A false sense of security?

NClement's picture

Even the biggest technophobe can’t have missed the soaring popularity of social networking sites such as Facebook, LinkedIn and Twitter over the past couple of years.

Social networking websites can be a powerful channel for firms to communicate with their customers and can build and reinforce brand recognition. Many companies have successfully incorporated social media into their marketing strategy and use it to promote and grow their businesses

But with social networking sites fast becoming the new frontier of the internet, unmonitored use of these sites in the workplace can create reputational, liability and information security risks for the employer.

Facebook and Twitter have recently fallen prey to cyber attacks which have raised serious questions over security loopholes in these sites. A recent survey by IT security firm Sophos revealed that a third of respondents use one password across multiple sites; so if one account is compromised, all accounts are vulnerable. A username/password combination is still the most popular method of accessing IT systems and websites, but its shortcomings are well documented and the need for additional security levels have become even more apparent through the rise of social networking sites.

No doubt, social networking sites have revolutionized communication for individuals and businesses and are making a huge contribution to business networking. But, it is vital that companies also protect themselves against the risks. For any company that uses - or allows its employees to use - social networking sites, additional layers of security for access control will form the first line of defense in the fight against rising number of cyber crime attacks.

HID Global recently launched its new logical access solution HID on the Desktop™ that is designed to strengthen the overall security of a desktop/network logon by requiring two-factor authentication. This means the employee uses their physical access smart card in addition to a password or PIN-based logon. This way, organizations all over the world can further protect themselves from network attacks and have greater control and security over who is accessing what in their IT networks.

What are some of the tactics your organization is implementing to avoid the risks of social networking in order to reap the benefits? Let us know your thoughts.