Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Security Threats from Social Computing

By Ajay Ghandi
March 1, 2008
Younger employees, accustomed to social computing, may threaten security of corporations. Chief security officers need to understand these new employees and what they bring into the enterprise.


With the influx of Web 2.0, highly collaborative tools and information exchanges between knowledge workers, the enterprise is poised for a significant shift.  Adding another layer of complexity, the new generation—the Millennials—are entering the workforce and they bring with them the familiarity of social computing tools. 

How exactly this will affect business operations is yet to be determined.  However if the way 2.0 technologies such as blogs, wikis and networking sites have impacted our social lives is any indication, then social software applications and social networks are likely to profoundly transform the way the enterprise works.

A Facebook Threat

But are enterprises ready to accommodate the Millennials’ needs? These tools have been deeply ingrained into their daily personal activity as is evident by the inclusion of product features like the Facebook “wall” into their everyday vernacular. But there’s a big difference between personal computing and computing for the enterprise, in particular where security is concerned. Vulnerabilities can easily be transferred from one environment to the next without proper guidance and technological know-how and C-levels need to be prepared.

This being said, the benefits of this dramatic transformation are also coupled with some serious issues around corporate governance and security.  Many organizations struggle with the most effective way to leverage governance and security.  These concerns stem from the nature of ad hoc collaborative and content rich environments that these new toolsets provide to users.  As people throughout the enterprise rapidly create content on the quest to unlock tacit knowledge and access information with greater speed and agility, a series of security issues need to be mitigated and addressed.

To create a low barrier for collaboration, the tools inherently have adopted security models and work best for content that is meant to be widely distributed.  Features of the products like RSS can also pose challenges around the granularity at which they can be secured and delivered.

Governance has now come to the forefront on the issues list.  With the inherent ability to quickly deliver content, Web 2.0 tools face some challenges that need to be addressed from a business standpoint and not technology layer.  What is acceptable use?  Who has responsibility?  Who maintains content?

Phishing and malware are serious concerns in the consumer space and this need to be addressed in the corporate space.  Corporate social networks are perfect entry points for these threats. The worms that once crawled into our e-mail inboxes are now going to appear from within our own corporate networks on our own wikis and blogs.

Social networks make it easier for people to form connections, understand relationships and leverage connections in the enterprise. They also provide a wealth of knowledge for people performing social engineering activities.

Reputation Management Concerns

As enterprises embrace more consumer tools to reach out to their prospects and customers, external content and reputation management in forums and blogs become of paramount concern.  Companies spend billions of dollars developing their brands and need to protect their investments.

Rapid user-driven creation of content impacts auditing and regulatory concerns.  Traditional content management systems contain rigid controls to manage this, but the very nature of Web 2.0 tools excludes them.

There are a number of critical steps that enterprises can do to protect against online threat and mitigate risk. There is a tremendous amount of undeniable business benefit to using social computing tools but getting started on the right foot will ensure the most value is gained for the business.  Additionally, physical security and IT teams will not be swamped under the weight of managing the rapid creation and sharing of content and ideas throughout implementation of the toolset. It is better to be safe and informed now, then to be caught off guard by a new 2.0 technology later.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ajay Ghandi is senior director for enterprise social computing at BEA Systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • U.S. Lags in Cloud Computing Adoption, While Info Security Threats Expand

    See More
  • Social Security Judges Facing Violent Threats

    See More
  • Lightbulb on blue background

    The Great Security Culture Shift: Building a Proactive Defense in an Era of Advanced Threats and Social Engineering

    See More

Related Products

See More Products
  • Optimizing Social Media from a B2B Perspective

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products

Events

View AllSubmit An Event
  • May 21, 2026

    From Referral to Response: Managing Domestic Violence Threats in the Workplace

    Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.
  • July 13, 2011

    NYC Infragard monthly security summit focused on cloud computing and email archiving.

View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing