Risk
7/13/2010
01:10 PM
50%
50%

Social Networking Weakens Enterprise Security

Trend Micro survey finds 24% of employees access social networks from their business computers.

A new study finds that the use of social networking in the workplace has risen from 19% in 2008 to 24% in 2010, with the biggest surges coming in Germany and Britain.

That finding comes from a Trend Micro survey of 1,600 people who regularly use the Internet at work, drawn equally from Germany, Japan, the United Kingdom, and the United States.

Using social networking tools at work isn't the only quasi-personal-time activity on the rise. Comparing the 2010 survey results with a similar Trend Micro survey conducted in 2008, workers in the United States are now 66% more likely to write personal e-mails at work, 39% more likely to conduct personal banking or online bill-paying, and 29% more likely to watch or listen to streaming audio or video.

But in a good turn for information security, the study also found that from 2008 to 2010, workers in all countries but Japan were also much less likely to download executable files onto their business PC.

At the same time, however, laptop users now appear to be practicing risky information protection habits. According to the Trend Micro study, "for all countries surveyed in 2010, laptop users who can connect to the Internet outside of company network are more likely to share confidential information via instant messenger, webmail, and social media applications than those who are always connected to a company's network."

Perhaps that's because employees' Internet habits apparently differ when they're connected to the corporate LAN at work, versus on the go. For example, laptop users are much more likely than desktop users to visit social networking sites. From 2008 to 2010, social networking usage via laptops increased by 10% in the United States. For desktop users, however, rates stayed about the same.

What should organizations do about safeguarding social networking use, especially in light of laptop users' more risky habits?

In general, security experts recommend that rather than blocking social networking sites outright, organizations create security policies governing their use, and then monitor and enforce those polices to safeguard employees as well as sensitive data.

According to the Trend Micro study, "trying to just prevent users accessing social networks from work could potentially increase the risk to an organization, as users look for ways around computer security, possibly increasing the chance of exposure to security threats."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3580
Published: 2014-12-18
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.

CVE-2014-6076
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2014-6077
Published: 2014-12-18
Cross-site request forgery (CSRF) vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-6078
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 do not have a lockout period after invalid login attempts, which makes it easier for remote attackers to obtain admin access via a brute-force attack.

CVE-2014-6080
Published: 2014-12-18
SQL injection vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.