Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Free White Paper Deals With Five Main Threats From Social Networking

ISACA : 09 June, 2010  (Technical Article)
ISACA has been examining social media and related threats, identifying the top five threats to businesses and detailing the handling of these threats in a free white paper available from the organisation's web site
ISACA has named the top five social media risks for business and recommended solutions to help businesses address security, customer service and corporate reputation risks raised by their employees' use of social media—on the job and off.

In a complimentary new white paper titled "Social Media: Business Benefits With Security, Governance and Assurance Perspectives," ISACA, a global association for enterprise governance of information technology, urges organizations to actively address the following potential risks:

• Viruses/malware
• Brand hijacking
• Lack of control over content
• Unrealistic customer expectations of "Internet-speed" service
• Non-compliance with record management regulations

Developed by a team of global ISACA experts, the white paper goes beyond the traditional look at social media in the workplace to address employees' use of social media outside of work. It also provides detailed how-to tips for effective social media governance. A free copy can be downloaded at the ISACA web site.

"Historically, organizations tried to control risk by denying access to cyberspace, but that won't work with social media," said Robert Stroud, CGEIT, international vice president of ISACA and vice president of IT service management and governance for the service management business unit at CA Technologies. "Companies should embrace it, not block it. But they also need to empower their employees with knowledge to implement sound social media governance."

Since tools like Facebook and Twitter don't require support from the IT department, they can be introduced by a business unit, marketing team or individual employees, and bypass IT, HR and Legal. This issue is reflected in IT department attitudes—62% of respondents to the 2010 ISACA IT Risk/Reward Barometer rated the risk posed by employees visiting social networking sites or checking personal e-mail as medium or high.

"The greatest risks posed by social media are all tied to violation of trust," said ISACA Certification Committee member John Pironti, CISM, CRISC, and president of IP Architects LLC. "Social media is built on the assumption of a network of trusted friends and colleagues, which is exploited by social engineering at great cost. That is why ongoing education is critical."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo