Be careful for the company, the Security Gap via Social Networking.

Important for businesses to change their mindset. Especially in security issues, to ensure network and important company information can be protected from security threats continue to evolve. Area of network security continues to change with the many changes that occur, such as increased use of social networking and also the growth of mobile device usage to connect with the network.

Mid-year Security Report 2010 from Cisco: Important discoveries
Central Great Pergesaran Happen - The great strength in the business world was changing security landscape of their company. Social networking, virtualization, cloud computing, and high dependency on mobile devices increasingly have a significant impact on the IT department, to manage network security. To be able to cope with the changes that are happening this trend, companies must:


- Affirming the policies per user for access to applications and data in the system that tervirtualisasi.
- Establish a strict access restrictions on corporate data.
- Create a formal corporate policy for mobility.
- Invest in the equipment for the management of activities and observations of cloud computing.
- Provide guidelines for the use of social media in the workplace for employees.


Things to note:
a. Become a Virtual Farm Target - Penilitian of the Cisco Security Intelligence Operations, found that 7 percent of the overall global users, to access Facebook with an average time of 68 minutes per day to play interactive games that are popular, "Farmville." "MafiaWars" is the second game The most popular after Farmville with the amount of five percent of users who spend 52 minutes per day to play, while "CafeWorld," with a total 4 percent of users who spend 36 minutes per day.

Despite the decline in productivity is not a security threat, but cyber criminals are believed to develop ways to spread malware through these games.

b. Company Policies Ignored - 50 percent of Internet users in the company admitted that they ignore company policy that prohibits the use of / access to social media, and access to social media at least once a week, and 27 percent say they are changing the settings on the devices on the company to can access applications that are prohibited by the company.

c. Level of Innovation unbridgeable - The cyber criminals began to exploit technological innovation. They exploit the gap between how quickly they can innovate from the security gaps that exist to generate profits, and with the speed of technological innovation company in mobilizing to protect their networks.

While the new business began to consider adopting social networking technologies and peer-to-peer, the first cyber criminals have been exploiting these technologies, not only to do evil, but to improve communication and speed of transactions between one another.

d. Increasing Spam Drastic - Although there had disruption of criminal spam operations, according to research recently completed by the Cisco Security Intelligence Operations, the volume of spam in 2010 is estimated meingkat 30% compared to 2009.

United States again became the largest spam-producing country, pushing Brazil into third position. India currently ranks second, Russia and South Korea in the fourth and fifth positions.

Brazil experienced a reduction of the volume of spam produced by 4.3 percent, mostly because of the increasing number of ISPs in Brazil that restrict access to port 25.

e. Spam attacks Multivector Rising - The cyber criminals still made the official web sites as a target but with a calculated attack multivektor spam perencanannya with time and focus to embed a keylogger, back door, and boots.

f. Start terrorists Social - Social Networking continues to be fertile ground for cyber criminals, with an increasing number of attacks. New threats emerging from the more dangerous criminal elements, such terrorists. The Government has been quite concerned about the existence of social networking and other technology used by the terrorists to organize, coordinate, and potentially launch attacks.
(Kabarindo)

0 komentar:

 
© 2009 Mysecurity | Powered by Blogger | Built on the Blogger Template Valid X/HTML (Just Home Page) | Design: Choen | PageNav: Abu Farhan