TMCnet - World's Largest Communications and Technology Community



Understanding and Mitigating Business Risk of Social Media in the Workplace
[April 01, 2014]

Understanding and Mitigating Business Risk of Social Media in the Workplace

(M2 PressWIRE Via Acquire Media NewsEdge) Dublin - Research and Markets ( has announced the addition of the "Understanding and Mitigating Business Risk of Social Media in the Workplace" report to their offering.

The nature of cyber threats is continually adapting to changing technology trends. Social media inparticular is a trend that provides significant benefits for businesses. Social networking Web sitesand applications offer a notable opportunity to target a new and far-reaching customer base withdynamic and engaging content. As a result, businesses are increasingly leveraging social media formarketing and other external communications. Threat actors, taking advantage of social media'spopularity, are adapting accordingly.

This SPIE will explain the threats to information security posed by social media in business environments, followed by best practices to minimize risk. Social Media Usage Exposes Businesses to Varying Levels of Risk Social media elevates the risk of data loss and security breaches; and risk is magnified when the threats are not well understood. A more complete understanding of social media threats is the first step to mitigating risk.

Vulnerabilities in Social Networking Sites As with any Web site, social networking sites are vulnerable to technical flaws. These vulnerabilities represent attack points for threat actors, allowing hackers to gain illegitimate access, privileges, and capabilities. Threat actors, for example, utilize cross site scripting (XSS) or SQL injection attacks, among other techniques, to inject malicious code into legitimate Web sites, or to intercept data such as user credentials.

Threats Propagate through Social Networking Web Sites A far greater risk is social media as a conduit for malware and spam. Malicious links and malware infected files can rapidly spread across social networks. Malware can use compromised accounts to post malicious links with tempting headlines that entice users to follow the link, all without the account owner's knowledge. Opening a malicious link directs users to phishing Web sites or Web sites hosting drive-by malware. These newly infected computers will then continue the cycle by posting additional poisoned links, and can perform other unwanted actions such as stealing credentials and sensitive personal information, or targeting other users with spam or malware.

Third-party Functionality and Content Present Soft Targets Even if social networking companies make substantial efforts to secure their Web sites inevitably third-party functionality represents a potential soft target for hackers. For example, a breach at the customer service specialist Zendesk resulted in leaked email addresses, phone numbers, and message subject lines for Twitter, Pinterest, and Tumblr users.

Key Topics Covered: - Introduction - Social Media Usage Exposes Businesses to Varying Levels of Risk - Next Generation Information Security Technologies Address Social Media Risk - The Human Element is the Greatest Social Media Risk - Stratecast - The Last Word For more information visit CONTACT: Research and Markets, Laura Wood, Senior Manager. Fax from USA: 646-607-1907 Fax from rest of the world: +353-1-481-1716 Sector: Business ( .


[ Back To's Homepage ]

Technology Marketing Corporation

35 Nutmeg Drive Suite 340, Trumbull, Connecticut 06611 USA
Ph: 800-243-6002, 203-852-6800
Fx: 203-866-3326

General comments:
Comments about this site:


© 2017 Technology Marketing Corporation. All rights reserved | Privacy Policy