IT Best Practices: Protecting the Perimeter
Read/Download White Paper (PDF)
For more information on Intel IT Best Practices, please visit www.intel.com/IT
At Intel, we are well aware of the risks associated with social media, but attempting to stop the use of external social media web sites would have been counterproductive and, in any case, impossible. We realized that if we did not embrace social media and define ways to use it, we would lose the opportunity to shape employee behavior. In general, people are likely to take better care of their own possessions than someone else’s. They feel a stronger connection to their own car than to one provided by their employer. We found social media does not create new risks, but can increase existing ones. Recognizing this, we created policies and training tools, then deployed internal social media capabilities, such as wikis, forums, and blogs. This article examines the effort to find the balance between protecting through restrictions and through cultivating a sense of personal commitment and security ownership among our employees.
Malcolm Harkins is vice president of the Information Technology Group, and Chief Information Security Officer (CISO) and general manager of Information Risk and Security. The group is responsible for managing the risk, controls, privacy, security, and other related compliance activities for all of Intel’s information assets.