Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireSecurity Leadership and ManagementSecurity & Business ResilienceIdentity ManagementPhysical SecurityBanking/Finance/Insurance

How to protect against rising social media threats

By John LaCour
Hand holds phone using social media
January 7, 2022

By some estimates, the number of worldwide social media users reached 4.2 billion in early 2021, and this number continues to grow. Additionally, 91.9% of U.S. marketers in companies larger than 100 employees use social media for marketing purposes. That’s a lot of companies connecting with a lot of people, making social media the largest pool of potential victims at scammers’ fingertips. And that leaves most American businesses open to phishing scams from bad actors.

Indeed, social media threats are on the rise. In January 2021, the average targeted organization experienced nearly 34 attacks through social media. As the year progressed, this number significantly increased. By September, the average targeted organization encountered 61 attacks per month, which is an 82% increase in three quarters.

Unfortunately, it can be extremely difficult to diffuse this rising threat. As digital transformation continues to accelerate — living more and more in a digital world as a means to work, communicate, purchase products, conduct research and find entertainment — our lives are moving into an almost fully digital space. This allows for easier social engineering attacks, selling of personal information, impersonation and general fraud. Identifying, locating and charging scammers through their social media activity is difficult to impossible for most situations.                               

Let’s start by defining the five key types of social media threats:

  1. Fraud: An incident designed to deceptively deny a right to a victim or provide illegal gain to the threat actor, including the unauthorized sale of account credentials; exposure of banking details; deposit fraud; providing access to tools designed to commit fraud; and other financial threats.
  2. Impersonation: An incident including a purposeful spoof of a corporate brand, executive or employee with intent to sway opinion or fool victims into performing an action.
  3. Cyber threat: An incident that includes an intentional cyber risk to the targeted victim, such as hacking attempts.
  4. Data leak: A leak or unauthorized share of proprietary or sensitive data such as login credentials, corporate documents or source code.
  5. Physical threat: A physical threat of harm specifically directed toward an employee, a physical location or an event.

While the percentage of fraud-related social media attacks leveled off in Q3 2021 after a significant increase in Q2, the threat type continued to make up the lion’s share of attacks. Cyber threats experienced the largest increase among all threat types in Q3, growing 5.5% from Q2 and accounting for approximately one quarter of the threats encountered. Employee, brand, and executive impersonations increased slightly as well, making up an additional quarter of the social media threats encountered.

Regarding specific industries, financial services was among the business sectors targeted most by social media attacks in 2021. This industry is a natural target for threat actors because their services are used broadly across several business sectors. The staffing and recruiting sector experienced the steepest increase in attacks, possibly due to seasonality and threat actors preying on job seekers during end-of-year recruiting. Information typically gleaned by hackers includes user and employee login credentials, credit card information and personal information that can then be used to launch other scams and attacks. One more factor contributing to the rise in social media threats include the growing focus on cryptocurrency. Crypto is non-traceable and crypto scams are easy to create, yet difficult to track.

Obviously, as the data shows, there is an urgent need for security teams to more closely monitor and manage social media activity. Here are some standard rules that employees should follow: 

  • Do not click on links in posts, tweets or direct messages unless you are 100% certain that they are genuine and well-intentioned. Ask yourself if somebody genuine would really contact you in this way with this information.
  • Recognize threats of financial issues or offers that seem too good to be true for what they really are.
  • If in doubt, call the correct number of the organization or individual from whom the post or tweet claims to be from to check its authenticity.
  • Know that even if the post or tweet seems to come from someone you trust, their account may have been hacked or spoofed.

Additionally, security teams need to start implementing procedures such as the following to protect against such threats which are sure to grow in 2022: 

  • Concentrate on marketing “phishing security awareness.” In most cases, phishing attempts require some kind of user action or response to succeed, so it is obvious that making users aware of the tactics used by scammers and the consequences of certain behaviors is paramount. Consider periodically communicating to your user base about the dangers of phishing and what to look out for. 
  • Employ experts. Security teams should have mobile experts dedicated to the detection and curation of these types of threats. Active monitoring is necessary and apps and emails should be flagged as suspicious if they reference, impersonate or replicate a brand’s content or images, including unauthorized use of logos, trademarks, content, functionality or appearance
  • Make your employees your frontline army. Involve and empower employees to take proactive participation in organization-wide training, as it is important to give employees a sense of their importance as a human barrier against phishing attempts. Make them feel a sense of pride and ownership for the safety of the brand’s customers. 
  • Account Protections. Always use a company email address to create social media accounts and have at least two “admins” on each account. This prevents someone changing passwords and locking you out. Additionally, each company should employ standard password change protocols and minimum password requirements. 
  • Verify the C-suite. Create official accounts for your top executives and get them verified (having a verified account or any account helps with mitigation of impersonation scams).

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users brought to you by Security Magazine. Subscribe here.

KEYWORDS: cryptocurrency cyber threat data loss prevention employee risk fraud prevention phishing security awareness social media security threat detection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John LaCour is the Founder and CTO of PhishLabs and serves as Principal Strategist with HelpSystems. PhishLabs, by HelpSystems, is a cyber threat intelligence company that delivers Digital Risk Protection through curated threat intelligence and complete mitigation. PhishLabs provides brand impersonation, account takeover, data leakage and social media threat protection in one complete solution for the world’s leading brands and companies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • social media influencer

    How to reduce security risks for social media influencers

    See More
  • Person-working-in-laptop.jpg

    7 ways to protect against cybersecurity threats in digital onboarding

    See More
  • protests -violence

    How extremist groups are using social media to spread their ideology, recruit and encourage violence

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • The Complete Guide to Physical Security

See More Products

Events

View AllSubmit An Event
  • May 21, 2026

    From Referral to Response: Managing Domestic Violence Threats in the Workplace

    Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.
  • December 11, 2025

    Responding to Evolving Threats in Retail Environments

    ON DEMAND: Retail security professionals face an array of security challenges, from organized retail crime to cyber-physical threats and public safety concerns. Learn how one of the world’s largest retail destinations stays ahead of these emerging threats.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing