SlideShare a Scribd company logo
1 of 6
Download to read offline
GFI White Paper

     Social networking at work:
      Thanks, but no thanks?
Millions of people around the world with access to the Internet are
members of one or more social networks. They have a permanent
      online presence where they create profiles, share photos,
share their thoughts with friends and spend hours just catching up
       with what hundreds of friends are doing with their life.
Contents
                  The Pros                          3
                  The Cons                          3
                  Thanks, but no thanks!            4
                  Striking a balance                4
                  About GFI®                        5




Social networking at work: Thanks, but no thanks?       2
Give most people access to the Internet and they will spend the next hour checking their email, their
Facebook profile, their MySpace webpage, updating their Twitter account and their LinkedIn account. It is
addictive, occasionally fun and it does bring to light a lot of ‘lost’ contacts.
But the positives aside, if you own a business would you want your employees to be so keen on social
networking that they could be spending unacceptably long periods of time online and chatting? No. And
while most employers are willing to close an eye to the occasional quick browse and update, they are more
concerned about those who abuse the system.
This brings us to the all-important question: What should I do?
Weighing the pros and cons of social networking at work can help businesses reach a decision that in the
first instance safeguards the company’s interests yet also takes into consideration the ‘needs’ and practices/
hobbies that today’s employees have.

The Pros
1. Used diligently, social networking sites can be useful in expanding market reach, widening the business’s
   circle of contacts, creating a communication platform with clients and advertise for free.
2. They can help a business to reach out to new markets, remain in touch with existing customers and use
   the snowball effect to market its services or products.
3. A positive presence online can boost a business’s reputation and establish the name in new areas before
   taking the ‘physical’ plunge.
4. Social networking is a free source of marketing and advertising. The only cost to the business is the time
   and effort required to maintain the network and the official website.

The Cons
1. The main concern for organizations is not social networking sites per se but the people using them. Social
   networkers are the weakest link and their actions can create problems. Computer users’ actions are often
   based on impulse and not genuine awareness of what they are doing.
2. The P-word. Productivity. One reason why social networking sites are given a cold shoulder is the fact that
   employees could be spending unacceptably long on these sites. If every employee in a 50-employee
   company spent 30 minutes on social networking every day of a working week, that would total a
   cumulative productivity loss of 6,500 hours in one year. Now when you factor in how much each hour
   costs in salaries, you get a better and convincing picture. There is also an effect on company morale. While
   everyone sneaks a peek at his or her profile during the day, most employees would frown upon those
   whose social networking profile is open throughout the day. Morale is further hit if no action is taken.
3. Although updates to social networking sites may not take up huge amounts of bandwidth, the availability
   of (bandwidth-hungry) video links posted on these sites (or links taking users to sites like YouTube)
   creates problems for IT administrators. There is a cost to Internet browsing, especially where high levels of
   bandwidth are required.
4. The threat from web-borne viruses and malware is often overlooked by businesses. Hackers are attracted to
   social networking sites because they see the potential to commit fraud and launch spam and malware attacks.
   There are tens of thousands of applications available for Facebook (according to the company) and while
   Facebook may make every effort to provide protection against malware, these third-party applications may
   not all be safe. Some have the potential to be used to infect computers with malicious code which in turn
   can be used to collect data from that user’s site. Messaging on social networking sites is also a concern
   and the Koobface worm is but one example of how messages are used to spread malicious code and
   worms. A worm infection is the last thing an administrator wants to have to deal with! If you want to learn
   how to protect yourself from these threats, read Microsoft MVP Brad Dinerman’s detailed article here:
   http://www.fieldbrook.net/TechTips/Security/SocialNetworking.asp.


