ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

If You Love Facebook, then You’ll Dig “Facebook at Work”

b2ap3_thumbnail_facebook_at_work_400.jpgFacebook has become the most popular social media outlet in the world, but in the eyes of corporate offices, it can be an immense time waster and productivity killer. However, it can be an incredibly efficient tool for connecting with other professionals, sort of like a pseudo-LinkedIn. To counter this stigma associated with social media in the workplace, Facebook has produced Facebook at Work.

Facebook at Work essentially allows you to communicate with your coworkers while in the office by utilizing a Facebook-like environment. This includes chat and sharing to walls, among other features. Facebook emphasizes that anything shared amongst your company is only visible to other users in your company, and not to the public. According to Larry Dignan of ZDNet, there are a number of reasons why this expansion makes sense, including:

  • Engagement during the workday is important for Facebook’s business.
  • Without work engagement, Facebook might lose users as they grow older and move into the professional world.
  • A professional version of Facebook might convince enterprises to unblock the social network.

It’s understandable why Facebook would want to try for a more professional approach, but unfortunately, some folks aren’t so convinced that Facebook would be suitable for the work environment. It seems most respondents are concerned about Facebook’s tendency to collect information and personal data from its users, and see this as a breach of corporate policy concerning sensitive data and private documents.

In another ZDNet article, Charlie Osborne explains why Facebook at Work’s success is unlikely. The reason is precisely due to businesses taking an extremely protective stance on their data security. What’s more is that Facebook has gained a reputation for its concerning use of consumer data. Remember the time that Facebook used its prevalence to control and experiment on the feelings of nearly 700,000 users? The idea was to examine whether or not emotions could be controlled or altered through the use of rigged news feeds. The social media giant was ridiculed by the masses saying that the project was unethical. Who’s to say that Facebook won’t do something similar with the information gathered by corporations using Facebook at Work?

Other concepts also come to mind, such as keeping the office life and home life separate. Is connecting something meant for socializing and networking really a good tool to integrate into the workplace? Some professionals are concerned that Facebook at Work, in addition to the growing Bring Your Own Device trend, will not only compromise security, but also desensitize the workforce to the dangers of the Internet and unprotected networks.

Businesses who decide to use Facebook at Work will wind up with expectations that the social network will respect and comply with their data security policies, but every business is different. What works for one business might not be an option for another. If Facebook fails to protect the data of these enterprises, it could have disastrous consequences for the social media juggernaut.

