Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity & Business Resilience

Anticipating the risks of meme culture

By Preston Hogue
The risk and resiliency of misinformation
August 30, 2021

For the past few years, we’ve watched how cultural and societal movements that originate and gain momentum in cyberspace can spill over into the real world, with real consequences for organizations. 

The pandemic has accelerated the process after lockdowns around the world evaporated in-person social activities and skyrocketed screen time — creating a captive audience of billions for online influencers. 

Digital advertising budgets are now reaching all-time highs, outpacing traditional channels. New apps and algorithms are being created every day to hyper-personalize and target content. Social media platforms have become even more influential, even as people have become savvier about using them and more skeptical about the information shared there.

We’re blurring the lines between physical and digital, and the effects are playing out today in some startling ways. Earlier this year a critical mass of retail investors targeted the over-shorted stock of GameStop, a fixture in malls everywhere a decade ago. The group had come together via the social media service Reddit, in a subgroup called WallStreetBets. 

The movement turned into an economic and cultural frenzy. The stock soared from $20 to almost $500 at one point. Major hedge funds with bearish positions experienced losses in the billions. Retail investment app companies took the astonishing step of restricting trading of the stock. 

The WallStreetBets subgroup has since swelled from 2 million to more almost 10 million members —essentially becoming a crowdsourced hedge fund with potentially billions in assets of its own. 

The GameStop spectacle began just weeks after thousands of rioters stormed the U.S. Capitol, having used apps like Twitter, Parler and Facebook to build momentum, organize and coordinate their activities. 

So far in 2021, we’ve seen massive transfers of wealth, political theater with life-altering consequences, and online activism spilling into the streets worldwide.   

I first learned about the power of crowdsourcing and online influence in the late 1990s when the Sri Lankan Tamil Tigers organization used the power of the web to coordinate a physical, real-world attack against websites owned by the Sri Lankan government. At an appointed time, all the group’s members and supporters around the world logged onto specific sites, crashing them. 

This weaponization of the internet was groundbreaking at the time and an early instance of what would become a recurring theme of cyber disruption in the decades to come. 

In the security industry, we usually talk about the proliferation of applications as an expanding technology footprint that can be targeted for cyberattacks. But to truly secure an organization in this environment, we have to be thinking beyond that. 

It would be hard to overstate the massive influence wielded today via the ever-expanding number of social platforms. These services provide anyone with the ability to build an enormous audience, sometimes overnight. One TV pundit’s brother recently gained nearly half a million followers on Twitter after a memorable tweet. More than 1.2 million people are following the daughter of a former White House aide on TikTok. 

When you have that kind of a crowd, and an app that allows you to speak to everyone at once, you can weaponize it pretty quickly. The larger the audience and the greater an influencer’s reach, the faster these things can happen and the more dramatic the risk can become. And if multibillion-dollar hedge funds can be targeted — companies whose entire business model is built on calculating risks — then anyone can. 

This idea of unseen risks caused by online influence is only going to become more critical as the advertising industry becomes hyper-personalized and much more sophisticated in its use of data. The infrastructure for this movement is being built on HTTP: trackers, cookies, referrals. 

As more services and assets move online — as more things are SaaS-ified — our hybrid lives will create surprising loopholes in the real world that may have consequences for individuals, organizations and institutions. 

And when influence can target you specifically in this new app economy, with a deep knowledge of who you are, we’re going to see more of these crowdsourced movements and new types of attacks and fraud that go well beyond clicks and credentials. 

KEYWORDS: misinformation campaigns operational resilience reputation security reputational risks risk and resilience social media security threat landscape

Share This Story

Preston Hogue is Director of Security Marketing at F5 Networks.

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing