Will Twitter attack drive off IT interest?

Analysts warn that more attacks could raise a warning flag for Twitter's enterprise users

This week's Twitter hack may not immediately drive corporate executives away from the microblogging site, but it may raising some early warning signs.

A hacker exploited a bug in the Twitter site Tuesday, causing havoc on the social network, creating a wild buzz on the blogosphere and prompting a flood of negative headlines around the globe.

The exploit, described by some as a " webtastrophe ," caused messages, and even porn, to pop up on users' screens. Twitter was fairly quick on the draw, though, and shut down the attack in a couple of hours.

Nonetheless, the long list of victims ranged from individual users to the official Twitter feed of the White House, prompting questions about how it will affect the views of the droves of corporate executives who've either been considering diving into the Twitterverse or who already have made the plunge.

Companies like online retailer Zappos.com , Dell and JetBlue have long taken advantage of the growing number of Twitter users by tweeting about their company culture, sales and promotions.

And these companies are far from alone. Industry analysts say enterprises are consistently being drawn to sites like Twitter and Facebook and are setting up their own social networking teams.

If such widely-publicized attacks continue, though, IT executives may start looking for a more secure alternative, analysts said.

"I think this was a lesson learned and a warning," said Brad Shimmin, an analyst at Current Analysis. "Social networks have garnered so much of the traffic over the Internet, but the responsibility these companies have isn't always reflected in the level of security and privacy they've afforded their users. Compared to other larger sites, I don't think Twitter is falling down entirely, but they do need to take this a little more seriously and handle it better than they did yesterday."

While Shimmin was surprised that a site like Twitter could still be knocked for a loop via such an exploit, he said what may have caught some users' attention is how slow Twitter was in giving users information about it.

"Everyone had figured it out before Twitter issued its announcement," said Shimmin. "Customers shouldn't have to look to third parties to understand when there's a problem with something like Twitter. They obviously need to do a better job of anticipating and responding to these sorts of exploits. They need to behave a little bit more like an enterprise player would."

Dan Olds, an analyst with The Gabriel Consulting Group, said despite Twitter's troubles this week, the social network should weather this storm as long as there isn't another one any time soon.

"This is going to, or at least should, make people in sensitive positions think twice about how much they rely on Twitter," Olds said. "I think a bit of caution is called for, but I don't think we'll see anyone significantly change their habits over this incident. Now, if there are more exploits in the near future -- enough to form a pattern in users' minds -- then that would spell trouble for Twitter."

Rob Enderle, an analyst at Enderle Group, noted that as long as people are avidly using Twitter, many company executives will put up with random exploits to continue taking advantage of all the eyes their tweets could attract.

However, if Twitter continues to get hit by attacks, and another strong microblogging site emerges, that could spell trouble.

"It really depends on how often this happens but as long as the people firms want to talk to are on Twitter, companies and organizations will find ways to mitigate the risk and continue to use the tool," added Enderle. "If the users look like they are moving, though, companies will follow very quickly."

Like Shimmin, Enderle said Twitter needs to formulate a better crisis response plan and team.

"What this event showcases is that Twitter hasn't yet developed a good crisis management process and that, until they do, an event like this could still take them out, along with a lot of customers," said Enderle. "Until that is fixed, many companies may choose not to."

Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin , or subscribe to Sharon's RSS feed . Her e-mail address is sgaudin@computerworld.com .

Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags securitytwitterDellcollaborationsoftwareapplicationsCybercrime and Hacking

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Sharon Gaudin

Computerworld (US)
Show Comments

Cool Tech

SanDisk MicroSDXC™ for Nintendo® Switch™

Learn more >

Breitling Superocean Heritage Chronographe 44

Learn more >

Toys for Boys

Family Friendly

Panasonic 4K UHD Blu-Ray Player and Full HD Recorder with Netflix - UBT1GL-K

Learn more >

Stocking Stuffer

Razer DeathAdder Expert Ergonomic Gaming Mouse

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Ben Ramsden

Sharp PN-40TC1 Huddle Board

Brainstorming, innovation, problem solving, and negotiation have all become much more productive and valuable if people can easily collaborate in real time with minimal friction.

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?