Best Practices for Secure Enterprise Social Media Deployments

Sprinklr
SprinklrMarketing at Sprinklr

Deploying Social Media at Enterprise Scale requires a different set of priorities for compliance, governance, and risk. If you are looking for best practices as it relates to how global companies are deploying social at scale, this checklist should help. Sprinklr has helped global brands with implementations in over 50 countries. We’ve assembled some best practices in an easy checklist for those concerned with issues around compliance, governance, and risk.

22 Must Haves For
    Secure Enterprise Social
How to Avoid Common Risk, Compliance, and Governance Mistakes
The Enterprise Social Media Security Reality

       “Almost two-thirds of companies surveyed
       say that social media is a significant or
       critical risk to their brand reputation; yet
       60% of companies either never train their
       employees about their corporate social
       media policies or do so only upon hiring.
       Moreover, 43% of companies have less than
       one Full-Time Equivalent (FTE) dedicated to
       managing social media risk.”
                    Guarding the Social Gates: The Imperative
                           for Social Media Risk Management
                       (Alan Webber, Altimeter, August 2012)



       “Nearly two-thirds of security and risk
       professionals (64%) have no social media
       policy in place or if they do, they lack
       tools to sufficiently enforce and support
       the policy.”
                            Manage the Risks of Social Media
                              (Chris McClean and Nick Hayes,
                    Forrester Research, Inc., November 2012)
Social@Scale Security Checklist
22 Must Haves For Every Enterprise-wide Social Media Deployment


                 Do we have...?                                                               Yes   No
Governance
                  1. content rules that flag unacceptable outbound content?

                  2. an approval workflow for outbound content?

                  3. the legal team involved for outbound content guidelines?

                  4. a defined escalation process?

                  5. the ability to track messages from inception to resolution?

                  6. a way to handle rogue accounts?

                  7. enterprise-wide, single point password control?

                  8. a rule to disapprove sending passwords around in Excel?

                  9. Access Management?

                 10. a social media policy or guidelines?

Security
                 11. the ability to treat private messages differently?

                 12. the ability to integrate with enterprise-wide authentication systems?

                 13. only tools and platforms that are enterprise-grade security compliant?

                 14. enforced password guidelines?

                 15. the ability to differentiate influencers?

                 16. automated monitoring rules?

Compliance
                 17. the ability to retract social messages from a central location?
                 18. the ability to document internal conversations about social
                     media situations?
                 19. the ability to archive outbound content?

                 20. the ability to archive inbound content?

                 21. the ability to create audit trails for social media activities?
                 22. a Social Media Management System that meets our own corporate
                     security requirements?

           To learn more about Social@Scale Security, visit us at www.sprinklr.com

Recommended

[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana... by
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...Altimeter, a Prophet Company
25.5K views27 slides
A Collection Of Community Management Advice by
A Collection Of Community Management AdviceA Collection Of Community Management Advice
A Collection Of Community Management AdviceMarketwired
39.6K views62 slides
[Report] A Framework for Social Analytics: Including 6 Use Cases for Social M... by
[Report] A Framework for Social Analytics: Including 6 Use Cases for Social M...[Report] A Framework for Social Analytics: Including 6 Use Cases for Social M...
[Report] A Framework for Social Analytics: Including 6 Use Cases for Social M...Altimeter, a Prophet Company
4.6K views40 slides
Next Generation Social Media: Alignment of Business Processes and Social Inte... by
Next Generation Social Media: Alignment of Business Processes and Social Inte...Next Generation Social Media: Alignment of Business Processes and Social Inte...
Next Generation Social Media: Alignment of Business Processes and Social Inte...Vinay Mummigatti
305 views11 slides
Is Social Taking Over Search by
Is Social Taking Over SearchIs Social Taking Over Search
Is Social Taking Over SearchPhil Buckley
3.4K views22 slides
To Monetize Open Social Networks, Invite Customers to Be More Than Just “Frie... by
To Monetize Open Social Networks, Invite Customers to Be More Than Just “Frie...To Monetize Open Social Networks, Invite Customers to Be More Than Just “Frie...
To Monetize Open Social Networks, Invite Customers to Be More Than Just “Frie...Get Satisfaction
582 views12 slides

