<img alt="dcsimg" id="dcsimg" width="1" height="1" src="//www.qsstats.com/dcsuuvfw300000gkyg9tnx0uc_3f7v/njs.gif?dcsuri=/index.php/c/a/Expert-Voices/Social-Media-at-Work-Balancing-Risks-Rewards-600562/1&amp;WT.js=No&amp;WT.tv=10.4.1&amp;dcssip=www.cioinsight.com&amp;WT.qs_dlk=XEkvwI6WjPBJcIo322pizwAAAAk&amp;">

Mobility and Social Media: Embrace and Respond

By Jose Granado & Chip Tsantes  |  Posted 02-02-2011 Print
As technologies advance and converge, they provide an increasingly mobile workforce with seemingly endless ways to connect and interact with colleagues, customers and clients. But at what risk?

Embrace and respond to mobility, social media trends

It will behoove you and your organization to recognize that mobility and social media are here to stay. Instead of banning mobile devices and social networking sites at work, you can mitigate the risks by simultaneously taking steps to safeguard your company's most critical access points and information assets, while creating a culture of risk awareness and compliance. The first step is to identify the key access points that must be secured. These will most likely be associated with access to primary information assets such as intellectual property, customer lists or corporate email traffic. Once these are identified, you can implement a data leakage prevention program.  On the process front, your organization should make a distinction between what is available on mobile devices versus what can be accessed from a secure location. The right people should be permitted to obtain the data they need where and when they need it without unnecessarily exposing themselves to any data risk.

Next, access to sensitive data, mobile or otherwise, should be restricted on a "need to access" basis. You'll want to establish protocols requiring that data stewards be notified of access to critical data. In terms of your people, those with access to sensitive information should be well briefed about the reasons data security is essential, as well as educated about the basics, such as safeguarding and regularly updating passwords. Implement processes to develop awareness and ensure compliance with security requirements.


Submit a Comment

Loading Comments...
eWeek eWeek

Have the latest technology news and resources emailed to you everyday.