At any given moment today, on-the-clock employees are updating their social media status, reading feeds and networking on business media \n\nsites. Moments can stretch to minutes: A recent study by the Ponemon Institute found that 60 percent of social media users spend at least 30 \n\nminutes a day on these sites while at work. Social networking has become the preferred channel of communication, and while companies initially resisted on-the-job use of social media, \n\nmany now embrace it as good for business. They understand that enterprise social media tools can spark collaboration among co-workers, \n\nstrengthen employee productivity and improve communications. Public social networking sites may help an organization attract customers and \n\nemployees, improve customer service and manage its brand image.\n\nSlideshow: 11 Promising Enterprise Social NetworksSlideshow: Understanding Web 2.0 Security in the WorkplaceThe inherent risks of social networking, however, can be very bad for business. Chief among them: Social media can be a very effective on-\n\nramp for malware attacks. Other threats include network breaches, intellectual property theft, leakage of sensitive business information and \n\nhijacking of Websites and social media accounts.Containing these risks requires a security strategy that fuses policies governing the use of social media with technology that monitors and \n\nprotects the corporate network. It is essential to reinforce policies and technology with thorough and continuous employee training on \n\nacceptable use of social media. A first step in creating a social media security strategy is classification of business data so that employees understand precisely what is -- and \n\nis not -- sensitive information. This process also should specifically delineate who is authorized to access corporate content and how that \n\ninformation can be used. Policies will vary by employee role and by social media site. For instance, a worker may be permitted to include employer affiliation and job \n\ntitle on a public profile on a business media site, but not on a personal one; HR staff may be allowed to provide more company information \n\nbecause doing so is essential to recruiting.Remember that hackers now target mobile devices such as smart phones and tablet PCs. Businesses should specify whether employees are \n\npermitted to access social networking sites from these devices and which apps may be used to do so. \n\nOnce policies are established, it may be necessary to reinforce them with a carefully considered combination of network monitoring and data \n\nprotection technologies. In some cases, these technologies may already be in place as part of standard IT security measures. If so, they should \n\nbe configured to include social networking controls. The Challenges of Changing Employee BehaviorWith social media, even a carefully planned mix of policies and technology may not be wholly effective. That's because you cannot stop \n\nemployees from posting data on social media when they go home at night; people will do what they want, regardless of corporate policy. \nWhat can you do? Implement a rigorous and continuous employee education program on acceptable use of social media. A business should proactively train employees and be very clear about what it considers proper use of company information. Be specific: Tell \n\nthem what they can and cannot say on social networking sites about the company. Employees should understand that posting corporate data is \n\nabsolutely forbidden -- unless it is expressly encouraged. Tailor the education program to meet the security knowledge level of your employees. The risks of malware, data loss and other threats \n\nshould be described in very real scenarios that explain impacts to the individual and the business. Show employees how to recognize current \n\nscams used in social media attacks and how to identify a phishing Website. Training should demonstrate how these threats propagate on social \n\nmedia and how they can be downloaded to a user's computer or mobile device and then infiltrate the enterprise network. Emphasize that this \n\nknowledge will be as useful at home as it is in the workplace.Education should not be exclusively technical, however. For many employees, sharing via social media has become so reflexive that they may \n\nnot realize how information innocently posted on a social network can harm a business. Workers also should understand that when they \n\nidentify themselves as an employee they are representing the company to the digital world. Finally, fully explain the consequences of failure to follow company policies on use of social media. Be very clear: Jobs are at risk for those \n\nwho violate the corporate code of conduct for privacy, client confidentiality and intellectual property. Gary Loveland is a principal in PwC's Security Advisory practice.