Such a compromise involves granting access to social media and other collaboration technologies while using technology controls to deflect threats
such as malware or phishing messages. In most cases, the security settings in social networks are controlled by users, not by IT. To compensate for this lack of control, additional security measures can be implemented – for instance, an intrusion prevention system to protect against network threats, and reputation filtering to detect suspicious activity and content.