Government CISOs have an added layer of responsibilities in balancing the pros and cons of social media in their organizations.
2. Security guidance and best practices
CISOs must carefully assess and ensure appropriate security controls are implemented and monitored based on the latest guidelines, such as Revision 4 of the National Institute of Standards and Technology Special Publication 800-53 that includes security controls related to social media/networking resources.
3. Data loss or leakage
Social media makes it very easy to either intentionally or unintentionally expose sensitive data to unauthorized entities. CISOs must understand and communicate with other organizational leadership regarding the potential disclosure of proprietary or sensitive organization data via social media.
4. Account hijacking
Since multiple individuals often have access to a single corporate account, the likelihood increases significantly that the loss of a single phone or compromised computer would give malicious actors access to a corporate account. Government CISOs must realize that recent account compromises (like those affecting the Associated Press, Fox News, the New York Post, Jeep, and Burger King, to name just a few) could just as easily happen to their department or agency Twitter, Facebook or other social media accounts.
5. Exposure to malware
With the ability to cast a wide net at a minimal cost, adversaries are regularly using social media platforms to lure users to infected or malicious content via shortened URLs, malicious files or simple social engineering. CISOs must prevent such exposure by minimizing the use of public social media platforms or implementing additional compensating security controls.
Although acceptable risk-tolerance levels will vary from one organization to another, access to external social media and networking sites from government systems should be limited to only individuals with an official business need. Personal use can be limited to personal devices (i.e., smartphones) not connected to government systems or networks, and personal devices should not be used to access official government accounts. Shared social media accounts used for corporate purposes and information dissemination need to transition from a single username and password to a more secure authentication approach, such as two-factor authentication.
Additionally, there are now a number of third-party applications available that allow appropriate enterprise accountability, management and access control to corporate accounts. To best address the risks associated with social media, it is critical that government CISOs and other leaders ensure that a social media policy is appropriately established and communicated within their department or agency. Without an established policy and rules of behavior, social media and its security risks will run rampant throughout an organization.
InformationWeek Tech Digest August 03, 2015The networking industry agrees that software-defined networking is the way of the future. So where are all the deployments? We take a look at where SDN is being deployed and what's getting in the way of deployments.