Best Practices for Securely Utilizing Social Networking Sites in Business Processes - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Best Practices for Securely Utilizing Social Networking Sites in Business Processes-5 Next

More and more people are now accessing social networks on their mobile phones and other consumer devices. The geolocation data resulting from these devices can put sensitive company data at risk without employees even realizing it. Interested third parties can use factors such as the location, time, date, frequency and type of posts to determine sensitive information about a job, project, partnership or other business asset.

There has been a lot of discussion around the security risks associated with social networking sites, especially when it comes to malicious attacks carried out by cyber criminals. But employees disclosing confidential data and the secure usage of social identities in business processes are quickly emerging as other areas of apprehension for IT admins and business managers.

Companies are increasingly using identity data created on social media sites to conduct business transactions, as it often provides for improved efficiency and better communication with customers. In fact, a number of identity and access management (IAM) protocols, such as OAuth, have emerged that facilitate identity-based interactions between businesses and social media sites. But organizations that rely upon identity information provided by third parties, such as Facebook and Twitter, must balance the benefits of doing so with the security and liability risks that can result.

Lighthouse Security Group has compiled the following tips to help companies securely use social networking sites in business processes.

More Slideshows:

2012's Hottest New TabletsA line up of the newest tablets to hit the market.

Five Tips to Brave the BYOD Boom Five tips for IT professionals facing the latest threat to identity and intellectual property.

Five Tips on How to Conduct Business and Save Money at the Gas Pump Learn how leveraging technology can protect your bottom line while doing business.


Related Topics : Application Security, IT Process Management, Six Sigma

More Slideshows

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.