Celebrating The Holidays Online - InformationWeek
12:23 PM

Celebrating The Holidays Online

A Pew study reports that a third of those who bought holiday gifts online last year did so from work.

Over the holidays, E-mail sending holiday greetings abounds, and so does searching for the perfect gift or deal online. Is it any different from all those holiday parties, luncheons, and gift-swapping? Maybe. Especially when it's often in addition to the offline holiday parties, luncheons, and gift-swapping.

The Pew Internet & American Life Project reported last January that a third of those who bought holiday gifts online last year did so from work. (The Pew Internet & American Life Project, www.pewinternet.org , is a well-regarded nonprofit initiative of the Pew Research Center for People and the Press http://people-press.org/ .) According to its research, the younger the workers, the more likely they would buy holiday gifts from work (42% of those under the age of 30 versus 22% of those over age 50).

Each year, Pearl Software issues its Scrooge Report, documenting the loss of workplace productivity due to increased personal use of the Internet from work over the holidays. Its Echo Global Internet Management Software is used by companies to monitor and block access to certain sites. Pearl CEO David A. Fertell blames holiday shopping for spybots and virus attacks on corporate computers. Fertell believes that blocking unreliable E-commerce sites can help protect networks from security breaches. (Pearl also is the developer of Cyber Snoop, one of the earliest Internet-monitoring apps for home use.)

While other leading Web-monitoring and blocking software companies (such as Websense and CyberControl) don't jump on the holiday cyberabuse bandwagon, there may be something to Pearl's claims.

Seventy-nine of respondents to InformationWeek Research's study reported sending and receiving personal E-mail and instant messages at work. It makes perfect sense that the number and frequency of those communications will increase over the holidays with family-photo attachments, recipe swapping, and well-wishes being shared across the world. And the increase will be felt via your bandwidth. To make matters a bit cheerier, Christmas carols and holiday music files will be downloaded and shared on your network, as will the original footage of "Frosty the Snowman," "The Christmas Story" or "The Grinch That Stole Christmas." Expect your employees to track Santa's progress from the North Pole using nasa.gov www.nasa/gov , to watch the bid prices for their favorite eBay collectible, and to access the HotWire.com and Priceline sites for travel bargains. Snow-flurry screen savers, flash files of Snoopy hiding his holiday bone, and more adware and popups than our network can hold--all are signs of the cyberholidays.

What can and should we be doing about this? Warn your employees that there are some nasty apps out there. Remind them to run a pop-up/adware/spyware remover every day. And make sure they warn you if a sudden avalanche of spam arrives in their work E-mail box. (Although you'll probably know before then, when your system crashes.) Then, sit back with a cup of eggnog and hum "Jingle Bells" under your breath. It's the holidays--enjoy them!

Return to main story, The Privacy Lawyer: Crack The Online Whip

Parry Aftab is a cyberspace lawyer, specializing in online privacy and security law. She can be reached at parry@aftab.com.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll