How much control do these companies have? Lately, many of them are being very careful in their ad contracts to...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
make sure that their messages and brands aren't bruised by overzealous advertisers. As a security professional, it's wise to recommend that the organization's lawyers carefully review contracts with Internet-based advertising firms, making sure that the documents explicitly call out the advertising methods that will be used. The affiliate should be restricted from using spyware to display ads.
Also, you may want to encourage your company to use methods that you can control, including Google AdWords or similar services. AdWords allows advertisers to promote their wares when a product relates to a specific user's Google query. The briefly worded advertisements on Google's search pages can appear when certain ad-related search terms are typed – this is a highly targeted and useful form of advertising.
Dig Deeper on Information Security Policies, Procedures and Guidelines
Related Q&A from Ed Skoudis
At Black Hat 2006, researcher Joanna Rutkowska unveiled a piece of machine-based malware called the Blue Pill. But is it a serious threat to your ...continue reading
Wi-Fi on airplanes seems like it will be unavoidable in the future, but what security risks does it pose? In this security threats expert response, ...continue reading
There are some rare forms of malware that antivirus software doesn't pick up on, but there are some good tools to remove all sorts of malware.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.