Millennial Mobile Workforce and Data loss revealed that 82% of Indian employees use Facebook, 62% blogs, 45% micro blogs, 69% Google talks and 61% of Yahoo messenger. The convergence of employees personal and professional lives on social media platforms and the high degree of trust in these environments is also becoming a major concern for enterprises.
Social media offers an easy and authentic way to communicate with almost anyone around the world. But social media also act as a perfect platform to perform malicious activities. As per the recent survey, cases of cyber-attacks and threats are increasing at a significant rate.
One of the main reason to this is that people have updated almost everything in their social media profile. Personal and sensitive information are being shared which can cause a higher depth of damage in the long run.
Social hackers increasingly use social media to attack brands, VIP’s and customers. The types of threats in these platforms are diverse and every platform has a different tactic to respond against cyber-attacks. As a result mitigation threats on social media can be frustrating and time consuming process for security teams.
Here we will look into various social threats and possible ways to mitigate them.
Threat types
- Impersonation; pretending to be someone else.
Impersonation is one the major and upcoming trend that hackers use nowadays. They rely heavily on this because it adds credibility to the scam and also increases the effectiveness.
Mitigation criteria:
- Proof that the profile is not a parody account
- Proof that the name and photo of the person impersonated is present on the post.
- Legitimate profile of the victim is optimal.
- Financial scams
Financial scams are commonly found in established social media platforms like Twitter, Facebook and Instagram.
Types of financial scams include deposit frauds, money flipping, card cracking, tech support and fake employment opportunities.
Mitigation criteria:
- Direct mentions of client in question with intent to commit financial fraud.
- Posted login details.
- Break in terms of service.
- Cyber threats
Cyber threats on social media includes phishing related links or pages, as well as malware. These types of threats are found in all social medias including YouTube.
Mitigation criteria:
- Active links to malicious content that is abusive in nature.
- Proof of past posted malicious content.
Social media stands as a free way to communicate with customers, prospects and partners that many brands used as an advantage. But on the other hand it is yet another potential threat to an organization’s reputation and infrastructures.
What if social media threats aren’t so predictable?
Many organizations are still unaware that apart from the benefits social media act as a breeding ground for highly targeted and co-ordinated malicious activities.
Hidden threats can cause substantial damage to your organization infrastructure and personal reputation.
Hidden threats
- Threat 1: Reputation damage
For an upcoming brand reputation play a key role in its development. Without the trust of the customers or prospects maintaining or growing your business will be an arduous task. Threats can come in the form of a disgruntled former employee, unhappy vendor or someone with a baleful intent to whittle away your brand’s reputation.
Eg. In Tesla, a former employee apparently stole several gigabytes of confidential data and leaked the details of the company’s production line to the media.
- Threat 2: Planned, focussed attack
Social media provides an ideal platform for cyber criminals to attack organization and their employees. The common tactics include:
- Harvesting information about individual employees to fuel sophisticated social engineering campaigns.
- Compromising employees social media accounts for the purpose of launching further attacks and password reuse.
- Planning destructive activities such as boycotts and protests.
- Threat 3: Physical threats
Sadly, not all digital threats stay entirely in the digital world. Social media platform make it easy for individuals to threaten organizations or employees and there is no way of knowing whether the threat is legitimate or not.
How to prevent hidden threats
- Be aware of what’s public
- Check your private settings
- Don’t accept friend request from strangers
- Be careful when you check in or share location
- Review you tags
- Don’t share personal information online
- Be aware of phishing scams
- Always keep your passwords safe
- Check community guidelines
Keywords: Social media, hidden threats, privacy