More Related Content

What's hot

Synthesio book signing marshall sponder - delivered by
Synthesio book signing    marshall sponder - deliveredSynthesio book signing    marshall sponder - delivered
Synthesio book signing marshall sponder - deliveredMarshall Sponder
11.9K views51 slides
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ... by
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...Altimeter, a Prophet Company
8.3K views18 slides
[Report] Social Data Intelligence, by Susan Etlinger by
[Report] Social Data Intelligence, by Susan Etlinger [Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger Altimeter, a Prophet Company
37.1K views26 slides
The guide to social media marketing and buisness intel.pdf by
The guide to social media marketing and buisness intel.pdfThe guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdfAnjanette Delgado
930 views123 slides
[Report] The Social Media ROI Cookbook, by Susan Etlinger by
[Report] The Social Media ROI Cookbook, by Susan Etlinger[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan EtlingerAltimeter, a Prophet Company
269.2K views27 slides
Social monitoring bootcamp Bogota, Colobmia by
Social monitoring bootcamp Bogota, ColobmiaSocial monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, ColobmiaMarshall Sponder
6.8K views61 slides

What's hot(20)

Synthesio book signing marshall sponder - delivered by Marshall Sponder
Synthesio book signing    marshall sponder - deliveredSynthesio book signing    marshall sponder - delivered
Synthesio book signing marshall sponder - delivered
Marshall Sponder11.9K views
The guide to social media marketing and buisness intel.pdf by Anjanette Delgado
The guide to social media marketing and buisness intel.pdfThe guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdf
Anjanette Delgado930 views
Social monitoring bootcamp Bogota, Colobmia by Marshall Sponder
Social monitoring bootcamp Bogota, ColobmiaSocial monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, Colobmia
Marshall Sponder6.8K views
Brands onlysocial marshall sponder - updated & delivered-v3 by Marshall Sponder
Brands onlysocial marshall sponder - updated & delivered-v3Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3
Marshall Sponder8.6K views
Best Practices from the World's Most Social Big Brands by Sprinklr
Best Practices from the World's Most Social Big BrandsBest Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big Brands
Sprinklr24.6K views
Social CRM the new rules of relationship management by Plínio Okamoto
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship management
Plínio Okamoto1.3K views
Financial Institutions and Social Media by Ogilvy Consulting
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media
Ogilvy Consulting8.6K views
Social Media ROI Cycle by Jamie Turner by SIXTY
Social Media ROI Cycle by Jamie TurnerSocial Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie Turner
SIXTY2.2K views
2014 market-report-online-community-trends get-satisfaction by Hai Dongkixot
2014 market-report-online-community-trends get-satisfaction2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfaction
Hai Dongkixot1.7K views
A Framework for Social Analytics by Susan Etlinger
A Framework for Social AnalyticsA Framework for Social Analytics
A Framework for Social Analytics
Susan Etlinger64.3K views
Kreative.asia Refining the ROI Equation by Esther Lim
Kreative.asia Refining the ROI EquationKreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI Equation
Esther Lim499 views

Similar to Best Practices for Secure Enterprise Social Media Deployments

3852 Socialnetworking Bk by
3852 Socialnetworking Bk3852 Socialnetworking Bk
3852 Socialnetworking BkLeo Greeley
195 views11 slides
Social Media Security Risk Slide Share Version by
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
1.9K views42 slides
Cyber security: five leadership issues worthy of Board and executive attention by
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionRamón Gómez de Olea y Bustinza
79 views10 slides
Cyber security: Five leadership issues worthy of board and executive attention by
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
457 views10 slides
D'souza social content by
D'souza social contentD'souza social content
D'souza social contentactkm
320 views30 slides
Risksense: 7 Experts on Threat and Vulnerability Management by
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
641 views24 slides

