2012年4月25日星期三
7 tips to overcome the challenges of social networks Taher Elgamal by, Security Consultant Axway
As social networks continue growing exponentially, companies face new challenges in computer security
Employees share information every day of their business via social networks and other digital channels, and it even encourages an exchange broadened with partners and customers.
Although this sharing of information often generates beneficial business interaction improving customer service and enhancing the brand value of a company, such exchanges can also be toxic when sensitive business information is shared without permission Company.
Companies are struggling to manage ongoing information sharing, regardless of where and how it is done. Also, here are some steps to consider to reduce risks and avoid sharing information with the bad parts.
1. Integrate directly with clients and partners
Social enterprises should strive to create connections that support data exchange speeds and accuracy, while maintaining secure communications with their customers and partners.
2. Have visibility into all business interactions
Preventing information leakage and maintaining control of the entry points of corporate data only prove possible if the teams have visibility from end to end on all data exchanges.
3. Encourage good connections
Companies should customize the rules and security policies through automated management rules and the establishment of a public key management - PKI if possible.
4. Connect directly to critical access points
Companies should allow their employees to share information by providing direct lines of communication and secure with the outside world.
5. Take compliance seriously
Social enterprises require integrated analysis tools to meet the requirements of regulatory authorities in their sector and other bodies.
6. Strengthen the culture
Educate employees and train them in methods of company preferred connectivity.
7. Adequately use technology to prevent data leakage
Technologies to prevent data leaks should be used as a "safety net" to track communications and provide compliance information. They should not be used to manage the ongoing relationship between the company and its partners.
Companies adopting these measures will protect against potential dangers of social networks, will benefit fully from their valuable assets and satisfy the work preferences of staff connected.
订阅:
博文评论 (Atom)
没有评论:
发表评论