Social networking at work: Thanks, but no thanks?
|
|
|
- Mary Garrison
- 10 years ago
- Views:
Transcription
1 GFI White Paper Social networking at work: Thanks, but no thanks? Millions of people around the world with access to the Internet are members of one or more social networks. They have a permanent online presence where they create profiles, share photos, share their thoughts with friends and spend hours just catching up with what hundreds of friends are doing with their life.
2 Contents The Pros 3 The Cons 3 Thanks, but no thanks! 4 Striking a balance 4 About GFI 5 Social networking at work: Thanks, but no thanks? 2
3 Give most people access to the Internet and they will spend the next hour checking their , their Facebook profile, their MySpace webpage, updating their Twitter account and their LinkedIn account. It is addictive, occasionally fun and it does bring to light a lot of lost contacts. But the positives aside, if you own a business would you want your employees to be so keen on social networking that they could be spending unacceptably long periods of time online and chatting? No. And while most employers are willing to close an eye to the occasional quick browse and update, they are more concerned about those who abuse the system. This brings us to the all-important question: What should I do? Weighing the pros and cons of social networking at work can help businesses reach a decision that in the first instance safeguards the company s interests yet also takes into consideration the needs and practices/ hobbies that today s employees have. The Pros 1. Used diligently, social networking sites can be useful in expanding market reach, widening the business s circle of contacts, creating a communication platform with clients and advertise for free. 2. They can help a business to reach out to new markets, remain in touch with existing customers and use the snowball effect to market its services or products. 3. A positive presence online can boost a business s reputation and establish the name in new areas before taking the physical plunge. 4. Social networking is a free source of marketing and advertising. The only cost to the business is the time and effort required to maintain the network and the official website. The Cons 1. The main concern for organizations is not social networking sites per se but the people using them. Social networkers are the weakest link and their actions can create problems. Computer users actions are often based on impulse and not genuine awareness of what they are doing. 2. The P-word. Productivity. One reason why social networking sites are given a cold shoulder is the fact that employees could be spending unacceptably long on these sites. If every employee in a 50-employee company spent 30 minutes on social networking every day of a working week, that would total a cumulative productivity loss of 6,500 hours in one year. Now when you factor in how much each hour costs in salaries, you get a better and convincing picture. There is also an effect on company morale. While everyone sneaks a peek at his or her profile during the day, most employees would frown upon those whose social networking profile is open throughout the day. Morale is further hit if no action is taken. 3. Although updates to social networking sites may not take up huge amounts of bandwidth, the availability of (bandwidth-hungry) video links posted on these sites (or links taking users to sites like YouTube) creates problems for IT administrators. There is a cost to Internet browsing, especially where high levels of bandwidth are required. 4. The threat from web-borne viruses and malware is often overlooked by businesses. Hackers are attracted to social networking sites because they see the potential to commit fraud and launch spam and malware attacks. There are tens of thousands of applications available for Facebook (according to the company) and while Facebook may make every effort to provide protection against malware, these third-party applications may not all be safe. Some have the potential to be used to infect computers with malicious code which in turn can be used to collect data from that user s site. Messaging on social networking sites is also a concern and the Koobface worm is but one example of how messages are used to spread malicious code and worms. A worm infection is the last thing an administrator wants to have to deal with! If you want to learn how to protect yourself from these threats, read Microsoft MVP Brad Dinerman s detailed article here: Social networking at work: Thanks, but no thanks? 3
4 5. Social engineering is a fine art and a lot of people are falling for online scams that appear genuine. The scope is to take information from users using subtle methods. For example, a quiz asking 20 questions about you, your lifestyle and habits, could provide the answers required for identity verification purposes on other sites. Telling everyone what your favorite pet s name is may be harmless but you may also have used that as a secret question on a site to remind you what your password is. Simple and clever. People also have a habit of posting details in their social networking profiles that beggars belief. While they would never disclose certain information when meeting someone for the first time, they see nothing wrong with posting it online for all to see on their profile, personal blog or other social networking site accounts. People often post messages without thinking through what they have written. A seemingly innocuous message such as I m working this weekend because we ve found a problem in our front-end product may be a spur of the moment comment but could raise concern among customers who may use that system, especially if the company handles confidential or financial detail. 6. Although there have been no major corporate lawsuits involving evidence from social networking sites, businesses need to be observant for employees who may be commenting publicly and talking about their employer. There are also serious legal consequences if employees use these sites and click on links to view objectionable, illicit or offensive content. An employer could be held liable for failing to protect employees from viewing such material. Apart from legal costs and fines, the damage to the organization s reputation could both be substantial. Thanks, but no thanks! Businesses need to take stock of the situation and decide whether the risk of allowing people to use social networking sites at work is acceptable or not. Businesses have three options: 1. Don t do anything, 2. Block everything (and that means Internet too), or 3. Be kind and let them use the Internet but only when you want them to. Today, most businesses opt for number three because it makes most business sense. You know your employees need the Internet to work. So blocking access is not really an option. Giving them total access to do what they want online is taking trust to the extreme. Yet having the ability to block or allow sites according to the business s needs is a solution that can and does work. Striking a balance In today s networked world, it is impossible to isolate a business because of social networking sites. Despite the concerns, there are steps a business can take to allow social networking at the office and still maintain a level of control. Here are a few pointers: 1. Restrict access. Allow access during their lunch break, before work starts and after work. This can easily be done using Internet monitoring and filtering software (and myriad other things). 2. Educate and train staff. Most employees are not aware of the time they spend on Facebook or that their actions online can cause security issues. Tell them in a language they understand how a simple click on a link they receive or an application they download can result in malware infecting their machine and the network. Additionally, tell them not to click on suspicious links and to pay attention when giving out personal details online. Social networking at work: Thanks, but no thanks? 4
5 3. Set security and usage policies. Have all employees sign any policies related to the use of the Internet at work, access to social networking sites and what they are allowed to say or do during office hours. Monitoring of all web activity is important and employees should be aware that their actions are being recorded and that failure to adhere to company policy can result in disciplinary action and/or dismissal. About GFI GFI Software provides web and mail security, archiving, backup and fax, networking and security software and hosted IT solutions for small to medium-sized enterprises (SMEs) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold Certified Partner. More information about GFI can be found at Social networking at work: Thanks, but no thanks? 5
6 USA, CANADA AND CENTRAL AND SOUTH AMERICA Weston Parkway, Suite 104, Cary, NC 27513, USA Telephone: +1 (888) Fax: +1 (919) UK AND REPUBLIC OF IRELAND Magna House, London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) Fax: +44 (0) EUROPE, MIDDLE EAST AND AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: Fax: AUSTRALIA AND NEW ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: Fax: [email protected] Disclaimer GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided as is with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, outof-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.
How to create a complex and secure backup strategy
GFI White Paper How to create a complex and secure backup strategy Data is the lifeblood of every organization and business. Data theft and data loss through negligence or hardware failure can cause irreparable
How to configure IBM iseries (formerly AS/400) event collection with Audit and GFI EventsManager
GFI White Paper How to configure IBM iseries (formerly AS/400) event collection with Audit and GFI EventsManager This document explains how to configure and use GFI EventsManager to collect IBM iseries
The importance of an Acceptable Use Policy
GFI White Paper The importance of an Acceptable Use Policy In an ideal world, employees would use the computers and Internet access provided their employer solely for business use. It is however, sadly,
GFI White Paper. How Web Reputation increases your online protection
GFI White Paper How Web Reputation increases your online protection Contents Introduction to Web Reputation 3 Why use Web Reputation? 3 The value of using Web Reputation and antivirus software 3 The value
GFI MailSecurity deployment strategies
GFI White Paper GFI MailSecurity deployment strategies Which operating mode(s) to use in your network environment GFI MailSecurity can be deployed as an SMTP gateway or as a VS API version for Microsoft
The business implications of not having a backup strategy: where businesses get it wrong
GFI White Paper The business implications of not having a backup strategy: where businesses get it wrong A business that fails to maintain a copy of its data is asking for trouble. It is extremely easy
Archiving technologies
GFI White Paper Archiving technologies Have you ever considered the impact one untraceable email can have on an organization or individual s career? With so much corporate information contained within
Patch management with GFI LanGuard and Microsoft WSUS
GFI White Paper Patch management with GFI LanGuard and Microsoft WSUS A cost-effective and easy solution for network-wide patch management This white paper provides an overview of how to use GFI LanGuard
