Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

The Social Media Security Problem for Corporations around the World

By Nate Pruitt
social-snaptrends
May 10, 2016

American Airlines once received a tweet from someone with the Twitter handle @QueenDemextriax_, reading in part, “I’m part of Al Qaida and on June 1st I’m gonna do something really big.” The airline promptly replied to the tweet, saying the user’s IP address and details had been forwarded to security and the FBI.

What followed was a complete meltdown that gained the Twitter user 30,000 followers. “I’m so sorry I’m scared now,” she tweeted. Then, “Why would I blow up one of your planes, I have my own jet.” And finally, “I blocked the FBI just in case.”

The person behind these tweets was a 14-year-old Dutch girl named Sarah.

American Airlines’and Sarah’s tweets were both deleted, and we don’t know if the FBI was ever contacted. But there’s no doubt the tweet was passed on to the airline’s corporate security unit, whose job is to protect people, buildings, and assets within a company. Corporate security has a duty to explore all avenues, and as seen in the example above, this now includes social media. This article will explore the ways in which social media has become an increasingly complicated source of threat to companies, and how corporate security teams can analyze and mitigate the threats successfully.

What Types of Threats Do Companies Have to Mitigate?

Social media threats target an array of things. They could be physical – in that they target a building or people. Rather, they could target a company’s assets or hack its IP address. The threats could be written or sent through photos and videos.

Let’s say an actor working on a film set posts a photo of the script to Instagram, and the photo is clear enough for the words to be read. Corporate security would be responsible for mitigating this threat immediately, as it threatens a production company’s intelectual property.

Bomb threats certainly fall under the jurisdiction of corporate security, as do death and assault threats against employees. Each year individuals tweet out supposed bomb threats, many from airports, and it’s up to corporate security units to decide if they are legitimate.

A popular example is one dubbed the “Twitter joke trial.” A U.K. man named Paul Chambers sent a tweet saying he’d “blow the airport sky high” when it was shut down due to weather. While Chambers claimed he had no intention of actually doing so, the tweet was taken seriously. Chambers was arrested and convicted of causing a menace under the U.K.’s Communications Act 2003. He won an appeal against the conviction two years later.

In February 2016, a Buzzfeed Canada writer namedScaachi Koul received a slew of death threats on Twitter after putting out a call for stories by non-white, non-male contributors. She deleted her Twitter account, but the threats targeted at Koul, as well as other people who receive similar threats, demonstrate the ease at which these social media threats can be made. Corporate security teams face real challenges in determining if the threats are valid. 

According to the Guardian’s Stuart Jeffries, a death threat used to be exceptional and shocking, but today it has become part of everyday life. “It’s the go-to response of anyone with two thumbs and a keyboard whenever someone does or says something they don’t like,” he writes. Although each threat may be complicated in its own way, corporate security teams must develop best practices to approach and mitigate every threat successfully.

What Strategies Are Companies Employing to Mitigate Threats?

The need for companies to identify a process by which to monitor and react to threats on social media is apparent. But as of now, many companies mitigate social media threats in a similar way they mitigate threats offline. 

Walmart, for example, identifies theft threats in its stores by deploying non-uniformed members of its loss prevention unit to patrol the aisles and catch thieves in action – and they catch a good number of thieves each month. If a threat was received through social media and the location of the store was known, corporate security would most likely bring in more members of its loss prevention unit to mitigate the risk. This isn’t much different from what Walmart already does with in-store threats.

But now imagine the threat was directed to Walmart in general. Corporate security sees the online threat, but not which location is being threatened – there are over 4,000 stores in the U.S. If the sender of a threat didn’t block his or her IP address, law enforcement could easily trace his or her location. However many Internet-based threats do not present an IP address. This makes it more complicated and time-consuming to track. Although, it’s not impossible.

When Harvard University received a bomb threat, for example, authorities were able to identify the threat was a hoax, even though the sender had hidden his IP address. He was trying to avoid an exam. Authorities were able to detect the student connected to a Tor exit node (Tor is a service to hide an IP address) on campus at about the same time the threatening email was sent. In this, he was caught. The same could be done if the threat was sent through social media.

Striking a Balance

The role of corporate security has expanded beyond physical borders – it’s now up to security to keep watch over online threats, too. However the threats are complicated. It’s difficult for corporate security to efficiently identify and analyze them, and it takes a significant amount of time and manpower to filter through potentially hazardous social media posts.

Going forward, companies need to implement technology to better mitigate threats. The right technology is capable of filtering through threats and zeroing in on location, and saves corporate security spending hours doing it manually. The sooner a company invests in technology and devises a social media specific strategy to respond to threats, the less havoc threats will wreak. 

KEYWORDS: security intelligence Situational Awareness social media monitoring social media risk threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nate Pruitt is a member of the advisory board at Snaptrends, a company that automates and simplifies social media monitoring with state-of-the-art analytics. Find Nate at https://www.linkedin.com/in/natepruitt

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • social-enews

    Send the Right Message: How to Streamline Emergency Communications in the Social Media Era

    See More
  • west-enews

    Brand Security: Maneuvering in the Wild, Wild West (AKA Social Media)

    See More
  • Social Media for Business

    5 Ways Social Media is Changing Corporate Security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing