Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

4 Common Security Threats of Social in the Enterprise

By Bruce Milne
September 29, 2015

As our lives become more and more digital and increasingly connected, information security (infosec) seems to have become a continuous cycle of good and bad news. The story is always the same: A highly visible breach takes over the headlines, the weakness the cyber criminals uncovered is identified, the general public is assured that new measures have been put in place to address the vulnerabilities, and other enterprises follow suit. And then the cycle begins all over again as hackers find another way in.

In any enterprise, especially in regulated industries like financial services, government and healthcare that deal with high volumes of critical data, infosec must be at or near the top of the executive priority list. In a breach-prone world, enterprises that handle sensitive personal or corporate information need all the help they can get in the form of awareness, advice and peer support on how to manage this growing challenge. Interestingly, though, the daily influx of stories about securing critical information rarely includes discussion of one particular area of risk: social media.

As companies continue to adopt the use of social across the enterprise for things like marketing, customer care, sales and market research, social media is rapidly becoming a new point of exposure and an infosec threat vector. Lapses in security around this platform can damage brand reputation, spread misinformation, leak data or even cause financial harm. High-profile examples from this year alone include ISIS sympathizers’ takeover of the U.S. CENTCOM Twitter handle and similar hacking crises with Delta, Newsweek and the Twitter CFO’s accounts, but even key guidance like the SEC’s April 2015 cybersecurity bulletin still fail to mention social media.

Social media is a unique enterprise application platform because the individual owns the account or “license,” not the enterprise, making it more challenging for firms to manage risk. It presents other exceptional challenges for enterprises in any industry, in that the rate of adoption continues to skyrocket, new social networks are introduced with remarkable frequency, and existing networks are constantly changing their functionalities, privacy policies and core algorithms. Trying to keep up with all the changing points of exposure can seem impossible and has perhaps led to turning a blind eye to discussing or addressing infosec at all when it comes to social.

It is a common occurrence for organizations to be paralyzed by the risk, effectively outlawing social altogether in the absence of an obvious solution to the infosec issue. Once a technology has a foothold with an employee base, however, that’s just not a realistic course of action, and to deny the many benefits of social media for the business would be shortsighted.

Rather, firms need to acknowledge and embrace social and extend guardrails to keep activities secure and compliant. Part of that process is employee education, but the technology exists today to contain the risk by putting processes, checks and balances in place to pre-review, moderate and monitor employee social media activity. Regardless of a firm’s tolerance for risk, there are solutions available today to make social media a safe and effective channel for business.

Here are four common types of social media infosec threats that enterprises need to scrutinize and address:

Leaking Sensitive Information: This is the threat grounded most directly in human error, and it’s usually an innocent mistake. Employees may accidentally (or overtly) share personally identifiable information (PII) or inside company information on Facebook, Twitter or LinkedIn, particularly when using functionality like direct messages on Twitter or InMail on LinkedIn, where it seems like the information is being shared privately between two parties.

Fraud/Phishing: Just like with email, cyber criminals can hack and hijack corporate social media accounts or create confusingly similar aliases, misrepresenting companies or individuals. This could cause employees or consumers to divulge sensitive information because they believe they are interacting with the “official” brand.

Malware/Trojans: Most people who have ever used a PC or newer piece of mobile technology are aware of this type of threat, usually transmitted through hyperlinks to viruses. These viruses may corrupt the user’s device or gain access to private information elsewhere on the computer or the firm’s network. Despite users’ familiarity with the typical tricks to get them to click, these types of schemes are craftily making their way into social streams by taking advantage of users’ trusted contacts to get them to click or share links.

Compliance Pitfalls: In regulated industries, compliance with complex rules from regulating bodies like the SEC, FINRA or IIROC is a necessary reality. The rules are designed primarily to protect the consumer from being misled by incorrect information. This means that information shared by employees, like financial advisors, must be constantly monitored and reviewed to ensure compliance with industry regulations.

In essence, companies should acknowledge, engage and protect social the same way they handle other electronic communication channels. This includes creating firm-wide policies around the use of social, training employees to protect themselves, the enterprise and consumers, and finding adept technology partners to help manage risks in an automated, scalable way.

Infosec threats through social media are increasing in lockstep with adoption. As the threat vector gets wider, people intent on exploiting weaknesses sense a new opportunity. Inventorying the risks, knowing what to look for and having a plan in place will go a long way to ensuring that a company can use social media safely and effectively to generate business and manage client relationships.

KEYWORDS: fraud trends phishing social engineering social media account hack social media security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bruce Milne is the EVP of Socialware. He can be reached at bmilne@socialware.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • social_enews

    The Evolution of Social Media Monitoring in Corporate Security

    See More
  • domain-name-freepik1170x658v.jpg

    4 emerging threats in the domain name landscape

    See More
  • healthcare worker on computer

    4 common cybersecurity flaws in healthcare organizations

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing