Social Media Security, 1st Edition

Leveraging Social Networking While Mitigating Risk

Social Media Security, 1st Edition,Michael Cross,ISBN9781597499866






235 X 191

Social networks have become part of the fabric of how we communicate and collaborate as a society. Be prepared to adopt them securely across the enterprise.

Print Book + eBook

USD 59.94
USD 99.90

Buy both together and save 40%

Print Book


In Stock

Estimated Delivery Time
USD 49.95

eBook Overview

VST (VitalSource Bookshelf) format

DRM-free included formats : EPUB, Mobi (for Kindle), PDF

USD 49.95
Add to Cart

Key Features

  • Defines an organization's goals for social networking
  • Presents the risks present in social networking and how to mitigate them
  • Explains how to maintain continuous social networking security


Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people’s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis).

However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.


Information Security professionals and network managers and administrators concerned with social media usage in the enterprise.

Michael Cross

Michael Cross (MCSE, MCP+I, CNA, Network+) is an Internet Specialist/Computer Forensic Analyst with the Niagara Regional Police Service (NRPS). He performs computer forensic examinations on computers involved in criminal investigation. He also has consulted and assisted in cases dealing with computer-related/Internet crimes. In addition to designing and maintaining the NRPS Web site at and the NRPS intranet, he has provided support in the areas of programming, hardware, and network administration. As part of an information technology team that provides support to a user base of more than 800 civilian and uniform users, he has a theory that when the users carry guns, you tend to be more motivated in solving their problems. Michael also owns KnightWare (, which provides computer-related services such as Web page design, and Bookworms (, where you can purchase collectibles and other interesting items online. He has been a freelance writer for several years, and he has been published more than three dozen times in numerous books and anthologies. He currently resides in St. Catharines, Ontario, Canada, with his lovely wife, Jennifer, his darling daughter, Sara, and charming son, Jason.

Affiliations and Expertise

Computer Forensic Analyst with the Niagara Regional Police Service, Canada

View additional works by Michael Cross

Social Media Security, 1st Edition


About the Author

About the Technical Editor

Chapter 1. What is Social Media?

Information in This Chapter:

What is social media?

Understanding social media

Different types and classifications

The value of social media

Cutting edge versus bleeding edge

The problems that come with social media

Is security really an issue?

Taking the good with the bad


Chapter 2. Opportunities of Social Media

Information in This Chapter:

Opportunities of social media

New methods of marketing to customers

Building social authority

Engaging customers

Sharing information

Getting the word out

Taking advantage of collective intelligence


Chapter 3. Employment and Social Media

Information in This Chapter:

Employment and social media

Using social media to find employees

Candidate screening

Using social media to find employment

Limiting personal information

Employees using social media

Allowing social media in the workplace


Chapter 4. Considerations for setting up Social Media

Information in This Chapter:

Considerations for setting up social media

Why are we doing this?

What is the place of social media in your organization?

Identifying your audience

Internet versus intranet

What’s being said about your brand?

Making the right decisions early

Identifying how you’ll represent yourself on the Internet

Approved representatives


Training and policy


Chapter 5. Being Bold Versus being Overlooked

Information in This Chapter:

Being bold versus being overlooked

Good social media campaigns

Bad social media campaigns

Sometimes it’s better to be overlooked

Social media hoaxes

The human factor

Content management

Promotion of social media


Chapter 6. Risks of Social Media

Information in This Chapter:

Risks of social media

Public embarrassment

Once it’s out there, it’s out there

False information

Information leakage

Retention and archiving content

Backing up social media

Loss of data/equipment


Chapter 7. The Dark Side

Information in This Chapter:

The dark side of social media


Social engineering

Hacked accounts


Chapter 8. Risk Management

Information in This Chapter:

Risk management

Laws and regulations



Police use of social media

Malware, viruses, and exploit distribution


Chapter 9. Policies and Privacy

Information in This Chapter:



Blocking users

Controlling app privacy

Location awareness


Chapter 10. Security

Information in This Chapter:


Fake accounts


Privacy and information sharing

Content security


Chapter 11. Where do We go from Here?

Information in This Chapter:

Where do we go from here?

The pitch, the promise, and the reality

Who’s in charge here?

Monitor social media

Keeping it fresh

Dialing it back and retaking control

Ongoing training



Quotes and reviews

"...offers a broad framework that a firm can use to create or enhance its social media security program...a handy resource for firms that are trying to create an effective and secure social media program." Blog

"The book lives up to its title and effectively shows the reader how to use social media without getting caught in its myriad security, privacy, risk, and PR weaknesses."-Security Management

"...effectively shows the reader how to use social media without getting caught in its myriad security, privacy, risk, and PR weaknesses...a handy resource for firms that are trying to create an effective and secure social media program."--Security Management (online), February 2015

Free Shipping
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy

Contact Us