Similar to Best Practices for Secure Enterprise Social Media Deployments(20)

3852 Socialnetworking Bk by Leo Greeley
3852 Socialnetworking Bk3852 Socialnetworking Bk
3852 Socialnetworking Bk
Leo Greeley195 views
Social Media Security Risk Slide Share Version by famudal
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
famudal1.9K views
D'souza social content by actkm
D'souza social contentD'souza social content
D'souza social content
actkm320 views
Risksense: 7 Experts on Threat and Vulnerability Management by Mighty Guides, Inc.
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
InfoSec's Guide to Social Media [WHITEPAPER] by Josh Stein
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
Josh Stein200 views
Cloud Cybersecurity: Strategies for Managing Vendor Risk by Health Catalyst
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Health Catalyst280 views
FORUM 2013 Social media - a risk management challenge by FERMA
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
FERMA838 views
Insider threats by izoologic
Insider threatsInsider threats
Insider threats
izoologic74 views
Managing Online Reputation. How to Protect Your Company on Social Media by Charlie Pownall
Managing Online Reputation. How to Protect Your Company on Social MediaManaging Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social Media
Charlie Pownall3.4K views
Rothke rsa 2012 what happens in vegas goes on youtube using social networks... by Ben Rothke
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Ben Rothke808 views
Social Media & Enterprise Security Whitepaper by SchleighS
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
SchleighS783 views
Guarding the Social Gates: The Imperative for Social Media Risk Management by Uzzi Ohana
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk Management
Uzzi Ohana938 views
Excelsior College Webinar: Human Resources & Social Media Governance by Mike Lesczinski
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media Governance
Mike Lesczinski595 views

More from Sprinklr

Care Is The New Marketing by
Care Is The New MarketingCare Is The New Marketing
Care Is The New MarketingSprinklr
7.6K views23 slides
Engaging New Audiences with Twitter by
Engaging New Audiences with TwitterEngaging New Audiences with Twitter
Engaging New Audiences with TwitterSprinklr
2.3K views16 slides
Succeeding with Instagram Ads by
Succeeding with Instagram AdsSucceeding with Instagram Ads
Succeeding with Instagram AdsSprinklr
1.5K views36 slides
Calculate Your ROI at SXSW by
Calculate Your ROI at SXSWCalculate Your ROI at SXSW
Calculate Your ROI at SXSWSprinklr
2.3K views1 slide
How Groupon Manages 15 Million Social Relationships by
How Groupon Manages 15 Million Social Relationships How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships Sprinklr
39.3K views3 slides
Content Management Best Practices by Josh Pines | Medidata Solutions by
Content Management Best Practices by Josh Pines | Medidata SolutionsContent Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata SolutionsSprinklr
2.3K views14 slides

More from Sprinklr(12)

Care Is The New Marketing by Sprinklr
Care Is The New MarketingCare Is The New Marketing
Care Is The New Marketing
Sprinklr7.6K views
Engaging New Audiences with Twitter by Sprinklr
Engaging New Audiences with TwitterEngaging New Audiences with Twitter
Engaging New Audiences with Twitter
Sprinklr2.3K views
Succeeding with Instagram Ads by Sprinklr
Succeeding with Instagram AdsSucceeding with Instagram Ads
Succeeding with Instagram Ads
Sprinklr1.5K views
Calculate Your ROI at SXSW by Sprinklr
Calculate Your ROI at SXSWCalculate Your ROI at SXSW
Calculate Your ROI at SXSW
Sprinklr2.3K views
How Groupon Manages 15 Million Social Relationships by Sprinklr
How Groupon Manages 15 Million Social Relationships How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships
Sprinklr39.3K views
Content Management Best Practices by Josh Pines | Medidata Solutions by Sprinklr
Content Management Best Practices by Josh Pines | Medidata SolutionsContent Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata Solutions
Sprinklr2.3K views
How Zillow Connected Thousands of Homeowners With President Obama by Sprinklr
How Zillow Connected Thousands of Homeowners With President ObamaHow Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President Obama
Sprinklr2.8K views
Webinar: Can Google+ Help Enterprise Brands? by Sprinklr
Webinar: Can Google+ Help Enterprise Brands?Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?
Sprinklr4.5K views
How Virgin America Soared During #Snowmageddon by Sprinklr
How Virgin America Soared During #SnowmageddonHow Virgin America Soared During #Snowmageddon
How Virgin America Soared During #Snowmageddon
Sprinklr1.9K views
Best Practices for Enterprise Social Media Management by the Social Media Dre... by Sprinklr
Best Practices for Enterprise Social Media Management by the Social Media Dre...Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...
Sprinklr38.5K views
Build it before you need it -Social@Scale: Crisis Management by Sprinklr
Build it before you need it -Social@Scale: Crisis ManagementBuild it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis Management
Sprinklr2.2K views
Sprinklr overview of Facebook Timeline by Sprinklr
Sprinklr overview of Facebook TimelineSprinklr overview of Facebook Timeline
Sprinklr overview of Facebook Timeline
Sprinklr5.9K views

