Back to Search Start Over

Towards ‘social’ security

Authors :
Jenkins, Chris
Source :
Computer Fraud & Security. Aug2012, Vol. 2012 Issue 8, p18-20. 3p.
Publication Year :
2012

Abstract

Social networking is a common Catch-22 for businesses – allow access to social media sites and the business is opened up to malicious content, phishing schemes and other evils. Declare all social media sites off-limits and employees become frustrated, find workarounds or work elsewhere. The key is to achieve a safe compromise – through an acceptable-use policy tailored to each specific organisation''s risk profile, and enforced through next-generation technologies. Clearly documenting ground rules, expectations and repercussions for out-of-policy behaviour will ensure that end users are aware of what''s considered acceptable use of social vehicles, explains Chris Jenkins of Dimension Data. It''s a common Catch-22 for many business and IT departments: allow access to social media sites and the business is opened up to malicious content, phishing schemes and other evils. Declare all social media sites off-limits and employees become frustrated, find workarounds or simply elect to work elsewhere. The key is to achieve a safe compromise – through an acceptable use policy tailored to each specific organisation''s risk profile, and enforced through next-generation technologies. [Copyright &y& Elsevier]

Details

Language :
English
ISSN :
13613723
Volume :
2012
Issue :
8
Database :
Academic Search Index
Journal :
Computer Fraud & Security
Publication Type :
Periodical
Accession number :
79115066
Full Text :
https://doi.org/10.1016/S1361-3723(12)70084-2