An organization's senior management is encouraging employees to use social media for promotional purposes. Which of the following should be the information security manager s FIRST step to support this strategy?
A.
Incorporate social media into the security awareness program.
B.
Develop a guideline on the acceptable use of social media.
C.
Employ the use of a web content filtering solution.
D.
Develop a business case for a data loss prevention (DLP) solution.
B. Develop a guideline on the acceptable use of social media.
This helps ensure that employees understand how to use these platforms in a manner that supports the organization's promotional goals while also protecting sensitive information and adhering to company policies and standards.
Creating clear, comprehensive guidelines will clarify what is considered appropriate and inappropriate behavior on social media for all employees. It addresses potential security risks and ensures consistent messaging and branding across employee social media interactions. These guidelines will serve as the foundation for further security measures, informing the contents of a security awareness program, the parameters of content filtering solutions if needed, and the rationale for investing in DLP tools.
Once the guidelines have been established, reinforcing them through a security awareness program!
if they are encouraging to use and not "thinking about using" it means that the social media AUP is already developed. I got the answer wrong too but now I see how A is correct
B. Develop a guideline on the acceptable use of social media.
When senior management encourages employees to use social media for promotional purposes, the first step for the information security manager should be to develop a guideline on the acceptable use of social media. This guideline outlines the organization's expectations and policies regarding the appropriate and responsible use of social media platforms for promotional activities.
Before encouraging employees to use social media for promotional purposes, it is essential to establish clear guidelines on what is considered acceptable use. This includes defining what types of content can be shared, how to handle customer inquiries or complaints, and how to protect sensitive information from being disclosed.
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
helg420
5 months, 1 week agoDisucssion
9 months agoLearner76
10 months, 3 weeks agotodush
1 year, 2 months agorichck102
1 year, 4 months agomad68
1 year, 5 months agoUser21
1 year, 5 months agobambs
1 year, 6 months agoDelTrotter
1 year, 10 months agoaokisan
1 year, 10 months agoZiggybooboo
1 year, 10 months ago