Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Manage the Risks of Social Media to Reap Business Benefits

By Jeanette Gibson
socialmedia
May 13, 2014

Adobe, Burger King, and Skype: They’ve all had their social media accounts hacked, resulting in brief but highly publicized smear campaigns.

It’s a risk any business or person with a Twitter, Facebook or other social networking account faces. Hackers attack, passwords fall into the wrong hands, or the wrongdoing comes from someone within the organization. It all makes social media sound very risky for a brand trying to build and uphold its reputation.

But there’s a bigger risk in today’s business world – not engaging on social media. Forrester Research reports of staggering business opportunity through social channels, to the tune of $170 for every fan a brand has on Facebook. And with Twitter, the payoff could reach into the trillions.

There is, of course, a way to navigate these lucrative spaces securely. With the following practices in place, organizations can keep posting and tweeting, knowing these efforts will support business goals without undermining privacy and security.

1)Get serious about passwords. Believe it or not, people still use passwords like “password” or “123456.” Few people realize that complex passwords, combining upper- and lowercase letters, numbers and symbols, form the best line of defense against cyber attacks. Instead of choosing easy words or personal details, consider strategies like using the first letter of each word of a common phrase or song lyric. (“I can’t get no satisfaction” becomes ICGNS. Even better, IcGnS!.) Or, use an automatic password generator.

Also, rein in who has password access. Single sign-on technology offers the safest approach to password management. It’s available through business-grade Social Relationship Platforms (SRPs), and it enables employees to log into social media accounts with the same usernames and passwords they use for their company emails. The IT department holds the master switch for turning accounts on and off and therefore can easily revoke access to social media accounts from individual employees, should the need ever arise.

2) Centralize social media channels.Large companies are sometimes surprised to discover that their employees have started dozens of “corporate” social media accounts, often without official permission. A crucial first step in getting social media security under control is to consolidate all of these accounts within a single social media management system, which allows users to publish to multiple profiles on Twitter, Facebook, LinkedIn, and other networks from one secure interface.

This kind of system also acts like an extra firewall. One of the most common ways for hackers to gain access to passwords and sensitive data is through malicious links posted on social media sites and elsewhere. Clicking on what looks like a great deal, for instance, may land someone on a bogus site where malware is instantly downloaded to a company computer. The better social media management systems out there have built-in malware and spam prevention tools, which will automatically issue a warning before opening suspicious pages.

3) Control who can post messages.Social media accounts at consumer brands can have millions of followers. Entrusting the keys to these accounts to entry-level employees or interns carries significant risk. A better approach is to use an SRP that restricts who can publish messages. With some SRPs, companies can grant certain employees limited permission to draft messages. The messages go to an approval queue, and senior management must sign off on them before they go up on any sites. This process ensures that all social messaging meets company standards, and no illicit tweets or posts slip through.

4) Offer basic social media education.Just a few years ago, social media was a dorm room toy. Today, it’s a cornerstone of marketing and sales strategy at the planet’s biggest companies. Giving employees access to this kind of power without any basic education is tantamount to handing over keys to the car without a driver’s ed course. Structured training on security and compliance issues, as well as on more advanced themes like using social media to sell to clients and improve internal workflows, is critical. Fortunately, some of the best social media tools now come equipped with online courseware and webinars for their users.

There will always be some level of risk with social media. It’s public; it’s pervasive; it can be vulnerable. But the above precautions make social communication much less precarious and all the more valuable for brining in customers, securing their loyalty, recruiting the best talent and taking business to the next level. So go ahead, get out there and socialize. Just be smart about it. 

KEYWORDS: social media account hack

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeanette Gibson, VP customer success and community with HootSuite

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Airport at Sunset

    Companies Aren't Doing Enough to Manage the Risks of Extended Business Travelers

    See More
  • Social Media security risks

    Facing the Risks of Social Media Account Takeovers

    See More
  • SEC0719-Cyber-Feat-slide1_900px

    Privacy: The Age of Context – Ensuring the Benefits of Sharing Outweigh the Risks

    See More

Related Products

See More Products
  • Whitepaper-Social-Media-3.gif

    Optimizing Social Media from a B2B Perspective

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing