Index

A

Acceptable Use Policies, 25

activists. See hacktivists

advertising campaigns

legal compliance issues for, 225–226

rapport with customers in, 212–213

alerts. See also Google Alerts

creating, 289–291

linking log files to, 272

Social Mention, 43, 232–233, 291–293

using for content, 271

American Medical Response of Connecticut (AMRC), 289

analysis. See auditing

Ann Taylor blogging gifts, 143

Anti-Cyber Squatting Protection Act, 247

Apple security leaks, 61–62

applications. See also externally hosted applications

cloud-based, 29, 30

developing and testing internal, 197–198

list of tools, 322–325

managing in-house social media, 110–112

monitoring online mentions, 274–276

next generation of Internet, 312–314

security for externally hosted, 113–116

self-hosted, 110–112, 200–201

ArpON, 96

assessing social media strategies

changes in authentication systems, 306

checking sources, 305

implementing strategies, 303

maintaining reputation management, 307–309

modifying management and policy, 304

reviewing improvements, 298–302

tracking anonymous attacks on brands, 306–307

vigilance in using strategies, 304

assessment. See social media assessment process

assets. See utilization of resources and assets

attacks. See also hacking; hacktivists; negative campaigns

cyberstalking, 96–99, 314

educating employees about, 121–122, 158–159

malware, 242

monitoring potential, 227

social media hacking, 92–94

stealing reality, 94–95

Trojan horse, 115, 122

Twitter attack on Southwest brand, 156–158

auditing

current social media strategies, 18

developing threat landscape, 8

identifying security gaps, 12–13

internal and external controls, 11, 200–202

securing customer data, 11–12

social media initiatives, 10

authentication

applying for in-house social media, 111, 112

changing systems for, 306

requiring e-mail, 99

B

backup and recovery strategies, 38

banning social media at work, 227–228

baseline reputation data, 291–293

best practices. See also social media security policy

evolution of security, 106

sample security policy for, 127–134

Biffano, Pedro Lopez, 314

Bit.ly, 59

BlackSheep, 93–94, 115

blocking intellectual property use, 170

Blogger.com, 209

blogs

copyright infringement on, 199

FTC regulations for, 143–144

military use of, 188–189

searching with Google Blog, 258–259

security policies regarding, 109, 111–112

threats via, 71

unauthorized reprinting of, 238–239

botnets, 74

brand attacks

assessing potential damage of, 86

attempts to ruin brand, 207

by competitors, 317

Domino’s, 204–206, 207

hacking as, 68–69

responding to, 156–159

tracking anonymous, 306–307

types of attackers, 72

brands. See also brand attacks

attempts to ruin, 207

creating management plan for, 191–192

defined, 206

management control rooms for, 150–151, 266–267, 276

monitoring data for, 287

potential loss of control, 315

role of brand evangelists, 152

training employees to advocate, 54

British Petroleum (BP), 4–6

Buckly H. Crispin v. Christian Audigier, Inc. et al, 62

budgets. See also monetary considerations

determining social media, 34–36, 254–255

implementing security with limited, 256–260

improvement checklist for, 264

including social media tools in, 186

security, 34–35

solving security with big, 260–262

Burger King, 223–224

business continuity plans, 38

businesses. See organizations

C

California Highway Patrol (CHP), 284–286

capabilities

assess technical, 28

mapping, 166–167

Catsouras, Nikki, 284–285, 286

CBT training, 263

cease and desist letters, 210–211

Chilling Effects Clearinghouse, 210–211

clickjacking, 68

cloud computing

cloud-based applications, 29, 30

risks in, 38–39

Comcast, 207

communications. See also blogs; content; intellectual property

disseminating policy changes, 280

laws regulating financial, 225–226

safeguarding, 12

telling employees about operating strategies, 193–194

community management

functions across departments, 152–153

resources and tasks in, 150–152

Community Manager

coordinating with other departments, 120–121

directing cross-functional teams, 154

disseminating social media policy, 158–159

hiring and training, 138

interfacing with other departments, 119–120

managing medium company challenges, 148–149

modifying Facebook privacy settings, 147–148

new tasks for, 118–119

organizing policy team, 125

responsibilities of, 144–153

sharing responsibility for Operations Management strategy, 189–190

small business challenges for, 146–148

training, 154–155

updating and managing security policy, 123

using reputation data, 293–294

working with IT, 118–121, 123, 145–146, 155

competitors

brands attacks by, 317

corporate espionage by, 89

monitoring online sentiment for, 13–14

