Wrap Up

Implementing controls over intellectual property and protecting copyright are very challenging tasks. IT security tools have to evolve to focus more on the content of the data traversing the network, how it makes its way into the public sphere, and what happens when it’s out there. Tools have to move beyond just looking for files to helping businesses function more securely in the connected cyberspace. Blocking access is not the answer when it comes to managing IP, nor is it truly feasible.

Improvement Checklist

image Have you inventoried all your social media assets and their management capabilities?

Have you identified social media tools ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.