What Web 2.0 and E2.0 Security Means to Me
E2.
Paula Gregorowicz' review of Traction TeamPage 4.0 in October's Intranet Journal details how TeamPage 4.
While Gregoriwicz' review points mostly to intranet E2.
In the Web 2.
Why do we trust facebook?
The amount of personal information and content shared in social networks today - even just the connections made - is incredible. Why have people put so much faith in these systems? In part because friends trust it, but also because we tend to ignore the dangers.
In light of easy to find reports about major lapses in uptime, speed and security of Web 2.
Do enterprises have any reason to be alarmed by employee activity in Web 2.
Sure. Employees certainly have every right to manage their own address book and professional network. And it would seem that their employers shouldn't have any cause for alarm as long as employees don't disclose confidential information. But there is no way to monitor for leaks. And beyond the simple matter of leaks, an employee's mere activity could be considered confidential . The waters get murky when you consider that an employee may connect to new partners and customers or prospects, and that the linking activity can be monitored by anyone that an employee is connected to. I remember backing off of LinkedIn many years ago when I saw a competitor make a series of connections to VC contacts I had. His fund raising goal and target list became instantly obvious. On the other hand, there are benefits we all reap by using these services and you can't control employees in mass - so a balanced view is required.
What are the drivers for using Web 2.
In Web 2.
In Enterprise 2.
What are security considerations for E2.
The matter of security goes beyond simple authentication (am I who I say I am) and privacy control (who can see what information). Given my experience with Traction TeamPage, I've identified the following aspects of security which may be interesting to enterprise decision makers and users alike:
1. Authentication - Are you who you say you are?
2. Permissions / Access Control - What spaces and content can you SEE and what can you DO in the environment? Beyond content, can you see address book information. For example, maybe employees can see everyone's information but customers can't see all other customer's contact data.
3. Audit Trail - What happened over time? For example, who applied a given tag at what time? or what version of a page was e-mailed to a customer?
4. Content Production Monitoring - Ability for users to keep up to date with new activity based on author, workspace of content specific criteria. Ability for administrators to monitor for malicious content, receiving instant notification or even suppressing the content as its posted.
5. Content Access Monitoring - In the case of an information leak (inadvertent or not), the ability for administrators to determine which users read what content when.
6. Content Moderation - This may include moderating comments on pages, working on several pages at once before publishing them simultaneously, or subjecting pages to a review process before publishing. It may also involve suppressing edit history from certain audiences or locking pages from being edited if they are in a final form.
7. Content Parsing - Is there a process that grooms content when its published? This sort of process can remove script tags and other types of elements that could be malicious.
These are all important considerations, but software has its limits. There is no protection better than a simple code of conduct and communication policy that applies to all venues, channels and contexts in which an employee may participate.