Comments
Information Security's Real Threat: Oversharing
Newest First  |  Oldest First  |  Threaded View
Chuck Brooks
50%
50%
Chuck Brooks,
User Rank: Author
10/29/2013 | 12:25:21 AM
re: Information Security's Real Threat: Oversharing
Social media and also file sharing is becoming an important part of business development and outreach for many companies. Proper security protocols combined with a good marketing strategy can help mitigate threats.
bbarnier
50%
50%
bbarnier,
User Rank: Apprentice
9/4/2013 | 3:01:31 AM
re: Information Security's Real Threat: Oversharing
Hello, thanks. Glad you found it helpful. Yep, long list of compliant companies that got in trouble.
WKash
50%
50%
WKash,
User Rank: Author
8/30/2013 | 6:08:23 PM
re: Information Security's Real Threat: Oversharing
This article offers some smart tips, and a great reminder: It is critical to remember that being compliant doesn't mean you are safe.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Author
8/30/2013 | 12:48:34 AM
re: Information Security's Real Threat: Oversharing
Chromebooks are worth looking into for SMBs. They're less vulnerable to malware then traditional PCs. You still have to worry about social engineering attacks however.
bbarnier
50%
50%
bbarnier,
User Rank: Apprentice
8/29/2013 | 10:20:41 PM
re: Information Security's Real Threat: Oversharing
Hello, thanks for your comment; good observation. It sometimes helps to compare Info sec in an SMB to a neighborhood pizza parlor or local car repair shop. Following good process improves customer satisfaction and reduces cost for business and customer prices. A similar idea applies to "tiny box" retailers where each small store is highly similar. This is often one of the ways "little guys" compete with big guys who get tied up in process knots. While most processes in a framework are needed, it is helpful to realize the SMB is ALREADY doing all these -- just informally and prone to gaps that lead to ugly surprises. The key is tailoring to the SMB. Enjoy the pizza!
Drew Conry-Murray
50%
50%
Drew Conry-Murray,
User Rank: Ninja
8/29/2013 | 9:53:03 PM
re: Information Security's Real Threat: Oversharing
This sounds like sensible advice, but how feasible is it for SMBs, particularly on the smaller end of the scale, to start getting into frameworks? Especially if they don't have a dedicated security team, but instead have a few IT folks who do everything?
David F. Carr
50%
50%
David F. Carr,
User Rank: Author
8/29/2013 | 7:05:51 PM
re: Information Security's Real Threat: Oversharing
The best way to prevent irresponsible sharing is to teach employees how to share responsibly in social media and internal collaboration systems.


The Agile Archive
The Agile Archive
When it comes to managing data, donít look at backup and archiving systems as burdens and cost centers. A well-designed archive can enhance data protection and restores, ease search and e-discovery efforts, and save money by intelligently moving data from expensive primary storage systems.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.