Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

09:50 AM
Dark Reading
Dark Reading
Products and Releases

Survey: How Security Views Web 2.0

A recent survey of 100 IT pros at Infosecurity Europe reveals trends in individual and corporate use of social media

London, UK " 27th May 2009 " A recent survey of 100 IT professionals at major IT security exhibition Infosecurity Europe revealed surprising trends in individual and corporate use of social media. The Launchpad Europe IT Security Index 2009 was intended to gauge IT professionals' attitudes towards social media, as well as to compare individual and corporate use of social media.

In contrast with the individual survey, in which 61 respondents reported to use Facebook, Twitter and other social media websites, only 21 out of 100 respondents reported that their organisations used social media. Eleven of those 21 organisations (52.38%) are using Twitter—an interesting contrast to the individual portion of the survey, in which only 15 of 61 individuals (24.59%) claimed to use Twitter. Facebook was by far the most popular among individuals, with 51 respondents claiming to use it. Fourteen reported to use other social media, including LinkedIn, LiveJournal and MySpace.

Mike Burkitt, director of European business accelerator Launchpad Europe, said: "Social media cannot be ignored by IT security professionals who know only too well that ignorance is not bliss and it is certainly no defense. No use are comments of 'tweeter beware,' 'my Facebook lips are sealed' or 'I don't know about Bebo.' IT security professionals must embrace all aspects of the social media phenomenon to fully understand this constantly evolving hotbed for information leakage and social engineering-savvy hackers. My advice is to make yourself and your company fluent in IT security 3.0."

According to the survey, companies are more likely to update their websites on a daily basis than individuals are. Ten of the 21 organisations who reported to use social media also said they updated their websites at least once a day. Only a third (20/61) of individuals exerted the same effort; most individuals said they updated their social media websites once or twice a week. Respondents were also asked to rate their concern about the security of social media on a scale of 1 to 5. Responses varied.

Some respondents said that as IT security professionals, they understood the security issues surrounding social media and were therefore less concerned. Other respondents said that as IT security professionals, they saw it as their job to be especially concerned about the security issues surrounding social media. On a scale of 1 to 5, the average concern level was 3.69.

"We accept social media as an insecure medium," said Paul Guckian, a principal consultant at Delaney Consulting. "We are aware it's insecure and it's public."

The simple solution, Guckian argued, is to understand the nature of the medium and to refrain from posting anything you wouldn't want aired in a public forum.

But the public nature of social media might not yet be commonsense for children—and as one respondent pointed out, children will find a way to use social media whether their parents want them to or not.

"It can't be stopped," said Maureen Lamb. "It's just a matter of training children so they understand the risks."

Security was not the only issue concerning respondents. Several respondents expressed scepticism—and even contempt—about the long-term viability of social media for businesses. In response to the suggestion that businesses might benefit from the marketing advantages of social media, one respondent scoffed, "Yeah, if you want to market your products to children." Another respondent, Tom Newton of SmoothWall, said, "People want to connect directly with individuals in companies. They don't want to go on your corporate Twitter."

Newton went on to express a realistic attitude towards the security of social media. He pointed out that security is, has been, and always will be a concern in this world.

"Bad boys will always find a way to use 140 characters to do something naughty," said Newton.

Jon Collins, Service Director at Free Form Dynamics, has some advice for companies concerned about online security: "It is clear that we are entering new territory when it comes to the types of online threats that exist, let alone what should be done about them. While there are considerable business benefits to be had from social networking, we would urge organisations to recognise that it can be a two-edged sword, and deal with the risks accordingly."

More results, analysis, and commentary on Omarketing's Countdown to Infosecurity blog.

About Launchpad Europe Launchpad Europe is a global reaching company, specialising in providing internationally focused organisations with a presence throughout Europe and beyond. Our service ranges from individual sales representation to building an entire, fully functional business entity. Launchpad provides and supports the full range of:

  • Sales and marketing activities
  • Direct and indirect third party channel representation
  • Distribution
  • Technical backup and support services
  • Legal and financial advice
  • HR functionality

    For more information about Launchpad Europe, please visit www.launchpad-europe.com or telephone +44 (0) 20 8255 2345/ +1 781 519 0485 and email [email protected] Press contacts: UK and RoW: Olivia Shannon, Omarketing +44(0) 20 8255 5225 [email protected] Americas: Heidi Groshelle, Groshelle Communications +1 415 563 1893 [email protected] Company contact: Mike Burkitt, Launchpad Europe +1 781 519 0245 +44(0) 20 8255 2345 [email protected]

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned
    Nicole Sette, Director in the Cyber Risk practice of Kroll, a division of Duff & Phelps,  11/19/2019
    DevSecOps: The Answer to the Cloud Security Skills Gap
    Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
    Attackers' Costs Increasing as Businesses Focus on Security
    Robert Lemos, Contributing Writer,  11/15/2019
    Register for Dark Reading Newsletters
    White Papers
    Cartoon Contest
    Current Issue
    Navigating the Deluge of Security Data
    In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2019-11-21
    Multiple cross-site scripting (XSS) vulnerabilities in Chyrp before 2.1.2 and before 2.5 Beta 2 allow remote attackers to inject arbitrary web script or HTML via the (1) content parameter to includes/ajax.php or (2) body parameter to includes/error.php.
    PUBLISHED: 2019-11-21
    The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference.
    PUBLISHED: 2019-11-21
    Multiple cross-site request forgery (CSRF) vulnerabilities in Synametrics Technologies SynaMan before 3.5 Build 1451, Syncrify before 3.7 Build 856, and SynTail before 1.5 Build 567
    PUBLISHED: 2019-11-21
    rConfig 3.9.2 allows devices.php?searchColumn= SQL injection.
    PUBLISHED: 2019-11-21
    An issue was discovered in Oniguruma 6.x before 6.9.4_rc2. In the function gb18030_mbc_enc_len in file gb18030.c, a UChar pointer is dereferenced without checking if it passed the end of the matched string. This leads to a heap-based buffer over-read.