Site Meter

Is LinkedIn a Bad Idea for Employers?

You may also like...

4 Responses

  1. Jack S. says:

    Employer controls? as if that ever works. By your reasoning, e-mail is bad for companies. Several viruses have transited via e-mail in just the way you describe and have been extremely successfully in shutting down a company’s mail system and other things. Block all non-registered e-mail addresses? Probably not going to work in a large operation. Risk filtering out an important client mail (it happens, I speak from personal experience). Also not a good idea.

    Your scenario also decribes the same thing as breaking into someone’s e-mail. I would hope that LinkedIn is at least close to the security of e-mail if not the same (which isn’t much, all things said).

    The social networking sites, personal e-mail at work and receiving personal mail on work e-mail all bring up interesting risk issues. But prohibition techniques is probably not the best way to address the problem.

  2. Jack S. says:

    the other things though, education and better virus filtering is a good technique. This of course requires properly trained technical staff as well who keep an eye on the virus news sites via alerts or whatever, etc. many times these nasty’s come out and do damage before corrective action can be taken. some can be spared if there’s effective communication.

  3. Bruce Boyden says:

    Another way to combat the problem would simply be to not have any friends. :-)

  4. Jack S., this problem is more insidious than typical spam. It’s now possible to do some pretty convincing social engineering, rather than just a “Dear Sir” in some strange email with a link or attachment.

    The remedies listed are quite appropriate. Tools are readily available to block malware attachments, filter email from spammy addresses, and even flag emails containing links to known malware domains and IP addresses. But education is key to get employees to recognize the risks of putting too much information in the public domain that can easily play into social engineering attacks.