Older Hacking Methods Still Used To Capture Forums
If you are running a Simple Machines Forum, there is a new hack making the rounds, and it is enough to turn your forum into something you no longer control. The hack first showed up May 01 2009, and has been...

Why Is GPL Selected By Open Source Vendors?
I started to consider the reasons why open source vendors select the GPL after ESR wrote: "The GPL may be a community-building signaling device, but it is...

P2P Is About Instant Gratification Not Thievery
'P2P is a demand signal from the market,' says Cory Doctorow. If that's the case, what are we to make of The Pirate Bay conviction last week? For those who don't know, Pirate Bay is one of the world's largest...

Tips To Help With Your Cloud Computing Project
Just finishing up the final touches on my first big cloud computing project, and there was much to learn here, some pitfalls and some promises in the cloud that...

Hacking WordPress Through Security Flaws
Bandit Defense has posted a new Wordpress hack, but there are some things you need to know about first. The biggest one is that it relies on poor security at the...


06.01.09

Social Networking Challenge To Network Security


By Mike Sachoff

The increase in social networking and mobility trends is presenting challenges to companies' network security, disaster planning and business continuity, according to a new study from AT&T.

Two-thirds (65%) of all executives plan on investing in new technologies in 2009. Investment will be focused on new equipment, a variety of software, storage and security updates.

When it comes to IT spending for this year, forty percent of executives said that their IT budgets are expected to be lower this year, while nearly a quarter (24%) indicated their budgets will be higher.

Three out of four executives are concerned about the increased use of social networking capabilities' potential impact on network security. Forty-four percent allow employees to access social networking sites. However, hacking continues to be listed as the biggest security risk to companies (30% compared with 3% for social networking).

Watch Your Business Grow with
Email Marketing - Free Trial

Sixty-seven percent of executives indicate that wireless network capabilities are part of their business continuity plan. In addition, nearly half (46%) said that mobile devices play a major role in their plan's considerations.

"In today's business environment, connectivity cannot be disrupted, which is why business continuity planning and disaster recovery efforts are paramount," said Bill Archer, chief marketing officer - AT&T Business Solutions.

"The top three lessons learned by the executives we surveyed who have experienced a disaster include: having a plan in place is critical; increase back-up systems to ensure no data loss; and have multiple means of communication available.


About the Author:
Mike is a staff writer for WebProNews. Visit WebProNews for the latest ebusiness news.
About NetworkNewz
NetworkNewz editors, writers and contributors focus on both the big picture and the details of networking. At NetworkNewz our goal is to deliver to you The Key To Network Management.





NetworkNewz is brought to you by:

SecurityConfig.com NetworkingFiles.com
ITmanagementNews.com WebProASP.com
DatabaseProNews.com SQLProNews.com
ITcertificationNews.com SysAdminNews.com
LinuxProNews.com WirelessProNews.com
CProgrammingTrends.com ITmanagementNews.com





-- NetworkNewzis an iEntry, Inc. publication --
iEntry, Inc. 2549 Richmond Rd. Lexington KY, 40509
2009 iEntry, Inc. All Rights Reserved Privacy Policy Legal

archives | advertising info | news headlines | newsletters | comments/feedback | submit article


The Keys To Network Management Ask Questions in the Networking Forum NetworkNewz About Us iEntry NetworkNewz Home Page About Article Archive News Downloads WebProWorld Forums Jayde iEntry Advertise Contact