Amazines Free Article Archive
www.amazines.com - Saturday, December 14, 2019
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133322)
 Advice (160962)
 Affiliate Programs (34735)
 Art and Culture (73690)
 Automotive (145680)
 Blogs (75057)
 Boating (9840)
 Books (17218)
 Buddhism (4125)
 Business (1328596)
 Business News (426311)
 Business Opportunities (366264)
 Camping (10962)
 Career (72734)
 Christianity (15844)
 Collecting (11637)
 Communication (115054)
 Computers (241957)
 Construction (38997)
 Consumer (49681)
 Cooking (17061)
 Copywriting (6567)
 Crafts (18204)
 Cuisine (7538)
 Current Affairs (20388)
 Dating (45780)
 EBooks (19687)
 E-Commerce (48204)
 Education (185249)
 Electronics (83499)
 Email (6392)
 Entertainment (159832)
 Environment (28937)
 Ezine (3039)
 Ezine Publishing (5446)
 Ezine Sites (1550)
 Family & Parenting (110900)
 Fashion & Cosmetics (196390)
 Female Entrepreneurs (11842)
 Feng Shui (130)
 Finance & Investment (310274)
 Fitness (106146)
 Food & Beverages (62868)
 Free Web Resources (7938)
 Gambling (30225)
 Gardening (25108)
 Government (10513)
 Health (629563)
 Hinduism (2205)
 Hobbies (44044)
 Home Business (91557)
 Home Improvement (251362)
 Home Repair (46138)
 Humor (4823)
 Import - Export (5453)
 Insurance (45130)
 Interior Design (29554)
 International Property (3485)
 Internet (190990)
 Internet Marketing (146338)
 Investment (22825)
 Islam (1167)
 Judaism (1356)
 Law (80490)
 Link Popularity (4591)
 Manufacturing (20842)
 Marketing (98779)
 MLM (14136)
 Motivation (18213)
 Music (27005)
 New to the Internet (9479)
 Non-Profit Organizations (4048)
 Online Shopping (129617)
 Organizing (7803)
 Party Ideas (11856)
 Pets (38079)
 Poetry (2234)
 Press Release (12674)
 Public Speaking (5618)
 Publishing (7523)
 Quotes (2407)
 Real Estate (126626)
 Recreation & Leisure (95279)
 Relationships (87563)
 Research (16158)
 Sales (80323)
 Science & Technology (110222)
 Search Engines (23454)
 Self Improvement (153102)
 Seniors (6232)
 Sexuality (35942)
 Small Business (49286)
 Software (82996)
 Spiritual (23465)
 Sports (116081)
 Tax (7658)
 Telecommuting (34066)
 Travel & Tourism (307422)
 UK Property Investment (3121)
 Video Games (13428)
 Web Traffic (11727)
 Website Design (56830)
 Website Promotion (36569)
 World News (1000+)
 Writing (35770)
Author Spotlight
ADRIAN JOELE

I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
ALFRED MEARS

Former English Teacher; Musician (20+ years); Freelance Writer ...more
SHOVON JOARDER

Shovon Joarder has been working as Freelance Marketing Project Manager for over four years. He also ...more
BELINDA SUMMERS

Belinda Summers works as a professional consultant. She helps businesses increase their revenue by l...more
CACEY TAYLOR

Im just a man who likes to be happy and see others happy. Im into home business, sports, family, and...more


Is facebook use in the enterprise too risky to allow? - HTC Protective Case - Apple iPhone4 Bumper by icdenta icdenta






Article Author Biography
Is facebook use in the enterprise too risky to allow? - HTC Protective Case - Apple iPhone4 Bumper by
Article Posted: 03/22/2013
Article Views: 127
Articles Written: 1096
Word Count: 973
Article Votes: 0
AddThis Social Bookmark Button

Is facebook use in the enterprise too risky to allow? - HTC Protective Case - Apple iPhone4 Bumper


 
Business,Business News,Business Opportunities
It is not news that Facebook, the behemoth of social networking, isless than aggressive about protecting the personal privacy of its900 million users. But even relatively savvy users may not be awareof how much of their information is collected, how it is used andhow little control they may have over it. And with millions of workers now using social networking in theirprofessional as well as personal lives, those privacy risks extendin a very big way to the enterprise. Consumer Reports , which released its annual report on Internet privacy and security last week, devotes an entire section to "Facebook and yourprivacy." Its findings may not surprise most CISOs, but will likelybe unsettling all the same.

