You have come a long way since the first chapter where you learned to assess the online environment in preparation for securing your company’s social media presence. Since then, we have covered a lot of ground, including:
Creating a framework for your security policy through the H.U.M.O.R. Matrix
Identifying threats
Developing strategies and best practices
Creating social media policies and procedures
Implementing monitoring and reporting systems
In this chapter, we explore what you’ve learned and identify some of the challenges that remain.