The recent news of government secrets posted to WikiLeaks has refocused enterprise IT on data security. Due to the ease of gathering and transmitting massive amounts of data in a short period of time, the cost of a single leak continues to grow exponentially. Meanwhile, thanks to exciting innovations in the consumer web, employees are demanding the benefits and openness of social networking inside the enterprise. Enterprise social solutions yield huge, measurable benefits. It’s just a matter of time before these two forces collide in your organization — if they haven’t already.
While social networking has relaxed an individual’s notion of privacy, “oversharing” in the enterprise context leads to increased risk. This risk is increased by unsanctioned social freeware that encourages employees to bypass IT altogether. In the name of openness and the cloud, these freeware solutions actively solicit people to share confidential company information with their co-workers, completely outside of the enterprise, on a system without any formal corporate controls. This is a regulatory lawsuit waiting to happen.
But, there are alternatives. Enterprise social software can be securely deployed from the cloud or from within the enterprise if adopted in the right way. To address these challenges, IT has to rely on the same tried and true security approaches, adapted for the new, social world. And most of the work involves addressing AAA — authentication, authorization and accounting — in the context of these new, open systems.
To Continue Reading: Click Here
By: Brian Roddy