Get All Access for $5/mo

Seven Tips On Mitigating Cyber Risks To Your Corporate Social Media The human factor cannot be reduced to zero, but it can be minimized as much as possible with the help of dedicated training.

By Anna Larkina

Opinions expressed by Entrepreneur contributors are their own.

You're reading Entrepreneur Middle East, an international franchise of Entrepreneur Media.

Shutterstock

This article was co-written with Roman Dedenok, a spam analysis expert at Kaspersky.

Threats to corporate social media are evolving along with perpetrators' social engineering skills at a blistering pace. Sometimes, their techniques reach such a high level that even the tech-savvy administrator of a corporate network can't tell the difference between a scam and the truth. As many businesses use social media to promote their products and services, these threats are relevant to an extremely large number of companies.

To help them stay safe, we at Kaspersky are offering the following tips to mitigate the cyber risks associated with social media in 2023. Here's a primer:

1/ Use caution with direct messages and drafts folder; delete old irrelevant information
Companies should be careful about keeping sensitive information in direct messages– it can pose cyber risks. People often use corporate social media to write directly to brands, asking for help, using the account holder's product or service. Also, some partnerships, such as those with bloggers, can be negotiated in direct messages. Sometimes, personal or financial information is shared during these conversations, which could remain in the messages folder long after the interaction. If there is a breach allowing cyber criminals to gain unauthorized access to the account, sensitive data may be leaked or used to organize an attack. To avoid this risk, make it a useful habit to delete irrelevant messages when a dialogue is finished, and the information it contains is no longer relevant. The same applies to posts– it is worth carefully reviewing what is saved in the drafts folder from time to time.

2/ Review old posts to minimize reputational risks
The power of reputation is growing: every word, action, and decision can either help or harm a company's image. Everything published online is of great importance in terms of cyber security as well: when sensitive information (re)appears in public, it almost always ends up hurting a company's reputation, and it could even incur financial losses. To be on the safe side, spend some time reviewing already published posts, as they might contain information that doesn't fit into the current reality- that might be anything from inappropriate jokes, to controversial advertising campaigns. What was normal yesterday can cause a negative public reaction today. A review of publications made over the past few years largely reduces related reputational risks.

3/ Be careful posting your success stories
When we sign a lucrative contract or conclude a deal, we often want to post it on social media to tell as many people as possible about our success. But we really need to be aware of unwanted cybercriminals' attention. If a potential attacker knows who your suppliers or contractors are, they could try to conduct an attack impersonating them or breaching their accounts and acting on their behalf. Moreover, the clearer you reflect your company's structure and working methods on social media, the easier it is for perpetrators to organize an attack. For example, if it is possible to trace who is responsible for finance- an attacker can pretend to be this person's supervisor, and then try to lure them into urgently transferring a large sum of money to a fake account to "close a deal," or "purchase necessary equipment." Exercising various social engineering techniques, a perpetrator can convincingly impersonate another person, and a victim would hardly notice the fraud.

4/ Warn newcomers about risks associated with "new job" posts on social media
After getting a new job, newcomers are usually keen to share the news on their social platforms, but they often do not yet understand how cybersecurity processes are built in this company: for example, how identification works, or with whom they can share sensitive information. Therefore, a newcomer is more vulnerable to cyberattacks. Imagine: a perpetrator tracks this person in social media, and collects information about them. Then the criminal writes the new employee a malicious letter on behalf of the company's information technology administrator asking to share the password to set up a technical account. It is highly likely that a newcomer will share the password, because they do not know that the administrators would never write such a letter. Moreover, new employees are usually shy, and they might hesitate to ask their colleagues if the letter is authentic. A tiny little post on social media might thus turn the employee into an entry point for cybercriminals. To mitigate such risks, offer newcomers a course on information security as soon as they join the company, and tell them to be extremely careful when posting about their new jobs as well.

5/ Control account access (and don't forget to change the password when an employee leaves)
Logins, passwords, and access to the email address are used to create a social media account are just as valuable as other internal corporate documents. If an employee who has access to accounts and authentication data leaves the company, it is useful to apply the same rules as when blocking their access to the corporate network. To begin with, change the password for the e-mail account linked to the corporate social network; then unlink the ex-employee's mobile phone number, and check other authentication methods– for example, a spare mailbox.

6/ Do not ignore two-factor authentication
Any account on a social network, not to mention a corporate one, must be securely protected. Two-factor authentication is an absolutely necessary setting for any type of account. In addition, the email address linked to the account should be as protected as the social media account itself. Often the attack begins with an initial access to e-mail. After breaching an account, an attacker can configure filters in the mailbox settings to delete all support emails from the social network. Therefore, a user will not be able to restore access to their account, because all emails will be deleted automatically. Not to mention that, in a stressful situation, we won't be checking which filters are currently configured in our mailbox. It is also best to register a social media account using a corporate e-mail address. To begin with, it is better protected (assuming the company cares about cyber security). Furthermore, in-house security specialists can block access to this mailbox along with all access to the corporate network.

7/ Provide your employees with anti-phishing training
To mitigate cyber risks in social media networks, it is not enough to protect your company's account technically. It is equally important to conduct special training for employees on information security, various types of phishing, and other threats. According to user statistics on the Kaspersky Gamified Assessment Tool that is designed to educate workers and to assist managers in measuring their cyber skills, just 11% of nearly 4000 employees demonstrated a high level of cybersecurity awareness in 2022, while 28% could not prove sufficient cybersecurity proficiency. Attackers use sophisticated methods of social engineering. Even the most advanced representatives of Gen Z can succumb to them. The human factor cannot be reduced to zero, but it can be minimized as much as possible with the help of dedicated training.

Related: Startup Spotlight: UAE-Headquartered SpiderSilk Wants To Simplify Cybersecurity In An Increasingly Digital World

Anna Larkina

Web content analysis expert at Kaspersky

Anna Larkina is a web content analysis expert at Kaspersky

Marketing

How to Leverage AI and Automation for Greater SEO Success

Discover how AI and SEO automation can streamline tasks without sacrificing quality.

Growing a Business

5 Entrepreneurial Mindsets That Drive Success

Here are the mindsets shared by the most successful entrepreneurs.

Operations & Logistics

Kylie Jenner's Removal from Forbes' Billionaires List Underscores the Basic Rules of PR

In the 'influence economy', be careful of the attention you seek.

Marketing

Five Things A Marketing Manager Needs To Operate To The Best Of Their Capabilities

As a marketing manager, achieving success in your role requires a combination of both tangible resources and intangible qualities.

Thought Leaders

10 TV Shows Every Entrepreneur Should Watch on Netflix

Have some free time on your hands? Get into one of these series.