Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

The Social Media Security Problem for Corporations around the World

By Nate Pruitt
social-snaptrends
May 10, 2016

American Airlines once received a tweet from someone with the Twitter handle @QueenDemextriax_, reading in part, “I’m part of Al Qaida and on June 1st I’m gonna do something really big.” The airline promptly replied to the tweet, saying the user’s IP address and details had been forwarded to security and the FBI.

What followed was a complete meltdown that gained the Twitter user 30,000 followers. “I’m so sorry I’m scared now,” she tweeted. Then, “Why would I blow up one of your planes, I have my own jet.” And finally, “I blocked the FBI just in case.”

The person behind these tweets was a 14-year-old Dutch girl named Sarah.

American Airlines’and Sarah’s tweets were both deleted, and we don’t know if the FBI was ever contacted. But there’s no doubt the tweet was passed on to the airline’s corporate security unit, whose job is to protect people, buildings, and assets within a company. Corporate security has a duty to explore all avenues, and as seen in the example above, this now includes social media. This article will explore the ways in which social media has become an increasingly complicated source of threat to companies, and how corporate security teams can analyze and mitigate the threats successfully.

What Types of Threats Do Companies Have to Mitigate?

Social media threats target an array of things. They could be physical – in that they target a building or people. Rather, they could target a company’s assets or hack its IP address. The threats could be written or sent through photos and videos.

Let’s say an actor working on a film set posts a photo of the script to Instagram, and the photo is clear enough for the words to be read. Corporate security would be responsible for mitigating this threat immediately, as it threatens a production company’s intelectual property.

Bomb threats certainly fall under the jurisdiction of corporate security, as do death and assault threats against employees. Each year individuals tweet out supposed bomb threats, many from airports, and it’s up to corporate security units to decide if they are legitimate.

A popular example is one dubbed the “Twitter joke trial.” A U.K. man named Paul Chambers sent a tweet saying he’d “blow the airport sky high” when it was shut down due to weather. While Chambers claimed he had no intention of actually doing so, the tweet was taken seriously. Chambers was arrested and convicted of causing a menace under the U.K.’s Communications Act 2003. He won an appeal against the conviction two years later.

In February 2016, a Buzzfeed Canada writer namedScaachi Koul received a slew of death threats on Twitter after putting out a call for stories by non-white, non-male contributors. She deleted her Twitter account, but the threats targeted at Koul, as well as other people who receive similar threats, demonstrate the ease at which these social media threats can be made. Corporate security teams face real challenges in determining if the threats are valid. 

According to the Guardian’s Stuart Jeffries, a death threat used to be exceptional and shocking, but today it has become part of everyday life. “It’s the go-to response of anyone with two thumbs and a keyboard whenever someone does or says something they don’t like,” he writes. Although each threat may be complicated in its own way, corporate security teams must develop best practices to approach and mitigate every threat successfully.

What Strategies Are Companies Employing to Mitigate Threats?

The need for companies to identify a process by which to monitor and react to threats on social media is apparent. But as of now, many companies mitigate social media threats in a similar way they mitigate threats offline. 

Walmart, for example, identifies theft threats in its stores by deploying non-uniformed members of its loss prevention unit to patrol the aisles and catch thieves in action – and they catch a good number of thieves each month. If a threat was received through social media and the location of the store was known, corporate security would most likely bring in more members of its loss prevention unit to mitigate the risk. This isn’t much different from what Walmart already does with in-store threats.

But now imagine the threat was directed to Walmart in general. Corporate security sees the online threat, but not which location is being threatened – there are over 4,000 stores in the U.S. If the sender of a threat didn’t block his or her IP address, law enforcement could easily trace his or her location. However many Internet-based threats do not present an IP address. This makes it more complicated and time-consuming to track. Although, it’s not impossible.

When Harvard University received a bomb threat, for example, authorities were able to identify the threat was a hoax, even though the sender had hidden his IP address. He was trying to avoid an exam. Authorities were able to detect the student connected to a Tor exit node (Tor is a service to hide an IP address) on campus at about the same time the threatening email was sent. In this, he was caught. The same could be done if the threat was sent through social media.

Striking a Balance

The role of corporate security has expanded beyond physical borders – it’s now up to security to keep watch over online threats, too. However the threats are complicated. It’s difficult for corporate security to efficiently identify and analyze them, and it takes a significant amount of time and manpower to filter through potentially hazardous social media posts.

Going forward, companies need to implement technology to better mitigate threats. The right technology is capable of filtering through threats and zeroing in on location, and saves corporate security spending hours doing it manually. The sooner a company invests in technology and devises a social media specific strategy to respond to threats, the less havoc threats will wreak. 

KEYWORDS: security intelligence Situational Awareness social media monitoring social media risk threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Nate Pruitt is a member of the advisory board at Snaptrends, a company that automates and simplifies social media monitoring with state-of-the-art analytics. Find Nate at https://www.linkedin.com/in/natepruitt

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • social-enews

    Send the Right Message: How to Streamline Emergency Communications in the Social Media Era

    See More
  • west-enews

    Brand Security: Maneuvering in the Wild, Wild West (AKA Social Media)

    See More
  • Workplace safety and security reimagining the workplace with not for profit office of the future prototype

    Not-for-profit Office of the Future prototype aims to help enterprises around the world reopen safely

    See More

Related Products

See More Products
  • Optimizing Social Media from a B2B Perspective

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing