SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Social media can not be ignored, IT Security should not stop it  Richard Turner September 2010
Research approach Generation Standby / Research summary / June 2010 c250 interviews with office workers and c150 interviews with managers were conducted online in each of UK, US, Australia and Germany during January 2010 The survey follows on from a study commissioned by Clearswift in 2007
Dilbert’s on the money
New ways of working require a new approach to security Generation Standby / Research summary / June 2010
Attitude to web collaboration/social media Generation Standby / Research summary / June 2010 Employee perception of company attitude Company attitude 39% of employees consider web 2.0 use is encouraged/allowed 65% of companies claim web 2.0 use encouraged/allowed Disconnect
social media/Internetusage at recruitment Generation Standby / Research summary / June 2010 Web technologies/social media are pervasive – now mentioned during the recruitment process in more than 8 out of 10 companies
Attitudes to social media Generation Standby / Research summary / June 2010
Company concerns about web 2.0 Generation Standby / Research summary / June 2010 Employees are largely in tune with the concerns of companies about web 2.0 - Although they tend to underplay reputational damage concerns
Company attitude to information security Generation Standby / Research summary / June 2010 Majority of companies’ IT security attitudes resolve around compliance/control - This has implications for the use and management of web 2.0 in organisations 37% of companies have turned down business opportunities because of information security concerns
Company experiences of Web 2.0 security Generation Standby / Research summary / June 2010 More than half of companies (51%) think employees are oblivious to security concerns when it comes to IT
Company experiences of web 2.0 security: by attitude to IT security (1) Generation Standby / Research summary / June 2010
Company experiences of web 2.0 security: by attitude to IT security (2) Generation Standby / Research summary / June 2010
Summary Generation Standby / Research summary / June 2010 ,[object Object]
Collaborative technologies are critical to success
Trust and openness are key
Employees allowed to be flexible are more engaged and loyal

Weitere ähnliche Inhalte

Was ist angesagt?

East Maine School District Case Study
East Maine School District Case StudyEast Maine School District Case Study
East Maine School District Case StudySecurly
 
Atos bluekiwi - social collaboration network
Atos   bluekiwi - social collaboration networkAtos   bluekiwi - social collaboration network
Atos bluekiwi - social collaboration networkParis, Bezons
 
Temasek Polytechnic - Knowledge sharing on Social Media >2010
Temasek Polytechnic - Knowledge sharing on Social Media >2010Temasek Polytechnic - Knowledge sharing on Social Media >2010
Temasek Polytechnic - Knowledge sharing on Social Media >2010leest29
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationDan Michaluk
 
Lesson 2
Lesson 2Lesson 2
Lesson 2MrsNunn
 
Case study presentation
Case study presentationCase study presentation
Case study presentationenglettk
 
Dwyer ISSA Presentation
Dwyer ISSA PresentationDwyer ISSA Presentation
Dwyer ISSA PresentationCathy Dwyer
 

Was ist angesagt? (7)

East Maine School District Case Study
East Maine School District Case StudyEast Maine School District Case Study
East Maine School District Case Study
 
Atos bluekiwi - social collaboration network
Atos   bluekiwi - social collaboration networkAtos   bluekiwi - social collaboration network
Atos bluekiwi - social collaboration network
 
Temasek Polytechnic - Knowledge sharing on Social Media >2010
Temasek Polytechnic - Knowledge sharing on Social Media >2010Temasek Polytechnic - Knowledge sharing on Social Media >2010
Temasek Polytechnic - Knowledge sharing on Social Media >2010
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk Mitigation
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Case study presentation
Case study presentationCase study presentation
Case study presentation
 
Dwyer ISSA Presentation
Dwyer ISSA PresentationDwyer ISSA Presentation
Dwyer ISSA Presentation
 

Ähnlich wie Social Media Can Not Be Ignored

NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...IJNSA Journal
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)Peter Bihr
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Paper 1 According to the authors, privacy and security go han.docx
Paper 1 According to the authors, privacy and security go han.docxPaper 1 According to the authors, privacy and security go han.docx
Paper 1 According to the authors, privacy and security go han.docxaman341480
 
Informationweek 500 - 2010 Enterprise Social Networking Presentation
Informationweek 500 - 2010 Enterprise Social Networking PresentationInformationweek 500 - 2010 Enterprise Social Networking Presentation
Informationweek 500 - 2010 Enterprise Social Networking PresentationMichael Healey
 
CompTIA Security Study [Report]
CompTIA  Security Study [Report]CompTIA  Security Study [Report]
CompTIA Security Study [Report]Assespro Nacional
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Research Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docxResearch Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docxronak56
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanShuja Ahmad
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Peter Bihr
 
deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015David Batch
 
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxmarilucorr
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 kedsliemichal
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)Peter Bihr
 
