ALSO IN THE NEWS...

Security issues continue to haunt social networking

Social networking’s security holes scare many businesses — and apparently for good reason. A recent survey found that half of businesses are staying away from social-networking technology because of security concerns, according to CIO magazine.

Nine out of 10 respondents said they had plans to incorporate social networking, instant messaging, wikis and other technologies into their operations, according to the survey, which Webroot Software commissioned and presented at the Infosec 2009 conference last week.

Only 15 percent said they had resolved the security issues, and 25 percent said they would proceed with their social-networking plans anyway.

Another survey presented at Infosec 2009 shows why businesses should be wary.

Vnunet.com reported that one-quarter of businesses say some of their employees have been victims of spam, phishing or malware because of visits to social-networking sites.

Often the problem is not the host site, such as Facebook or MySpace, but third-party applications integrated into the site, according to a Feb. 18 article by eWeek.com. Often the developer, not the host, manages the server and is responsible for security, experts said.

About the Author

Connect with the GCN staff on Twitter @GCNtech.

inside gcn

  • power grid (elxeneize/Shutterstock.com)

    Electric grid protection through low-cost sensors, machine learning

Reader Comments

Mon, May 11, 2009 Eirik Iverson Chantilly Virginia

Social networking involves exposing the vulnerable software applications running on PCs to even more potentially malicious content that could result in data theft, ransom, or computer hijacking. http://www.blueridgenetworks.com/securitynowblog/endpoint_security/worms-virus-trojan-rob-facebook-myspace-social-network-users One needs to take a different approach to fighting zero-day malware attacks, shifting away from comparing each inbound communication or file to a vast 'most wanted list' (i.e., your typical anti-virus/spyware software) to security solutions that act as a 'chaperone' to the applications that process these inbound communications and files.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group