Monday, February 28, 2011

Explore the dark side

WATCH OUT: A Facebook user logging into his account in this July 16, 2009 file photo. Blindly allowing Facebook in the workplace may result in propagation of data leakage, loss of data and damage to the corporate reputation. - AP

Uncovering the risks of social networking applications in the workplace.

By ERIC CHONG

WITH the revolution of Web 2.0, social networking applications are now playing a pivotal role in influencing and shaping the way we socialise and collaborate for both work and personal purposes. In fact, the use of social networking applications can be broadly categorised into three enabling objectives: Saying, Socialising and Sharing.

Specific examples of Saying applications are like Gmail, Yahoo!, Instant Messaging, Microsoft Hotmail which enable people to communicate. Socialising refers to applications like Facebook, Twitter and Linked-In that connects everyone on social and professional basis; while applications that enable Sharing include BitTorrent, YouSendIt, and Xunlei.

At work, social networking applications are also widely used among employees and employers to get their jobs done.

For instance, a corporate professional or an employer uses Linked-In to enable them to connect with people in their network or headhunt talents, while Facebook is widely used among marketers for sales, customer relations management, branding and communication.

Applications that enable users to Say, Socialise and Share files are being used worldwide with remarkable consistency. No single geography whether it is Asia Pacific, the United States, or Europe is that different in terms of application usage at a category level.

However, organisations might face the possibility of data leakage as employees who have Internet access are putting their organisations at a risk by using certain applications that could involve the sharing of sensitive and confidential information.

Unmonitored, unchecked and risky

Saying applications, including webmail and instant messaging, can bring about more active collaboration, increased communications efficiency, and quicker time-to-market.

The dark side is that these applications are unmonitored and as such, they pose business and security risks. Business risks include internal compliance with application usage policies that may not allow the use at all, or dictate what can or cannot be said about the company.

Furthermore, saying applications are capable of transferring files, thus opening organisations up to data leakage and the delivery of malware via attachments.

Palo Alto Networks' latest Application Usage & Risk Report (AUR) showed that the most frequently detected saying applications being used in the enterprise networks are Gmail (93%), Hotmail (90%), Yahoo! Mail (88%), and Facebook Mail (79%).

In the report covering South-East Asia countries - Singapore and Thailand which surveyed 41 organisations, Hotmail is found to be the most common (83%) and most heavily used by nearly 6x from the next closest web application (224GB vs 36GB) per organisation.

When at work, users are voyeurs

With a base of more than 500 million users, it is no surprise that Facebook is the most popular social networking application. Social networking applications were found in 96% of the participating organisations, which indicates that control efforts are not working.

Statistics in the AUR showed that Facebook champions the percentage of most commonly detected socialising applications with a 96% share, followed by Twitter 93%, Linked-In 85%, MySpace 79% and other Facebook apps at 76%.

Facebook use among employees in the company are often perceived as waste of time where users are "voyeurs" while at work. Interestingly, the bulk of the traffic (69%) is actually users watching Facebook pages.

The risks that voyeurism represents include a potential loss of productivity and the possibility of malware introduction by clicking on a link within someone's "wall."

Blindly allowing Facebook in the workplace may result in propagation of data leakage, loss of data and damage to the corporate reputation.

Better way to move, broadcast data

Browser-based filesharing applications have steadily grown in popularity to the point where they are now used more frequently than P2P or FTP. Now seen in 96% of organisations, these new class of applications simplify file sharing but can also be broadcast-oriented (similar to P2P) in their distribution model.

By using RapidShare, MegaUpload or Mediafire, a user can now upload their content and allow it to be affiliated with many search engines.

In Palo Alto Network's AUR findings, an average of 500GB of data is being transferred per organisation during a one week period. Interestingly, Singapore consumes the second highest amount of bandwidth on a regional basis (P2P = 4.8TB and BB FS = 6.7TB) behind China.

But whether it is saying, socialising or sharing, these applications are popular vectors for delivery of malware and vulnerability.

The reason is simple: Their popularity makes it easy for malware creators to deliver their payload by simply creating a compelling reason for a user to "click" on what appears to be an update, an IM, a tweet, or a post from a trusted acquaintance.

The sender may in fact be the person they say, but that fact is insignificant. By "clicking" first on a link sent by a highly trusted source and asking or thinking later, the user has, unknowingly, propagated the threat or installed the malware.

New generation of a savvy workforce

Applications that enable saying, socialising, and sharing have long been used in workplace environments, however their usage has been somewhat "quiet."

Today, the intertwined nature of work, home, family, and technology, combined with a generation of users that is always connected and assumes usage is "approved," has dramatically elevated the discussion around these applications.

The speed of adoption by tech-savvy network users adds significantly to the risks that companies must try to manage - making the challenge doubly difficult because of the resistance to change and the inflexibility that traditional control mechanisms exhibit.

Organisations need to work diligently yet quickly to determine the appropriate balance between blocking and blindly allowing these applications.

What should be taken into consideration by organisations are the issues or solution methods employed in enabling social networking in the workplace without jeopardising the security and confidentially of information in an organisation.

And this is where IT and the security team needs to exert their influence and expertise.

The latest edition of the AUR (issued in the last quarter of 2010) consists of real-world traffic from 723 organisations worldwide, and examines user and application trends in the enterprise.

The report advocates for assigning an action to these saying, socialising and sharing applications, and fostering discussions and creating viable policies around acceptable use.

(Eric Chong is regional marketing director of Palo Alto Networks, Asia Pacific. Palo Alto Networks is a network security company.)


Adopted from TechCentral




No comments:

Post a Comment