Wrap Up

Social media operations have to be managed like any other application operations. All applications, whether hosted by a third party or in-house, have inherent technology weaknesses. Employees using these applications have to be aware of the dangers posed by these different tools or websites. IT, the Community Manager, Human Resources, Marketing, and Legal must collaborate to ensure that the tools being used meet not only the business’s functional requirements but also good security practices requirements.

Improvement Checklist

image Are you monitoring employee and public mentions with the right tools?

Have you put an approval process in place ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.