7 Social Media Security Best Practices to Keep Your Business, Data & Reputation Safe

By Janet Church

pixelcreatures / Pixabay

Corporate social media concerns have progressed past the question of ROI as a marketing discipline and have landed squarely in the Risk Officers lap as a security concern. In fact, social media security is a serious risk for every corporation. Since 2011, cyber criminals have found a home on social media where they perpetuate fraud. During the past six months, CIO Insight states that cyber criminals have increased 70% (and it does not appear to be slowing down). CIO Insights also states that worldwide security breach costs will grow from $3 Billion in 2015 to $6 Trillion in 2021. That’s a lot of crime, and a lot of damage to your company!

To protect brands and reputation, companies must now ensure that their social media accounts are not gateways that expose them to costly threats. this means that you need to keep vigilant watch for cyber risks, including:

  • Ransomware attacks (such as the recent Wanna Cry)
  • Hijacking or hacking accounts
  • Phishing or impersonating brands to gain an audience
  • Stealing passwords to gain access to an account associate with a brand or a person
  • Giving access to shared user data through social platforms

With all these threats lurking, it can be difficult to manage and monitor risks and protect your company (and even your customers) from potential damage. Instead of waiting for an alarm bell to sound, businesses should be proactive and implement a social media governance plan that keeps their business, data and reputation safe. Here are seven social media security best practices to make the security section of your governance plan the best it can be:

Social Media Security Best Practice #1: Discover All Points of Presence (POPs)

The first step in keeping your corporate social media governed is to determine which accounts, pages, channels, boards, etc. appear to be associated with your business. Because counterfeit accounts can pop up at any time, you have to be aware of where your business is being represented on social media in order to assess whether a brand account is valid. Once you discover all of the POPs for your business, you will have a bird’s eye view of the accounts and areas that you must actively keep secure. After this first audit, be sure to have an ongoing audit program in place to find newly created rogue or fraudulent accounts.

Social Media Security Best Practice #2: Assess all POPs

It can often come as a surprise to a company when they figure out just how many places their brand is represented on the internet. Once you’ve determined where all of your business’ POPs are located, it is time to decide which ones should be managed and which ones should be shut down. When assessing POPs be sure to look for:

  • Accounts that your company does not have access to (due to lost credentials)
  • Accounts that are using your brand in an inflammatory way
  • Duplicate accounts for locations or sub-brands
  • Fraudulent accounts
  • Accounts that mislead a consumer to believe that is is representing your brand

Social Media Security Best Practice #3: Create Inventory System Go to the full article.

Source:: Business 2 Community

Be Sociable, Share!