Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home IT Management
    • IT Management

    BYOD, Social Media Among Top Security Threats of 2013

    Written by

    Nathan Eddy
    Published December 17, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Organizations of all sizes are facing fresh security challenges in the year ahead, due in a large part to bring your own device (BYOD) programs, social media networks and the general “consumerization” of IT, according to a report from information services specialist Wisegate.

      These threats from devices, applications and services, which are no longer fully under the control of an official IT department, introduce a wide range of IT security threats that are completely unintentional but no less real. The report said allowing workers to use their own mobile devices, be they smartphones, tablets or notebook computers, presents a serious threat to network and data security.

      Chief security officers (CSOs) are concerned about the theft, loss or leakage of company data, proper storage and transmittal of company data such as storage in the cloud or transmittal through popular services like Dropbox. They also worry about the limitations of managing devices and how far the organization can, or should, go toward locking down devices. CSOs are also concerned about malware and spyware aimed at mobile devices, and how (or even whether) to support a growing number of devices that use a variety of operating systems, applications, firmware and mobile carriers.

      Social media is another area where platforms like Twitter, LinkedIn or Facebook could be used for spear-phishing attacks and may potentially reveal confidential company information. The report cautioned that there is a need for enforceable policies and procedures as well as awareness training to help control the type of information workers share on a personal level when it might be connected with work assets.

      Consumerization of IT represents a challenge that encompasses social media and BYOD and goes beyond those platforms, as employees increasingly use applications and devices for work that were initially designed for private personal use. Cloud storage sites, while easy to use and readily available, lack security tools that could spur data leakages or other security breaches.

      Unsurprisingly, data protection issues are a major concern for CSOs in light of the trends mentioned above. The report recommended businesses implement programs to combat security issues and raise employee awareness to ensure that sensitive company data isn’t winding up in the wrong places. Losing track of data was also cited as a major issue for businesses, especially as the rise of big data has organizations struggling to cope with a deluge of data that must be analyzed, categorized and safely stored away in a secure location.

      “IT operations and [information security] professionals have their work cut out for them in the year ahead. Though security threat vectors are changing, the underlying principles of how to address them are not. It’s important to get out in front of potential threats and involve everyone in the organization,” the report concluded. “Increasing employee security awareness and convincing workers to adopt more prudent behaviors will go a long way in complementing the technology-based solutions that organizations deploy to protect their network and information assets.”

      Nathan Eddy
      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×