10 Ways to Improve Your Social Media Security Policy and Posture

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 10 Ways to Improve Your Social Media Security Policy and Posture-2 Next

Social Media Pitfalls: Think Before You Share

Never post your personal information in social media, according to Nathan Wenzler, principal security architect at AsTech Consulting. "Even if you trust your friends list, they could have others who access their accounts and can see your information. With it, they could easily commit identity theft and use that info to compromise any of your accounts."

Social media is a culmination of tons of information being converged in one location, which makes it a vulnerable target. As Andre Bagrin, CEO of My Digital Shield points out, when phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily.

"Because social media has become so central, someone really does have the ability to essentially highjack someone's life," Bagrin adds. "You can become a victim through your social accounts and not even know right away. Potential job opportunities can be cut short among many other unfortunate repercussions."

Social media can become a security nightmare in a couple of ways, says Rob Sadowski of RSA, the Security Division of EMC. First, social media can be used to distribute malicious content (malware, malicious links), and the likelihood of users engaging with that content is much greater because it comes from friends or known contacts they trust. Second, personal details shared on social media can be very useful for hackers looking to compromise users' identities or find high-value targets for attacks, fraud, or cybercrime.

Improve your social media security posture by considering the following tips on social media best practices for business.

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom's Guide. You can reach Sue via Twitter: @sueporemba


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

IT security skills 7 Top Skills for Security Pros

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you. ...  More >>

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.