Web+2.0++Security+Issues+and+Ways+to+Protect+Your+Business+By+Cheryl+Berger

Web 2.0: Security Issues and Ways to Protect Your Business By Cheryl Berger ​

Having the honor of someone hacking into my Facebook account and sending out inappropriate messages from my account, I have experienced first-hand how Web 2.0 technology can create security and privacy issues. I was lucky enough to have not had to deal with insanity of identity theft and all I had to endure were vulgar posts on my Facebook page. To make sure that this never happens again, at least the best I can prevent it, I have created a very unique password with a variety of numbers and symbols.

One of the problems with Web 2.0 technology is that unmonitored access to the sites creates a number of risks to companies, including data theft, information leakage, and liability for information misuse. The reason for these security risks is that these services were never created for company use. There are many types of businesses taking advantage of the Web 2.0 technology including schools and healthcare organizations. One security issue to think about that I did not mention above and is very widespread among young adults is sexual predators. This is something that schools have to take in consideration when allowing students to access the internet. As stated in the article Security in a Web 2.0-Based Educational Environment, “Repeated research studies have demonstrated that the majority of young people are generally making good choices online and effectively handling the negative incidents that do occur. However, they are young, they do not fully understand the ramifications of some actions, they will engage in risk taking, they will make mistakes, and others may seek to harm them. The technology environment can have a negative influence on behavior due to the misconception of invisibility and the lack of tangible feedback of the consequences of behavior. Through effective social norms/peer leadership-based education, we can reduce their mistakes, increase their abilities to respond to negative incidents, and encourage them to assist others or report serious concerns to a responsible adult.” Image from resetsanfrancisco.org

Since the schools can’t completely stop the students from using Web 2.0 technology, they are encouraged to use peer leadership to stress the importance of helping others who are at risk online. Students should understand fully the potential harmful consequences to others, and provide practice in helping skills. Among the older grades teachers should use peer discussion groups so the students can ask questions for a better understanding. The schools should also provide opportunities for older students to offer guidance to younger students.

Among the healthcare organizations, it was thought that Web 2.0 technology was a great way to offer new ways to communicate with patients, employees, and potential new patients. However, protecting sensitive patient data and the integrity of the organization is very important and some staff worries that opening access without the right security, policies, and planning could be harmful since the Web 2.0 sites are a top target of cybercriminals and a major source of data loss if they are not managed properly. Another problem is that Web 2.0 sites present an entry for malware and other data-stealing attacks. Cybercriminals are infecting more and more sites that enable user-generated content such as blogs and Twitter, with malicious content. Recent research also shows that 57 percent of data-stealing attacks are coming over the Internet. A healthcare called Health First was looking into these issues and after research they found that traditional security solutions were not able protect against Web 2.0 attacks and inappropriate content. As mentioned in the article Gateway secures Web 2.0 initiative, in order for Health First to let their employees visit these sites, they needed a Web security gateway solution that sits inline in the network stream, which is able to look at the specific content on the page and then prevent the malicious elements from being accessed. Image from ciefrenak.org

Health First chose to use Websense Web Security Gateway as a tool to enable employees to safely access Web 2.0 technology. Health First’s information security architect, Frank Waszmer, designed a deployment strategy to help minimize installation time. To redirect HTTP and HTTPS Web traffic to the gateway, he deployed the system in what is called a "transparent proxy," utilizing the WCCP protocol. Most of the time spent on this project has been around adjusting internet use policies and working with the different departments to provide better control and feedback. The article Gateway secures Web 2.0 initiative states, "Today, healthcare IT managers and CIOs need to be an active part of the solution to balance the business needs of Web 2.0 adoption with security," says Rushnell. "Web 2.0 is here and only going to become a larger part of our business, so my greatest advice to other healthcare organizations thinking about enabling Web 2.0 is that they need to anticipate the changes in the business and adjust, actively taking steps to secure Web 2.0 use."

With so many people entering the workforce and bringing with them the knowledge of social computing tools we are unsure how exactly this will affect businesses in the future. If the way 2.0 technologies such as blogs, wikis, and networking sites have changed our personal lives is any indication, then social software applications and social networks are likely to greatly alter the way the companies work. However, there is a big difference between personal computing and computing for the company, especially where security is concerned. Weaknesses can easily be transferred from one environment to the next without proper education and technical knowledge and managers need to be prepared. Among the benefits of this remarkable conversion are also some serious issues around corporate control and security. Therefore, a series of security issues need to be enforced and addressed.

The article Security Threats from Social Computing says “Phishing and malware are serious concerns in the consumer space and this needs to be addressed in the corporate space. Corporate social networks are perfect entry points for these threats. The worms that once crawled into our e-mail inboxes are now going to appear from within our own corporate networks on our own wikis and blogs. Social networks make it easier for people to form connections, understand relationships and leverage connections in the enterprise. They also provide a wealth of knowledge for people performing social engineering activities.”

There is a terrific amount of benefits for businesses in using social computing tools but getting started on the right foot will guarantee the most worth is acquired for the business. There are many steps that companies can take to protect against online threat and lower risks. The best thing to do is to find out the companies needs and what kind of security threats that the company can experience. At that point, they can then research what kind of security tools they should implement in their company. It is better to be secure and educated now, then to be caught off guard by a new 2.0 technology later.

Links

You can find a copy of Web 2.0 Security Issues Discussed At New York Forum at http://home.nestor.minsk.by/networks/news/2008/05/0201.html

You can find a copy o f SECURITY In A Web 2.0-Based Educational Environment part 1 at http://www.internetatschools.com/Articles/Editorial/Features/Security-in-a-Web-2.0-Based-Educational-Environment-Issues-and-Answerse28094Part-1-5bAvailable-Full-Text2c-Free5d-66905.aspx

You can find a copy o f SECURITY In A Web 2.0-Based Educational Environment part 2 at http://www.internetatschools.com/Articles/Editorial/Features/Security-in-a-Web-2.0-Based-Educational-Environment-Issues-and-Answerse28094Part-2-68105.aspx

You can find a copy o f Gateway Secures Web 2.0 Initiative: Concerned About Malware And Other Security Issues, Health First Settled On A Solution That Allows IT To Set Granular, Flexible Internet Usage Policies For Devices, As Well As Specific Users And Groups at http://www.highbeam.com/doc/1G1-210032278.html

You can find a copy o f Security Threats From Social Computing at http://www.securitymagazine.com/articles/security-threats-from-social-computing-1

Source Citations
 * 1) "Web 2.0 Security Issues Discussed At New York Forum." (n.d.): Gale: InfoTrac OneFile (HITS). Web. 3 Sept. 2012.
 * 2) Willard, Nancy. "SECURITY In A Web 2.0-Based Educational Environment." Multimedia & Internet@Schools 17.3 (2010): 8-11. Computer Source. Web. 3 Sept. 2012.
 * 3) Willard, Nancy.  " SECURITY In A Web 2.0-Based Educational Environment." Multimedia & Internet@Schools 17.4 (2010): 21-23. Computer Source. Web. 3 Sept. 2012.
 * 4) "Gateway Secures Web 2.0 Initiative: Concerned About Malware And Other Security Issues, Health First Settled On A Solution That Allows IT To Set Granular, Flexible Internet Usage Policies For Devices, As Well As Specific Users And Groups." Health Management Technology 30.10 (n.d.): 20. Gale: Academic OneFile (PowerSearch). Web. 3 Sept. 2012.
 * 5) Ghandi, Ajay. "Security Threats From Social Computing." Security: Solutions For Enterprise Security Leaders 45.3 (2008): 20-22. Vocational and Career Collection. Web. 3 Sept. 2012.