Endpoint
11/19/2012
07:35 PM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
RSS
E-Mail
50%
50%

Despite Security Worries, Human Resources Allows Social Media At Work

More than 60 percent of enterprises don't block Facebook, other sites; two-thirds don't monitor employee use

Human resources executives are worried about the possibility that the use of social networks at work might jeopardize security and productivity -- but not worried enough to block them, a new study says.

According to a survey of HR executivesconducted by Holos Research and commissioned by productivity measurement tool vendor MySammy, most personnel managers are turning a blind eye and allowing the use of Facebook and other sites at work, as well as the use of personal smartphones and handheld devices.

Some 38 percent of companies block the use of social networking sites at work, according to the survey. Of those, 77 percent cited potential security threats as an important reason, and 76 percent said they were concerned about potential harm to the company's brand. More than two-thirds (67 percent) said they are concerned about a loss of employee productivity.

While concerns about lost security and productivity were common, nearly two-thirds of respondents (62 percent) said they allow the use of social networks from the workplace. Of those, 65 percent said they have no way to monitor how much time users spend on such websites, and 86 percent say they have not specified any time limits on employee use of them.

Even among companies that block access to social networks, there appear to be plenty of opportunities for employees to circumvent such policies. Some 87 percent of HR professionals said they allow the use of personal smartphones at work -- although 58 percent of them are concerned that those devices may be used to access social networks.

"Social media will not be going away," the study says. "Companies need to be proactive in terms of setting clear guidelines for use of social media, and be clear in communicating the policies to their employees. Just as important, companies cannot be lulled into a false sense of security that simply blocking access to social media websites at work is the answer."

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
ambreen11
50%
50%
ambreen11,
User Rank: Apprentice
1/24/2013 | 5:28:45 AM
re: Despite Security Worries, Human Resources Allows Social Media At Work
The use of social media in the workplace continues to grow and so do the associated threats. Organizations must recognize these risks and take steps to secure their environment. Please keep in mind that a good defense is optimized with a layered approach. You can see my "Buraq Technologies" website by simply googling it.Thanks
ambreen11
50%
50%
ambreen11,
User Rank: Apprentice
1/24/2013 | 5:28:22 AM
re: Despite Security Worries, Human Resources Allows Social Media At Work
The use of social media.in the workplace continues to grow and so do the
associated threats. Organizations must recognize these risks and take
steps to secure their environment. Please keep in mind that a good
defense is optimized with a layered approach.

Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.