Home
About Us
Advertise
Printable version
Toxic Personalities: Preventing the Spread of Confidential Information
By Thomas Logan
April 19, 2011 —
(Page 1 of 4)
Enterprises from all backgrounds have heard the social media call. Breathless marketing executives presented the C-suite with crisp PowerPoint presentations showing case studies that encouraged them to reap the benefits of being open, social and transparent. That forced true change, with the C-suite altering practices and asking for more social activity and collaboration throughout the organization.
There's only one problem: The whole idea has the security folks tied up in knots. The key challenge here is that as employees communicate openly with customers, partners, prospects and competitors, private and otherwise proprietary information within content management systems and on hard drives may leak out. And for many companies, a serious breach has already happened, as evidenced by recent headlines of significant fines that organizations such as the FTC, the Department of Health and Human Services, and others have imposed.
This isn't just about malicious activity and employees out to do harm, but about employees who
want
to do the right thing when it comes to information security, but either don't know, don't understand or don't remember the rules.
It's also about creating and enforcing those rules.
Most corporations that have installed SharePoint 2010, for example, have taken one look at the social media components and either failed to deploy them or deliberately turned them off, fearful of the unregulated Wild West that they understand social media to be. But tools exist that can integrate seamlessly into SharePoint and other collaboration platforms that can scan posts prior to publication, as well as monitor existing content and file stores, and either block, quarantine, or simply notify the appropriate security staff about anything from profanity to the secret merger codename that only the executive team should know about.
How does a company protect itself from its own employees? And what type of personalities should employers be on the lookout for when trying to safeguard private or other confidential information? The following are the three worst offenders.
Foul-Mouthed Social Media Monster
The Social Media Monster has a lot to say and wants to tell everyone about it. She's out on Twitter and Facebook, she's answering questions on LinkedIn and Quora, and she's interacting in the forums. She does all of this with good intentions: to keep herself and her company in front of prospects. It's a valid marketing strategy.
Next Page
Related Search Term(s):
security
Pages
1
2
3
4
Share this link:
https://sptechweb.com/link/35454
Related Articles
Metadata Security for SharePoint Adds Security Permissions
Titus Metadata Security for SharePoint allows permissions to be assigned based on the recipient's Active Directory properties
New Database Reporting Console Tracks Compliance
Application Security's Analytics 1.0 is used in conjunction with the company's DbProtect database security suite. It is based on Cognos' business intelligence suite and contains dashboards that cover compliance and security key performance indicators.
The Data Center: Security, Compliance Issues Holding Back the Clouds
Cloud computing is still gaining steam as a concept and practice in the industry. Acceptance of it is being hindered by flaws in its application and by lingering doubts to its effectiveness, things that can or will soon be addressed.
Add comment
Name*
Email*
Country
United States
Canada
Afghanistan
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua & Barbuda
Antilles, Netherlands
Arabia, Saudi
Argentina
Armenia
Aruba
Australia
Austria
Azerbaijan
Bahamas, The
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia and Herzegovina
Botswana
Brazil
British Virgin Islands
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Congo
Cook Islands
Costa Rica
Cote D'Ivoire
Croatia
Cuba
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
East Timor (Timor-Leste)
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
Gabon
Gambia, the
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guinea
Guinea-Bissau
Guinea, Equatorial
Guyana
Haiti
Holland (see Netherlands)
Honduras
Hong Kong, (China)
Hungary
Iceland
India
Indonesia
Iran, Islamic Republic of
Iraq
Ireland
Israel
Italy
Jamaica
Japan
Jordan
Kazakhstan
Kenya
Kiribati
Korea (North)
Korea (South)
Kuwait
Kyrgyzstan
Laos
Latvia
Lebanon
Lesotho
Liberia
Libyan Arab Jamahiriya
Liechtenstein
Lithuania
Luxembourg
Macao, (China)
Macedonia, TFYR
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States of
Moldova, Republic of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar (ex-Burma)
Namibia
Nauru
Nepal
Netherlands
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestinian Territory
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russia (Russian Federation)
Rwanda
Saint Helena
Saint Kitts and Nevis
Saint Lucia
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia & Montenegro
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
Spain
Sri Lanka (ex-Ceilan)
Sudan
Suriname
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Taiwan
Tajikistan
Tanzania, United Republic of
Thailand
Timor-Leste (East Timor)
Togo
Tokelau
Tonga
Trinidad & Tobago
Tunisia
Turkey
Turkmenistan
Turks and Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United Kingdom
Uruguay
Uzbekistan
Vanuatu
Vatican City State (Holy See)
Venezuela
VietNam
Virgin Islands, British
Virgin Islands, U.S.
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zanzibar
Zimbabwe
[Not specified]
Comment
Preview