Access "Social media: A security challenge and opportunity"
This article is part of the March 2013 issue of The security risk sweeping Europe
New and recent entrants to the global workforce are posing increasing security challenges to their employers as they mix personal and private lives. Nowhere is this more evident than in the use of social media, often accompanied by a low regard or even total disregard for privacy concerns. Some 91% of Generation Y students and workers believe the age of privacy is over, while a third are unconcerned about the data that is captured about them, according to the latest Cisco Connected World Technology Report. “More Generation Y workers globally said they feel more comfortable sharing personal information with retail sites than with their own employers' IT departments,” says Cisco. This attitude is at odds with business concerns about the disclosure of commercially sensitive information through social media to potentially hundreds of millions of Twitter and Facebook users. In Europe, concerns about privacy linked to security are particularly acute, as evidenced by proposals for a new cyber security directive that link privacy and security. The proposals aim to ... Access >>>
Premium Content for Free.
Social media: A security challenge and opportunity
by Warwick Ashford
Generation Y workers are posing increasing security challenges to their employers as they share data unreservedly
- Social media: A security challenge and opportunity by Warwick Ashford
Misuse of social media could wreak havoc, warns World Economic Forum
by Bill Goodwin
The rapid spread of false information through social media poses a growing threat to business and society, the World Economic Forum has warned
- Misuse of social media could wreak havoc, warns World Economic Forum by Bill Goodwin
Spanish police arrest ransomware cyber gang
by Warwick Ashford
Police in Spain have arrested a gang of 11 cyber criminals who used "ransomware" to demand money from thousands of victims in 30 countries
- Spanish police arrest ransomware cyber gang by Warwick Ashford
More Premium Content Accessible For Free
Social Engineering in IT Security
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...
Gartner: Digital transformation: How to survive the information crisis
It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...
Deloitte CIO Survey 2014
Deloitte's second global CIO survey assesses CIO's role in innovation, spending and technology priorities, and their relationship with the business.