profile as IT attacker, 72

reputation threats from, 83

compliance

ensuring HIPAA, 225, 226–227

Human Resources responsibilities for, 222, 225–227

reviewing laws effecting operations, 199–200

confidentiality breach

defined, 110

focusing monitoring on, 227

occurrences of, 195

content

alerting systems for, 271

contacting owners of damaging web, 208

lifespan of social media, 207, 285

longevity of negative, 207

removing from Web, 207, 208–210

control of brand message, 315

controls

auditing internal and external, 200–202

cost of implementing application, 182–184

directing keyword search engine results, 211

resource security, 163–164

Cooks Source magazine, 238–239

copyrights

assessing company’s, 27, 31–32

educating employees in, 173–175

fair use doctrine and, 175

improvement checklist for, 175

managing and protecting, 248–249

measuring protection of, 33

threats to, 81, 89

tracking loss of copyrighted material, 171–173

utilization categories for, 240

corporate espionage, 89, 315

corporations. See organizations

“Cost of a Data Breach” (Ponemon Institute), 178–180

Creative Commons, 171, 174

crisis management, 216

customers

establishing rapport with, 212–213

monitoring, 48, 49

reputation threats from, 83

reviewing comments with Google search, 50–51

threats to corporate social media by, 73

cyberstalking

corporate, 97–99

defined, 96

forms of, 96–97, 314

D

dangers of social networks

cyberstalking, 96–99, 314

defenses against, 99–100

example of Firesheep hacking, 92–94

logon from unsecured networks, 92–93, 96, 197

personal security and data scraping, 100–102, 317

stealing reality, 94–95

data. See also data loss

checking online sources, 305

correlating employee, 99

data scraping, 100–102, 317

developing comparative reputation, 291–293

false, 89

future risks for, 315–316

keeping usage trend tracking patterns, 271–272

learning to protect customer, 142–143

levels of security for, 173

maintaining log files, 272–273

methods for protecting, 270–273

storage of, 37–38

tools for monitoring, 243–245

vulnerability of social media, 102

data devaluation, 75

data loss

from attacks, 82

cost study on breached data, 178–180

costs of, 180–182

DLP tools, 162, 163, 270–273

preventing intellectual property, 170–173

tracking, 171–173

Data Loss Cost calculator, 181, 183

Data Loss Prevention (DLP) tools, 162, 163, 270–273

Data Protection Acts, 239

data scraping, 100–102, 317

data storage

developing backup and recovery strategies, 38

understanding where social media activity stored, 37–38

DataLossDB.com, 180

defamation

about, 88

claims by employee of, 109

focusing monitoring on, 227

requesting content removal in, 208–210

Dell, 266–267

denial of service, 111

Digital Millennium Copyright Act, 247

discrimination claims, 109

documenting policies, 263

Domino’s, 204–206, 207, 309

downtime from attacks, 82

E

e-mail cyberstalking, 99

E-SIGN Act, 226

education. See training

Electronic Communications Privacy Act, 239

employees. See also firing employees; monitoring employees; training

blocking access for terminated, 196

checking on prospective, 230–231

codes of conduct and media use for, 21, 25, 117–118

communicating operating strategies to, 193–194

criticizing employers online, 241

dedicating to monitoring media, 53–54

digital literacy training for, 32

educating in social media risks, 102

empowering to use social media, 54

identifying regulations and requirements for, 141–144

learning to protect customer data, 142–143

least-privilege access for, 196

outlining security policies for, 109–110

privacy rights of, 195, 224–225, 239

profile as IT attacker, 72

reputation management in posts of, 288–289

reputation threats from, 83

running background checks on social media for, 222

stalking company, 98

teaching PCI standards, 141–142, 173

threats to security from, 81, 276

tracking social media usage, 279–281

training, 121–122, 155–159, 263

use of new social media tools, 278, 309

where to monitor, 240

encryption, 114–115

enforcing

social media policies, 170–171

strong passwords, 112

externally hosted applications. See also Facebook; Twitter

auditing controls on, 13–14, 201–202

costs of implementing controls on, 182–184

lack of control over, 108

managing security for, 113–116

policy checklist for, 115–116

F

F-Secure, 115

Facebook

accessing and modifying privacy settings for, 147–148

cyberstalking on, 97, 314

downloading information from, 191

Firesheep hacking on, 92–94

hacking of, 18–19

managing in-house security for, 113–116

protecting against malware installations on, 165

risks associated with, 59

fair use doctrine, 175

Federal Electronic Communications Privacy Act, 246

Federal Trade Commission (FTC)

enforcing social media use, 143

Safeguard Rules, 269

financial loss from social media attacks, 81–82

Firesheep, 92–94, 115

firing employees

media postings as grounds for, 139, 223–225, 230

Termination policy for, 25, 80

using social media to build case for, 230

Fox News hacking incident, 68–69

free security tools, 254, 322–325

Frogloop tool, 182, 183

future trends

competitor’s brand attacks, 317

defenses for, 319

erosion of privacy, 316

geolocation targeting, 316

inconsistent international regulations, 318–319

loss of control, 315

next generation of Internet applications, 312–314

ownership of social media data, 317–318

product and data threats, 315

threats, 314–319

G

Gatorade, 150–151

geolocation targeting, 316

Gismodo, 61–62

Global Brain, The (Russell), 314

Google Alerts

about, 87, 256–257

creating, 289–290

setting up, 55

uses for, 249–250, 252

Google Blog searches, 258–259

Google Insights for Search, 259–260

Google Trends, 257–258

Gramm-Leach-Bliley Act (GLBA), 269

H

hacking. See also hacktivists

impact of Zynga, 28

MasterCard, 48–49

political, 68–69

profile of hackers, 72

Zuckerberg’s Fanpage, 18–19

hacktivists

about, 68–69

reputation threats from, 83

retaliating against MasterCard, 48–49

HBGary Federal, 307

HIPAA (Health Insurance Portability and Accountability Act)

data loss and, 180

ensuring compliance with, 225, 226–227

handling violations of, 79–80

operational monitoring of, 269

training employees in, 173

hiring

Community Manager, 138

running social media checks before, 222, 230–231, 239

historical reputation data, 291–293

HowSociable, 275

HTTPS Everywhere, 114–115

Hulme, George V., 276

Human Resources department. See also Community Manager; firing employees; monitoring employees; training

assessing social media plans, 10

banning social media at work, 227–228

basing worker’s termination on monitoring, 230

checking on prospective employees, 222, 230–231, 239

compliance responsibilities for, 225–227

creating public policy, 235

defining Community Manager role, 144–146

developing social media training, 153–159

disseminating social media policy, 158–159

employment laws and social network profiles, 154

examples of unleveraged, 5

focus of monitoring, 227

hiring and training Community Manager, 138

H.U.M.O.R. matrix for, 9, 299

identifying employee regulations and requirements, 141–144

impact of policies on security, 25

improving monitoring, 235–236

information gathering phase for, 24

inventory of assets and tools in, 11

JAG’s improvements in, 140–141, 299

key challenges of, 138

monitoring by, 223–225

postings and firing of employees by, 139, 223–225

providing employee media guidelines, 117–118

role in security, 21, 124

setting social media security policies, 21–23

setting up monitoring requirements, 232–234

threat assessment for, 80–81

working with Community Manager, 118, 119

Human Resources Matrix, 9, 299

H.U.M.O.R. matrix. See also specific matrix components

assessing security with, 19–20, 26–27

assessing strategies with, 15

defined, 9

Human Resources Matrix, 9, 299

measuring improvement with, 298–302

Monetary Considerations Matrix, 9, 35–36, 301

Operations Management Matrix, 40

Reputation Management Matrix, 9, 44, 290, 302

threat assessment using, 80–85

Utilization of Resources Matrix, 9, 27–33, 300

I

ICANN’s Uniform Domain Dispute Resolution Policy, 247

IceRocket, 42

identity theft

social media and possibility of, 7

steps for countering, 100

threat of, 90, 315

impersonation, 75, 90

implementing social media strategies

adapting to changing authentication systems, 306

challenges in, 303

checking sources, 305

dealing with changes, 304

improvement checklists

assessing social media, 15

budgeting process, 264

employee use of social media, 102

intellectual property and copyright protection, 175

monitoring, 235–236, 252

online reputation management, 63, 294

operations, 202, 281

reputation, 217–218

security strategy analysis, 45

social media security policy, 135

threat assessment, 90

incident management

managing crises, 216–217

steps in, 249–251

types of, 249

violations of intellectual property, 247–248

inconsistent regulations, 318–319

Information Technology department. See IT department

infringement of copyrights

assessing policies on, 27

protection of blogs, 199

instructor-led training, 263

intellectual property. See also blogs; content; copyrights

assessing company’s policy on, 27

creating management plan for, 191

determining risks to, 30–31

improvement checklist for, 175

measuring protection of, 33

monitoring, 246–248

ownership of social media data, 317–318

preventing loss of, 170–173

technologies protecting, 31

theft of, 247–248

threat assessment for, 81

utilization categories for, 240

Internet. See also social media; websites

credibility of online data, 305

inconsistent international regulations for, 318–319

Internet Protocol version, 6, 313

next generation of applications, 312–314

inventory of technology, 28, 166

IT (Information Technology) department

analyzing security for, 10

assessing risks of cloud resources, 38–39

creating technology assessment, 27, 28–30

defenses against social network dangers, 99–100

detecting threats in social media, 70

determining social media budget from, 34–36

evaluating and setting social media policies, 22–23

impact of policies on security, 25

information gathering phase for, 24

inventory of assets and tools in, 11

participating in copyright protection, 171–173

protecting data, computers, and laptops, 190–191

providing network management plans, 194–195

restrictions protecting networks, 95–96

safeguarding communications, 12

securing customer data, 11–12

sharing operations responsibility, 189–190

working with Community Manager, 118–121, 123, 145–146, 155

J

JAG Consumer Electronics

about, 19–20

baseline monitoring by, 233–234

budgeting at, 255

evaluating use of technology, 165–169

expense of implementing controls, 182–184

Human Resources improvements by, 140–141

implementing operational guidelines at, 267–268

improving reputation management for, 288

incident management for, 249–251

information gathering phase for, 24

measuring utilization of resources and assets, 32–33

Monetary Considerations Matrix for, 35–36

monitoring customers of, 49

Operations Management Matrix for, 40–41, 189

Reputation Management Matrix for, 44, 290, 302

reviewing improvements in strategies, 298–302

social media security policy for, 108

threat assessment for, 69

upgrading capabilities at, 246

using H.U.M.O.R. matrix for, 19–20, 26–27

K

Knowem, 191

L

laws. See also copyrights; regulations

applying to monitoring, 246–247

effecting operations, 199–200

impacting social media, 225–226

inconsistent Internet regulations, 318–319

social network profiles and employment, 154

state intellectual property, 247

leaks, 48, 61–62

least-privilege concept, 196

Legal department. See also laws

influencing security policies, 25

information gathering phase for, 24

inventory of assets and tools in, 11

laws affecting corporate operations strategy, 199–200

participating in responses to threats, 63

steps for protecting reputation, 210–211

libel, about, 88

Lithium, 262

location-based services

cyberstalking using, 97–98, 314

malicious uses of data scraping, 100–102, 317

monitoring, 57–58

risks of geolocation targeting, 316

threats to, 89

log files, 272–273

logons from unsecured networks, 92–93, 96, 197

logos, 206

Lord, Bob, 147

M

malicious applications

challenges of stopping, 68

data scraping, 100–102, 317

Trojan horse applications, 115, 122, 165

Marketing department

dealing with crises, 42–44

defining Community Manager role, 144–146

determining social media budget for, 34–36

establishing rapport with customers, 212–213

impact of policies on security, 25

information gathering phase for, 24

managing leaks, 61–62

participating in copyright protection, 171–173

re-using material posted in social media, 174

reviewing social media platforms for, 10

working with Community Manager, 118, 123

MasterCard, 48–49

McNeil Consumer Healthcare, 212

meetup threats, 72

MentionMap, 145

MerchantCircle, 254

microblogging threats, 72

mobile devices. See also location-based services

collecting data from, 317

threats via, 72

monetary considerations

assessing potential damage, 86

budgeting improvement checklist, 264

budgets for social media, 34–36, 254–255

calculating costs of data loss, 180–182

cost savings of social media, 313

costs of data breaches, 178–180

evaluating threats and countermeasure costs, 184–185

expense of implementing controls, 182–184

finding free security resources, 254, 322–325

H.U.M.O.R. matrix for, 9, 35–36, 301

impact of BP’s oil spill, 5

implementing security with limited budget, 256–260

role in security policy, 124

solving security with big budgets, 260–262

threat assessments and, 81–82

training costs, 263

Monetary Considerations Matrix, 9, 35–36, 301

monitoring. See also monitoring employees

about, 48, 222

choosing what to monitor, 240

creating baseline requirements for, 232–234

credibility on social media, 54

customer comments, 50–51

data for brands, 287

developing reporting metrics for resources and assets, 251–252

focus of, 227

how to accomplish, 241

improving, 235–236

intellectual property, 170, 171, 246–248

legal limits of, 224

limitations of, 95

location-based services, 57–58

online reputation, 62–63, 289–291

paid services for, 260–262

problems for, 51–53

third-party services for, 126

tools for, 55–58, 243–245

types of operations, 268–269

using URL filtering, 99, 242

who to monitor, 239

monitoring employees

checking on prospective employees, 230–231

firing employees based on postings, 139, 223–225, 230

monitoring operational risks, 37

tracking employee usage, 279–281

use of social media, 48, 58–61, 199–200, 228–229, 239–241

when to monitor employees, 241

where to monitor employees, 240

N

National Association of Securities Dealers (NASD), 269

National Institute of Standards and Technology (NIST) standards, 106

National Labor Relations Act, 247

National Labor Relations Board (NRLB), 289

National Vulnerability Database, 121

negative campaigns

against Nestlé, 31–32, 60–61, 207

effect on United Airlines stock, 41

erroneous claims on Taco Bell fanpage, 54

hacking of Facebook, 18–19

launched against Wal-Mart, 50–51, 52

MasterCard hacking incident, 48–49

sentiment against Groupon, 43

Southwest Airlines, 156–158, 207

when to combat, 53–54

Nestlé, 31–32, 60–61, 207

network management plans, 194–195

nonprofits. See organizations

O

online reputation management (ORM)

applying to employees, 288–289

case study in, 284–286

checklist for improving, 294

defined, 286

developing comparative data for, 291–293

improving JAG, 288

issues in, 284

maintaining, 307–309

proactive role in, 319

services for, 262, 286–287

setting up monitoring systems, 289–291

using reputation data, 293–294

open source applications, 29, 38–39

Open Source Vulnerability Database, 121

Operation Payback, 48

operations. See also Operations Management strategy

about strategies for, 188

alerting systems for content, 271

assessing operational risks, 37–38, 86

criticism of BP’s, 6

Dell’s policies for, 266–267

disseminating policy changes, 280

H.U.M.O.R. matrix for, 9, 40, 301–302

improvement checklist for, 202, 281

including employee monitoring in, 276–278

information gathering about, 39–40

maintaining log files, 272–273

methods for data loss protection, 270–273

military uses of social media, 188–189

monitoring for, 266, 268–269, 274–276

risks in cloud or open source technologies, 38–39

role in security policy, 124

staying up with social media news, 280–281

threat assessment to, 82

tools for monitoring and managing, 273–278

tracking employee usage, 279–281

usage trend tracking patterns, 271–272

Operations Management Matrix, 9, 40, 301–302

Operations Management strategy

about, 189

access to software tools, 195–197

auditing internal tools and social media, 200–201

communicating operating strategies, 193–194

creating asset management plan, 190–192

developing and testing internal applications, 197–198

improving, 202

laws affecting, 199–200

maintaining physical security, 193

network management plans, 194–195

providing security awareness training, 192–193

roles and responsibilities for, 189–190

organizations

analyzing social media risks, 8, 9–13, 76, 77

assessing copyright safety, 27, 31–32

assigning policy team for, 125

best defense for future trends, 319

budgeting for security, 34–35

business continuity plans for, 38

calculating costs of data loss, 180–182

challenges to medium-sized, 148–149

combating negative campaigns, 53–54

coordinating security policy components for, 116–117

corporate cyberstalking against, 97–99

costs of implementing controls, 182–184

creating own social network, 213–215

crisis and incident management for, 216–217

evaluating technology use, 165–169

evaluating threats and response costs, 184–185

identifying social media security gaps, 12–13

implementing policies for large, 149–153

in-house support services for social media, 38

influence of social media on, 312–314

internal security threats in, 58–61

learning collaborative use of resources, 164–165

maintaining credibility in social media, 54

managing reputation attacks, 204–206

media challenges in small business, 146–148

operational assessments for, 36–41

physical security in, 193

protecting data and computer equipment, 190–191

questions about operations, 39–40

responding to threats, 68, 76–80, 83, 86–88

reviewing current practices, 21–23

securing customer data, 11–12

writing security policy guidelines, 107

ORM. See online reputation management

ownership of social media data, 317–318

P

passwords

defending user, 99

easy-to-hack, 98, 102

enforcing use of strong, 112

managing company Facebook account after terminating employee, 196

PCI (Payment Card Industry) standards, 141–142, 173, 269

personal information, data available on social media, 98, 99

Pew Internet & American Life Project, 319

phishing

about, 75

educating employees on, 122

steps for countering, 100

physical security considerations, 193

Pirsig, Robert, 212

plagiarism checkers, 171, 172, 248–249

policies. See also social media security policy

developing public, 235

disseminating changes in, 280

employee Acceptable Use, 25

Human Resources management of public, 235

policy mapping, 28, 167–169

Ponemon Institute, 178–180

postings

firing employees based on, 139, 223–225

managing company reputation in employee, 288–289

tools for monitoring public, 185

pretexting, 122, 224

privacy

collection of device data, 317

corporate rights to, 61–62

countering identity theft and phishing attacks, 100

crossing the line in employee monitoring, 224–225

future erosion of, 316

handling violations of HIPAA, 79–80

SEC guidelines for financial advisors, 269–270

securing customer data, 11–12

social media and lack of, 7, 101–102

training employees to protect customer, 142–143

when using company-provided computers, 195, 239

products. See also brands

future risks for, 315

losing control of brand message, 315

public. See also customers

managing policy for, 235

monitoring, 48

public relations

dedicating to monitoring media, 53–54

Nestlé’s misstep in, 31–32, 60–61

R

Radian6, 261

registering brand name, 192

regulations

assessing standards and risks for, 37

effecting financial communications, 225–226

FTC blogging, 143–144

identifying employee-specific, 141–144

inconsistent international, 318–319

types of regulatory breaches, 109

remediation, 308–309

reporting

developing metrics for resource, 251–252

importance of social media, 308

managing IP data loss with, 170

requesting SAS 70 reports, 193, 198

reputation. See also online reputation management

about, 41, 204

assessing and managing, 41–44, 83–85, 207–208

attacks on brand equity, 204–207

contacting post authors and domain owners about content, 208

controlling keyword search engine results, 211

creating own social network, 213–215

damage to BP’s, 6

detecting fake profiles, 56–57

developing comparative data on, 291–293

effect of hacking on MasterCard, 48–49

example of damage to, 284–286

H.U.M.O.R. matrix for, 9, 44, 290, 302

improvement checklist for, 217–218

incident management for, 216–217

influence of disparaging videos on, 71

legal recourse to protect, 210–211

managing crises, 216

monitoring brand equity, 287

monitoring online, 13–14, 50–51, 55–58

paid monitoring services for, 262, 286–287

qualitative approaches to managing, 212

registering brand name, 192

requesting content removal, 208–210

security policy and protection of, 124

Reputation Management Matrix, 9, 44, 290, 302

Reputation.com, 262

resources. See utilization of resources and assets

response plans

creating for security policies, 125–126

developing to social media threats, 86–88

requirements needed for, 308

training employee responses to brand attacks, 156–159

Russell, Peter, 314

S

Salesforce.com, 313

sample social media security policy, 127–134

SAS 70 reports, 193, 198

search engine optimization, 211

Securities Exchange Act, 226

Securities Exchange Commission (SEC), 269–270

security. See also privacy; security strategy analysis; social media security policy

analyzing IT, 10

assessing operational risks, 37–38

changes introduced by social media, 6–7

considering organization’s physical, 193

corporate budget for, 34–35, 256–262

easy-to-hack passwords, 98

employee threats to, 276

evolution of best practices, 106

finding free resources for, 254, 322–325

impact of social media policies on, 25

importance of user education for, 173–175

internal threats to, 58–61

issues for large organizations, 152

IT defenses against social network dangers, 99–100

levels of data, 173

measuring with H.U.M.O.R. matrix, 19–20, 26–27

monitoring customers for, 52–53

as moving target, 304, 309

protecting user sessions, 96

responding to unintended information leaks, 61–62

safeguarding communications, 12

Threat Management Lifecycle, 76–79

Security Director, 121

security strategy analysis

evaluating human resource policies, 21–27

improvement checklist for, 45

monetary considerations, 34–36

reputation management, 41–44

reviewing use of resources and assets, 27–33

understanding operational risks, 36–41

using H.U.M.O.R. matrix for, 19–20

self-hosted applications, 110–112, 200–201

sessions

managing in-house social media, 111

protecting user, 96

Sherrod, Shirley, 71

slander, 88

Smith, Kevin, 156–158, 207

Social Development Ministry Authority of Auckland, 139

social media. See also social media assessment process; social media security policy; and specific media

assessing current policies for, 10, 21–23

available information on, 97–99

background checks using, 222, 230–231, 239

banning at work, 227–228

budgets for, 34–36, 254–255

building termination case with, 139, 223–225, 230

changing security, 6–7

collaborative use of, 164–165

content lifespan on, 207, 285

costs of controls for, 182–184

creating own, 213–215

data devaluation via, 75

detecting fake profiles, 56–57

empowering employees to use, 54

enabling encrypted communications for, 114–115

identifying security gaps in, 12–13

impact of policies on securing, 25

in-house support services for, 38

laws impacting, 225–226

list of tools, 322–325

logon from unsecured networks, 92–93, 96, 197

military use of blogs, 188–189

monitoring use of, 58–61, 199–200, 228–229

need for security with, 4

online publications about, 280–281

ownership of data on, 317–318

policy checklist for, 115–116

qualitative approaches to reputation management, 212

re-using material posted in, 174

requesting SAS 70

reports, 193, 198

responding to brand attacks on, 156–159

social networking worms, 73–74

stopping malicious apps in, 68

understanding where stored, 37–38

URL filtering of, 99, 242

violations of privacy, 7

worms in, 73–74

social media assessment process

creating competitive analysis, 13–14

developing organizational analysis, 8, 9–13

improvement checklist for, 15

steps in, 7–8, 15

using H.U.M.O.R. matrix, 9, 15

social media control rooms, 150–151, 266–267, 276

social media security policy, 106–135

addressing “what if” scenarios, 61–62

applying H.U.M.O.R. Matrix to, 123–124

characteristics of effective, 108

codes of conduct and use, 117–118

coordinating components of, 116–117

Dell’s, 266–267

detailing for in-house social media, 110–112

determining response to, 125–126

developing, 125–126

developing public policy in HR, 235

disseminating changes in, 280

employee security training, 121–122

enforcing, 170–171

evolution of best practices, 106

identifying employee regulations and requirements, 141–144

improvement checklist for, 135

managing externally hosted applications, 113–116

measuring improvements in, 298–302

putting in place, 100

regulatory and legal requirements, 109–110

role of Community Manager in, 118–121

sample, 127–134

types of employees addressed, 138

UAE guidelines for, 107

updating and managing, 123

Social Mention, 43, 232–233, 291–293

social profiles

data scraping of, 100–102, 317

detecting fake, 56–57

employment laws and, 154

SocialCast, 233

SocialGO, 213–214

sock puppets, 188

Southwest Airlines, 156–158, 207

Sprout Social, 286, 287

spyware, 68

St. Mary’s Hospital, 180–182

stealing reality, 94–95

T

Taco Bell, 54, 309

TCP session hijacking, 95

teams

developing social media, 153–154

directing cross-functional, 154

organizing policy, 125

technology. See also tools

application risks to assess, 29

assessing needs for, 27, 28–30

changing, 89

evaluating organization’s use of, 165–169

measuring utilization of resources, 32–33

needed by Community Manager, 144–145

protecting intellectual property, 31

security threats of new social media tools, 278

threat assessments of, 81

types of monitoring tools, 55–58, 243–245

URL filtering, 99, 242

using paid monitoring services, 260–262

utilization categories for, 240

Telephone Consumer Protection Act, 225

Telephone Records and Privacy Protection Act, 224

Termination policy, 25, 80

testing internal applications, 197–198

theft

identity, 7, 90, 100, 315

types of intellectual property, 247–248

third-party services

monitoring services, 126, 274–275

reputation management, 286–287, 290

Threat Management Lifecycle, 76–79

threats. See also dangers of social networks; data loss

about, 68

analyzing corporate risks, 76, 77

assessing potential damage, 68, 85–86

assessing with H.U.M.O.R. matrix, 80–85

attacks by competitors, 317

defined, 8

employee security, 276

erosion of privacy, 316

evaluating countermeasure costs, 184–185

evolving nature of, 314

example of threat management, 79–80

future trends for, 314–319

geolocation targeting, 316

identifying, 70–72, 76, 77

improving assessment of, 90

inconsistent regulations as, 318–319

loss of control as, 315

ownership of social media data, 317–318

potential attackers, 72

product and data threats, 315

responding to, 77, 86–88

Threat Management Lifecycle, 76–79

types of, 73–75, 88–90

tools

auditing internal and external, 200–201

available on limited budget, 256–260

budgeting for social media, 186

data logging, 273

Data Loss Prevention, 162, 163, 270–273

determining access to software, 195–197

employees’ use of new social media, 278, 309

Frogloop, 182, 183

Knowem, 191

list of social media, 322–325

MentionMap, 145

monitoring online reputation, 14, 55–58, 232–233

needed by Community Manager, 145–146

plagiarism checkers, 171, 172, 248–249

services for big budgets, 260–262

types of monitoring, 243–245

using URL filtering, 99, 242

trademarks, 5, 89

training

about intellectual property policies, 170

brand advocates, 54

community managers, 154–155

developing strategies for, 153–154

digital literacy, 32

employees, 155–159

essential in resource security, 164

HIPAA standards, 79–80, 173

need for digital literacy, 32

protection of customer data, 142–143

responses to brand attacks, 156–159

security and security awareness, 121–122, 192–193

teaching PCI standards, 141–142, 173

users to recognize Trojan horse attacks, 122

Traverse Legal website, 7

Trojan horse

educating employees on, 122

installing from Twitter message, 115

protecting against, 165

Truth-in-Lending/Truth-in-Savings Acts, 225, 226

Twitter

inappropriate use of, 162–163

managing in-house security for, 113–116

threats from tweetups, 72

Trojan installations from message in, 115

TwitJobSearch, 231

U

Unfair and Deceptive Acts or Practices Act, 225

United Airlines, 41

United Arab Emirates (UAE), 107

updates, monitoring security of new software, 146

URLs

displaying long or short, 59

filtering, 99, 242

hijacking with embedded malware, 59

usage trend tracking patterns, 271–272

users

stealing reality from, 94–95

threats to corporate social media by, 73

validations defending, 99–100

utilization of resources and assets. See also intellectual property about, 162

assessing technology needed, 27, 28–30

case study in mishandled content, 238–239

collaborating for, 164–165

copyright protection, 27, 31–32, 248–249

creating reporting metrics for, 251–252

detecting intellectual property theft, 247–248

educating employees in, 173–175

H.U.M.O.R. matrix for, 9, 27–33, 300

inappropriate use of resources, 162–163

incident management steps, 249–251

intellectual policy in, 27, 30–31

measuring, 32–33

preventing data loss, 170–173

reviewing use of, 27–33

role in security policy, 124

safeguarding trademarks, 5

security controls for, 163–164

technology mapping steps, 28, 165–169

threat assessments of, 81

types of, 27

Utilization of Resources matrix, 9, 27–33, 300

V

videos

firing after posting defamatory, 223–225

threats via, 71

vulnerabilities

of social media data, 102

tracking, 121

W

Wal-Mart, 50–51, 52

Webcopyplus, 31

websites

Google searches monitoring customer comments, 50–51

list of social media tools, 322–325

requesting content removed from, 208–210

web scraping of, 74

WikiLeaks, 48, 62

Wikipedia, 209–210

WordPress

checking for updates on, 146

manual security updates for, 149, 150

as open-source application, 29

Y

Yahoo! Pipes, 55–56, 57

Yorktown School District case, 223

Z

Zen and the Art of Motorcycle Maintenance (Pirsig), 212

Zynga, 28

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset