10 hard truths IT must learn to accept

Unsanctioned devices, compromised networks, downtime -- today's IT is all about embracing imperfections

By , InfoWorld |  IT Management, BYOD, cloud computing

IT concession No. 8: Your company's deepest secrets are only a tweet away

Credit: Andrew Winning / Reuters

Employees are using social networks at work, whether you allow them to or not. The problem? Malware infections distributed via social networks and sensitive corporate data leaking online.

"The behavior of people using social media is like their behavior using email 10 years ago," says Rene Bonvanie, VP of worldwide marketing for Palo Alto Networks. "With email, we've learned to never click on anything. But inside social media, people click on every tiny URL because they trust the sender. That's why botnets we successfully rebuffed are coming back."

"Educate, re-educate, and educate again," says Sarah Carter, VP of marketing for Actiance. "Put technology-coaching solutions in place, where you can remind users of risks and your company policy about visiting sites not relevant to business."

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

IT ManagementWhite Papers & Webcasts

See more White Papers | Webcasts

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question