Who’s not using social media? Probably very few. But while you’re using it, research shows chances are you are being monitored by your employer. Your iPad is also being watched, not by your employer but by hackers trying to get into your PC.
Social Media Use Monitored
The online survey of 257 security professionals was conducted between February 4 and March 12, 2010, and covered a range of security topics in addition to social media, including smartphones, healthcare and cloud computing.
Key findings include:
- 59% maintain a social media policy
- 39% of respondents’ organizations ban social media use
- 46% of respondents were unsure if their employees comply with social media policy, despite the majority having visibility into social media use
Even though almost 40% of respondents ban employee social media use, this type of policy is a knee-jerk reaction to the serious security risks associated with social media and is not necessarily effective,” says Andrew Storms, Director of Security Operations for nCircle.
Storms recommends employers engage in ongoing, detailed communication about the risks of social media so that employees better understand what types of activity do and do not affect corporate security.
Hackers Try iPad As PC Gateway
Security software specialist BitDefender has issued a warning saying that hackers are sending unsolicited emails to iPad owners inviting them to visit a fake iTunes site and download software that can compromise data stored on the iPad.
The e-mail includes a link to a third-party site operated by the hackers that looks like Apple's own iTunes software page. Upon downloading the fake software, malicious code that BitDefender has identified as "Backdoor.Bifrose.AADY" will be added to the user's PC giving hackers control over the PC as well as email logs and passwords.
Best way to beat it is to check the address of the site that they are being asked to download the iTunes from and don’t download it unless it fits. This also does not affect Mac users.
SAP Moves On Insurance And Health
SAP (news, site), a company that has been seeking to make inroads into the insurance technology space for years, plans to acquire TechniData, a German company that provides software to help businesses comply with environmental, health and safety regulations.
TechniData provides systems integration, managed EHS (environmental, health and safety) services, regulatory content and software to help companies comply with regulatory challenges in these areas.
While it may not be obvious what the link to insurance is, health and safety compliance are critical in determining insurance risk. For insurance companies looking to make risk assessments about possible customers, compliance is absolutely key. The deal is expected to close in Q3 for an undisclosed sum.
CCM Market Young But Growing
Within the GRC marketplace, Continuous Controls Monitoring (CCM) is a set of technologies that assist the business in reducing business losses from fraud or failure to follow rules governing financial transactions (it should not be mixed up with Component Content Management).
It also aims to improve performance through continuous monitoring (CM) and reducing the cost of auditing through continuous audit (CA) of the automated controls in ERP systems.
The reason that this has come up now is because Gartner has just published its 2010 Magic Quadrant for CCM. The report shows that over past year the market has grown at double-digit rates with some of the best-of-breed vendors reporting a doubling of software license revenue.
Some of the bigger vendors are reporting less percentage growth on higher revenues, but still reporting increases of between 10% and 30% in the same period.
We’re not going say who’s in and who’s out in the Magic Quadrant as we couldn’t possibly list them all, but Oracle (news, site) is one of them. You can access the report from the Oracle website for free if you register.