Security Pros warm to Web 2.0 access

Security Pros warm to Web 2.0 access

Facebook, LinkedIn and Twitter, once viewed as high-risk, productivity-sucking applications, seem to have wiggled their way into the hearts of security teams.

Facebook, LinkedIn and Twitter, once viewed as high-risk, productivity-sucking applications, seem to have wiggled their way into the hearts of security teams nationwide. In fact, most organizations no longer block the popular web sites and allow employees to access these Web 2.0 applications at work, according to a new survey from the Security Executive Council.

The research, which was released last week week at the CSO Perspectives conference, reveals 86 per cent of organizations who responded to an open poll on the council's web site said they do allow workers to use Web 2.0 applications, such as Facebook, LinkedIn and Twitter, while on the job and/or with a company-issued computer.

The topic of social networking and work access was the subject of a spirited discussion among professionals who attended CSOP, a three-day event in Clearwater, Florida. Some in attendance pointed to Web 2.0 access as a necessary recruiting and retention tool.

"We talk about Web 2.0, but there is also a concept I call Employee 2.0," said Mark Small, vice president of enterprise sales with Websense, a security software provider based in San Diego."If you go out and try to hire some kids now, they ask: 'Can I have access to Facebook at work?' If you say no, they will go and work for someone else."

Small, in a presentation on Web 2.0 applications, noted among major employers in the United States, IBM currently estimates the company has 33,000 Facebook accounts among employees.

CSOs and CISOs that allow access to Facebook, LinkedIn, Twitter and other social networking sites were the majority voice in a panel discussion on the topic. Leslie Lambert, CISO of Sun Microsystems, said social networking sites have become a standard part of her hiring process.

"How many of you have hired someone recently without looking them up first on LinkedIn?" she asked the audience. Very few hands went up in response.

Those who restrict access in their organizations were also vocal on their reasons for holding out. Chief concerns included a potential hack or breach of company information because social engineering scams have become common on Facebook, Twitter, MySpace and other similar sites.

Derek Benz, CISO of Honeywell, said another concern is potential damage to the company's reputation.

"Many people form groups associated with their company on these sites and the company can not necessarily control what is said in those groups."

Lambert said Sun Microsystems was also concerned about what employees might do or say as a representative of the company on social networking sites. As a result, Sun has crafted an 'electronic discourse' policy that all workers sign before they start with the company. Policies, however, can only go so far in mitigating risks.

"I have a lot of policies," said Lambert. "But I don't run a police state."

Jerry Nolasco, a vice president of global information security with Franklin Templeton Investments in St. Petersburg, Florida, said he has opened up access to Facebook, Twitter and LinkedIn on a limited basis to select employees, such as human resources, who have a clear business need to access the sites. While only a small number can access the sites now, Nolasco admits he will likely open them up to all eventually.

"We are looking at re-engineering and investing in tools that will allow employees to securely use Facebook and Twitter at work," he said.

Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags social networkingWeb 2.0

Show Comments