Social media sites lead the way for security, privacy best practices

By Thor Olavsrud, CIO |  Security, privacy, social media

How do your Websites stack up when it comes to consumer security and privacy protections? On the whole, when it comes to security and privacy best practices, social media sites are leading the way, while sites operated by banks and the U.S. government are lagging.

2011 has become known as the "Year of the Breach" due to the numerous high-profile data breaches that year, affecting companies like Sony, RSA, Epsilon and NASDAQ. In all, according to the Verizon 2012 Data Breach Investigations Report, 2011 saw 855 data breach incidents and 174 million compromised records across 36 countries. The trend continued into 2012, starting in January with Zappos, which experienced a breach of 24 million records.

Verizon found the top causes of breaches in 2011 were hacking (81% of incidents, up from 50% in 2010) and malware (69% of incidents, up from 49% in 2010). Ninety-seven percent of the incidents were avoidable through simple steps and internal controls, Verizon found.

The Online Trust Alliance (OTA) has declared its mission to combat this trend. A non-profit group comprised of academics and representatives from the public and private sector, OTA is dedicated to developing and advocating best practices and policy concerning security and privacy. It recently released its fourth annual Online Trust Honor Roll to recognize sites for supporting security and privacy best practices.

"We believe it's important to not only publish best practices, but also to track adoption," explains Craig Spiezle, executive director and president of OTA. "We want to accelerate the adoption of best practices and recognize those companies that are doing the right thing. Hopefully we'll get others to follow."

Security and Privacy Honor Roll Factors

For the 2012 Honor Roll, OTA reviewed more than 1,200 sites using 10 criteria. Companies had to earn composite scores of 80% or higher across the 10 individual factors to earn the Honor Roll designation.

The factors included the following:


Originally published on CIO |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question
randomness