Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Free guide available to securing social media

Network Box : 09 April, 2009  (New Product)
Network Box has made a free guide available containing advice on how to maintain a secure environment whilst using social media and microblogs such as Twitter
Business should review their security policies to include Twitter, according to a guide released by Network Box.

The Guide to Secure Use of Twitter is part of a series of 'securing social media' guides from Network Box, and is designed to help IT managers review or create new user policies and update company security processes to include Twitter and other microblogs.

The most significant security threat to users posed by Twitter is the sharing of links between groups of followers - often masked by URL shortening tools such as tinyurl or - which could be exploited to download malware, or launch a phishing attack. Other potential risks including identity 'hijacking', hacking into user accounts and spam campaigns.

The guide includes this advice for companies:

1 User access: Agree whether your company policy is to allow access to Twitter. There is often a clear business case for using Twitter; so be realistic about whether users should be using it. It may be that don't feel comfortable allowing blanket access to Twitter to all employees, so you could consider granting different access rights to different groups. For example, it may be important for customer-facing or product development staff to use Twitter to communicate with customers or test groups. If you do allow universal access, consider recommending Twitter tools that should and shouldn't be used; and stay up to date with development and use of those tools. Review this policy regularly - this is a fast-changing world.

2 Productivity: As with any interactive media tools, keep a close check on productivity. Make clear to employees that wasting company time on personal activity is not acceptable, whether this is spending time on Twitter, Facebook, personal email or the telephone. Give clear guidelines as to how much time spent on personal contact is acceptable. Ensure clear objectives and targets are set by the HR team or line managers, and are being met. If they are, then productivity is not an issue.

3 Personal security: Educate your employees about the risks of giving away personal details on Twitter, as on any other media. Don't give away your Twitter password, or information on Twitter that could expose any of your other personal account passwords. Commonly, these include: date of birth, mother's maiden name, father's first name, pet's name, key home address details and such like.

4 Downloading malware from unknown sources: Twitter is often used to share information and web links, photos or video links. Make it clear to employees that they should never click on a link they don't trust, or that is sent by someone they don't know personally. This may sound obvious, but with the rise of the 'social web', it is a point well worth re-iterating. URL-shortening tools such as tinyurl or can cloak websites that are being used for malware downloads or phishing attempts. Some of these URL shortening tools (tinyurl and on Firefox) have a 'preview' function, which allows you to view the URL before you click through - these have been developed as a result of increased security concerns and are worth using.

5 Associated reputational risks: As with other social media, make it clear to your employees that they have a contractual duty not to bring their company into disrepute. This includes talking about company business on public conversation networks such as social networks or microblogs.

Simon Heron, Internet Security Analyst for Network Box, says: "The most important thing is that a company's security systems work for, not against, what employees need to do their jobs. Our advice is: make sure your security is up to date so it can deal with new technologies such as Twitter."

Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo