Vulnerabilities / Threats
7/23/2010
10:17 AM
50%
50%

Employees Flout Social Network Security Policies

Many people admit changing settings on business devices to access prohibited sites from the workplace, finds Cisco.

Enterprises' current social networking policies apparently are preventing employees from accessing these sites on company time, according to new research from Cisco.

After all, 50% of the employees polled in the Cisco 2010 Midyear Security Report, released Thursday, admitted to ignoring corporate policies banning the use of social media tools, and said they logged on to these sites at least once a week from their company computer. More than one quarter said they change the settings on business devices to access prohibited applications, the study found.

In a related study, Cisco Security Intelligence Operations found that 7% of a worldwide sample of users on Facebook spent an average of 68 minutes per day on the game Farmville, 5% spent an average 52 minutes daily playing Mafia Wars, and 4% doodled away an average of 36 minutes on Cafe World.

"Technological innovations are fundamentally changing the way people live, work, play, share information, and communicate with each other. Because consumers are typically the early adopters, enterprises often struggle to adapt existing polices to address their employees' preferred use of technology," said John N. Stewart, Cisco VP and chief security officer, in a statement. "With a number of tectonic forces converging in the marketplace, now is the time for enterprises to transform their IT model to accommodate the emerging borderless network and increasing security challenges."

While the lure of social networks proves too strong for many employees to overcome, cybercriminals also are increasing their efforts to gain traction in this arena. Cybercriminals use social media to commit crimes, enhance communication, and speed transactions with each other, according to Cisco. In fact, the United States government has awarded grants to examine how social networks and other technologies can be used to organize, coordinate, and incite potential attacks, Cisco said.

Experts are concerned that criminals will use popular games to deliver malware to unsuspecting users and their networks.

Enterprises also are grappling with security issues surrounding virtualization and the ever-expanding array and scope of mobile devices. To address these challenges, Cisco recommends businesses enforce granular per-user policies for access to applications and data on virtualized systems; create a formal policy for mobility; set strict business-data limits; use tools to manage and monitor the cloud and related activities; and give employees stronger, consistent guidance for their use of social media in the workplace.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8802
Published: 2015-01-23
The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.

CVE-2014-9623
Published: 2015-01-23
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quote and cause a denial of service (disk consumption) by deleting an image in the saving state.

CVE-2014-9638
Published: 2015-01-23
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.

CVE-2014-9639
Published: 2015-01-23
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.

CVE-2014-9640
Published: 2015-01-23
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.