SlideShare a Scribd company logo
Social media security
How to prevent hacks and manage
them if they happen
1. Preventing hacks1. Preventing hacks
Why are social media hacks a problem?
• You are the CEO of a bank, tweeting regularly,
and generally being hip
• And then your Twitter account is hacked.
There’s a tweet in your name that says the bank
has made huge losses and doesn’t have enough
money to pay account holders
• People panic and there is a run on the bank…
How do hacks happen?
• People who want to cause mischief can get
access to your password in a number of ways:
– Passwords are hacked using “brute force” software that runs
through all the possible combinations of letters and numbers
– People steal (or find) unprotected portable devices
– Devices are infected with spyware (often after a phishing attack)
– Passwords are not changed when an employee who knows
them leaves the company
– The password is stored on a shared personal device which
allows access by non-authorised people
– Password lists are made available to non-authorised people
• So what can you do about this?
How can you stop hacking?
• You can’t be sure of preventing hacking
• But you can take some basic steps to make it
less likely that people will succeed:
– Use robust passwords
– Limit access to social media accounts
– Limit direct access to social media accounts
– Keep in control
– Watch out for Cookies
– Educate people to avoid phishing attacks
– Take care with mobile devices
Use robust passwords
• Ensure passwords are strong
– minimum of 12 characters including at least one each of capital
letter, lower case letter, number, keyboard symbol (e.g. ! $ % &)
• Don’t use words or names in the password
– Password isn’t a great password
– And people realise that numbers are commonly substituted for
letters: So P455w0rd isn’t great either!
• Think of a phrase and use the first letters:
– I love my wife Delvina and my two boys Caspar and Tarquin!
becomes IlmwD&m2bC&T!
• Ensure passwords are different for all accounts
• Change passwords a couple of times a year
Limit access
• Audit number of people who have access (check
for 3rd
parties like agencies)
• Severely limit the people who have access
– If necessary appoint an “editor” who uploads content
written by other people
– Ensure that the contracts of people with access stipulate that
passwords must not be shared
– Keep a record of who has access
Manage access
• If you can, implement Single Sign On technology
to manage access to your social media accounts
• This means that people don’t have to sign onto
social media accounts directly
– they get access when they sign into your company network
• Preventing direct access means that fewer
people need to know or remember passwords
and that passwords can be changed at any time
Cookie attacks
• Some platforms (e.g. Twitter, Facebook) are
designed to remain open continuously
– This is so that you get access every time you go to your
computer or mobile phone
• Keeping an account open all the time gives
people an easy way into your account
– If it is open on a mobile device which subsequently gets lost
– if you are using a shared device and forget to log out.
• The most secure way to handle this is to require
access to corporate social media only via fixed
company equipment
Ensure you have control
• Some platforms (e.g. Facebook) say business
pages must be set up by private accounts
– Don’t allow individuals to set up these pages: create an account
representing your “corporate personality” instead
– If private accounts have been used, you may have to start afresh
even if it means sacrificing assets such as Likes
• If you ask people to Tweet or Post for you make
sure the accounts they set up are owned and
capable of being managed by the company
Avoid phishing attacks
• Phishing: a hacker sends you message “from”
your social network, asking you to log in to your
account and provides you with a handy link
• You enter username and password into a fake
login page, which promptly captures the data
– Often these attacks are personalised with your name and job
title (“spear-fishing”) and look very credible
• Prevent this through education. Train people to:
– Recognise suspicious emails
– Check the address of the site in the browser address bar
– Avoid links in emails and navigate directly to their account
Mobile devices
• Mobile devices represent a risk because they
can be lost or stolen
• Limit access to corporate social media accounts
via fixed computers in secure office locations
• If you need access outside the office (e.g. for
tweets at a conference):
– Protect the device with a robust password
– Make sure you have the ability to lock or wipe it remotely
– Avoid using password vaults that remember passwords for you
• If you are logging on to Twitter or Facebook on a
mobile device log off after you finish
Wi-Fi
• Wi-fi connections may be insecure or dangerous
• Check to make sure you are using the official
wi-fi (check the exact name)
– Don’t be tempted to use an alternative wi-fi even if seems to
offer easy access
• Don’t use the corporate account to tweet on wi-fi
– Set up a secondary account and use it for out-of-office events
– Use the event hashtag in tweets to ensure that people find your
posts
– Get colleagues to follow the secondary account and share your
posts via the main corporate account as soon as possible
Educate
• Most protection can be gained through
education
• Help people understand where the risks lie, what
they can do to minimise them, and why it is
important
2. Five steps for2. Five steps for
managing if you aremanaging if you are
hackedhacked
Step 1. Regain control by resetting
passwords
• Change the password on the account (to
something harder to hack)
• If the hackers have changed the password, reset
it using the forgotten password link on the site
– At the same time change the password of the account
administrator’s email address as this may have been hacked too
• If the hackers have locked you out of your
account contact the social platform directly:
– Search [platform name] AND hacked OR compromised to find
the right page
Step 2. Protect your other platforms
• Now check all your other social media platforms
and ensure they have not been hacked as well
• If they are safe check that they have a secure
password and that this is different from the
passwords on your other social media sites
Step 3. Get back to normal
• Get your social media accounts back to the state
they were in before the hacking incident
• Delete unwanted content
– Delete any content sent out without your authorisation
• This doesn’t guarantee it will disappear completely and for
ever as other people may have saved or shared it
• Check your account settings
– Make sure there aren’t any nasty surprises waiting for you
• Have any automated responses been altered?
• Does your profile contain strange links?
• Have any Twitter lists been tampered with?
• Do you have unexpected new some “friends”?
Step 4. Let people know
• Tell your audience
– Post messages to followers apologising for any offence caused
• Pay to promote these messages if the hack was serious
– Put a message on your website and any other content such as
blogs and social media profiles
• Tell your employees
– Reassure them and tell them what to do and say if they are
asked about the crisis by friends or peers
• Tell the media
– Especially if the breach is potentially damaging you will want to
make sure the media have your version of events
5. Review your security
• Review security to reduce the risk of anything
similar happening again
– Ensure that you have followed the advice in the first part of this
presentation
• Review any applications that have access to
your accounts; remove any you don’t recognize
• Run a virus scan on devices that have accessed
your accounts including mobile devices
• If available, set up “2-factor authentication”
(unless you have Single Sign On software)
• Make sure employees are properly educated