Understanding data backups: why SMEs need them
GFI White Paper Understanding data backups: why SMEs need them Data is the lifeblood of every organization, yet many either fail to back up their data or they are not doing so properly. Losing data can
How to keep spam off your network
GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam
Integrating faxes into today s world of healthcare e-records
GFI White Paper Integrating faxes into today s world of healthcare e-records This white paper examines the obstacles preventing the move away from fax machines, and the benefits of having a communications
GFI Product Comparison. GFI LanGuard 2011 vs Microsoft Baseline Security Analyzer 2.2
GFI Product Comparison GFI LanGuard 2011 vs Microsoft Baseline Security Analyzer 2.2 General features GFI LanGuard 2011 MBSA 2.2 Scheduled scans r Agent-less Agent-based Integration with Active Directory
GFI Product Guide. GFI MailArchiver Archive Restrictions and Licensing Guide
GFI Product Guide GFI MailArchiver Archive Restrictions and Licensing Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty
GFI Product Comparison. GFI LanGuard 2011 vs Retina Network Security Scanner 5.12.1
GFI Product Comparison GFI LanGuard 2011 vs Retina Network Security Scanner 5.12.1 General features GFI LanGuard 2011 Retina 5.12.1 Scheduled scans Agent-less Agent-based Integration with Active Directory
Email security Cloud vs. On-premise solutions
GFI White Paper Email security Cloud vs. On-premise solutions Choosing whether to put your email security in the cloud or host it on premise is a major decision. Hopefully this white paper will help. Contents
GFI MailEssentials Online Archive Configuration and usage
GFI MailEssentials Online Archive Configuration and usage Contents Retention policies 3 Message tagging 4 Access rights 5 Journaling 5 Accessing archived messages 7 Archive search / Viewing archived messages
Protecting your network against email threats
GFI White Paper Protecting your network against email threats The need for comprehensive server-based email security This white paper explains why antivirus software alone is not enough to protect your
Quick Start Guide for administrators
Quick Start Guide for administrators Contents Welcome 3 Your login information 3 Step 1: Adding mailboxes 3 Part 1: Add users 3 Part 2: Add aliases 3 Step 2: Adjusting your spam handling settings 4 Optional
GFI Product Comparison. GFI MailArchiver 6.0 vs Stimulus Software MailArchiva
GFI Product Comparison GFI MailArchiver 6.0 vs Stimulus Software MailArchiva Overview GFI MailArchiver 6.0 is the business archiving solution for small and medium-sized enterprises (SMEs). Reduce PST management
GFI White Paper. Going beyond Exchange 2010 - Why it pays to have a dedicated email archiving solution
GFI White Paper Going beyond Exchange 2010 - Why it pays to have a dedicated email archiving solution Contents Introduction 3 The state of email archiving and data retention 3 The compliance challenge
GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange
GFI Product Comparison GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange GFI MailEssentials Trend Micro ScanMail Suite Microsoft Exchange Server 2003/2007/2010/2013 Integration Option
GFI Product comparison. GFI MailArchiver vs. Microsoft Exchange 2010
GFI Product comparison GFI MailArchiver vs. Microsoft Exchange 2010 GFI MailArchiver 2011 GFI MailArchiver is an industry-leading email management solution. It is used globally by administrators to lower
GFI MailEssentials 2014 Upgrade Guide A guide to upgrading from previous versions of GFI MailEssentials and GFI MailSecurity
GFI MailEssentials 2014 Upgrade Guide A guide to upgrading from previous versions of GFI MailEssentials and GFI MailSecurity The information and content in this document is provided for informational purposes
GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
Survey: Web filtering in Small and Medium-sized Enterprises (SMEs)
September 2010 GFI Software www.gfi.com More and more organizations are seeing value in web filtering and web security solutions, a survey conducted by GFI Software shows, with seven in 10 stating they
Social networking and security risks
GFI White Paper Social networking and security risks By Brad Dinerman The popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as
GFI Product Manual. Outlook Connector User Manual
GFI Product Manual Outlook Connector User Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no
Patch management: Fixing vulnerabilities before they are exploited
GFI White Paper Patch management: Fixing vulnerabilities before they are exploited Managing and administering software updates remains one of the most challenging and resource-intensive tasks an IT Department
GFI product comparison. GFI MailArchiver vs. Microsoft Exchange 2010
GFI product comparison GFI MailArchiver vs. Microsoft Exchange 2010 GFI MailArchiver GFI MailArchiver is an industry-leading email management solution. It is used globally by administrators to lower email
GFI Product Guide. How to create a new SQL Server Instance in Microsoft SQL Server 2012 and SQL Server Express
GFI Product Guide How to create a new SQL Server Instance in Microsoft SQL Server 2012 and SQL Server Express The information and content in this document is provided for informational purposes only and
GFI Product Comparison. GFI MailArchiver 6.0 vs Quest Software Archive Manager
GFI Product Comparison GFI MailArchiver 6.0 vs Quest Software Archive Manager General features GFI MailArchiver 6.0 Quest Software Archive Manager Supports Microsoft Exchange 2000, 2003 and 2007 Supports
GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0
