Tough Outfits Vulnerable to HackAdded: Tuesday, November 22nd, 2011
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
According to the recent research, companies banning social networks on corporate computers are proved to be more vulnerable to hack.
Telus and the Rotman School of Management have recently published a report in IT security, where they surveyed around 650 companies. The results of the research showed that those outfits that ban employees from using social media later experience 30% more computer security breaches than those allowing free use of websites like Facebook and Twitter.
According to media reports, Rotman boffin Dr. Walid Hejazi claimed that the main problem about being autocratic to your employees is that they won’t just let it go. Instead, they will be working out ways to circumvent your policy. Indeed, employees banned from social networks choose to download different applications onto the corporate computers that could allow them to bypass firewalls and access restricted services. Such software allows staff to tweet on the job, while also creating security gaps that can be easily exploited by hackers. Dr. Walid Hejazi admitted that it would be simpler and more secure to let employees access social networks. He pointed out that the best strategy is not blocking all access. Instead, the companies are recommended to allow access, but to provide awareness training with such access so that people could clearly understand what they are doing.
The results of the survey confirmed that the firms who devote a good share of their IT budgets to ensuring security are always the least likely to see its sensitive information leaked by hackers. Meanwhile, the researchers admitted that companies are never able to compensate for bad behaviors and habits of their employees. And hackers can always find a way to circumvent security measures if they have enough motivation.
November 22nd,2011Posted by:
Tuesday, November 22nd, 2011
|If company users can download and install apps.; then that company needs to fire its IT Staff and when proven that employee as well.|
This happens all the time. I've seen employee's fire for just doing that.
Places I've been to restrict users to level access to the system with read only and their own file to store items into.
Company applications they need to use is setup to only allow the read and write ability strictly for that purpose only. I've seen attempts to breach this and it has resulted in that stupid employee fired on the spot; given with allot of IT and people out of work. There are many just waiting for your job if you are dumb enough to do what this article states.
|@menahunie: Really? have you worked in most of these places apon descussion. Its the most boring work enviorment in the world. Nothing to keep you busy and eventually awake...|
YES IT IS WORK, and the employee understands this. but without relief to the grind... whats the point...
Theres a simple solution, Relax limitations on SFW sites. But set limitations based on user workload, so if the user is falling behind. limitations increase, if there ahead, they decrease...
This is easily done on MODERN NETWORKS. With QoS, DHCP and Localised DNS you can easily control these things based on USER logins.
Yes, although it does make a bigger issue for workloads, but the worst worker is Management. 70% of management workers can be found NOT performing there jobs, THESE ARE THE PEOPLE WITH TOO MUCH TIME ON THERE HANDS. Failing to check there quota, thus the people below them appear to not be doing there jobs.
Not to mention, Most management cannot even perform the jobs of the people below them and set unreal expectations.
|About the same rules apply as to: If a kid wants candy and you won't give it to them, they're gonna whine and cry about it til you do. Pretty much same scenario with all the people hooked into these social networking sites. Take their privvy's away and your gonna end up with some people with too much time on their hands. In the right hands your going to find someone who knows a little about security and bam, problem solved, access granted. Depending on how these companies IT staff run things it may not all be user based logins to a specific home dir. Some use level type security, which would be more anonymous I suppose if one were to do these exploits upon the network. Well on that note Thanks for sharing this article SaM. --The logs always say it all in the end, but do you spoof?--||
Most Popular Stories