Social networking at work: Thanks, but no thanks?                                                                 3
5. Social engineering is a fine art and a lot of people are falling for online scams that appear genuine. The
   scope is to take information from users using subtle methods. For example, a quiz asking 20 questions
   about you, your lifestyle and habits, could provide the answers required for identity verification purposes
   on other sites. Telling everyone what your favorite pet’s name is may be harmless but you may also have
   used that as a secret question on a site to remind you what your password is. Simple and clever.
   People also have a habit of posting details in their social networking profiles that beggars belief. While they
   would never disclose certain information when meeting someone for the first time, they see nothing wrong
   with posting it online for all to see on their profile, personal blog or other social networking site accounts.
   People often post messages without thinking through what they have written. A seemingly innocuous
   message such as ‘I’m working this weekend because we’ve found a problem in our front-end product’ may
   be a spur of the moment comment but could raise concern among customers who may use that system,
   especially if the company handles confidential or financial detail.
6. Although there have been no major corporate lawsuits involving evidence from social networking sites,
   businesses need to be observant for employees who may be commenting publicly and talking about
   their employer. There are also serious legal consequences if employees use these sites and click on links
   to view objectionable, illicit or offensive content. An employer could be held liable for failing to protect
   employees from viewing such material. Apart from legal costs and fines, the damage to the organization’s
   reputation could both be substantial.

Thanks, but no thanks!
Businesses need to take stock of the situation and decide whether the risk of allowing people to use social
networking sites at work is acceptable or not.
Businesses have three options:
1. Don’t do anything,
2. Block everything (and that means Internet too), or
3. Be kind and let them use the Internet… but only when you want them to.
Today, most businesses opt for number three because it makes most business sense. You know your
employees need the Internet to work. So blocking access is not really an option. Giving them total access to
do what they want online is taking trust to the extreme. Yet having the ability to block or allow sites according
to the business’s needs is a solution that can and does work.

Striking a balance
In today’s networked world, it is impossible to isolate a business because of social networking sites. Despite
the concerns, there are steps a business can take to allow social networking at the office and still maintain a
level of control.
Here are a few pointers:
1.	 Restrict	access. Allow access during their lunch break, before work starts and after work. This can easily be
    done using Internet monitoring and filtering software (and myriad other things).
2.	 Educate	and	train	staff. Most employees are not aware of the time they spend on Facebook or that their
    actions online can cause security issues. Tell them in a language they understand how a simple click on
    a link they receive or an application they download can result in malware infecting their machine and
    the network. Additionally, tell them not to click on suspicious links and to pay attention when giving out
    personal details online.




Social networking at work: Thanks, but no thanks?                                                                    4
3.	 Set	security	and	usage	policies. Have all employees sign any policies related to the use of the Internet
    at work, access to social networking sites and what they are allowed to say or do during office hours.
    Monitoring of all web activity is important and employees should be aware that their actions are being
    recorded and that failure to adhere to company policy can result in disciplinary action and/or dismissal.

About GFI
GFI Software provides web and mail security, archiving, backup and fax, networking and security software
and hosted IT solutions for small to medium-sized enterprises (SMEs) via an extensive global partner
community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both
delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the
unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has
offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia,
Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations
worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a
Microsoft Gold Certified Partner.
More information about GFI can be found at http://www.gfi.com.




Social networking at work: Thanks, but no thanks?                                                                5
USA, CANADA AND CENTRAL AND SOUTH AMERICA
15300 Weston Parkway, Suite 104, Cary, NC 27513, USA
Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
ussales@gfi.com



UK AND REPUBLIC OF IRELAND
Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK
Telephone: +44 (0) 870 770 5370
Fax: +44 (0) 870 770 5377
sales@gfi.co.uk



EUROPE, MIDDLE EAST AND AFRICA
GFI House, San Andrea Street, San Gwann, SGN 1612, Malta
Telephone: +356 2205 2000
Fax: +356 2138 2419
sales@gfi.com



AUSTRALIA AND NEW ZEALAND
83 King William Road, Unley 5061, South Australia
Telephone: +61 8 8273 3000
Fax: +61 8 8273 3099
sales@gfiap.com




Disclaimer

© 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.

The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but
not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential
damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the
accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-
of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in
this document.

If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.

More Related Content

More from GFI Software

Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data BackupsGFI Software
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class SeriesGFI Software
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™GFI Software
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementGFI Software
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerGFI Software
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security SolutionsGFI Software
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web SecurityGFI Software
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkGFI Software
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR SpamGFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 
Binary translation
Binary translationBinary translation
Binary translationGFI Software
 
GFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI Software
 

More from GFI Software (20)

Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Data Backups
Data BackupsData Backups
Data Backups
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class Series
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Greylisting
GreylistingGreylisting
Greylisting
 
Binary translation
Binary translationBinary translation
Binary translation
 
Stopping Malware
Stopping MalwareStopping Malware
Stopping Malware
 
GFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment StrategiesGFI MailSecurity's Deployment Strategies
GFI MailSecurity's Deployment Strategies
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Social Networking at Work

  • 1. GFI White Paper Social networking at work: Thanks, but no thanks? Millions of people around the world with access to the Internet are members of one or more social networks. They have a permanent online presence where they create profiles, share photos, share their thoughts with friends and spend hours just catching up with what hundreds of friends are doing with their life.
  • 2. Contents The Pros 3 The Cons 3 Thanks, but no thanks! 4 Striking a balance 4 About GFI® 5 Social networking at work: Thanks, but no thanks? 2
  • 3. Give most people access to the Internet and they will spend the next hour checking their email, their Facebook profile, their MySpace webpage, updating their Twitter account and their LinkedIn account. It is addictive, occasionally fun and it does bring to light a lot of ‘lost’ contacts. But the positives aside, if you own a business would you want your employees to be so keen on social networking that they could be spending unacceptably long periods of time online and chatting? No. And while most employers are willing to close an eye to the occasional quick browse and update, they are more concerned about those who abuse the system. This brings us to the all-important question: What should I do? Weighing the pros and cons of social networking at work can help businesses reach a decision that in the first instance safeguards the company’s interests yet also takes into consideration the ‘needs’ and practices/ hobbies that today’s employees have. The Pros 1. Used diligently, social networking sites can be useful in expanding market reach, widening the business’s circle of contacts, creating a communication platform with clients and advertise for free. 2. They can help a business to reach out to new markets, remain in touch with existing customers and use the snowball effect to market its services or products. 3. A positive presence online can boost a business’s reputation and establish the name in new areas before taking the ‘physical’ plunge. 4. Social networking is a free source of marketing and advertising. The only cost to the business is the time and effort required to maintain the network and the official website. The Cons 1. The main concern for organizations is not social networking sites per se but the people using them. Social networkers are the weakest link and their actions can create problems. Computer users’ actions are often based on impulse and not genuine awareness of what they are doing. 2. The P-word. Productivity. One reason why social networking sites are given a cold shoulder is the fact that employees could be spending unacceptably long on these sites. If every employee in a 50-employee company spent 30 minutes on social networking every day of a working week, that would total a cumulative productivity loss of 6,500 hours in one year. Now when you factor in how much each hour costs in salaries, you get a better and convincing picture. There is also an effect on company morale. While everyone sneaks a peek at his or her profile during the day, most employees would frown upon those whose social networking profile is open throughout the day. Morale is further hit if no action is taken. 3. Although updates to social networking sites may not take up huge amounts of bandwidth, the availability of (bandwidth-hungry) video links posted on these sites (or links taking users to sites like YouTube) creates problems for IT administrators. There is a cost to Internet browsing, especially where high levels of bandwidth are required. 4. The threat from web-borne viruses and malware is often overlooked by businesses. Hackers are attracted to social networking sites because they see the potential to commit fraud and launch spam and malware attacks. There are tens of thousands of applications available for Facebook (according to the company) and while Facebook may make every effort to provide protection against malware, these third-party applications may not all be safe. Some have the potential to be used to infect computers with malicious code which in turn can be used to collect data from that user’s site. Messaging on social networking sites is also a concern and the Koobface worm is but one example of how messages are used to spread malicious code and worms. A worm infection is the last thing an administrator wants to have to deal with! If you want to learn how to protect yourself from these threats, read Microsoft MVP Brad Dinerman’s detailed article here: http://www.fieldbrook.net/TechTips/Security/SocialNetworking.asp. Social networking at work: Thanks, but no thanks? 3
  • 4. 5. Social engineering is a fine art and a lot of people are falling for online scams that appear genuine. The scope is to take information from users using subtle methods. For example, a quiz asking 20 questions about you, your lifestyle and habits, could provide the answers required for identity verification purposes on other sites. Telling everyone what your favorite pet’s name is may be harmless but you may also have used that as a secret question on a site to remind you what your password is. Simple and clever. People also have a habit of posting details in their social networking profiles that beggars belief. While they would never disclose certain information when meeting someone for the first time, they see nothing wrong with posting it online for all to see on their profile, personal blog or other social networking site accounts. People often post messages without thinking through what they have written. A seemingly innocuous message such as ‘I’m working this weekend because we’ve found a problem in our front-end product’ may be a spur of the moment comment but could raise concern among customers who may use that system, especially if the company handles confidential or financial detail. 6. Although there have been no major corporate lawsuits involving evidence from social networking sites, businesses need to be observant for employees who may be commenting publicly and talking about their employer. There are also serious legal consequences if employees use these sites and click on links to view objectionable, illicit or offensive content. An employer could be held liable for failing to protect employees from viewing such material. Apart from legal costs and fines, the damage to the organization’s reputation could both be substantial. Thanks, but no thanks! Businesses need to take stock of the situation and decide whether the risk of allowing people to use social networking sites at work is acceptable or not. Businesses have three options: 1. Don’t do anything, 2. Block everything (and that means Internet too), or 3. Be kind and let them use the Internet… but only when you want them to. Today, most businesses opt for number three because it makes most business sense. You know your employees need the Internet to work. So blocking access is not really an option. Giving them total access to do what they want online is taking trust to the extreme. Yet having the ability to block or allow sites according to the business’s needs is a solution that can and does work. Striking a balance In today’s networked world, it is impossible to isolate a business because of social networking sites. Despite the concerns, there are steps a business can take to allow social networking at the office and still maintain a level of control. Here are a few pointers: 1. Restrict access. Allow access during their lunch break, before work starts and after work. This can easily be done using Internet monitoring and filtering software (and myriad other things). 2. Educate and train staff. Most employees are not aware of the time they spend on Facebook or that their actions online can cause security issues. Tell them in a language they understand how a simple click on a link they receive or an application they download can result in malware infecting their machine and the network. Additionally, tell them not to click on suspicious links and to pay attention when giving out personal details online. Social networking at work: Thanks, but no thanks? 4
  • 5. 3. Set security and usage policies. Have all employees sign any policies related to the use of the Internet at work, access to social networking sites and what they are allowed to say or do during office hours. Monitoring of all web activity is important and employees should be aware that their actions are being recorded and that failure to adhere to company policy can result in disciplinary action and/or dismissal. About GFI GFI Software provides web and mail security, archiving, backup and fax, networking and security software and hosted IT solutions for small to medium-sized enterprises (SMEs) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold Certified Partner. More information about GFI can be found at http://www.gfi.com. Social networking at work: Thanks, but no thanks? 5
  • 6. USA, CANADA AND CENTRAL AND SOUTH AMERICA 15300 Weston Parkway, Suite 104, Cary, NC 27513, USA Telephone: +1 (888) 243-4329 Fax: +1 (919) 379-3402 ussales@gfi.com UK AND REPUBLIC OF IRELAND Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) 870 770 5370 Fax: +44 (0) 870 770 5377 sales@gfi.co.uk EUROPE, MIDDLE EAST AND AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: +356 2205 2000 Fax: +356 2138 2419 sales@gfi.com AUSTRALIA AND NEW ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: +61 8 8273 3000 Fax: +61 8 8273 3099 sales@gfiap.com Disclaimer © 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out- of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.