How to Use Web 2.0 and Social Networking Sites Securely

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

This is the downloadable version of this new pocket guide which provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected.               

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • IT
  • Web
  • Web 2.0
  • Networking
  • Social Networking

Course programme

Description
This is the downloadable version of this new pocket guide which provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected.

Program

ORDER THIS POCKET GUIDE TODAY TO ENSURE THAT YOUR EMPLOYEES ARE REMAINING SECURE AND COMPLIANT WHEN USING WEB 2.0 SITES.....
This pocket guide is also available in a softcover format here .
At its simplest, Web 2.0 is the term used to describe the second generation of web technologies, including social networking sites, blogs and wikis, all of which enable the Web to be used in a different, more interactive way than before. These technologies also enable users to connect with a very large number of people in a short period of time at low cost.
The use of Web 2.0 technologies has also spawned new business models and enabled improved collaboration, knowledge sharing and communication within organisations.
At the same time, however, Web 2.0 technologies bring greater security risks for their fast growing universe of users. The number of risks is also growing exponentially. The challenge for businesses, therefore, is to find ways of enabling their users to use Web 2.0 technologies whilst minimising the risks.
Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected.
Key features include:
  • Web 2.0 threats - phishing, hacking attacks, social engineering...
  • Protecting organisations from risks including introducting policies and staff awareness training
PROTECT YOURSELF AND YOUR ORGANISATION FROM RISKS BY ORDERING THIS POCKET GUIDE TODAY....

How to Use Web 2.0 and Social Networking Sites Securely

Price on request