Employment Screen Resources' Lester Rosen says there's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants, they also can be abused.
When it comes to sizing up the privacy agenda for 2011, the tone at the top of organizations is all about improving data security, says privacy expert and lawyer Lisa Sotto.
Fraud attempts will escalate, not diminish, as new threats and channels blossom in 2011. Growth in mobile banking and the use of social networks are expected to pose new security challenges, experts say.
Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
"If you at all have any inclination of allowing Internet access in your company networks, you need a social media policy," says Hemu Nigam, former CSO at MySpace.
WikiLeaks founder Julian Assange has become akin to a "cyber messiah," Hemu Nigam says. And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
One-third of students who gave up social media for a week say they felt less stressed by not having to compulsively check updates and posts on social networks.
Looking ahead to the new year, Kristin Lovejoy of IBM says information security organizations face a host of global compliance issues - and the complexity of this challenge may be the biggest task of 2011.
Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.