Workplace social networking rising
With social networking use in the workplace rising, companies may need to think more about what policies they have in place.


Employees are increasingly accessing social networking sites while at work, potentially placing their corporate network in greater danger.
Almost a quarter of respondents to a Trend Micro survey said they used social networking sites in the workplace, up from 19 per cent in 2008.
The poll, conducted among 1,600 end users in the UK, US, Germany and Japan, discovered that Germany had seen the biggest rise in office social networking use, followed by the UK.
A disparity between laptop and desktop users was also discovered by the research, with the former more likely than the latter to head to sites such as Facebook and Twitter.
In 2010, 29 per cent of laptop users polled said they went on such sites at work, compared to 18 per cent of desktop users.
Furthermore, laptop users who go online outside of the corporate network are more likely to share confidential data over services such as instant messenger, email and social media applications than workers always connected to the company network.
According to Rik Ferguson, senior security advisor at Trend Micro, companies should be educating their workers on the dangers associated with social networks on a regular basis, rather than just occasionally.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Any policies that you are going to put in place, one of the most important pillars of that policy is going to be education," Ferguson told IT PRO.
"It's going to be about making sure that people are aware of what kind of information is appropriate to share, what kind of information is not appropriate to share, what kind of tone it is appropriate to engage in when you are having an online conversation," he added.
It is also important for workers to understand the longevity of the data they place on the internet, Ferguson said.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
Tech leaders worry AI innovation is outpacing governance
News Business execs have warned the current rate of AI innovation is outpacing governance practices.
-
Exploitation of Docker remote API servers has reached a “critical level”
News Hackers are targeting Docker’s remote access API as it allows them to pivot from a single container to the host and deploy malware with ease
-
Cyber criminal underground “thriving” as weekly attacks surge by 75% in Q3 2024
Cyber attacks reached another all-time high this quarter as digital crime continues to be a highly profitable industry for threat actors
-
Alarm raised over patched Phemedrone Stealer malware that's being used to target Windows PCs - here's what you need to know
News Phemedrone Stealer is being used to exploit a vulnerability in Windows Defender SmartScreen despite the issue being patched in November 2023
-
Top data security trends
Whitepaper Must-have tools for your data security toolkit
-
SOC modernization and the role of XDR
Whitepaper Automate security processes to deliver efficiencies across IT
-
Uncovering the ransomware threat from global supply chains
Whitepaper Effectively mitigate ransomware risk
-
The near and far future of ransomware business models
Whitepaper Discover how criminals use ransomware as a cyberweapon