaging customers -- FOMO -- Sharing information -- Knowing what NOT to say -- Getting the word out -- COBRAs -- eWOM -- Hashtags -- Missing the mark … mistakes in responding to people -- Taking advantage of collective intelligence -- Bibliography -- 3 Employment and Social Media -- Employment and social media -- Using social media to find employees -- Candidate screening -- Asking for a prospective or current employee's password -- Legal issues -- Using social media to find employment -- Getting referrals -- Branding yourself -- LinkedIn -- Endorsements and recommendations -- Creating a custom URL on LinkedIn -- Getting the word out -- Limiting personal information -- Adding too much additional information -- Public profiles -- Passwords -- Your password may have already been compromised -- Hacking 101 -- Securing other settings on LinkedIn -- Employees using social media -- Allowing social media in the workplace -- Bibliography.

4 Considerations for setting up Social Media -- Considerations for setting up social media -- Why are we doing this? -- Requirements gathering -- What is the place of social media in your organization? -- Is it really needed? -- How will it be used? -- How will it not be used? -- Identifying your audience -- Younger audiences -- Internet versus intranet -- What's being said about your brand? -- Monitoring conversations -- Making the right decisions early -- Setting corporate goals -- Getting the right people together -- Remembering technology in the equation -- Nonwork computers -- Shortened URLs and related risks -- Examine suspicious URLs -- Using centralized corporate accounts and email -- Identifying how you'll represent yourself on the Internet -- Approved representatives -- Preexisting accounts -- Privacy -- Some privacy concerns in using social media -- Training and policy -- Bibliography -- 5 Being Bold Versus being Overlooked -- Being bold versus being overlooked -- Good social media campaigns -- Bad social media campaigns -- Sometimes it's better to be overlooked -- Social media hoaxes -- The human factor -- The oops factor -- Acronyms and abbreviations in messaging -- Netiquette -- Don't feed the trolls -- Content management -- Stale and outdated content -- Following trends -- Linking content across different sites -- Linking twitter to linkedin -- Linking your twitter account to facebook -- Linking your facebook page to twitter -- Adding internet social media content to a web page -- Censorship -- Censorship by country -- Self-censorship -- Censoring your pages and blogs -- Humor -- Promotion of social media -- Contests -- Directories -- Not everyone is on the internet -- Bibliography -- 6 Risks of Social Media -- Risks of social media -- Sources of risk -- Public embarrassment -- The content you post can and will be held against you.

Divorce cases and social media -- Removing videos from YouTube -- Removing photos and tags that others post on Facebook -- Removing posts on Facebook -- Hiding content -- Reporting abuse -- Once it's out there, it's out there -- False information -- Misrepresenting yourself -- Misrepresenting your business -- False information isn't necessarily bad -- Information leakage -- Be clear about what's private -- Providing too much information -- WikiLeaks -- Corporate espionage -- Retention and archiving content -- eDiscovery -- Backing up social media -- Archive Facebook -- Archive Twitter -- Multisite third-party tools -- Other tools for individual sites -- Loss of data/equipment -- Selling and recycling equipment -- Wiping hard disks -- Lost or stolen phone/tablet -- Backup and restore -- Using windows backup -- Web-based solutions -- Backing up a cell phone or tablet -- Personal data or equipment -- BYOD -- Bibliography -- 7 The Dark Side -- The dark side of social media -- Cybercrime -- Scams -- Using secure browsing -- Cyberstalking -- Protecting yourself -- Cyberbullying -- Cybersex and other intimate issues -- Romance scams -- Chat rooms -- Blocking chat in Facebook -- Cybersex -- Sexting -- Fake photos and video -- Explicit content on social media sites -- Explicit content of yourself or loved ones -- Predators -- Monitoring tools -- Social engineering -- Dumpster diving -- Phishing -- Fake sites -- Fake sites for purposes other than phishing -- Fake or shortened URLs -- Norton Safe Web -- Anti-phishing protection in browsers -- Hacked accounts -- An example of how hacking works -- Protecting yourself -- Defaced sites -- Keeping track of who's logged on -- Trusted contacts -- Bibliography -- 8 Risk Management -- Risk management -- Assessing risks -- Sources of risk revisited -- Laws and regulations -- Privacy policies and terms of service.

