Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyIdentity ManagementPhysical SecurityCybersecurity News

How to build a better corporate social media policy

By Aaron Barr
networking-security-freepik
July 9, 2021

It’s no secret that in today’s cancel-prone culture, social media can have a negative impact on companies – not just from corporate social media accounts, but also from those of individual employees. This includes more obvious things like posts that reflect poorly on a company’s reputation. But it also includes cybersecurity risks that can arise from social media activity, something which is too often overlooked.

In today’s blended and continuously connected world, our personal and professional lives are a digitally connected continuous stream, documented and available for public view. With this in mind it is imperative employers provide more comprehensive guidelines to secure and protect employee use of social media. Employers are reluctant to step into this space for fear of kicking a hornet's nest of individual privacy and personal freedom issues, but if done correctly, it doesn’t need to be an either/or situation; there is a way for employers to institute a corporate social media policy that balances protecting the company with protecting personal freedoms of speech.

 

The digital, social reality

Social networking is now an integrated aspect of work and personal life. While companies embrace social media to promote products and services, the potential for confidential data leakage or employee abuse is ever-present.

In today’s digital world, personal security is directly tied to corporate security. Therefore, it is critical for organizations to implement employee security guidelines and best practices to improve not only the employees’ digital hygiene and personal security but also the company’s security. At the same time, companies have to be careful about not infringing on personal liberties; any policy in place must balance both security and privacy.

 

Social media brings security and reputation risks

While social media has brought a lot of positives in terms of communications and providing a platform for different voices, it also carries risk. As we saw recently with the January 6 attack on the Capitol, many employers were quick to fire or condemn employees who had attended the attack and/or praised it on social media because it reflected poorly on brand reputation.

There are also the obvious sorts of non-disclosure agreement (NDA) issues that can arise with social media. Employees using social media to share trade secrets or disclose new deals before they should go public can clearly have a negative impact, with the potential for subjecting the company to legal troubles. But a lesser-known aspect is that employees’ social media use can open up a company to cybersecurity risk and inadvertent sensitive information disclosures. As an example, hackers can gather information from different social media sites about your employees, which they can then aggregate and use to guess the usernames and passwords of employee accounts – like their corporate email, or can aggregate relationships across employees and executives to reveal sensitive business relationships.

A corporate social media policy is a must

 

A solid, documented social media policy is meant to protect both employers and employees. Unfortunately, many such policies are sparse on details about what secure social media practices look like and what actions employees should take to improve their individual, and therefore, corporate risk factors. Employees need clear guidelines on what the company expects with respect to their social media use.

A corporate social media policy should make clear, at a minimum, how employees engage online on the companies behalf and  employees can and cannot post about, including:

  • Sensitive/private/confidential company information
  • Personal customer information
  • Comments about co-workers, customers or vendors that could be considered harassing, threatening, retaliatory or discriminatory

Many corporate social media policies focus only on these few and essential guidelines. But a solid policy should also contain guidelines and recommendations for good personal cyber hygiene – things like not using business email addresses to sign up for personal social accounts, the need to change passwords regularly, and how to avoid password recycling. It should include recommendations on implementing multi-factor authentication and tips for creating stronger passwords. Also recommendations for how to secure personal information from general public view, and how to check on the major social media platforms what is publicly viewable

A solid corporate social media policy also needs to lay out the implications or disciplinary actions for violating the guidelines within.

 

Balancing privacy, personal freedoms and protection

Under the National Labor Relations Act, employees are free to discuss working conditions and their own employment-related terms with those both inside and outside their organization. Employers aren’t permitted to take retaliatory action against an employee engaging in this protected activity.

That said, there’s been increasing support for companies’ social media policies when it can be proven that it has the potential to truly harm a company. For instance, the National Labor Relations Board recently ruled in favor of a California ambulance company that sought to restrict employees from engaging in social media postings deemed to be “inappropriate communications” about the company.

Employers need to ensure they are truly evaluating their corporate social media policy with a goal of protecting the company while also not infringing on personal rights.

 

Craft a secure policy

Social media provides significant opportunities for organizations to interact with customers and prospects, judge public brand sentiment, deliver corporate messaging directly to the public and more. It’s a medium that is intended for sharing and communicating, but in the corporate world, the wrong kind of communication can quickly sour your brand. And even the most innocent sharing online can be fodder for attack as bad actors aggregate seemingly harmless employee information.

Incorporating and promoting a social media use policy within an organization doesn’t ensure employee adoption or comprehension. Training will be an important aspect of a comprehensive strategy. But it’s an important part of the solution and a place to start. Use the information provided above to begin the process of crafting a policy that satisfies both security and employees’ rights.

KEYWORDS: corporate security cyber security physical security reputation management social media social networking

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aaron Barr, Co Founder & Chief Technology Officer at PiiQ Media, is a recognized expert in information operations and exploitation, social engineering, open source intelligence and digital covert operations. He previously served as a program manager at Northrop Grumman, leading three technical operations programs for three separate U.S. intelligence agencies from 2001-2010. Prior to that he was technical director for Northrop Grumman’s intelligence and cyber security business unit (a $750M organization) and the lead engineer for the company’s cyber security integration group. In that position, he worked to organize Northrop’s vast cyber capabilities across the company to satisfy national security objectives. Additionally, Aaron served as a naval cryptologist from 1989-2001 in both the Pacific and Atlantic theaters. He led the European Advanced Signals Analysis Laboratories’ COMINT mission from 1998-2001, and was hand-picked for multiple forward-deployed special intelligence collection missions. He has lectured frequently across both government and commercial security conferences about social media and open source collection and analysis.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • face-recognition-freepik1170.jpg

    Facial recognition technology’s serious security problem

    See More
  • How to Use Social Media for Better #Security

    See More
  • police1-900px.jpg

    How to Build a Better Ballistics Analysis Strategy

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • August 7, 2025

    Threats to the Energy Sector: Implications for Corporate and National Security

    ON DEMAND: The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing