Best Practices for Securely Utilizing Social Networking Sites in Business Processes - Slide 4

1 | 2 | 3 | 4 | 5 | 6 | 7
Next Best Practices for Securely Utilizing Social Networking Sites in Business Processes-4 Next

Companies that use a protocol, such as OAuth, to delegate authorization (e.g., function of applications) with social media sites, need to be cognizant of the security policies those sites have in place internally. This is a critical factor in determining the level of trust a company should put in the identity data resulting from social networking channels.

Companies that trust the fact that users are who they say they are because they can delegate authorization to a specific social media site risk overstepping the boundary of legitimate “trust”, as social identities are hardly authoritative anyone can sign up for one free of charge and promote fake identifying information. The bottom line? Companies should treat social identities, and users’ ability to authenticate themselves via social identities, as little more than a convenience. They should not rely upon the authenticated identity, or the identity data from a social profile as authoritative… or anything they’d otherwise base a sensitive transaction upon.

There has been a lot of discussion around the security risks associated with social networking sites, especially when it comes to malicious attacks carried out by cyber criminals. But employees disclosing confidential data and the secure usage of social identities in business processes are quickly emerging as other areas of apprehension for IT admins and business managers.

Companies are increasingly using identity data created on social media sites to conduct business transactions, as it often provides for improved efficiency and better communication with customers. In fact, a number of identity and access management (IAM) protocols, such as OAuth, have emerged that facilitate identity-based interactions between businesses and social media sites. But organizations that rely upon identity information provided by third parties, such as Facebook and Twitter, must balance the benefits of doing so with the security and liability risks that can result.

Lighthouse Security Group has compiled the following tips to help companies securely use social networking sites in business processes.

More Slideshows:

2012's Hottest New TabletsA line up of the newest tablets to hit the market.

Five Tips to Brave the BYOD Boom Five tips for IT professionals facing the latest threat to identity and intellectual property.

Five Tips on How to Conduct Business and Save Money at the Gas Pump Learn how leveraging technology can protect your bottom line while doing business.


Related Topics : Application Security, IT Process Management, Six Sigma

More Slideshows

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Five9RemoteEmployees0x 5 Best Practices to Enable Remote Workers

Recent years have seen a significant increase in the remote workforce as developments in technology have given employees the freedom to work anywhere, anytime. ...  More >>

DataM62-190x128 10 Steps for a Proper Data Governance Plan

Establishing a digital governance plan can be a challenge, but with the right education and tools, the job can be made a lot simpler. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.