The Ten Commandments for web 2.0

Security supplier Websense has published the 10 commandments for businesses to adhere to if they are to get the best out of web 2.0 technologies. Survey...

Security supplier Websense has published the 10 commandments for businesses to adhere to if they are to get the best out of web 2.0 technologies:

  1. Survey employees and understand how they use web 2.0 - Different user groups need different things
  2. Agree and define your company policy - Have an opinion, then document this philosophy
  3. Monitor web 2.0 usage (inbound and outbound) - To protect employees and corporate assets
  4. Ensure 'inclusive' policies - Corporate policy should apply to all user groups, all roles and fixed vs. mobile
  5. Secure employee corporate identities - Do you want corporate identities posted on social networks?
  6. Don't assume old issues are no longer issues - Pornography, gambling and hacking content is rife in the web 2.0 landscape
  7. Protect internal confidential data from leaking out - One of the biggest hidden dangers of web 2.0
  8. Mitigate inbound malicious threats - Threats have become more targeted towards web 2.0 platforms
  9. Consider mandatory disclaimer usage - To differentiate employee personal views from company views
  10. Measure all aspects of points 1-9 - web 2.0 has huge potential, but ensure you can measure ROI on any spend/cost items

Ross Dyer, technical manager at Websense, said web 2.0 exposes businesses to new risks. "Through social networking sites and other interactive online services, employees are creating content and, in moments, sharing it with thousands of others. Content on these sites is extremely dynamic and personalised, so it often flies under the radar of legacy security systems. To embrace web 2.0at work, business needs a solution that canprotect their essential information," said.

Social media facts businesses cannot ignore >>



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Network software



Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:




  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...