Site icon

Social Media Cyber Security Risks and Best Practices for Businesses

The biggest social media cyber security risks businesses face and how to avoid them

Businesses tend to gloss over social media cyber security, thinking that it’s more of an issue in their employees’ personal lives than a threat to workplace cyber security. However, one in eight enterprises have suffered a security breach that was traced back to a cyber attack on social media.

Here are the top social media cyber security threats to organizations and how to avoid them.

Social Media Cyber Security Threats to Enterprises

Human Error & Other Insider Threats

Company insiders are arguably the biggest social media cyber security threat, representing everything from posting inappropriate content (accidentally or purposefully) to sharing passwords to clicking on a phishing link posted by a follower or “friend.”

Unattended Accounts

It’s a good idea to reserve your brand’s name on all major social media channels, even if you don’t plan to use all of them, so that competitors and detractors do not get their hands on them. It’s not a good idea to leave these accounts completely unattended. Hackers often look to break into “zombie” corporate accounts that no one is monitoring, then use them to spread malware, launch social engineering schemes, or even post defamatory information about the company.

Uncontrolled User Access

Some organizations hand out their social media credentials like they’re candy, not only to multiple employees but also interns, temps, and third-party social media vendors.

Imposter Accounts

This is when hackers set up phony social accounts with handles that closely match your organization’s name, sometimes even using your graphics and copying your recent posts to make the account look genuine.  Although imposter accounts are sometimes seen as a reputation management problem, not a social media security issue, these accounts then follow/friend your customers or even your employees and engage in social engineering, sending them messages requesting login credentials and other sensitive information.

Vulnerabilities in Connected Apps

Many companies connect their social accounts with third-party apps, such as analytics apps. While these apps are useful or even necessary, they are not without cyber security risks. In 2017, hackers got into the Twitter accounts of numerous prominent organizations, including Forbes and Amnesty International, using a flaw in the popular Twitter Counter app.

Social Media Cyber Security Best Practices for Enterprises

There are numerous proactive steps your company can take to protect against social media cyber security threats:

The cyber security experts at Continuum GRC have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting your organization from security breaches. Continuum GRC offers full-service and in-house risk assessment and risk management subscriptions, and we help companies all around the world sustain proactive cyber security programs.

Continuum GRC is proactive cyber security®. Call 1-888-896-6207 to discuss your organization’s cyber security needs and find out how we can help your organization protect its systems and ensure compliance.

Exit mobile version