Workplace social networking rising

With social networking use in the workplace rising, companies may need to think more about what policies they have in place.

Office

Employees are increasingly accessing social networking sites while at work, potentially placing their corporate network in greater danger.

Almost a quarter of respondents to a Trend Micro survey said they used social networking sites in the workplace, up from 19 per cent in 2008.

The poll, conducted among 1,600 end users in the UK, US, Germany and Japan, discovered that Germany had seen the biggest rise in office social networking use, followed by the UK.

A disparity between laptop and desktop users was also discovered by the research, with the former more likely than the latter to head to sites such as Facebook and Twitter.

In 2010, 29 per cent of laptop users polled said they went on such sites at work, compared to 18 per cent of desktop users.

Furthermore, laptop users who go online outside of the corporate network are more likely to share confidential data over services such as instant messenger, email and social media applications than workers always connected to the company network.

According to Rik Ferguson, senior security advisor at Trend Micro, companies should be educating their workers on the dangers associated with social networks on a regular basis, rather than just occasionally.

"Any policies that you are going to put in place, one of the most important pillars of that policy is going to be education," Ferguson told IT PRO.

"It's going to be about making sure that people are aware of what kind of information is appropriate to share, what kind of information is not appropriate to share, what kind of tone it is appropriate to engage in when you are having an online conversation," he added.

It is also important for workers to understand the longevity of the data they place on the internet, Ferguson said.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021
What is a botnet?
botnets

What is a botnet?

14 Jul 2021
Trend Micro home network security flaws could let hackers take over PCs
Security

Trend Micro home network security flaws could let hackers take over PCs

26 May 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021