Risk
7/13/2010
01:10 PM
50%
50%

Social Networking Weakens Enterprise Security

Trend Micro survey finds 24% of employees access social networks from their business computers.

A new study finds that the use of social networking in the workplace has risen from 19% in 2008 to 24% in 2010, with the biggest surges coming in Germany and Britain.

That finding comes from a Trend Micro survey of 1,600 people who regularly use the Internet at work, drawn equally from Germany, Japan, the United Kingdom, and the United States.

Using social networking tools at work isn't the only quasi-personal-time activity on the rise. Comparing the 2010 survey results with a similar Trend Micro survey conducted in 2008, workers in the United States are now 66% more likely to write personal e-mails at work, 39% more likely to conduct personal banking or online bill-paying, and 29% more likely to watch or listen to streaming audio or video.

But in a good turn for information security, the study also found that from 2008 to 2010, workers in all countries but Japan were also much less likely to download executable files onto their business PC.

At the same time, however, laptop users now appear to be practicing risky information protection habits. According to the Trend Micro study, "for all countries surveyed in 2010, laptop users who can connect to the Internet outside of company network are more likely to share confidential information via instant messenger, webmail, and social media applications than those who are always connected to a company's network."

Perhaps that's because employees' Internet habits apparently differ when they're connected to the corporate LAN at work, versus on the go. For example, laptop users are much more likely than desktop users to visit social networking sites. From 2008 to 2010, social networking usage via laptops increased by 10% in the United States. For desktop users, however, rates stayed about the same.

What should organizations do about safeguarding social networking use, especially in light of laptop users' more risky habits?

In general, security experts recommend that rather than blocking social networking sites outright, organizations create security policies governing their use, and then monitor and enforce those polices to safeguard employees as well as sensitive data.

According to the Trend Micro study, "trying to just prevent users accessing social networks from work could potentially increase the risk to an organization, as users look for ways around computer security, possibly increasing the chance of exposure to security threats."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8148
Published: 2015-01-26
The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.

CVE-2014-8157
Published: 2015-01-26
Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.

CVE-2014-8158
Published: 2015-01-26
Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.

CVE-2014-9571
Published: 2015-01-26
Cross-site scripting (XSS) vulnerability in admin/install.php in MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 allows remote attackers to inject arbitrary web script or HTML via the (1) admin_username or (2) admin_password parameter.

CVE-2014-9572
Published: 2015-01-26
MantisBT before 1.2.19 and 1.3.x before 1.3.0-beta.2 does not properly restrict access to /*/install.php, which allows remote attackers to obtain database credentials via the install parameter with the value 4.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.