CHAPTER 12Human Resources Monitoring & Reporting

In the previous parts of the book, we covered how to assess your current environment for social media weaknesses, methods for determining the threats to your reputation and security, and the tools and techniques for implementing operational guidelines. In this part of the book, we cover the monitoring and reporting tactics that you have to implement so you know what’s going on within your company and in the public sphere. If you can’t measure your activities, you will never know if you are making any progress toward social media security nirvana.

As we discussed in Chapter 4, companies face numerous threats via social media channels. These threats basically concern the loss of confidential information, ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.