Q

Can watching online videos present enterprise security risks?

In this SearchSecurity.com Q&A, security expert Mike Rothman unveils what security risks, if any, are presented by Internet video and radio.

Can watching videos online and listening to Internet radio present any serious security problems? If so, are there any recommendations on how to approach the problem from a policy standpoint and from a user standpoint?
Internet video and radio present no additional security issues, besides the inherent risks of navigating with a browser. There is nothing in the various streaming protocols that create additional worries. That being said, many organizations have policies governing the use of Internet video and radio for productivity reasons.

Many Web filtering gateways can block these applications. As an additional layer of precaution, I also recommend...

application control (white lists) to be integrated into the client security layer to make sure that malware can't execute if a user navigates to a bad site.

For more information:

  • In this installment of our Risk Management Guide, contributor Shon Harris explains what risk is and clarifies the differences between risk and vulnerability management.
  • Identity management and access control expert Joel Dubin reviews the processes involved when conducting a risk assessment.
  • This was last published in June 2007

    Dig Deeper on Information Security Policies, Procedures and Guidelines

    PRO+

    Content

    Find more PRO+ content and other member only offers, here.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    Start the conversation

    Send me notifications when other members comment.

    By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

    Please create a username to comment.

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close