More Related Content

What's hot

Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Innocent Korie
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
DallasHaselhorst
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Rahul Boga
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
BalwantBesra
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
Priscila Bernardes
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Phishing
PhishingPhishing
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam
 
Social engineering and Phishing
Social engineering and PhishingSocial engineering and Phishing
Social engineering and Phishingthecorrosiveone
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
Maria Petropulos
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 

What's hot (20)

Security awareness
Security awarenessSecurity awareness
Security awareness
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Social engineering and Phishing
Social engineering and PhishingSocial engineering and Phishing
Social engineering and Phishing
 
Cyber Safety For Educators
Cyber Safety For EducatorsCyber Safety For Educators
Cyber Safety For Educators
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 

Similar to Social media security

Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
Joint Base Myer-Henderson Hall
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
Norfolk Naval Shipyard
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
North Texas Chapter of the ISSA
 
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
One-IT
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
KevinRiley83
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
James Krusic
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
GrittyCC
 
Using Social networks for Recruiting
Using Social networks for RecruitingUsing Social networks for Recruiting
Using Social networks for Recruiting
Jason Frostholm
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public Educators
Sarah K Miller
 
Craig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFestCraig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFest
PRFest
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
MarketingatBahrain
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
vasidharta
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
Justin Denton
 

Similar to Social media security (20)

Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
ECSM 2021 - Ce faci dacă ți-au fost sparte conturile de social media
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Spam & Phishing
Spam & PhishingSpam & Phishing
Spam & Phishing
 