What are your thoughts on the concept of Facebook at Work? Are you willing to give it a try, or are you concerned about the security of your business’s data? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Communication Data Recovery Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 Apps IT Support Managed Service Windows 10 Browser Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Remote Work Internet of Things Data Management Operating System Government Saving Money Workplace Strategy Gadgets Networking Artificial Intelligence Windows Managed IT services Mobile Device Management Remote Bandwidth Business Technology Blockchain Encryption App Server Virtualization Information Spam WiFi Employee/Employer Relationship Apple Information Technology History Gmail Office Two-factor Authentication Office 365 Budget BDR Cybercrime Conferencing Health Big Data Access Control Data Security Analytics Wi-Fi Compliance Cost Management IT Management Training Employer-Employee Relationship Voice over Internet Protocol Document Management Help Desk Hacking Save Money Patch Management Remote Computing Vendor Remote Monitoring Hacker Computing Customer Service Unified Threat Management Vendor Management Firewall Hard Drive Augmented Reality Word Search... Best Practice IBM Data loss Legal Website Mobile Office Retail Alert Data storage Managed Services Hiring/Firing Outlook Password Applications Project Management Money BYOD Vulnerabilities Monitoring Healthcare Sports Social SaaS Websites DDoS Mobile Computing Mobility Meetings Marketing Windows 11 iPhone Running Cable Education Twitter Cortana Google Maps Scam Content Filtering Law Enforcement End of Support Storage Printer Remote Workers Router VPN Windows 7 Free Resource Update The Internet of Things YouTube Travel User How To Virtual Reality Data Breach Social Engineering Laptop Cryptocurrency Paperless Office Antivirus Black Market Maintenance Cleaning Chrome Robot Virtual Desktop Avoiding Downtime Multi-factor Authentication Start Menu PowerPoint Experience Solid State Drive Downloads Administration Computer Care Holidays Vulnerability Saving Time Presentation Specifications Cooperation Video Conferencing IT Consultant Chromebook Software as a Service Drones Data Protection Computers Bitcoin Disaster Virtual Machines Automobile Computer Repair Telephone Customer Relationship Management Co-Managed IT How To Entertainment Professional Services Lithium-ion battery Microchip Excel Flexibility Processors Managed Services Provider Tech Terms Hack Identity Theft Virtual Private Network Notifications Managed IT Digital Unified Communications Virtual Assistant Current Events HIPAA Google Docs Bluetooth Taxes Distributed Denial of Service Solutions Office Tips Wireless Technology Private Cloud Processor Memory eWaste Integration Images 101 Display Downtime Physical Security Safety Politics Machine Learning Settings Employees Surveillance Banking Touchscreen Google Wallet Videos Deep Learning Emails Computer Malfunction Fake News Managing Costs Messenger Emergency Proxy Server SSID Vendor Mangement Service Level Agreement Computing Infrastructure Media Development Electronic Payment Employer/Employee Relationships Business Metrics Management Hosted Solution Samsung Device security Uninterrupted Power Supply Wireless Headphones Webcam Microsoft Excel Virtual Machine Books Staffing Optimization Tech Smart Technology Language Business Mangement Going Green IP Address Society Business Cards Reviews 2FA Teamwork Error Phone System Tablets Monitors Visible Light Communication Data Storage Hypervisor Reading Bookmark Google Calendar Term Medical IT Download Windows 8 Supercomputer Piracy Shopping Paperless SQL Server Virus HTML Displays Nanotechnology Competition Advertising Motion Sickness PCI DSS Licensing Relocation Browsers Recovery Humor Comparison Google Play Supply Chain Work/Life Balance Google Drive Upload Computer Accessories Tech Support Software License Gig Economy Business Communications Internet Service Provider LiFi Azure Social Network Entrepreneur Documents Corporate Profile Screen Reader Application Regulations Compliance Managed IT Service Knowledge Data Analysis Memes In Internet of Things Television Security Cameras Workplace Telephony Trends Employer Employee Relationship Mobile Technology Business Intelligence Human Resources Net Neutrality Hacks Customer Resource management Network Congestion Cabling Devices Securty Writing Tablet G Suite Tip of the week Financial Data Reliable Computing Fileless Malware IT Mouse Scams VoIP Gamification Domains Tracking Company Culture Risk Management Google Apps Telephone System Regulations Troubleshooting Backup and Disaster Recovery Web Server Telework Scalability Directions Communitications Administrator SharePoint Microsoft 365 Cables Text Messaging Content Proactive IT Digital Payment Desktop Smartwatch Procurement Bring Your Own Device Electronic Medical Records Worker Accountants Access Database Public Speaking FinTech IT Assessment Streaming Media Point of Sale Time Management Music Public Cloud CES Equifax Keyboard Supply Chain Management Value Health IT Audit Business Owner Shortcuts Spyware Tactics Hard Drives Hard Drive Disposal Organization Cyber security Smart Devices Botnet Username File Sharing intranet Micrsooft Startup Shortcut Freedom of Information Remote Working Rental Service Redundancy Wireless Navigation Be Proactive Flash Cache Addiction Heating/Cooling email scam Environment AI Trend Micro Electronic Health Records Windows XP Transportation Telephone Systems Unified Threat Management Business Growth Workers Mobile Security Social Networking Digital Security Cameras Legislation News Wasting Time User Tip Printing Evernote Inbound Marketing Modem Workplace Strategies Network Management CCTV eCommerce

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?