To corporate IT departments, Twitter and Facebook and LinkedIn often look like leaks waiting to happen.
Or worse --like attack vectors for social engineering. But users will post to them with or without permission, so the challenge for IT is tapping social networking's potential while reducing its risk.
No hay comentarios:
Publicar un comentario