Using Social networks for Recruiting
Using Social networks for RecruitingUsing Social networks for Recruiting
Using Social networks for Recruiting
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public Educators
 
Craig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFestCraig McGill on Cyber Security at #PRFest
Craig McGill on Cyber Security at #PRFest
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 

More from Mosoco Ltd

A process for measuring cyber security culture (very draft)
A process for measuring cyber security culture (very draft)A process for measuring cyber security culture (very draft)
A process for measuring cyber security culture (very draft)
Mosoco Ltd
 
Digital transformation: knowledge management
Digital transformation: knowledge managementDigital transformation: knowledge management
Digital transformation: knowledge management
Mosoco Ltd
 
Digital transformation: digital business process
Digital transformation: digital business processDigital transformation: digital business process
Digital transformation: digital business process
Mosoco Ltd
 
Digital transformation: the future of retail
Digital transformation: the future of retailDigital transformation: the future of retail
Digital transformation: the future of retail
Mosoco Ltd
 
Digital transformation: introduction to mobile marketing
Digital transformation: introduction to mobile marketingDigital transformation: introduction to mobile marketing
Digital transformation: introduction to mobile marketing
Mosoco Ltd
 
Digital transformation: the digital workplace
Digital transformation: the digital workplaceDigital transformation: the digital workplace
Digital transformation: the digital workplace
Mosoco Ltd
 
Digital transformation: social media marketing
Digital transformation: social media marketingDigital transformation: social media marketing
Digital transformation: social media marketing
Mosoco Ltd
 
Digital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskDigital transformation: introduction to cyber risk
Digital transformation: introduction to cyber risk
Mosoco Ltd
 
Digital transformation: measuring your digital marketing returns
Digital transformation: measuring your digital marketing returnsDigital transformation: measuring your digital marketing returns
Digital transformation: measuring your digital marketing returns
Mosoco Ltd
 
Social media risk
Social media riskSocial media risk
Social media risk
Mosoco Ltd
 
Planning successful social media marketing campaigns
Planning successful social media marketing campaignsPlanning successful social media marketing campaigns
Planning successful social media marketing campaigns
Mosoco Ltd
 
Social media marketing (introduction)
Social media marketing (introduction)Social media marketing (introduction)
Social media marketing (introduction)
Mosoco Ltd
 
Research and truth
Research and truthResearch and truth
Research and truth
Mosoco Ltd
 
Introduction to user experience research (TechUK Designing Digital Health sem...
Introduction to user experience research (TechUK Designing Digital Health sem...Introduction to user experience research (TechUK Designing Digital Health sem...
Introduction to user experience research (TechUK Designing Digital Health sem...
Mosoco Ltd
 
Interactive tv text input usability report 2011
Interactive tv text input usability report 2011Interactive tv text input usability report 2011
Interactive tv text input usability report 2011
Mosoco Ltd
 

More from Mosoco Ltd (15)

A process for measuring cyber security culture (very draft)
A process for measuring cyber security culture (very draft)A process for measuring cyber security culture (very draft)
A process for measuring cyber security culture (very draft)
 
Digital transformation: knowledge management
Digital transformation: knowledge managementDigital transformation: knowledge management
Digital transformation: knowledge management
 
Digital transformation: digital business process
Digital transformation: digital business processDigital transformation: digital business process
Digital transformation: digital business process
 
Digital transformation: the future of retail
Digital transformation: the future of retailDigital transformation: the future of retail
Digital transformation: the future of retail
 
Digital transformation: introduction to mobile marketing
Digital transformation: introduction to mobile marketingDigital transformation: introduction to mobile marketing
Digital transformation: introduction to mobile marketing
 
Digital transformation: the digital workplace
Digital transformation: the digital workplaceDigital transformation: the digital workplace
Digital transformation: the digital workplace
 
Digital transformation: social media marketing
Digital transformation: social media marketingDigital transformation: social media marketing
Digital transformation: social media marketing
 
Digital transformation: introduction to cyber risk
Digital transformation: introduction to cyber riskDigital transformation: introduction to cyber risk
Digital transformation: introduction to cyber risk
 
Digital transformation: measuring your digital marketing returns
Digital transformation: measuring your digital marketing returnsDigital transformation: measuring your digital marketing returns
Digital transformation: measuring your digital marketing returns
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Planning successful social media marketing campaigns
Planning successful social media marketing campaignsPlanning successful social media marketing campaigns
Planning successful social media marketing campaigns
 
Social media marketing (introduction)
Social media marketing (introduction)Social media marketing (introduction)
Social media marketing (introduction)
 
Research and truth
Research and truthResearch and truth
Research and truth
 
Introduction to user experience research (TechUK Designing Digital Health sem...
Introduction to user experience research (TechUK Designing Digital Health sem...Introduction to user experience research (TechUK Designing Digital Health sem...
Introduction to user experience research (TechUK Designing Digital Health sem...
 
Interactive tv text input usability report 2011
Interactive tv text input usability report 2011Interactive tv text input usability report 2011
Interactive tv text input usability report 2011
 

Recently uploaded

The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
Allensmith572606
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
fisherameliaisabella
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
Bojamma2
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 

Recently uploaded (20)

The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdfModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
ModelingMarketingStrategiesMKS.CollumbiaUniversitypdf
 
The-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic managementThe-McKinsey-7S-Framework. strategic management
The-McKinsey-7S-Framework. strategic management
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 

