Best Practices for Securely Utilizing Social Networking Sites in Business Processes - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Best Practices for Securely Utilizing Social Networking Sites in Business Processes-6 Next

While it’s not necessarily possible to monitor all information an employee may post to social media sites and networks, companies can take preventative measures through the usage of common Web security technologies. While employees are at work, or logged into the company network, a good practice is to use a Web filtering technology that either manages or prohibits altogether employee access to social media sites, like Facebook and Twitter. This will cut down on the potential for employees to share sensitive company data while keeping employees on-task. Employing the use of Data Leakage Prevention (DLP) technology can also add another layer of defense against employees proliferating sensitive company data.

There has been a lot of discussion around the security risks associated with social networking sites, especially when it comes to malicious attacks carried out by cyber criminals. But employees disclosing confidential data and the secure usage of social identities in business processes are quickly emerging as other areas of apprehension for IT admins and business managers.

Companies are increasingly using identity data created on social media sites to conduct business transactions, as it often provides for improved efficiency and better communication with customers. In fact, a number of identity and access management (IAM) protocols, such as OAuth, have emerged that facilitate identity-based interactions between businesses and social media sites. But organizations that rely upon identity information provided by third parties, such as Facebook and Twitter, must balance the benefits of doing so with the security and liability risks that can result.

Lighthouse Security Group has compiled the following tips to help companies securely use social networking sites in business processes.

More Slideshows:


2012's Hottest New TabletsA line up of the newest tablets to hit the market.

Five Tips to Brave the BYOD Boom Five tips for IT professionals facing the latest threat to identity and intellectual property.

Five Tips on How to Conduct Business and Save Money at the Gas Pump Learn how leveraging technology can protect your bottom line while doing business.

 

Related Topics : Application Security, IT Process Management, Six Sigma

 
More Slideshows

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.