Sarbanes-Oxley act -- Health insurance portability and accountability act -- Fair information practice principles -- Payment card industry data security standard -- Digital millennium copyright act -- Removing content from Google -- Intellectual property and trademark infringement -- Discrimination -- Defamation -- Harassment -- Insurance -- Forensics -- Digital forensic software -- Don't delete messages -- Reverse lookups -- Finding the approximate geographic location -- Using Facebook -- Acquiring information from social media sites -- Police use of social media -- Incriminating yourself -- Defending yourself online -- Outdated content -- Direct use of social media to solve crimes -- Malware, viruses, and exploit distribution -- Scareware/ransomware -- Baiting -- Browser hijacking -- Protecting yourself from backdoors and exploits -- Protecting yourself from viruses and malware -- Bibliography -- 9 Policies and Privacy -- Policies -- Pros and cons -- Creating a policy -- Online social behavior -- Enforcing policies -- Getting people to read it -- Policies affected by social media -- Acceptable use -- Antidiscrimination and antiharassment -- Confidentiality -- Intellectual property -- Records retention -- Moonlighting -- Noncompete and nonsolicitation agreements -- Code of conduct and ethics -- How not to report a violation -- Privacy -- Your own worst enemy -- What friends say about you -- Using Facebook lists -- Create new lists -- Restricted list -- Restricting who can see your Facebook posts -- Limiting past posts -- Restricting who can see your friends and who you follow -- Protecting your tweets -- Checking the risk of a site -- Blocking sites through the browser -- Parental control software -- Blocking users -- Blocking users on Facebook -- Unblocking users -- Blocking invites -- Blocking users on Twitter -- Blocking users on YouTube.

Blacklisting users on WordPress -- Controlling app privacy -- Managing apps on Facebook -- Checking the privacy of apps before you install -- Removing apps -- Blocking apps in Facebook -- Unblocking apps -- Location awareness -- Being aware of your location and situation -- Location-based social networks -- Removing location information from Facebook -- Removing location information from Twitter -- Hiding events -- Privacy of photos -- Geotags -- Bibliography -- 10 Security -- Security -- Keeping track of accounts -- Security reviews -- Security strategies -- Fake accounts -- Brandjacking -- Brandjacking as part of an attack -- Defensive profiles to prevent impersonation -- Reporting fake accounts on Facebook -- Reporting inappropriate profiles on LinkedIn -- Passwords -- Bad passwords -- Good passwords -- Hacking 101 -- Verification for password resets -- Protecting your account with two-step verification -- Privacy and information sharing -- Locking down personal information -- Contact information on Facebook -- Basic information on Facebook -- Likes on Facebook -- Privacy shortcuts -- Doxxing -- Doxxing 101 -- The human flesh search engine -- Facebook graph search -- Controlling exposure to search in Facebook -- Content security -- Preapproving or turning off comments -- Stop people from posting on your timeline -- Controlling what others see -- Controlling tags -- Hiding sections of a timeline -- Seeing through the eyes of others -- Bibliography -- 11 Where do We go from Here? -- Where do we go from here? -- The pitch, the promise, and the reality -- Who's in charge here? -- Accountability -- Accountability in a crisis -- Governance -- Developing plans, policies, and guidelines -- The scope of making decisions -- Reviewing membership -- Clear and understandable roles -- Crisis management -- Continuity planning -- Monitor social media.

Reading is fundamental.
Abstract:
Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis). However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control. Defines an organization's goals for social networking Presents the risks present in social networking and how to mitigate them Explains how to maintain continuous social networking security.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: