Tuesday, August 11, 2009

Twitter, Facebook Attacks Show Vulnerabilities of Platform Reliance

Online and printed media outlets, as well as blogs and other social networks, were abuzz last week with news over the apparent cyber-hijacking of Twitter as part of what a blogger claims was an act of orchestrated retaliation.


While the details of the specific attacks have been well chronicled by numerous other outlets, what wasn't written about extensively was how these attacks illustrate perfectly the need to consider not only the demographics and audience that you can reach via social media, but also the technology ramifications of any campaign you launch.


With the increasing reliance on social networks, the Web has made a migration of sorts away from a collection of properties based on uniform standards ratified by international bodies to a few, select properties that, when taken offline by technical issues or some other circumstance, can cause widespread disruption. That's not to say that using Twitter or Facebook for social-media campaigns is a bad thing; however, just as you want your important computer files residing in several places including one site that's remotely managed, you want your social media presence to be planned similarly as well to avoid widespread disruption in the event of outages.


The best way to get around these attacks is to rely on platforms that you exclusively control, but are remotely maintained. Examples can include everything from Web sites to blogs. While one of your hosts may go down at any one time, if you host the different elements of your overall Web presence at different locales/services, the odds of a widespread disruption are lower.


Even if another widespread attack doesn't occur in the future, it will likely pay dividends in the event an Internet backbone provider has a widespread disruption or something similar happens. We sometimes forget that for all the redundancies that were built into the Internet, occasionally all it takes is for an errant backhoe operator to take down a big chunk of the Internet, as has happened in the past.


Just as you plan for conventional disasters at the office, planning for them in your online activity can avoid costly and time-consuming disruptions

No comments: