5 top social media security threats


English: Infographic on how Social Media are b...

Image via Wikipedia

Enterprises need to take precautions to make sure employees practice safe social media

This is my last post in 2011. I wish you all a Merry Xmas and a Happy New 2012 year.

Social media platforms such as Twitter, Facebook, LinkedIn and now Google+ increasingly are being used by enterprises to engage with customers, build their brands and communicate information to the rest of the world.

But social media for enterprises isn’t all about “liking,” “friending,” “up-voting” or “digging.” For organizations, there are real risks to using social media, ranging from damaging the brand to exposing proprietary information to inviting lawsuits.

Here are five of the biggest social media security threats:

5. Mobile apps

The rise of social media is inextricably linked with the revolution in mobile computing, which has spawned a huge industry in mobile application development. Naturally, whether using their own or company-issued mobile devices, employees typically download dozens of apps because, well, because they can.

Social networking security threats taken too lightly

But sometimes they download more than they bargained for. From Lookout mobile security vendor’s latest security report said that in the first half of 2011, more than one million users were hit by Android malware infection through dowloaded applications carrying malicious software. Some of the malware was designed to reveal the user’s private information to a third party, replicate itself on other devices, destroy user data or even impersonate the device owner.

More over, a tremendous breach in privacy and almost tantamount to data theft, perpetrated by mobile carriers against their customers.  This revelation came from security researcher Trevor Eckhart concerning a software package called Carrier IQ, which seems to be embedded in at least some phones on major U.S. carriers.

4. Social engineering

A favorite of smooth-talking scammers everywhere, social engineering has been around since before computer networks. But the rise of the Internet made it easier for grifters and flim-flam artists to find potential victims who may have a soft spot in their hearts for Nigerian royalty.

Social media has taken this threat to a new level for two reasons:

1) People are more willing than ever to share personal information about themselves online via Facebook, Twitter, Foursquare and Myspace, and

2) social media platforms encourage a dangerous level of assumed trust. From there it’s a short step to telling your new friend about your company’s secret project. Which your new friend really might be able to help with if you would only give him a password to gain access to a protected file on your corporate network. Just this once.

3. Social networking sites

Sometimes hackers go right to the source, injecting malicious code into a social networking site, including inside advertisements and via third-party apps. On Twitter, just to name it, shortened URLs (popular due to the 140-character tweet limit) can be used to trick users into visiting malicious sites that can extract personal (and corporate) information if accessed through a work computer. Twitter is especially vulnerable to this method because it’s easy to retweet a post so that it eventually could be seen by hundreds of thousands of people.

2. Your employees

You knew this was coming, but even the most responsible employees have lapses in judgment, make mistakes or behave emotionally. Nobody’s perfect all of the time.

But dealing with an indiscreet comment in the office is one thing; if the comment is made on a work-related social media account, then it’s out there, and it can’t be retrieved. Just ask Ketchum PR Vice President James Andrews, who two years ago fired off an infamous tweet trashing the city of Memphis, hometown of a little Ketchum client called FedEx, the day before he was to make a presentation to more than 150 FedEx employees (on digital media, no less!).

The tweet was discovered by Fedex employees, who emailed angry missives to Ketchum headquarters protesting the slight and wondering why FedEx was spending money on a snooty New York PR firm while employees were dealing with a 5% salary cut during a severe recession. Andrews had to make a very public and humiliating apology.

Remember, this wasn’t some low-level employee not tuned into the corporate mission. This was a high-level communications executive who damaged his company’s brand and endangered an account. Imagine what a disgruntled low-level employee without as much invested in his job might be able to do with social media tools and a chip on his shoulder.

1. Lack of a social media policy

This one’s totally on you. Without a social media policy for your enterprise, you are inviting disaster. You can’t just turn employees loose on social networking platforms and urge them to “represent.” You need to spell out the goals and parameters of your enterprise’s social media initiative. Otherwise you’ll get exactly what you’re inviting – chaos and problems.

Who is allowed to use social media on behalf of the organization and what they’re allowed to say are the two most obvious questions that must be addressed in a social media policy. You need to make all this clear or employees will make decisions on their own, on the fly. Does that sound like a good thing?

Two more imperatives related to social media policy:

1) Organizations must conduct proper training for employees, if only to clear up issues regarding official social media policies, and

2) A social media initiative needs a coordinator and champion. And that means a social media manager.

By Nerney a freelance writer who covers technology, social media and fitness. He writes the Tech Business Today blog for ITworld.

Read more about security in Network World’s Security section

http://www.networkworld.com/news/2011/053111-social-media-security.html?page=1

Advertisements

About Georges Abi-Aad

CEO, electronic engineer with MBA in marketing. Multicultural; French citizen born in Lebanon working in the Middle East and fluent in French, English and Arabic. I have more than 30 years of proven experience in the Middle East with European know how. I am good in reorganization and in Global strategic management business. I am a dependable leader with an open approach in working with people, forging a strong team of professionals dedicated to the Company and its clientele. Perseverance is my key word. Married to Carole and having 2 children: Joy-Joelle and Antoine (Joyante!).
This entry was posted in Marketing, social media, strategic management, Tutoring and tagged , , , . Bookmark the permalink.

30 Responses to 5 top social media security threats

  1. Harsha says:

    companies should have a clear social media policy

  2. Pingback: Develop Your Computer Business For The Better With A Free Blog :Blogging for Money

  3. Social network like Twitter, facebook, Linkedln, orkut plays a very important role to make communication between one another. Through this social network students can share their knowledge with other student and also they clear their doubt with free of cost. And also this all site are the medium of entertainment and time pass for boring people. So we can say this is social network revolution going on….Social Network Analysis

  4. Hi Thanks for sharing this post…I want more information about Mobile Application Development and Web Designing Company India. So please share more and more post with us.

  5. Hi and I hope everyone is having a happy holidays as well. A very good article on social media and security. If you are big enough it is definetly wise to have someone from your public relations staff in charge of the social media for your company. Handed out a lot of good stuff on cell phone security and overall things we should be aware of in this young technology age.

    • Thx for your comments. Happy new year to you too. I agree with you that we should have a clear strategy for Social Media. Otherwise, we will have it all wrong. Happy that you liked my post. Please continue visiting my blog as I post new articles every Wednesday 🙂

  6. Definitely, what a great blog and educative posts, I definitely will bookmark your blog.All the Best!

  7. good idea im gonna try it

  8. I like this post, enjoyed this one thankyou for putting up.

  9. Pingback: i like reading

  10. Charles Pych says:

    Many thanks for finding the time to talk about this, Personally i think fervently about this and I appreciate studying this topic. Please, when you gain information, please update this website with more information. I have found it very useful.

  11. I’ve just lately started a blog, the information you provide on this website has helped me tremendously. Thanks for your entire time & work.

  12. I simply want to say I’m newbie to blogging and absolutely liked you’re website. Most likely I’m want to bookmark your blog . You definitely have perfect articles and reviews. Kudos for sharing your web page.

  13. I very much love your posts. Your website has really good information! Ill definitely be visiting it again very soon!

  14. Hello my friend! I want to say that this article is awesome, nice written and include approximately all significant infos. I’d like to see more posts like this .

  15. Many thanks for an unbelievable put up, would study your particular others topics. thank you your notions with this, I experienced a lttle bit made an impact to by this post. Merit again! You wanna make a great time. Got some excellent data here. I do think that if more individuals thought about it like this, they’d have got a better time have the hold ofing the matter.

  16. This was refreshing. I wished I could read every post, but i have to go back to work now… But I’ll be back.

  17. Really good site thank you so much for your time in writing the posts for all of us to learn about.

  18. Theo Sivia says:

    I’m not quite sure where to begin with this, so I’ll just say this is a really good article. I’ve enjoyed reading it and pondering the many points you make.

  19. Thanks so much for the blog post.Really thank you! Will read on…

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s