Cargando…
How to Use Web 2.0 and Social Networking Sites Securely
Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure t...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
IT Governance Publishing
2009
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1415421 |
_version_ | 1780924030613716992 |
---|---|
author | Team, ITG Research |
author_facet | Team, ITG Research |
author_sort | Team, ITG Research |
collection | CERN |
description | Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected. |
id | cern-1415421 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2009 |
publisher | IT Governance Publishing |
record_format | invenio |
spelling | cern-14154212021-04-22T00:39:24Zhttp://cds.cern.ch/record/1415421engTeam, ITG ResearchHow to Use Web 2.0 and Social Networking Sites SecurelyComputing and ComputersGiven the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected.IT Governance Publishingoai:cds.cern.ch:14154212009 |
spellingShingle | Computing and Computers Team, ITG Research How to Use Web 2.0 and Social Networking Sites Securely |
title | How to Use Web 2.0 and Social Networking Sites Securely |
title_full | How to Use Web 2.0 and Social Networking Sites Securely |
title_fullStr | How to Use Web 2.0 and Social Networking Sites Securely |
title_full_unstemmed | How to Use Web 2.0 and Social Networking Sites Securely |
title_short | How to Use Web 2.0 and Social Networking Sites Securely |
title_sort | how to use web 2.0 and social networking sites securely |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1415421 |
work_keys_str_mv | AT teamitgresearch howtouseweb20andsocialnetworkingsitessecurely |