Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

BCS ITNow 201306 - Share Securely


Published on

When posting information online you should always assume that it is public, says Gareth Niblett, Chairman of the BCS Information Security Specialist Group.

Published in: Social Media
  • Be the first to comment

  • Be the first to like this

BCS ITNow 201306 - Share Securely

  1. 1. June 2013 ITNOW 25 People now live more and more of their lives online, with most having accounts with one or more sites that allow them to share personal or professional details and activities with others. We generally trust who we connect with but share maybe more than is prudent in a medium that may seem ephemeral but can provide an online record long into the future. Misjudged messages and images can be found years later and put employment and relationships at risk. Even trying to limit who you initially share information with doesn’t prevent it from being recorded or forwarded on, and the sites may have an interest in you sharing to the widest audience possible. Always assume posts are public and permanent. Even if we are careful about who we connect with and what we share, we can provide snippets of information which, taken together with other data, can expose things that we did not intend to be publicly revealed - be they company technologies, plans and other commercially sensitive data or your locations and sensitive personal data. Often our mobile devices, such as smartphones and tablets, will be set up to automatically log into social media sites and other accounts yet lack the same level of protections that a laptop or desktop might have. When someone else gets hold of our devices it can be all too easy to get access to the device, along with all the data and accounts linked to it. INFORMATION SECURITY We might also receive posts, links and recommendations from friends, colleagues and other contacts that we click on, install or visit and be subject to other risks, such as scams, malware, spyware and other unwanted things. We all need to be educated to online and social threats, so we can all identify and deal with them. When posting information online you should always assume that it is public, says Gareth Niblett, Chairman of the BCS Information Security Specialist Group. Information Security Specialist Group (ISSG): Information Risk Management and Assurance Specialist Group: BCS Security Community of Expertise (SCoE): FURTHER INFORMATION SHARE SECURELY doi:10.1093/itnow/bwt010©2013TheBritishComputerSocietyImage:iStockPhoto/162496927 Available from all ebook stores BC196/LD/AD/0513 © BCS, The Chartered Institute for IT, is the business name of The British Computer Society (Registered charity no. 292786) 2013 The increasing use of personal devices such as smartphones and tablets at work is offering an opportunity as well as a challenge for organisations. This ebook looks at ways to embrace the benefits of BYOD while offering advice on how to minimise the risks. £1.99 (inc.VAT) According to a recent iPass report, 73% of enterprises allow non-IT- managed devices to access company resources. This ebook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. £1.99(inc.VAT) The articles in this ebook look at different aspects of cloud computing. From strategic and infrastructure considerations to legal and security issues, the practical advice will build a clearer picture of the benefits and drawbacks. £1.99(inc.VAT) PROFESSIONALS ON THE GO PROS AND CONS Alsoavailableinthisebookseries: GETTING PERSONAL