Security survival tips for the Web 2.0 world

How to guard corporate secrets, protect your network, manage IM risks, and educate your staff

Corporate response to the influx of Web 2.0 technologies is as varied as companies themselves. Here are some tips for developing security policies and practices that best fit your company, from restrictions on social sites to rules on mini devices and instant messaging. Plus, we offer expert tips for communicating these new Web 2.0 policies to workers.

How to: Guard corporate secrets in a Web 2.0 world

There's no surefire way to completely eliminate the risk of information leakage in a blogging environment. Due diligence requires an approach that involves defence, detection and deterrence:

-- Re-evaluate whether you need to update your antivirus and malicious-code protection for Web traffic. Consider a combination approach recommended by Gartner Inc. that involves antivirus software, URL filtering, application controls, Web site reputation services and safe search technologies.

-- Establish a blog oversight committee -- a group of fellow-employee bloggers who are committed to promoting blogging within the company and making sure the company's interests are served.

-- Update acceptable-use, ethics, trade-secret and other employee policies to deal with blogs and community sites like MySpace and YouTube.

-- Consider whether to deploy content monitoring and filtering technology, and update your URL filtering tools.

How to: Protect your network and your data from mini devices

One of the biggest threats to network and data security today comes from mini devices. Ironic? Yes. Insurmountable? No. Start with these action items to deal with this threat:

-- Establish a corporate policy that specifies who can use which devices and under what circumstances.

-- Take a look at what you have. Account for corporate-owned devices, and determine whether workers are using personal devices at work. Evaluate whether your antivirus software can adequately protect your network from malware coming from those devices.

-- Back up policy with technology. Allow only corporate-owned devices onto your network. Consider using applications that block nonauthorized access to USB ports. Implement sound data-protection policies that include the encryption of sensitive data, so if a mini device is lost, the data isn't compromised. If needed, upgrade your software to block malware from mini devices.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Computerworld Staff

Computerworld
Show Comments

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?