Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesGovernment: Federal, State and Local

3 Social Media Security Risks for Government Employees

By Greg Kushto
November 10, 2015

These days, everyone, even government employees, are on social media.  Some agencies even allow for limited personal use of government resources such as laptops and official time to check or update social media. But when could the Facebook and Twitter habits of government employees be putting their agencies – and the publics they serve – at risk?

Connecting With People You Don’t Know

Social media makes it easier than ever for people all over the world to connect with one another. For government employees, though, connecting with someone that they don’t actually know can pose a serious security risk. It is very easy for an adversary to create a false Facebook account and then begin “friend”-ing people who are either known as government employees or identify themselves as such on social media. Once these adversaries have connected with employees, they can track status updates, new connections, even likes and shares to begin to put together a picture of what is going on at an agency and potentially use that information for their own gain.

To prevent adversaries from gathering this information, it’s critical that government organizations remind employees that there’s no reason to friend or connect with someone on social media if they don’t actually know that person. Agencies should establish social media security policies that require employees to validate the identity and authenticity of a new connection before allowing access their social profiles.

Sharing Too Much Information

In addition to being careful about who they connect with, it’s critical for federal employees to be extra cautious about what information they share on social media. Seemingly simple updates such as “Headed downtown for a meeting this afternoon…” or “Excited about spending the next two weeks in Europe” are exactly the types of information that can become dangerous if it falls into the wrong hands.

Unfortunately, government agencies have adversaries out there who are actively trying to get this information. The process of sharing information and connecting with unknowns is something that can easily get federal agencies in trouble, if not through a cybersecurity breach, then with the government itself. There are existing social media policies against these practices, even though many government employees don’t realize it. They’re designed to protect agencies and employees, but both can find themselves in serious trouble if they do not follow and enforce these policies.

Security leaders should have specific policies in place about what information is acceptable for employees to share on social media, and what is not. Security professionals should also work with IT staff and HR professionals to enable employee communications while ensuring they stay secure. Remind employees that when they talk about where they work, being a federal employee, or having access to certain information on social media, they are setting themselves and their agency up as a target. Establish best practices, such as to simply not identify yourself as a federal employee on social media.

Separating Business and Personal

To help government employees enjoy the benefits of social media while at the same time protecting against cybersecurity threats to their agencies, one of the easiest and most foolproof things to do is to keep separate accounts.

In today’s always-connected world, separating your personal and professional lives offline can be tricky, and it’s no different on social media. It’s important to keep in mind the differences between the various social media platforms.

On social media platforms where you might connect and engage with people on a more personal level, such as Facebook or Twitter, it’s best for employees to avoid using their official titles. It can also be wise for employees to add a disclaimer to their profile, stating that the views expressed are their own and not that of their employer.

With professional networking sites such as LinkedIn, employees may choose to include biographical information about their current job status and employment history. This type of identification as a federal employee is acceptable under current policy, and if employees are careful about their privacy settings, who they connect with, and what they share, it also comes with minimal security risks.

It can be tricky for some government employees to balance the line between acting in an official capacity and their lives as private citizens, especially on social media where the lines are easily blurred. Security leaders should encourage employees to establish separate accounts to help keep things clear for everyone. They should also reinforce the fact that interactions on social media are really the same interactions as in real life. If employees wouldn’t share information about their work with a stranger on the street, they shouldn’t be sharing it on social media. 

KEYWORDS: data breach social engineering social media security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg Kushto is the Director for Security at Force 3, The Network Security Company.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • social media influencer

    How to reduce security risks for social media influencers

    See More
  • Mitigation, not Prohibition, is Best Response to Social Media’s Security Risks

    See More
  • Facing the Risks of Social Media Account Takeovers

    See More

Related Products

See More Products
  • Optimizing Social Media from a B2B Perspective

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing