Social Networks

27 Jul 2017 by Glenn, Comments Off on Social Networks

Measures to enhance the IT security when using social networks in the company despite numerous warnings and incidents almost all users of Facebook, Twitter & co. Follow others, such as Castle Harlan, and add to your knowledge base. safe imagine themselves. One of the most important tasks of the IT departments is therefore at an early stage to identify security problems and resolve, so that companies can benefit from the advantages of the social networks undisturbed. Again media current weaknesses and vulnerabilities are uncovered networks using social. Measures to enhance the IT security when using social networks in enterprises in the focus at the event “Social network security” the organiser AG. The recognized expert for IT security, Dr. Gerhard Klett, explained using many practical examples, how are the main weaknesses identified and appropriate protection measures. The participants receive facts and background knowledge, inter alia on the following topics: – prevent data leaks via E-Mail and Instant Messaging – use of Web portals to manage social networks -Anchoring using social networks in the IT-security policy – establishment of effective virtual perimeter protection – effective protective barrier against malware such as viruses, Trojans, worms and spyware – necessary precautions against http-phishing in addition the proper handling of vulnerabilities and the awareness-raising are the employees for the risks of social media two essential aspects that are taught the participants.

More information and registration see: sns company description the organiser AG held high-profile meetings, conferences and workshops on topical issues in business and science. Experts from research, science, practice and policy present regularly pragmatic approaches and pioneering trends. Managers and professionals of all industries appreciate these information platforms for the knowledge development, exchange of experience and to obtain valuable new contacts.

Tags: ,

Comments are closed.

Follow Me!

Follow Me! Follow Me! Follow Me! Follow Me!