Risk
7/13/2010
01:10 PM
Connect Directly
RSS
E-Mail
50%
50%

Social Networking Weakens Enterprise Security

Trend Micro survey finds 24% of employees access social networks from their business computers.

A new study finds that the use of social networking in the workplace has risen from 19% in 2008 to 24% in 2010, with the biggest surges coming in Germany and Britain.

That finding comes from a Trend Micro survey of 1,600 people who regularly use the Internet at work, drawn equally from Germany, Japan, the United Kingdom, and the United States.

Using social networking tools at work isn't the only quasi-personal-time activity on the rise. Comparing the 2010 survey results with a similar Trend Micro survey conducted in 2008, workers in the United States are now 66% more likely to write personal e-mails at work, 39% more likely to conduct personal banking or online bill-paying, and 29% more likely to watch or listen to streaming audio or video.

But in a good turn for information security, the study also found that from 2008 to 2010, workers in all countries but Japan were also much less likely to download executable files onto their business PC.

At the same time, however, laptop users now appear to be practicing risky information protection habits. According to the Trend Micro study, "for all countries surveyed in 2010, laptop users who can connect to the Internet outside of company network are more likely to share confidential information via instant messenger, webmail, and social media applications than those who are always connected to a company's network."

Perhaps that's because employees' Internet habits apparently differ when they're connected to the corporate LAN at work, versus on the go. For example, laptop users are much more likely than desktop users to visit social networking sites. From 2008 to 2010, social networking usage via laptops increased by 10% in the United States. For desktop users, however, rates stayed about the same.

What should organizations do about safeguarding social networking use, especially in light of laptop users' more risky habits?

In general, security experts recommend that rather than blocking social networking sites outright, organizations create security policies governing their use, and then monitor and enforce those polices to safeguard employees as well as sensitive data.

According to the Trend Micro study, "trying to just prevent users accessing social networks from work could potentially increase the risk to an organization, as users look for ways around computer security, possibly increasing the chance of exposure to security threats."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3541
Published: 2014-07-29
The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on.

CVE-2014-3542
Published: 2014-07-29
mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) is...

Best of the Web
Dark Reading Radio