Recently uploaded

Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
164 views13 slides
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
247 views13 slides
State of the Union - Rohit Yadav - Apache CloudStack by
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStackShapeBlue
303 views53 slides
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
162 views59 slides
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
91 views52 slides
"Node.js Development in 2024: trends and tools", Nikita Galkin by
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin Fwdays
33 views38 slides

Recently uploaded(20)

Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue164 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue247 views
State of the Union - Rohit Yadav - Apache CloudStack by ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue303 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs by Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
"Node.js Development in 2024: trends and tools", Nikita Galkin by Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays33 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT by ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue208 views
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... by Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro35 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue171 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue139 views
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... by ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue196 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... by ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue108 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue183 views
Optimizing Communication to Optimize Human Behavior - LCBM by Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar38 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 views
"Package management in monorepos", Zoltan Kochan by Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 views

Best Practices for Secure Enterprise Social Media Deployments

  • 1. 22 Must Haves For Secure Enterprise Social How to Avoid Common Risk, Compliance, and Governance Mistakes
  • 2. The Enterprise Social Media Security Reality “Almost two-thirds of companies surveyed say that social media is a significant or critical risk to their brand reputation; yet 60% of companies either never train their employees about their corporate social media policies or do so only upon hiring. Moreover, 43% of companies have less than one Full-Time Equivalent (FTE) dedicated to managing social media risk.” Guarding the Social Gates: The Imperative for Social Media Risk Management (Alan Webber, Altimeter, August 2012) “Nearly two-thirds of security and risk professionals (64%) have no social media policy in place or if they do, they lack tools to sufficiently enforce and support the policy.” Manage the Risks of Social Media (Chris McClean and Nick Hayes, Forrester Research, Inc., November 2012)
  • 3. Social@Scale Security Checklist 22 Must Haves For Every Enterprise-wide Social Media Deployment Do we have...? Yes No Governance 1. content rules that flag unacceptable outbound content? 2. an approval workflow for outbound content? 3. the legal team involved for outbound content guidelines? 4. a defined escalation process? 5. the ability to track messages from inception to resolution? 6. a way to handle rogue accounts? 7. enterprise-wide, single point password control? 8. a rule to disapprove sending passwords around in Excel? 9. Access Management? 10. a social media policy or guidelines? Security 11. the ability to treat private messages differently? 12. the ability to integrate with enterprise-wide authentication systems? 13. only tools and platforms that are enterprise-grade security compliant? 14. enforced password guidelines? 15. the ability to differentiate influencers? 16. automated monitoring rules? Compliance 17. the ability to retract social messages from a central location? 18. the ability to document internal conversations about social media situations? 19. the ability to archive outbound content? 20. the ability to archive inbound content? 21. the ability to create audit trails for social media activities? 22. a Social Media Management System that meets our own corporate security requirements? To learn more about Social@Scale Security, visit us at www.sprinklr.com