Ten Ways the IT Department Enables Cyber Crime - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Ten Ways the IT Department Enables Cyber Crime-5 Next

Social networks are here to stay. This is the new “must-have” technology that segments of your business are demanding for growth. When properly used, it can help tremendously. Ten years ago, the pressure on IT departments was for basic Internet access. Then the demand came for corporate email, and then for Instant Messaging applications. Each of these eventually became mission-critical business tools. Social media is merely the next wave, and we need to be prepared for it.

Many organizations are struggling with the question of how to allow their employees to use Web 2.0 tools responsibly without sacrificing security and regulatory compliance requirements. Social media and Web 2.0 technologies, if used securely, can help organizations increase collaboration and productivity and drive revenue. The focus should be on how organizations should embrace social media in a secure fashion because, with a few exceptions, the outright banning of social media will eventually prove impractical.

A formal policy to control the access and management of social media is essential. For example, if a company protects its perimeter against malware attacks but lacks adequate control for social network access, one employee’s carelessness could lead to malware infecting the company network and causing significant economic losses, either directly or indirectly. Social networks are also a possible means for information leaks by employees who voluntarily share information with third parties.

With the exception of some very controlled academic environments, banning social media will eventually prove impractical. A more practical approach is to employ technology that closely watches the traffic that traverses social media websites and blocks known malicious sites.

End-user demands for access to the World Wide Web and all of the communication vehicles that it affords are at an all-time high. Business demands for those same communication vehicles are also on the rise. The mobility of employees and company data present a growing challenge and keeping up with the exponentially growing cyber crime threat is daunting.

As a result, and often without their knowledge or understanding, many IT departments have become accomplices to cyber crime. This slideshow explains the various ways that corporate IT departments are enabling cyber crime in our environments, and provides some guidelines to prevent this dangerous, destructive practice from continuing.

This slideshow features 10 ways that IT departments are enabling cyber criminals today, as identified by Kaspersky Lab experts, and offers ways to stop them.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

PlexxiITRoles0x IT Roles: The New Faces of Network Infrastructure

The newfound emphasis on tools and service integration is shaping a new crop of industry professionals — the actual faces behind the IT infrastructure. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.