Social Networking: a Boon and a Conundrum

Submitted by: Submitted by

Views: 34

Words: 806

Pages: 4

Category: People

Date Submitted: 02/15/2015 11:23 PM

Report This Essay

Social Networking: A Boon and a Conundrum

1888 PressRelease ­ Cyber criminals are finding ways to use social networking to their advantage. The best  company policy is to provision comprehensive, mandatory training that can effectively reach everyone in your  valuable group of employees. For security awareness training that is uniquely memorable, positive and thorough,  visit www.CipherEx.com to learn more.

Businesses, large and small, are recognizing the value of having a presence on social media. Making a human connection with potential customers, vendors and investors in a social environment like Facebook is an asset to any enterprise. For some, social media may be the best way to cultivate ongoing business relationships. It is not uncommon to hear managers talk of finding the perfect candidate for an unfilled position in the company by using sites like Facebook and LinkedIn. Unfortunately, cyber criminals are also finding ways to use social networking to their advantage. Going public with a company profile on a social networking site can be tricky business. First and foremost, one needs a dedicated IT person who knows the safety ropes to create and manage it. Tight security settings and monitoring of daily activities on a corporate social media page is an absolute must. Most businesses choose to limit activities on the company page to team members who have considerable expertise in IT security. A more daunting problem can be introduced through the personal use of social media by employees. While it may seem counter-intuitive that personal activity, like communicating with friends on Facebook, could wreak havoc on your company's network, studies show that the most efficient means of warding off malware and cyber-crime on company networks is to educate the entire staff about the hazards that exist in social networking, how to recognize them and how to avoid them. What are the risks? Countless varieties of malware, including Trojans and phishing devices, weave...