Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Social Networking Here To Stay Despite Security Risks

IT pros must find a way to balance the risks and rewards of Web 2.0 platforms like Facebook and Linked In, security expert says.

Companies need to accept that employees will spend at least part of their day on social networks like Facebook, Twitter, and Linked In, and need to adopt strategies and policies to manage and secure such activity rather than attempting to outlaw it, an expert who spoke Thursday at the Interop IT Conference and Expo in Las Vegas said.

"The question isn’t whether to block or not to block" said Ben Rothke, senior security consultant with British Telecom. “Blocking simply won’t work,” said Rothke, who noted that even conservative organizations, such as Boeing, have adopted Web 2.0 technologies as part of their marketing and communications strategies.

To boot, Fortune 500 companies like General Motors are driven millions of dollars in incremental sales through their Twitter and Facebook accounts. But as valuable as social media can be, it also presents security risks. "You have to get in front of the wave, learn what the challenges are and what information may be at risk," said Rothke.

One of the biggest risks that social networking poses to organizations is that employees may be exposing information that's not meant for public consumption, especially in highly regulated environments like banking and healthcare, in industries that rely heavily on proprietary research and development, or even in the military.

"Boeing or the U.S. Marines are going to face different challenges than Starbucks," said Rothke.

An effective social media security strategy starts with employee education, Rothke said. "It’s the three Cs, it has to be clear, comprehensive, and continuous. You can’t give an awareness briefing on day one and then forget about it. It has to be ongoing."

Rothke added that employees should know in advance the consequences of inappropriate postings. "Let them know that it’s no joke, and that they could lose their job in three tweets."

The bottom line, however, is that IT pros need to accept the fact that social networking sites and other Web 2.0 technologies are now a fact of life in the enterprise, and they must learn to deal with them.

"You can’t say no to a CEO who wants to implement a social networking strategy. IT must come to the table with answers," Rothke said.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Ransomware Damage Hit $11.5B in 2019
Dark Reading Staff 2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18238
PUBLISHED: 2020-02-26
Moxa ioLogik 2542-HSPA Series Controllers and IOs, and IOxpress Configuration Utility ioLogik 2500 series firmware, Version 3.0 or lower IOxpress configuration utility, Version 2.3.0 or lower. Sensitive information is stored in configuration files without encryption, which may allow an attacker to a...
CVE-2019-17274
PUBLISHED: 2020-02-26
NetApp FAS 8300/8700 and AFF A400 Baseboard Management Controller (BMC) firmware versions 13.x prior to 13.1P1 were shipped with a default account enabled that could allow unauthorized arbitrary command execution via local access.
CVE-2019-17275
PUBLISHED: 2020-02-26
OnCommand Cloud Manager versions prior to 3.8.0 are susceptible to arbitrary code execution by remote attackers.
CVE-2020-3169
PUBLISHED: 2020-02-26
A vulnerability in the CLI of Cisco FXOS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying Linux operating system with a privilege level of root on an affected device. The vulnerability is due to insufficient validation of arguments passed to a spe...
CVE-2020-3170
PUBLISHED: 2020-02-26
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could expl...