There has been a lot of discussion around the security risks associated with social networking sites, especially when it comes to malicious attacks carried out by cyber criminals. But employees disclosing confidential data and the secure usage of social identities in business processes are quickly emerging as other areas of apprehension for IT admins and business managers.
Companies are increasingly using identity data created on social media sites to conduct business transactions, as it often provides for improved efficiency and better communication with customers. In fact, a number of identity and access management (IAM) protocols, such as OAuth, have emerged that facilitate identity-based interactions between businesses and social media sites. But organizations that rely upon identity information provided by third parties, such as Facebook and Twitter, must balance the benefits of doing so with the security and liability risks that can result.
Lighthouse Security Group has compiled the following tips to help companies securely use social networking sites in business processes.
2012's Hottest New TabletsA line up of the newest tablets to hit the market.
Five Tips to Brave the BYOD Boom Five tips for IT professionals facing the latest threat to identity and intellectual property.
Five Tips on How to Conduct Business and Save Money at the Gas Pump Learn how leveraging technology can protect your bottom line while doing business.
IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ... More >>
Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ... More >>
To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ... More >>