Social media security

  • 1. Social media security How to prevent hacks and manage them if they happen
  • 2. 1. Preventing hacks1. Preventing hacks
  • 3. Why are social media hacks a problem? • You are the CEO of a bank, tweeting regularly, and generally being hip • And then your Twitter account is hacked. There’s a tweet in your name that says the bank has made huge losses and doesn’t have enough money to pay account holders • People panic and there is a run on the bank…
  • 4. How do hacks happen? • People who want to cause mischief can get access to your password in a number of ways: – Passwords are hacked using “brute force” software that runs through all the possible combinations of letters and numbers – People steal (or find) unprotected portable devices – Devices are infected with spyware (often after a phishing attack) – Passwords are not changed when an employee who knows them leaves the company – The password is stored on a shared personal device which allows access by non-authorised people – Password lists are made available to non-authorised people • So what can you do about this?
  • 5. How can you stop hacking? • You can’t be sure of preventing hacking • But you can take some basic steps to make it less likely that people will succeed: – Use robust passwords – Limit access to social media accounts – Limit direct access to social media accounts – Keep in control – Watch out for Cookies – Educate people to avoid phishing attacks – Take care with mobile devices
  • 6. Use robust passwords • Ensure passwords are strong – minimum of 12 characters including at least one each of capital letter, lower case letter, number, keyboard symbol (e.g. ! $ % &) • Don’t use words or names in the password – Password isn’t a great password – And people realise that numbers are commonly substituted for letters: So P455w0rd isn’t great either! • Think of a phrase and use the first letters: – I love my wife Delvina and my two boys Caspar and Tarquin! becomes IlmwD&m2bC&T! • Ensure passwords are different for all accounts • Change passwords a couple of times a year
  • 7. Limit access • Audit number of people who have access (check for 3rd parties like agencies) • Severely limit the people who have access – If necessary appoint an “editor” who uploads content written by other people – Ensure that the contracts of people with access stipulate that passwords must not be shared – Keep a record of who has access
  • 8. Manage access • If you can, implement Single Sign On technology to manage access to your social media accounts • This means that people don’t have to sign onto social media accounts directly – they get access when they sign into your company network • Preventing direct access means that fewer people need to know or remember passwords and that passwords can be changed at any time
  • 9. Cookie attacks • Some platforms (e.g. Twitter, Facebook) are designed to remain open continuously – This is so that you get access every time you go to your computer or mobile phone • Keeping an account open all the time gives people an easy way into your account – If it is open on a mobile device which subsequently gets lost – if you are using a shared device and forget to log out. • The most secure way to handle this is to require access to corporate social media only via fixed company equipment
  • 10. Ensure you have control • Some platforms (e.g. Facebook) say business pages must be set up by private accounts – Don’t allow individuals to set up these pages: create an account representing your “corporate personality” instead – If private accounts have been used, you may have to start afresh even if it means sacrificing assets such as Likes • If you ask people to Tweet or Post for you make sure the accounts they set up are owned and capable of being managed by the company
  • 11. Avoid phishing attacks • Phishing: a hacker sends you message “from” your social network, asking you to log in to your account and provides you with a handy link • You enter username and password into a fake login page, which promptly captures the data – Often these attacks are personalised with your name and job title (“spear-fishing”) and look very credible • Prevent this through education. Train people to: – Recognise suspicious emails – Check the address of the site in the browser address bar – Avoid links in emails and navigate directly to their account
  • 12. Mobile devices • Mobile devices represent a risk because they can be lost or stolen • Limit access to corporate social media accounts via fixed computers in secure office locations • If you need access outside the office (e.g. for tweets at a conference): – Protect the device with a robust password – Make sure you have the ability to lock or wipe it remotely – Avoid using password vaults that remember passwords for you • If you are logging on to Twitter or Facebook on a mobile device log off after you finish
  • 13. Wi-Fi • Wi-fi connections may be insecure or dangerous • Check to make sure you are using the official wi-fi (check the exact name) – Don’t be tempted to use an alternative wi-fi even if seems to offer easy access • Don’t use the corporate account to tweet on wi-fi – Set up a secondary account and use it for out-of-office events – Use the event hashtag in tweets to ensure that people find your posts – Get colleagues to follow the secondary account and share your posts via the main corporate account as soon as possible
  • 14. Educate • Most protection can be gained through education • Help people understand where the risks lie, what they can do to minimise them, and why it is important
  • 15. 2. Five steps for2. Five steps for managing if you aremanaging if you are hackedhacked
  • 16. Step 1. Regain control by resetting passwords • Change the password on the account (to something harder to hack) • If the hackers have changed the password, reset it using the forgotten password link on the site – At the same time change the password of the account administrator’s email address as this may have been hacked too • If the hackers have locked you out of your account contact the social platform directly: – Search [platform name] AND hacked OR compromised to find the right page
  • 17. Step 2. Protect your other platforms • Now check all your other social media platforms and ensure they have not been hacked as well • If they are safe check that they have a secure password and that this is different from the passwords on your other social media sites
  • 18. Step 3. Get back to normal • Get your social media accounts back to the state they were in before the hacking incident • Delete unwanted content – Delete any content sent out without your authorisation • This doesn’t guarantee it will disappear completely and for ever as other people may have saved or shared it • Check your account settings – Make sure there aren’t any nasty surprises waiting for you • Have any automated responses been altered? • Does your profile contain strange links? • Have any Twitter lists been tampered with? • Do you have unexpected new some “friends”?
  • 19. Step 4. Let people know • Tell your audience – Post messages to followers apologising for any offence caused • Pay to promote these messages if the hack was serious – Put a message on your website and any other content such as blogs and social media profiles • Tell your employees – Reassure them and tell them what to do and say if they are asked about the crisis by friends or peers • Tell the media – Especially if the breach is potentially damaging you will want to make sure the media have your version of events
  • 20. 5. Review your security • Review security to reduce the risk of anything similar happening again – Ensure that you have followed the advice in the first part of this presentation • Review any applications that have access to your accounts; remove any you don’t recognize • Run a virus scan on devices that have accessed your accounts including mobile devices • If available, set up “2-factor authentication” (unless you have Single Sign On software) • Make sure employees are properly educated