Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home IT Management
    • IT Management

    BYOD, Social Media Among Top Security Threats of 2013

    By
    Nathan Eddy
    -
    December 17, 2012
    Share
    Facebook
    Twitter
    Linkedin

      Organizations of all sizes are facing fresh security challenges in the year ahead, due in a large part to bring your own device (BYOD) programs, social media networks and the general “consumerization” of IT, according to a report from information services specialist Wisegate.

      These threats from devices, applications and services, which are no longer fully under the control of an official IT department, introduce a wide range of IT security threats that are completely unintentional but no less real. The report said allowing workers to use their own mobile devices, be they smartphones, tablets or notebook computers, presents a serious threat to network and data security.

      Chief security officers (CSOs) are concerned about the theft, loss or leakage of company data, proper storage and transmittal of company data such as storage in the cloud or transmittal through popular services like Dropbox. They also worry about the limitations of managing devices and how far the organization can, or should, go toward locking down devices. CSOs are also concerned about malware and spyware aimed at mobile devices, and how (or even whether) to support a growing number of devices that use a variety of operating systems, applications, firmware and mobile carriers.

      Social media is another area where platforms like Twitter, LinkedIn or Facebook could be used for spear-phishing attacks and may potentially reveal confidential company information. The report cautioned that there is a need for enforceable policies and procedures as well as awareness training to help control the type of information workers share on a personal level when it might be connected with work assets.

      Consumerization of IT represents a challenge that encompasses social media and BYOD and goes beyond those platforms, as employees increasingly use applications and devices for work that were initially designed for private personal use. Cloud storage sites, while easy to use and readily available, lack security tools that could spur data leakages or other security breaches.

      Unsurprisingly, data protection issues are a major concern for CSOs in light of the trends mentioned above. The report recommended businesses implement programs to combat security issues and raise employee awareness to ensure that sensitive company data isn’t winding up in the wrong places. Losing track of data was also cited as a major issue for businesses, especially as the rise of big data has organizations struggling to cope with a deluge of data that must be analyzed, categorized and safely stored away in a secure location.

      “IT operations and [information security] professionals have their work cut out for them in the year ahead. Though security threat vectors are changing, the underlying principles of how to address them are not. It’s important to get out in front of potential threats and involve everyone in the organization,” the report concluded. “Increasing employee security awareness and convincing workers to adopt more prudent behaviors will go a long way in complementing the technology-based solutions that organizations deploy to protect their network and information assets.”

      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×