Feeds

Loudmouth workers leaking data through social networking sites

Twitter ye not

Choosing a cloud hosting partner with confidence

Almost two-thirds (63 per cent) of sys administrators fear that workers share too much personal information through social networking websites, according to a poll by IT security firm Sophos.

Blabby workers are putting corporate infrastructure and data at risk, according to the survey, which also found that a quarter of organisations got hit by spam, phishing or malware attacks via sites such as Twitter, Facebook, LinkedIn and MySpace.

These social networking sites have become a favourite locale for cybercrooks bent on stealing identities, distributing malware or sending spam.

"The initial productivity concerns that many organisations harboured when Facebook first shot to popularity are giving way to the realisation that there are more deliberate and malicious risks associated with social networking," said Graham Cluley, senior technology consultant at Sophos.

Although one third of organisations still reckon timewasting on social networking sites is the greater issue with sites such as Twitter and Facebook, malware and data leakage were also cited as concerns by many firms.

Attacks on social networking sites over recent months have run the gamut, from scams designed to trick users into sending money to exotic locations under the pretence that a friend is in trouble, to malware disguised as Facebook error messages. Often hackers obtain access to profile using phishing techniques before using these compromised accounts.

The Sophos survey found that one third of respondents has received spam through social networking sites, while one in five (21 per cent) have been the victim of targeted phishing or malware attacks.

Sophos reckons that regulating - rather than proscribing - access to social networking websites is the way to go. "The danger is that by completely denying staff access to their favourite social networking site, organisations will drive their employees to find a way round the ban – and this could potentially open up even greater holes in corporate defences," explained Cluley.

"Let's not also forget that social networking sites can have beneficial business purposes for some firms too, giving them the chance to network with existing customers and potential prospects." ®

Beginner's guide to SSL certificates

More from The Register

next story
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
FBI boss: We don't want a backdoor, we want the front door to phones
Claims it's what the Founding Fathers would have wanted – catching killers and pedos
Kill off SSL 3.0 NOW: HTTPS savaged by vicious POODLE
Pull it out ASAP, it is SWISS CHEESE
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.