You are on page 1of 2

Comment

Article
Analysis – Avoid data leakage in a Web 2.0 world

By Fran Howarth, Principal Analyst, Quocirca Ltd


focusing on the functionality that these
Losing data such as intellectual property can programming techniques enable, less attention
harm an organisation competitively and, if it can was paid to their security vulnerabilities.
be proven how the loss occurred and what party
benefited, can potentially lead to expensive A key problem is that through use of next-
litigation. generation programming languages, more of the
business logic, such as access controls and
Businesses face many regulations that force session management logic, is exposed to users
them to improve their security and implement and therefore to hackers.
safeguards. In a recent Quocirca survey 82 per
cent of 250 respondents cited data protection Many Web 2.0 applications allow users greater
laws as the most worrying regulation they face control over the content they generate and give
more than twice as many as for any other. them the ability to publish content online. This is
something that organisations should be wary of,
Organisations are now taking great pains to since security issues can be raised by employees
ensure the data on which they rely, including giving away personal, or even company-related
personal data related to partners, customers and information, through the use of such
employees, is secure. But, in many cases, they applications.
are struggling to keep ahead of hackers who
have turned their attention from using fairly The need to place controls on the use of
simple methods, such as sending a virus as an applications using new programming techniques
email attachment, to a more targeted approach. as well as to solve the productivity drain seen in
One such method of attack is through the some organisations through the use of newer,
software applications that run on computer more socially oriented applications, such as
networks. social networking sites and blogs is leading
many companies to try to block or limit their
Software applications often contain millions of use.
lines of code, making it likely that some mistakes
will have been made in the writing of the code. There are a number of technology tools that can
Such flaws can be targeted by hackers and new be used to do this effectively. However, a large
types of attacks are emerging that look for proportion of survey respondents are relying on
insecurely written code and hunt for policies alone for blocking or restricting access
vulnerabilities in software applications. and policies are notoriously hard to enforce.

However, while organisations are under pressure A better strategy is to deploy both technology
to protect the information they generate, they and policies and to ensure that employees are
are increasingly making use of Web 2.0 aware of their obligations laid out in the policies
applications that provide a much higher degree set. Organisations cannot afford to be
of interaction and allow for dynamic content to complacent.
be produced on the fly, providing users with a
much richer experience than the static web Quocirca’s report Why Application Security is
content of yesteryear. Crucial is free to CRN readers and is due to be
published shortly at www.quocirca.com.
To write Web 2.0 applications, a number of new
programming tools have been developed, using
dynamic user-friendly interfaces that allow a
higher degree of collaboration. However, in

© 2008 Quocirca Ltd http://www.quocirca.com +44 118 948 3360


Comment
Article

About Quocirca
Quocirca is a primary research and analysis company specialising in the business impact of information
technology and communications (ITC). With world-wide, native language reach, Quocirca provides in-
depth insights into the views of buyers and influencers in large, mid-sized and small organisations. Its
analyst team is made up of real-world practitioners with first hand experience of ITC delivery who
continuously research and track the industry and its real usage in the markets.

Through researching perceptions, Quocirca uncovers the real hurdles to technology adoption – the
personal and political aspects of an organisation’s environment and the pressures of the need for
demonstrable business value in any implementation. This capability to uncover and report back on the
end-user perceptions in the market enables Quocirca to advise on the realities of technology adoption,
not the promises.

Quocirca research is always pragmatic, business orientated and conducted in the context of the bigger
picture. ITC has the ability to transform businesses and the processes that drive them, but often fails to
do so. Quocirca’s mission is to help organisations improve their success rate in process enablement
through better levels of understanding and the adoption of the correct technologies at the correct time.

Quocirca has a pro-active primary research programme, regularly surveying users, purchasers and
resellers of ITC products and services on emerging, evolving and maturing technologies. Over time,
Quocirca has built a picture of long term investment trends, providing invaluable information for the
whole of the ITC community.

Quocirca works with global and local providers of ITC products and services to help them deliver on the
promise that ITC holds for business. Quocirca’s clients include Oracle, Microsoft, IBM, Dell, T-Mobile,
Vodafone, EMC, Symantec and Cisco, along with other large and medium sized vendors, service
providers and more specialist firms.

Details of Quocirca’s work and the services it offers can be found at http://www.quocirca.com

© 2008 Quocirca Ltd http://www.quocirca.com +44 118 948 3360

You might also like