Will Twitter attack drive off IT interest?

Analysts warn that more attacks could raise a warning flag for Twitter's enterprise users

This week's Twitter hack may not immediately drive corporate executives away from the microblogging site, but it may raising some early warning signs.

A hacker exploited a bug in the Twitter site Tuesday, causing havoc on the social network, creating a wild buzz on the blogosphere and prompting a flood of negative headlines around the globe.

The exploit, described by some as a " webtastrophe ," caused messages, and even porn, to pop up on users' screens. Twitter was fairly quick on the draw, though, and shut down the attack in a couple of hours.

Nonetheless, the long list of victims ranged from individual users to the official Twitter feed of the White House, prompting questions about how it will affect the views of the droves of corporate executives who've either been considering diving into the Twitterverse or who already have made the plunge.

Companies like online retailer Zappos.com , Dell and JetBlue have long taken advantage of the growing number of Twitter users by tweeting about their company culture, sales and promotions.

And these companies are far from alone. Industry analysts say enterprises are consistently being drawn to sites like Twitter and Facebook and are setting up their own social networking teams.

If such widely-publicized attacks continue, though, IT executives may start looking for a more secure alternative, analysts said.

"I think this was a lesson learned and a warning," said Brad Shimmin, an analyst at Current Analysis. "Social networks have garnered so much of the traffic over the Internet, but the responsibility these companies have isn't always reflected in the level of security and privacy they've afforded their users. Compared to other larger sites, I don't think Twitter is falling down entirely, but they do need to take this a little more seriously and handle it better than they did yesterday."

While Shimmin was surprised that a site like Twitter could still be knocked for a loop via such an exploit, he said what may have caught some users' attention is how slow Twitter was in giving users information about it.

"Everyone had figured it out before Twitter issued its announcement," said Shimmin. "Customers shouldn't have to look to third parties to understand when there's a problem with something like Twitter. They obviously need to do a better job of anticipating and responding to these sorts of exploits. They need to behave a little bit more like an enterprise player would."

Dan Olds, an analyst with The Gabriel Consulting Group, said despite Twitter's troubles this week, the social network should weather this storm as long as there isn't another one any time soon.

"This is going to, or at least should, make people in sensitive positions think twice about how much they rely on Twitter," Olds said. "I think a bit of caution is called for, but I don't think we'll see anyone significantly change their habits over this incident. Now, if there are more exploits in the near future -- enough to form a pattern in users' minds -- then that would spell trouble for Twitter."

Rob Enderle, an analyst at Enderle Group, noted that as long as people are avidly using Twitter, many company executives will put up with random exploits to continue taking advantage of all the eyes their tweets could attract.

However, if Twitter continues to get hit by attacks, and another strong microblogging site emerges, that could spell trouble.

"It really depends on how often this happens but as long as the people firms want to talk to are on Twitter, companies and organizations will find ways to mitigate the risk and continue to use the tool," added Enderle. "If the users look like they are moving, though, companies will follow very quickly."

Like Shimmin, Enderle said Twitter needs to formulate a better crisis response plan and team.

"What this event showcases is that Twitter hasn't yet developed a good crisis management process and that, until they do, an event like this could still take them out, along with a lot of customers," said Enderle. "Until that is fixed, many companies may choose not to."

Sharon Gaudin covers the Internet and Web 2.0, emerging technologies, and desktop and laptop chips for Computerworld. Follow Sharon on Twitter at @sgaudin , or subscribe to Sharon's RSS feed . Her e-mail address is sgaudin@computerworld.com .

Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.

Tags Cybercrime and HackingDellapplicationssecuritytwittersoftwarecollaboration

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Sharon Gaudin

Computerworld (US)

Comments

Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?