GFI Product Comparison GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0 GFI MailEssentials Symantec Mail Security for Microsoft Exchange 7.0 Supports Microsoft Exchange Server 2003
GFI MAX RemoteManagement Building Blocks to Managed services
GFI MAX RemoteManagement Building Blocks to Managed services Overview GFI s Building Block Program is all about making Managed Services a practical reality for IT support companies. A recent survey found
GFI Product Comparison. GFI MailArchiver 6.0 vs EMC EmailXtender Archive Edition
GFI Product Comparison GFI MailArchiver 6.0 vs EMC EmailXtender Archive Edition General features GFI MailArchiver 6.0 EMC EmailXtender Archive Edition Supports Microsoft Exchange Server 2000, 2003 and
GFI Product Comparison. GFI MailArchiver 6.0 vs Waterford Technologies MailMeter Archive
GFI Product Comparison GFI MailArchiver 6.0 vs Waterford Technologies MailMeter Archive General features GFI MailArchiver 6.0 Waterford Technologies MailMeter Archive Supports Microsoft Exchange Server
GFI product comparison. GFI MailArchiver vs. Symantec Enterprise Vault
GFI product comparison GFI MailArchiver vs. Symantec Enterprise Vault General features GFI MailArchiver Symantec Enterprise Vault Supports Microsoft Exchange Server 2003, 2007 and 2010 Supports distributed
GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options
GFI FAXmaker for Exchange/SMTP 12: An introduction to the architecture and deployment options An overview of how GFI FAXmaker works, and how to deploy it This white paper describes the different ways in
GFI Product Manual. GFI MailArchiver Evaluation Guide
GFI Product Manual GFI MailArchiver Evaluation Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
GFI Cloud white paper. Cloud-based services: Easing the IT burden while taking control. www.gficloud.com
GFI Cloud white paper Cloud-based services: Easing the IT burden while taking control www.gficloud.com Contents Introduction 3 Transferring workload into the cloud 4 Managing the cloud 5 Summary 6 About
Vulnerability management: Key questions you should be asking
GFI White Paper Vulnerability management: Key questions you should be asking Is vulnerability management critical for a business? Aren t traditional security tools sufficient to protect and secure the
Endpoint Protection Performance Benchmarks
Endpoint Protection Performance Benchmarks GFI Software conducted objective performance testing on four, publically available business endpoint protection security software products on Windows 7 Professional
GFI Product Guide. GFI Archiver Evaluation Guide
GFI Product Guide GFI Archiver Evaluation Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
GFI Product Manual. Version 6.0. Getting Started Guide
GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
GFI Product Manual. GFI MailArchiver Outlook Addon
GFI Product Manual GFI MailArchiver Outlook Addon The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
GFI Product Guide. GFI Archiver and Office 365 Deployment Guide
GFI Product Guide GFI Archiver and Office 365 Deployment Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,
GFI Product Manual. Outlook Connector Manual
GFI Product Manual Outlook Connector Manual The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
How To Set Up A Journaling Mailbox In Microsoft Office 365 And Gfi Mailarchiver
GFI Product Guide GFI MailArchiver and Office 365 Deployment Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any
GFI Product Guide. GFI MailArchiver Archive Assistant
GFI Product Guide GFI MailArchiver Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
Why organizations need to archive email
GFI White Paper Why organizations need to archive email The underlying reasons why corporate email archiving is important Over the past few years, email has become an integral part of the business workflow.
How to perform network-wide security event log monitoring
GFI White Paper How to perform network-wide security event log monitoring Using GFI EventsManager for intrusion detection and essential auditing of security event logs This white paper explains the need
GFI Product Manual. Evaluation Guide Part 1: Quick Install
GFI Product Manual Evaluation Guide Part 1: Quick Install The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,
GFI Product Manual. Evaluation Guide Part 1: Quick Install
GFI Product Manual Evaluation Guide Part 1: Quick Install The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind,
GFI Product Guide. Archive Assistant
GFI Product Guide Archive Assistant The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied,
BUILDING BACKUP AS A SERVICE (BaaS)
BUILDING BACKUP AS A SERVICE (BaaS) Whitepaper backup.gfimax.com Backup-as-a-Service (BaaS): A fantastic opportunity for MSPs and IT Support Providers Everyone needs backup. But, it is a thankless job,
Evaluation guide. Evaluator s guide to getting the maximum benefit out of a GFI LanGuard trial
Evaluation guide Evaluator s guide to getting the maximum benefit out of a GFI LanGuard trial Contents GFI LanGuard 2012 evaluation guide 1 Introduction 4 GFI LanGuard overview 4 Why do customers purchase
SPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
GFI Product Manual. Web security, monitoring and Internet access control. Evaluation Guide Part 1: Quick Install
GFI Product Manual Web security, monitoring and Internet access control Evaluation Guide Part 1: Quick Install The information and content in this document is provided for informational purposes only and
Whitepaper: Virtualized fax servers why they re better than an appliance
Whitepaper: Virtualized fax servers why they re better than an appliance Organizations can achieve numerous benefits as they move from traditional manual faxing to a network fax server solution. Here are
