Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity Leadership and ManagementCybersecurity News

Don’t Overlook LinkedIn as a Corporate Security Risk

By Daniil Davydoff
linkedin
May 22, 2019

Social media platforms such as Facebook, Twitter, Instagram, as well as specialized social networks and encrypted messaging apps have come under attack for facilitating violent extremism and serving as violent ideology laboratories. Since the Christchurch mosque shootings in March, governments are again discussing social media clampdowns as they gain greater awareness of far-right extremism. The threat these leaders are trying to address is very real, but from the standpoint of corporate security and other corporate risk functions, I’m more worried about the often ignored risks associated with LinkedIn – including those pertaining to corporate espionage, fraud and phishing, operational security, workplace risk and reputational risk.   

Why LinkedIn Matters

Before we get to discussing these dangers, it is worth thinking about why LinkedIn matters in the first place. While the platform has an active user base that puts it below the top 10 largest social media sites, LinkedIn is the platform of choice for professionals. It is the most used social network by Fortune 500 companies and according to Louis Camassa, Managing Partner at EMPATH brand consultancy, “LinkedIn is where most Fortune 500 decision-makers and executives like to spend their spare time.” This means that LinkedIn is what we call in security a “target-rich” environment, a one-stop shop for threat actors who seek to leverage social media to target major enterprises, executives and other employees. 

What you Need to Watch For

So, what are the main risks corporate security professionals need to be watching for as we use LinkedIn? I would argue there are at least five:

  • Corporate espionage – if you’ve been reading the news lately, you’ll know that almost every week a case of foreign state-backed corporate espionage is uncovered in the U.S. LinkedIn serves as a connection tool that can be exploited by those seeking secrets, as demonstrated by the recent case of former CIA officer Kevin Mallory, who sold state secrets to China. The effectiveness of LinkedIn as a tool of choice for threat actors is not surprising. While some professionals still use LinkedIn only as a rolodex of existing contacts, the platform encourages users to make new connections, whether to support a job search, or simply to expand the new virtual-professional network.
  • Fraud and phishing – tricking people into clicking malicious links is a tactic that is far older than LinkedIn and defrauding them through impersonation or other means is ancient. Yet LinkedIn does provide an inviting pool of targets for scamming and social engineering. Career-focused individuals, especially if desperate for a next step, may be more likely to engage and to overlook the signs of fraud.  
  • Operational security – remember when you took some personal information off your Facebook profile in the wake of the company’s many data privacy scandals over the past couple years? I do, and yet my LinkedIn profile is a repository of open-source intelligence (OSINT) on my life, and if someone wanted to know where I am on any given weekday, they could use my account to find out. What is more, when I had less information on my profile, LinkedIn was insisting that I add detail or lose out on the professional networking benefits. Some individuals amid a job search even place their full resume on the site, with home address included. Having a very public profile on LinkedIn is a calculated risk that I choose to take, but I am not a company executive or a public figure. For them, exposure of such information could greatly heighten security vulnerability.  
  • Workplace risk – whereas influencers on Instagram or Facebook can be seen peddling lifestyles, brands, or politics, LinkedIn has become a hub for career philosophers. These individuals collect likes and shares by expressing views on ideal workplaces, ideal managers, and ideal job searches, among other topics. Most of the content is inspirational and aspirational for followers but can also serve to create unrealistic expectations and grievances. Anecdotally, several workplace violence investigations conducted by AT-RISK later revealed the instigator to have expressed such grievances through the platform.
  • Reputational risk – LinkedIn can also create several forms of reputational risk for users. To begin with, how you represent yourself is much more likely to be tied—even if implicitly and unintentionally—to your current and former employer than on other forms of social media. If you are an intelligence and investigations professional who is sharing “fake news” without conducting basic due diligence, for example, it is highly likely that you and your firm will lose credibility.

Corporate Security Professionals, You’re Not Exempt

In early February, I was contacted through LinkedIn by a foreign security professional with seemingly impressive credentials, including a PhD from a military university as well as a leadership position in a veterans’ organization. My initial inclination was to admit the professional into my circle; he was from a country where I have few security industry connections and we seemed to share an interest in intelligence and investigations. A bit of profile digging, however, quickly revealed a manifesto that included a demand for further scrutiny of and “ending the speculation about the Holocaust.” Subsequent media searches also showed that the so-called veterans’ union was involved in violent activity and had links to far-right organizations, including one that was banned by Facebook as a hate group in April. Security professionals are on the front lines of maintaining their employers’ or clients’ safety and reputational integrity, so I decided to decline the invite. I implore my security colleagues to be as aware of their virtual environment as they are of their physical surroundings, or, like nearly 50 of my current LinkedIn connections, they will have clicked “accept” and potentially exposed themselves to serious reputational fallout. 

KEYWORDS: cybersecurity LinkedIn phishing Terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dan davydoff   pic1

Daniil Davydoff, CPP, is Director, Research Management and Operations at Eurasia Group and director of social media for the World Affairs Council of Palm Beach. He has been published by ASIS International/Security Management, Risk Management Magazine, The National Interest, The Carnegie Council for Ethics in International Affairs, Foreign Policy and RealClearWorld, among other outlets. His views do not reflect those of his company.

Daniil Davydoff can be contacted on LinkedIn or at davydoff@eurasiagroup.net

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Why Reputational Risk is a Security Risk and What to Do About It

    See More
  • inge huijbrechts

    Leading at the Crossroads of Sustainability and Security Risk: A Discussion with Inge Huijbrechts

    See More
  • Here, a CDC healthcare worker takes the proper measurements to ensure that she is protected in an Ebola clinic in West Africa - Security Magazine

    Don’t Forget Biological Threats

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Risk Analysis and the Security Survey, 4th Edition

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

See More Products

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    ON DEMAND: In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing