Cargando…

How to Use Web 2.0 and Social Networking Sites Securely

Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure t...

Descripción completa

Detalles Bibliográficos
Autor principal: Team, ITG Research
Lenguaje:eng
Publicado: IT Governance Publishing 2009
Materias:
Acceso en línea:http://cds.cern.ch/record/1415421
_version_ 1780924030613716992
author Team, ITG Research
author_facet Team, ITG Research
author_sort Team, ITG Research
collection CERN
description Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected.
id cern-1415421
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2009
publisher IT Governance Publishing
record_format invenio
spelling cern-14154212021-04-22T00:39:24Zhttp://cds.cern.ch/record/1415421engTeam, ITG ResearchHow to Use Web 2.0 and Social Networking Sites SecurelyComputing and ComputersGiven the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected.IT Governance Publishingoai:cds.cern.ch:14154212009
spellingShingle Computing and Computers
Team, ITG Research
How to Use Web 2.0 and Social Networking Sites Securely
title How to Use Web 2.0 and Social Networking Sites Securely
title_full How to Use Web 2.0 and Social Networking Sites Securely
title_fullStr How to Use Web 2.0 and Social Networking Sites Securely
title_full_unstemmed How to Use Web 2.0 and Social Networking Sites Securely
title_short How to Use Web 2.0 and Social Networking Sites Securely
title_sort how to use web 2.0 and social networking sites securely
topic Computing and Computers
url http://cds.cern.ch/record/1415421
work_keys_str_mv AT teamitgresearch howtouseweb20andsocialnetworkingsitessecurely