The 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global InformationThe 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global Informationjtfoster
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxSALU18
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxbartholomeocoombs
 
Mobility & Social Media
Mobility & Social MediaMobility & Social Media
Mobility & Social MediaMart Leepin
 

Ähnlich wie Social Media Can Not Be Ignored (20)

NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Paper 1 According to the authors, privacy and security go han.docx
Paper 1 According to the authors, privacy and security go han.docxPaper 1 According to the authors, privacy and security go han.docx
Paper 1 According to the authors, privacy and security go han.docx
 
Informationweek 500 - 2010 Enterprise Social Networking Presentation
Informationweek 500 - 2010 Enterprise Social Networking PresentationInformationweek 500 - 2010 Enterprise Social Networking Presentation
Informationweek 500 - 2010 Enterprise Social Networking Presentation
 
CompTIA Security Study [Report]
CompTIA  Security Study [Report]CompTIA  Security Study [Report]
CompTIA Security Study [Report]
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Research Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docxResearch Topic and Methodology Form—Unit 4Use the research s.docx
Research Topic and Methodology Form—Unit 4Use the research s.docx
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)
 
deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015deloitte-au-privacy-index-2015
deloitte-au-privacy-index-2015
 
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docxCourse Information GovernanceDue Date – 2 daysChapter 11 .docx
Course Information GovernanceDue Date – 2 daysChapter 11 .docx
 
Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11 Course Information GovernanceDue Date – 2 daysChapter 11
Course Information GovernanceDue Date – 2 daysChapter 11
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
The 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global InformationThe 2011 (ISC)2 Global Information
The 2011 (ISC)2 Global Information
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
 
According to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docxAccording to the authors, privacy and security go hand in hand; .docx
According to the authors, privacy and security go hand in hand; .docx
 
Mobility & Social Media
Mobility & Social MediaMobility & Social Media
Mobility & Social Media
 

Social Media Can Not Be Ignored

  • 1. Social media can not be ignored, IT Security should not stop it Richard Turner September 2010
  • 2. Research approach Generation Standby / Research summary / June 2010 c250 interviews with office workers and c150 interviews with managers were conducted online in each of UK, US, Australia and Germany during January 2010 The survey follows on from a study commissioned by Clearswift in 2007
  • 4. New ways of working require a new approach to security Generation Standby / Research summary / June 2010
  • 5. Attitude to web collaboration/social media Generation Standby / Research summary / June 2010 Employee perception of company attitude Company attitude 39% of employees consider web 2.0 use is encouraged/allowed 65% of companies claim web 2.0 use encouraged/allowed Disconnect
  • 6. social media/Internetusage at recruitment Generation Standby / Research summary / June 2010 Web technologies/social media are pervasive – now mentioned during the recruitment process in more than 8 out of 10 companies
  • 7. Attitudes to social media Generation Standby / Research summary / June 2010
  • 8. Company concerns about web 2.0 Generation Standby / Research summary / June 2010 Employees are largely in tune with the concerns of companies about web 2.0 - Although they tend to underplay reputational damage concerns
  • 9. Company attitude to information security Generation Standby / Research summary / June 2010 Majority of companies’ IT security attitudes resolve around compliance/control - This has implications for the use and management of web 2.0 in organisations 37% of companies have turned down business opportunities because of information security concerns
  • 10. Company experiences of Web 2.0 security Generation Standby / Research summary / June 2010 More than half of companies (51%) think employees are oblivious to security concerns when it comes to IT
  • 11. Company experiences of web 2.0 security: by attitude to IT security (1) Generation Standby / Research summary / June 2010
  • 12. Company experiences of web 2.0 security: by attitude to IT security (2) Generation Standby / Research summary / June 2010
  • 13.
  • 14. Collaborative technologies are critical to success
  • 16. Employees allowed to be flexible are more engaged and loyal
  • 18. Education is important in ensuring risks and rewards are understood
  • 19. A New approach to IT security is required
  • 20. Technology exists to enable businesses to embrace the new ways of working
  • 21.
  • 22. Unifying Information Security Clearswift is a security software company that aims to simplify companies’ IT security to better protect businesses’ intellectual property and data. This in turn gives businesses the confidence to adopt web, email and collaboration technologies to ultimately allow the business to innovate and grow.
  • 23. Questions? Generation Standby / Research summary / June 2010 How do you measure up? To asses your organisation against the research outlined in this webinar www.clearswift.com/worklifeweb