Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

09:50 AM
Dark Reading
Dark Reading
Products and Releases

Survey: How Security Views Web 2.0

A recent survey of 100 IT pros at Infosecurity Europe reveals trends in individual and corporate use of social media

London, UK " 27th May 2009 " A recent survey of 100 IT professionals at major IT security exhibition Infosecurity Europe revealed surprising trends in individual and corporate use of social media. The Launchpad Europe IT Security Index 2009 was intended to gauge IT professionals' attitudes towards social media, as well as to compare individual and corporate use of social media.

In contrast with the individual survey, in which 61 respondents reported to use Facebook, Twitter and other social media websites, only 21 out of 100 respondents reported that their organisations used social media. Eleven of those 21 organisations (52.38%) are using Twitter—an interesting contrast to the individual portion of the survey, in which only 15 of 61 individuals (24.59%) claimed to use Twitter. Facebook was by far the most popular among individuals, with 51 respondents claiming to use it. Fourteen reported to use other social media, including LinkedIn, LiveJournal and MySpace.

Mike Burkitt, director of European business accelerator Launchpad Europe, said: "Social media cannot be ignored by IT security professionals who know only too well that ignorance is not bliss and it is certainly no defense. No use are comments of 'tweeter beware,' 'my Facebook lips are sealed' or 'I don't know about Bebo.' IT security professionals must embrace all aspects of the social media phenomenon to fully understand this constantly evolving hotbed for information leakage and social engineering-savvy hackers. My advice is to make yourself and your company fluent in IT security 3.0."

According to the survey, companies are more likely to update their websites on a daily basis than individuals are. Ten of the 21 organisations who reported to use social media also said they updated their websites at least once a day. Only a third (20/61) of individuals exerted the same effort; most individuals said they updated their social media websites once or twice a week. Respondents were also asked to rate their concern about the security of social media on a scale of 1 to 5. Responses varied.

Some respondents said that as IT security professionals, they understood the security issues surrounding social media and were therefore less concerned. Other respondents said that as IT security professionals, they saw it as their job to be especially concerned about the security issues surrounding social media. On a scale of 1 to 5, the average concern level was 3.69.

"We accept social media as an insecure medium," said Paul Guckian, a principal consultant at Delaney Consulting. "We are aware it's insecure and it's public."

The simple solution, Guckian argued, is to understand the nature of the medium and to refrain from posting anything you wouldn't want aired in a public forum.

But the public nature of social media might not yet be commonsense for children—and as one respondent pointed out, children will find a way to use social media whether their parents want them to or not.

"It can't be stopped," said Maureen Lamb. "It's just a matter of training children so they understand the risks."

Security was not the only issue concerning respondents. Several respondents expressed scepticism—and even contempt—about the long-term viability of social media for businesses. In response to the suggestion that businesses might benefit from the marketing advantages of social media, one respondent scoffed, "Yeah, if you want to market your products to children." Another respondent, Tom Newton of SmoothWall, said, "People want to connect directly with individuals in companies. They don't want to go on your corporate Twitter."

Newton went on to express a realistic attitude towards the security of social media. He pointed out that security is, has been, and always will be a concern in this world.

"Bad boys will always find a way to use 140 characters to do something naughty," said Newton.

Jon Collins, Service Director at Free Form Dynamics, has some advice for companies concerned about online security: "It is clear that we are entering new territory when it comes to the types of online threats that exist, let alone what should be done about them. While there are considerable business benefits to be had from social networking, we would urge organisations to recognise that it can be a two-edged sword, and deal with the risks accordingly."

More results, analysis, and commentary on Omarketing's Countdown to Infosecurity blog.

About Launchpad Europe Launchpad Europe is a global reaching company, specialising in providing internationally focused organisations with a presence throughout Europe and beyond. Our service ranges from individual sales representation to building an entire, fully functional business entity. Launchpad provides and supports the full range of:

  • Sales and marketing activities
  • Direct and indirect third party channel representation
  • Distribution
  • Technical backup and support services
  • Legal and financial advice
  • HR functionality

    For more information about Launchpad Europe, please visit www.launchpad-europe.com or telephone +44 (0) 20 8255 2345/ +1 781 519 0485 and email [email protected] Press contacts: UK and RoW: Olivia Shannon, Omarketing +44(0) 20 8255 5225 [email protected] Americas: Heidi Groshelle, Groshelle Communications +1 415 563 1893 [email protected] Company contact: Mike Burkitt, Launchpad Europe +1 781 519 0245 +44(0) 20 8255 2345 [email protected]


    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/13/2020
    Omdia Research Launches Page on Dark Reading
    Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
    Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
    Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-07-13
    The docker packages version docker-1.13.1-108.git4ef4b30.el7 as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 (https://access.redhat.com/errata/RHBA-2020:0053) included an incorrect version of runc that was missing multiple bug and security fixes. One of the fixes regressed in th...
    PUBLISHED: 2020-07-13
    The version of docker as released for Red Hat Enterprise Linux 7 Extras via RHBA-2020:0053 advisory included an incorrect version of runc missing the fix for CVE-2019-5736, which was previously fixed via RHSA-2019:0304. This issue could allow a malicious or compromised container to compromise the co...
    PUBLISHED: 2020-07-13
    An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
    PUBLISHED: 2020-07-13
    The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
    PUBLISHED: 2020-07-13
    A hard-coded telnet credential in the tenda_login binary of Tenda AC15 AC1900 version allows unauthenticated remote attackers to start a telnetd service on the device.