Feeds

Loudmouth workers leaking data through social networking sites

Twitter ye not

Providing a secure and efficient Helpdesk

Almost two-thirds (63 per cent) of sys administrators fear that workers share too much personal information through social networking websites, according to a poll by IT security firm Sophos.

Blabby workers are putting corporate infrastructure and data at risk, according to the survey, which also found that a quarter of organisations got hit by spam, phishing or malware attacks via sites such as Twitter, Facebook, LinkedIn and MySpace.

These social networking sites have become a favourite locale for cybercrooks bent on stealing identities, distributing malware or sending spam.

"The initial productivity concerns that many organisations harboured when Facebook first shot to popularity are giving way to the realisation that there are more deliberate and malicious risks associated with social networking," said Graham Cluley, senior technology consultant at Sophos.

Although one third of organisations still reckon timewasting on social networking sites is the greater issue with sites such as Twitter and Facebook, malware and data leakage were also cited as concerns by many firms.

Attacks on social networking sites over recent months have run the gamut, from scams designed to trick users into sending money to exotic locations under the pretence that a friend is in trouble, to malware disguised as Facebook error messages. Often hackers obtain access to profile using phishing techniques before using these compromised accounts.

The Sophos survey found that one third of respondents has received spam through social networking sites, while one in five (21 per cent) have been the victim of targeted phishing or malware attacks.

Sophos reckons that regulating - rather than proscribing - access to social networking websites is the way to go. "The danger is that by completely denying staff access to their favourite social networking site, organisations will drive their employees to find a way round the ban – and this could potentially open up even greater holes in corporate defences," explained Cluley.

"Let's not also forget that social networking sites can have beneficial business purposes for some firms too, giving them the chance to network with existing customers and potential prospects." ®

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.