The same can be said, and should be said, for Enterprise 2.0.
Policy formation and risk management, along with governance programs, are necessary to properly address legal, security, compliance, identity, and related business concerns. There have been some quotes that state a belief that employees are aware of information issues such as confidentiality, intellectual property, privacy, etc. That is simply not true. People have always been one of the weak links when it comes to breaches - time and time again. There are technical things that vendors proclaiming themselves as "E2.0" solutions should be doing but that does not remove the need to raise these issues with employees and the responsibilities they have re: communication, information sharing, and collaboration using social tools and applications.
Twittergate: “Most difficult part of Web 2.0 security is the human” | VentureBeat
So what can you do to protect yourself? The difficult part of Web 2.0 security isn’t actually the technical side. It’s the human, said David Marcus, director of security, research & communications at security software maker McAfee.
He had a few pieces of advice:
1. Be careful about what you share: It becomes easier and easier to share personal details without thinking on Twitter. Compiled together, a person’s entire tweet stream can easily reveal where they live.
2. Don’t use your Twitter password for other Web 2.0 services. From a hacker’s perspective, if a password combination works on Twitter it’s probably worth trying elsewhere.
3. Be judicious about the third-party applications you access.
4. If you’re keeping data in the cloud (in any service, e-mail, Twitter or otherwise), do due diligence to make sure that company has good security practices.
Twittergate: “Most difficult part of Web 2.0 security is the human” | VentureBeat
Comments
You can follow this conversation by subscribing to the comment feed for this post.