Social Networking Threats

Social networking is no longer just a term in the urban dictionary but a way of life. Sites like Facebook and Twitter
connect millions of users around the globe, breaking down traditional geographical barriers with the aid of the Internet.


In Singapore, approximately half the population are Facebook users. Singapore also boasts the fourth largest Twitter population in Asia with approximately 2.1 million users. Organizations too have come to realize the value
of social media with many companies jumping on the social media wagon.


Not the Real McCoy


However, despite the benefits that social media offer businesses, there is a downside – the increased risk of having a company’s IT system infiltrated by web-based viruses and spyware.


When a user accesses a compromised social media website hosting a seemingly harmless link or video, spyware hosted on site can be activated to lure users to fake websites that trick them into divulging personal details and
passwords.

Join Singapore Business Review community


How to handle social media security risks


Companies will continue to leverage on social networking sites as a business tool to communicate with their clients and to build their brands. Similarly, cybercriminals will continue with their relentless attempts to hack into users’ accounts to phish for information, send spam or carry out other malicious activities.


However, there are steps that companies can take to protect themselves from social networking threats. The weapon of choice for many companies when combating web threats is a hosted web security service.


A Hosted Web Security and Content Filtering service operates at the Internet level to intercept viruses, spyware and other web-borne threats before they enter your network, including those that enter from social media sites. The greatest benefit of this service is that it does not require hardware implementation, regular maintenance or security upgrades.


All users’ web traffic requests – made within and outside the corporate network – are made to pass through the Hosted Web Security and Content Filtering service platform which should be hosted in secure data centers worldwide.


Each request is checked against a company’s acceptable-use policy to determine if access should be given. If a request is allowed to pass, the relevant web page or file download is scanned for viruses and spyware. Thereafter if a virus of spyware is identified, access to the web page is denied.


Your business’s infrastructure and information are protected, while productivity is enhanced through the efficient enforcement of acceptable usage policies.


To find out more about the fully managed web security services that Symantec Hosted Services delivers, visit our website at www. messagelabs.com.sg
 

Since you're here...

...there are many ways you can work with us to advertise your company and connect to your customers. Our team can help you dight and create an advertising campaign, in print and digital, on this website and in print magazine.

We can also organize a real life or digital event for you and find thought leader speakers as well as industry leaders, who could be your potential partners, to join the event. We also run some awards programmes which give you an opportunity to be recognized for your achievements during the year and you can join this as a participant or a sponsor.

Let us help you drive your business forward with a good partnership!

Top News

Vibrant Group wins suit against Blackgold Australia
The group shall be paid damages and fees by Blackgold Australia’s ex-CEO and ex-chairman.
Lorem Ipsum text in year 2025
Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old.
Lorem Ipsum is simply dummy text of the printing and typesetting industry.
Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock, a Latin professor at Hampden-Sydney College in Virginia, looked up one of the more obscure Latin words, consectetur, from a Lorem Ipsum passage, and going through the cites of the word in classical literature, discovered the undoubtable source. Lorem Ipsum comes from sections 1.10.32 and 1.10.33 of "de Finibus Bonorum et Malorum" (The Extremes of Good and Evil) by Cicero, written in 45 BC. This book is a treatise on the theory of ethics, very popular during the Renaissance. The first line of Lorem Ipsum, "Lorem ipsum dolor sit amet..", comes from a line in section 1.10.32.