More than 150 million Americans use the site, with that numberincreasing daily. And in exchange for helping people do things likestay in touch with family and friends, find old classmates, sharephotos, organize around interests and causes, promote theirbusinesses and learn about the tour schedule of their favoriteband, Facebook collects and distributes vast amounts of sensitivepersonal information. It is one very prominent example of Big Data. [See also: 4 tips for Facebook from security and privacy experts ] CR notes Facebook CEO Mark Zuckerberg's claim in a blog post last November that, "We do privacy access checks literally tens of billions oftimes each day to ensure we're enforcing that only the people youwant see your content." But CR does a reality check on the claim: "Facebook gets a report everytime you visit a site with a Facebook 'Like' button, even if younever click the button, are not a Facebook user, or are not loggedin." "Even if you have restricted your information to be seen by friendsonly, a friend who is using a Facebook app could allow your data tobe transferred to a third party without your knowledge," CR writes. That information includes visits to pages about health conditionsor treatments, which would interest insurers; announcements aboutattending an event, which would interest burglars; and informationabout sexual, religious and racial/ethnic affiliations, intimaterelationships and even drug use, which would interest potentialemployers.

ITWorld 's Dan Tynan reported last week on how many of the more than 500,000 games, puzzles and quizzes onFacebook exist mainly for the purpose of, "sucking data out of youraccount." Some of those apps violate Facebook policies, but Tynan notes thatthe enforcement of those policies can be lax, at best. And whilethere is now a Chrome plug-in called Privacy Score from Privacy Choice that rates how each app treats your data, that score is largelybased on the policies published by the apps and tracking companies,which can also have credibility problems. Rebecca Herold, an attorney, professor and consultant known as the"Privacy Professor," said the worst part of all this is that"Facebook changes their privacy settings and sharing algorithms sooften that it is hard for even privacy pros to keep up." "If you've allowed someone access to your data, there is nothing tostop them from copying and sharing it elsewhere -- there are waysin which their settings will override your settings," Herold said."Every person should post only information that they would not mindthe entire world seeing." Still, the connections Facebook brings to people also bringirresistible benefits to commerce. Those benefits -- such as 18million people "liking" a brand's page after learning their friendshad done so -- make it practically mandatory for enterprises to beon Facebook if they want to compete.

And security experts say it is useless to try to prevent employeesfrom being on Facebook anyway. Chester Wisniewski, asenior securityadviser at the security vendor Sophos, said public social networkslike Facebook are "not a good choice for online collaboration, asyou have no guarantees of privacy or how sensitive information willbe handled." But, he says if a company tries to block Facebook, Twitter or othersites, "employees will simply grab their iPhone, Android etc. anddo what they wish, where you don't have any oversight." [Joan Goodchild goes in-depth: Facebook may be scary, but we love it anyway ] So, is it possible for an enterprise to exploit the advantageswithout being damaged by the risks? No public site can be made airtight. But Wisniewski says it ispossible to minimize risks, by "educating employees on appropriateuse of social media and allowing it on your network where you havesome ability to monitor if sensitive company information is beingshared inappropriately." Herold agrees, saying that "with millions of apps being used by thepublic to stay in touch with companies, completely cutting offaccess is simply not an option." Given that reality, she said, "More companies are allowing certaingroups of workers, or all workers, access with mitigating controls-- tools such as data leak protection (DLP), encryption, heuristicmalware detection, intruder prevention and detection tools." But even that, Herold said, cannot address "the problematic andcomplex architecture within which Facebook is created and sharesdata.

Technology alone will not work." ' So companies needto update their information security and privacy policies to coversocial media, she said. Rafal Los, chief security evangelist at HP software worldwide,said: "Enterprises can reduce risks with a combination oftraditional security to combat known threats with an enterprisesecurity intelligence platform which integrates advancedcorrelation, deep application analysis and network-level defensemechanisms to detect malicious activities, misuse and accidentaldisclosure through the use of social media." Herold says she did a social networking privacy and securitytraining class to a large hospital system in January where shecovered the actions individuals should take when using the sites,to protect information. "By including how individuals are personally affected, and not justfocusing on the organization, those taking the training were ableto see why taking security and privacy steps online is important,"she said. Read more about social networking security in CSOonline's Social Networking Security section.

I am an expert from protectivephonecovers.com, while we provides the quality product, such as HTC Protective Case , Apple iPhone4 Bumper, iPhone 4 Protective Cases,and more.

Related Articles - HTC Protective Case, Apple iPhone4 Bumper,







Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance


STEPHEN BYE

Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through The...more
GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
SUSAN FRIESEN

Susan Friesen, founder of the award-winning web development and digital marketing firm eVision Media...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
TIM FAY

I am not a writer nor am I trying to become a writer. I am an average person with average intelligen...more
MICHAEL BRESCIANI

Rev Bresciani is the author of two Christian books. One book is an important and concisely written b...more
KIRAN KAUR

Kiranpreet (Kiran) Kaur, D.D.S., who received her Doctor of Dental Surgery degree from the prestigio...more
STEVE BURGESS

Steve Burgess is a freelance technology writer, a practicing computer forensics specialist as the pr...more
JOANNA MORGAN

Joanna Morgan has a huge passion for making money online from home and enjoys traveling around the w...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2019, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license