Social Media

Twitter, Facebook, Gmail, LinkedIn, Skype, the list goes on and on and a majority of the one billion people that use these social net working sites consistently use them while at work. This unchecked flow of data is a new source of sensitive information and creates se curity loopholes for serious cyber attacks. From a technology stand point, enforcing a policy around social networking traffic is difficult but it must be done.

by Chris Poulin

You must be logged in to post a comment