Risk
7/13/2010
01:10 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Social Networking Weakens Enterprise Security

Trend Micro survey finds 24% of employees access social networks from their business computers.

A new study finds that the use of social networking in the workplace has risen from 19% in 2008 to 24% in 2010, with the biggest surges coming in Germany and Britain.

That finding comes from a Trend Micro survey of 1,600 people who regularly use the Internet at work, drawn equally from Germany, Japan, the United Kingdom, and the United States.

Using social networking tools at work isn't the only quasi-personal-time activity on the rise. Comparing the 2010 survey results with a similar Trend Micro survey conducted in 2008, workers in the United States are now 66% more likely to write personal e-mails at work, 39% more likely to conduct personal banking or online bill-paying, and 29% more likely to watch or listen to streaming audio or video.

But in a good turn for information security, the study also found that from 2008 to 2010, workers in all countries but Japan were also much less likely to download executable files onto their business PC.

At the same time, however, laptop users now appear to be practicing risky information protection habits. According to the Trend Micro study, "for all countries surveyed in 2010, laptop users who can connect to the Internet outside of company network are more likely to share confidential information via instant messenger, webmail, and social media applications than those who are always connected to a company's network."

Perhaps that's because employees' Internet habits apparently differ when they're connected to the corporate LAN at work, versus on the go. For example, laptop users are much more likely than desktop users to visit social networking sites. From 2008 to 2010, social networking usage via laptops increased by 10% in the United States. For desktop users, however, rates stayed about the same.

What should organizations do about safeguarding social networking use, especially in light of laptop users' more risky habits?

In general, security experts recommend that rather than blocking social networking sites outright, organizations create security policies governing their use, and then monitor and enforce those polices to safeguard employees as well as sensitive data.

According to the Trend Micro study, "trying to just prevent users accessing social networks from work could potentially increase the risk to an organization, as users look for ways around computer security, possibly increasing the chance of exposure to security threats."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-0360
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

CVE-2012-1317
Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

CVE-2012-1366
Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

CVE-2012-3062
Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

CVE-2012-3918
Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web