CHAPTER 8Utilization of Resources: Strategy & Collaboration
Deploying resources and controls to protect the utilization of intellectual property and copyright is a huge challenge. How do you know if employees are sending out confidential information in blog posts or Twitter messages? Or, if you are Apple, how do you know if an employee has taken out the latest iPhone5 for a spin and started tweeting about the latest developments? Or maybe a nurse at your hospital, as in the case of HealthPark Medical Center, is sharing patient information on Facebook.
Companies have a hard time knowing about all the information being sent from their networks via communication channels such as e-mail or FTP or through web browsers. Add social media to the mix ...
Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.