close

policy

We would like to invite you to continue a survey you have started. ...

Do you trust your insurer ?

Strongly agree
Agree
Disagree
Strongly disagree
Insurance provides peace of mind
Insurance is purchased only when compulsory
Terms and Conditions (small print) are clear and easily accessible
Insurance jargon (language) stands in the way of fully understanding each policy
Insurance companies try their best to uphold the details of the policy without cutting corners
Reducing risk, cutting costs and profits are more important to an insurance company than the customer
Insurance companies in the region are as professional as in other more developed markets
Gender
Age group
Do you feel your insurance provider works in your interest?
Have you had a rejected claim that you feel was not justified?
Do you trust your insurance provider?
Our Network

Register for our free newsletter

 
 
Latest News

The top four risks companies face when socialising online

The top four risks companies face when socialising online

Jumping on the social media bandwagon isn’t as easy as the young’uns make it look. Blue Coat Systems’ Nigel Hawthorn lists the dangers to look out for.

0

July 11, 2011 10:46 by



2. Selective Social Networking Controls – Manage the actions your employees can take within social networking sites. For example, you may want to prevent employees from uploading attachments, photos or video to social media sites, thereby preventing risks of inadvertent data loss or risks to your corporate reputation. The key is to have granular control over what can be done within social networking. This requires a solution that not only looks at where the initial traffic is coming from (e.g. Facebook, YouTube, etc.), but also at what is being done within that application (email, posting messages, downloading attachments).

3. Caching – you can’t allow social media to overrun your network and adversely impact business critical applications. However, because social networking is becoming so integral to business, you cannot simply block it. What you can do is offset any potential performance degradation with caching, which allows you to locally store data and video files after an initial download and make them readily available to users who want to subsequently access them.

4. Policy flexibility – Set acceptable use policies within social media. You may choose, for instance, to block access to certain apps during work hours; or if you allow it, you may want to give it a lower priority, so it doesn’t impact business critical applications. The ability to delineate between social networking sites and specific applications or content within those sites is crucial to setting an effective acceptable use policy.

Maximising the use of social networking as a communication tool between companies and its partners and customers doesn’t to be a potential risk for the business. Embracing social media only requires the right security.

Nigel Hawthorn is the VP EMEA Marketing for Blue Coat Systems

From working with an Apple distributor in 1980 to VP EMEA Marketing now, Hawthorn has 25 years experience of computers and networking.  His international knowledge started in 1987 and has presented at security, e-commerce and networking forums in over 50 countries.  He has contributed to a number of computing books on protocols and security and lived in California for a number of years before relocating back to the UK as he was missing the rain.  He has worked for Blue Coat Systems for over 9 years.



Pages: 1 2

0

Tags: , , , , , , , ,

Leave a Comment