Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Audits

Security Concerns Primary Roadblock to Corporate Adoption of Web 2.0

A new report released today by IT security giant McAfee indicates that while organizations see the potential value of Web 2.0 tools, decision makers continue to debate whether to use them in the workplace.

Security Risks of Social Media

A new report released today by IT security giant McAfee indicates that while organizations see the potential value of Web 2.0 tools, decision makers continue to debate whether to use them in the workplace.

Security Risks of Social Media

The report is based on a survey of over 1,000 global business decision-makers in 17 countries. It finds that 75 percent of those queried are using Web 2.0 technology – defined broadly as consumer social media applications such as Facebook, Twitter and YouTube plus specialized enterprise solutions – for functions such as IT (51 percent), marketing and sales (34 percent), customer relations (29 percent), advertising and public relations (28 percent) and human resources (22 percent).

Revenue potential was cited as the top driver for adoption of Web 2.0 technologies. Three out of four organizations reported that their expanded use created new revenue streams. Forty percent said the tools have boosted productivity and enhanced marketing strategies.

Related Column: Web 2.0 – Should Businesses Block or Embrace?

Security concerns were the primary roadblock to Web 2.0, with half the firms citing fears of malicious software, viruses, overexposure of information and spyware.

A surprising 60 percent of the companies surveyed had suffered large losses averaging $2 million each because of security incidents during the past year, but the potential consequence of Web 2.0 abuse that was most feared in the future (also by 60 percent) was loss of reputation.

Worldwide, 13 percent of organizations block all Web 2.0 activity, while 81 percent restrict the use of at least one Web 2.0 tool because of security concerns.

The new report is titled “Web 2.0: A Complex Balancing Act – The First Global Study on Web 2.0 Usage, Risks and Best Practices.” It was commissioned by McAfee and authored by faculty affiliated with the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...