{"id":2040,"date":"2012-02-06T09:03:36","date_gmt":"2012-02-06T17:03:36","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=2040"},"modified":"2022-04-13T02:23:47","modified_gmt":"2022-04-13T09:23:47","slug":"three-ways-social-media-can-put-enterprises-at-risk","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2012\/02\/three-ways-social-media-can-put-enterprises-at-risk\/","title":{"rendered":"Three Ways Social Media Can Put Enterprises at Risk"},"content":{"rendered":"<p>In a recent post for ReadWriteWeb (3 Ways Social Media Can Put Enterprises at Risk), I outlined a few IT security \u201cblind spots\u201d that many companies are currently trying to address when dealing with social media applications. As last week's blog post on our Application Usage and Risk Report findings pointed out, I am convinced that social media is here to stay in the enterprise. To expand upon the points I made in that article, I\u2019d like to add a few additional details to expound on my opinions around approaching these \u201cblind spots\u201d.<\/p>\n<p><!--more-->On basic user education: It helps, but we\u2019ve seen time and again that hackers can always count on user behavior to provide the openings they need to penetrate network defenses.   <\/p>\n<p>On SSL, being a double-edged sword: On the one hand, as an end user, SSL encryption is often the only thing protecting your connection to web applications and services, which is particularly important if you\u2019re using a public or poorly-secured Wi-Fi network. Several high-profile social media account hacks, advocacy by consumer-protection groups and the introduction of freely-available packet sniffing tools (such as Firesheep) drove home the importance of encryption for all kinds of web services. However, on the other hand, ongoing problems with certificate authorities themselves only emphasize the point that just because traffic is encrypted doesn\u2019t mean that it\u2019s safe. In addition, SSL can actually increase the risks to your organization because this same encryption hides your users\u2019 traffic from all the (expensive) hardware and software in which your company has invested to protect users on the company network \u2013 unless they\u2019re using a next generation firewall. Here\u2019s where IT can take the lead role by ensuring that their network defenses have deep visibility into all network traffic, including SSL.<\/p>\n<p>On mobile devices, particularly application security: IT can issue user guidance on remote access for popular consumer devices and, obviously, a VPN will likely be the most secure connection that employees can use. Products such as <a href=\"https:\/\/www.paloaltonetworks.com\/products\/globalprotect\" target=\"_blank\" rel=\"noopener\">GlobalProtect<\/a> go a step beyond this, delivering protection and performance so that employees will actually use them. Also, although user education will never be something that security professionals can rely upon to obstruct risk, in the end it still helps in edge cases where mature solutions are still emerging. For instance, given the prevalence of insecure mobile applications for consumer collaboration that may crossover with work activities, IT can issue recommendations on which applications their employees use for accessing work email and similar communications. This may help minimize the overall risk to their personal accounts on Facebook and other social sites. The more secure the information is on \u201cnon-work\u201d websites, the less likely that those accounts will be used in phishing attacks or the like to attack employees in your organization.<\/p>\n<p>By utilizing the above strategies and combining them with rock-solid network security and other security technologies where appropriate, you can make sure your company is able to maintain productivity at the speed that your business demands it.<\/p>\n<link rel=\"author\" href=\"https:\/\/plus.google.com\/114253851106284887789\"\/>\n","protected":false},"excerpt":{"rendered":"<p>In a recent post for ReadWriteWeb (3 Ways Social Media Can Put Enterprises at Risk), I outlined a few IT security \u201cblind spots\u201d that many companies are currently trying to address when &hellip;<\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[31,1814,40,1815,25],"coauthors":[917],"class_list":["post-2040","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-application-control","tag-application-usage-risk-report","tag-file-sharing","tag-firewall","tag-social-networking"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2040","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2040"}],"version-history":[{"count":8,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2040\/revisions"}],"predecessor-version":[{"id":3744,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2040\/revisions\/3744"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2040"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2040"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2040"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=2040"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}