Q

Should software be used to monitor networks for blogging activity?

Deciding network-monitoring software be used to monitor corporate networks for blogging activity is more of a policy decision than a security one, but network security expert Mike Chapple explains what the issue boils down to.

Should network-monitoring software be used to monitor corporate networks for blogging activity? Should enterprises focus their monitoring priorities elsewhere?
This is really more of a policy question than a security one. It's all boils down to risk management. If you, in conjunction with the leadership of your organization, feel that blogging poses a significant risk to your company, you may wish to consider using this type of control.

If the objective is to restrict blogging activity, network-monitoring software probably isn't the most efficient way to do so. I'd recommend implementing a content-filtering product, such as Secure Computing Corp.'s Webwasher SME250 or Websense Inc.'s Hosted Web Security tool. These products come with built-in Web categorization databases that help monitor certain types of unwanted traffic, such as blogging sites, pornography, etc.

If you choose to implement content filtering, a word of warning: no filtering scheme is perfect, and it's difficult to defeat someone who is determined to bypass such filtering. For example, if you allow users to access secure websites using HTTPS, it won't be possible to inspect the contents of their encrypted traffic. Bypassers could set up an encrypted proxy at home and use it to route traffic elsewhere on the Internet. Also, while content filtering databases may contain well-known blogging sites, such as Blogger and Wordpress, they can't possibly track all of the little-known single blog sites out there on the Internet. You can build a wall if you like, but it's going to be made of Swiss cheese.

More information:

  • See how blogging on corporate laptops is risky business.
  • SearchSecurity.com editors debate whether blogging is a security threat to corporate systems.
  • This was first published in December 2008

    Dig deeper on Monitoring Network Traffic and Network Forensics

    Pro+

    Features

    Enjoy the benefits of Pro+ membership, learn more and join.

    Have a question for an expert?

    Please add a title for your question

    Get answers from a TechTarget expert on whatever's puzzling you.

    You will be able to add details on the next page.

    0 comments

    Oldest 

    Forgot Password?

    No problem! Submit your e-mail address below. We'll send you an email containing your password.

    Your password has been sent to:

    -ADS BY GOOGLE

    SearchCloudSecurity

    SearchNetworking

    SearchCIO

    SearchConsumerization

    SearchEnterpriseDesktop

    SearchCloudComputing

    ComputerWeekly

    Close