Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingFire & Life SafetyIdentity ManagementPhysical SecurityCybersecurity News

How to build a better corporate social media policy

By Aaron Barr
networking-security-freepik
July 9, 2021

It’s no secret that in today’s cancel-prone culture, social media can have a negative impact on companies – not just from corporate social media accounts, but also from those of individual employees. This includes more obvious things like posts that reflect poorly on a company’s reputation. But it also includes cybersecurity risks that can arise from social media activity, something which is too often overlooked.

In today’s blended and continuously connected world, our personal and professional lives are a digitally connected continuous stream, documented and available for public view. With this in mind it is imperative employers provide more comprehensive guidelines to secure and protect employee use of social media. Employers are reluctant to step into this space for fear of kicking a hornet's nest of individual privacy and personal freedom issues, but if done correctly, it doesn’t need to be an either/or situation; there is a way for employers to institute a corporate social media policy that balances protecting the company with protecting personal freedoms of speech.

 

The digital, social reality

Social networking is now an integrated aspect of work and personal life. While companies embrace social media to promote products and services, the potential for confidential data leakage or employee abuse is ever-present.

In today’s digital world, personal security is directly tied to corporate security. Therefore, it is critical for organizations to implement employee security guidelines and best practices to improve not only the employees’ digital hygiene and personal security but also the company’s security. At the same time, companies have to be careful about not infringing on personal liberties; any policy in place must balance both security and privacy.

 

Social media brings security and reputation risks

While social media has brought a lot of positives in terms of communications and providing a platform for different voices, it also carries risk. As we saw recently with the January 6 attack on the Capitol, many employers were quick to fire or condemn employees who had attended the attack and/or praised it on social media because it reflected poorly on brand reputation.

There are also the obvious sorts of non-disclosure agreement (NDA) issues that can arise with social media. Employees using social media to share trade secrets or disclose new deals before they should go public can clearly have a negative impact, with the potential for subjecting the company to legal troubles. But a lesser-known aspect is that employees’ social media use can open up a company to cybersecurity risk and inadvertent sensitive information disclosures. As an example, hackers can gather information from different social media sites about your employees, which they can then aggregate and use to guess the usernames and passwords of employee accounts – like their corporate email, or can aggregate relationships across employees and executives to reveal sensitive business relationships.

A corporate social media policy is a must

 

A solid, documented social media policy is meant to protect both employers and employees. Unfortunately, many such policies are sparse on details about what secure social media practices look like and what actions employees should take to improve their individual, and therefore, corporate risk factors. Employees need clear guidelines on what the company expects with respect to their social media use.

A corporate social media policy should make clear, at a minimum, how employees engage online on the companies behalf and  employees can and cannot post about, including:

  • Sensitive/private/confidential company information
  • Personal customer information
  • Comments about co-workers, customers or vendors that could be considered harassing, threatening, retaliatory or discriminatory

Many corporate social media policies focus only on these few and essential guidelines. But a solid policy should also contain guidelines and recommendations for good personal cyber hygiene – things like not using business email addresses to sign up for personal social accounts, the need to change passwords regularly, and how to avoid password recycling. It should include recommendations on implementing multi-factor authentication and tips for creating stronger passwords. Also recommendations for how to secure personal information from general public view, and how to check on the major social media platforms what is publicly viewable

A solid corporate social media policy also needs to lay out the implications or disciplinary actions for violating the guidelines within.

 

Balancing privacy, personal freedoms and protection

Under the National Labor Relations Act, employees are free to discuss working conditions and their own employment-related terms with those both inside and outside their organization. Employers aren’t permitted to take retaliatory action against an employee engaging in this protected activity.

That said, there’s been increasing support for companies’ social media policies when it can be proven that it has the potential to truly harm a company. For instance, the National Labor Relations Board recently ruled in favor of a California ambulance company that sought to restrict employees from engaging in social media postings deemed to be “inappropriate communications” about the company.

Employers need to ensure they are truly evaluating their corporate social media policy with a goal of protecting the company while also not infringing on personal rights.

 

Craft a secure policy

Social media provides significant opportunities for organizations to interact with customers and prospects, judge public brand sentiment, deliver corporate messaging directly to the public and more. It’s a medium that is intended for sharing and communicating, but in the corporate world, the wrong kind of communication can quickly sour your brand. And even the most innocent sharing online can be fodder for attack as bad actors aggregate seemingly harmless employee information.

Incorporating and promoting a social media use policy within an organization doesn’t ensure employee adoption or comprehension. Training will be an important aspect of a comprehensive strategy. But it’s an important part of the solution and a place to start. Use the information provided above to begin the process of crafting a policy that satisfies both security and employees’ rights.

KEYWORDS: corporate security cyber security physical security reputation management social media social networking

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aaron Barr, Co Founder & Chief Technology Officer at PiiQ Media, is a recognized expert in information operations and exploitation, social engineering, open source intelligence and digital covert operations. He previously served as a program manager at Northrop Grumman, leading three technical operations programs for three separate U.S. intelligence agencies from 2001-2010. Prior to that he was technical director for Northrop Grumman’s intelligence and cyber security business unit (a $750M organization) and the lead engineer for the company’s cyber security integration group. In that position, he worked to organize Northrop’s vast cyber capabilities across the company to satisfy national security objectives. Additionally, Aaron served as a naval cryptologist from 1989-2001 in both the Pacific and Atlantic theaters. He led the European Advanced Signals Analysis Laboratories’ COMINT mission from 1998-2001, and was hand-picked for multiple forward-deployed special intelligence collection missions. He has lectured frequently across both government and commercial security conferences about social media and open source collection and analysis.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • face-recognition-freepik1170.jpg

    Facial recognition technology’s serious security problem

    See More
  • police1-900px.jpg

    How to Build a Better Ballistics Analysis Strategy

    See More
  • 5 minutes w Miller

    5 minutes with Todd Miller - How to build community trust for better public safety

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!