Pay Invoice
Manage Your Account
(252) 329-1382
Call Our Staff
inquiries@dtinetworks.com
Email Our Staff
Manage Your Account
Call Our Staff
Email Our Staff
While data breaches can happen at any time and anywhere, the world of social media has become a prominent battleground in recent years.
Virtually every organization â businesses, educational institutions, and associations â has employees, students, and members who make use of social media sites such as Facebook and Instagram in their personal lives.
More often than not, businesses themselves have a considerable online presence and draw on social media networks like Facebook and LinkedIn, in particular, for marketing functions, sales, and client relations.
Organizations that lack a significant online presence but have employees that use social networks have an obligation to ensure that their users and staff membersâ identities are safeguarded online.
Many organizations supply their employees with basic information on safe internet practices, with the hope that they will implement these practices at home as well as at work. This offers an ideal opportunity for corporate security teams to lay the groundwork for what actions can be taken in case of a large-scale social network cyberattack.
The goal is to lessen the impact of data breaches that are otherwise out of your control or to limit their adverse effects.
In this article, weâll explore five ways to help minimize the risk of data breaches on social media networks and other applications.
Weâre going to presume that you and your team are already aware of how to come up with a strong password, using a succession of upper and lower case letters, numbers, and symbols â and not including telltale tidbits like the name of your pet.
Great password? Check! But wait, thereâs more!
Whenever a major social media breach does occur, it may take some time between when the breach first surfaces, when an organization detects it, and when youâre alerted to the fact that your information has been compromised.
If youâre changing your password consistently, you narrow the window of damage opportunity between those monumental events. Even if youâve fashioned what you believe to be the perfect password, donât recycle it across multiple accounts.Â
Based on surveys conducted by Terranova Security, nearly 80% of users are still utilizing the same passwords on numerous systems. That number increases even more for the younger generation â either they arenât aware of the risk or itâs possible that they donât want to have to recall a slew of different passwords.
Regardless, if youâre using the same account-password combination on several channels and one channel is breached, cyberattackers are more likely to be able to infiltrate your other accounts.
If you donât want to â or canât â remember all of those complicated passwords youâve created, consider making use of a secure password management tool.
From a functionality standpoint, a password manager is simply that â a program you log in to with one password that stores all of your other passwords. Think of it, more or less, as a digital wallet.
When considering which password management tool to use, try to find one thatâs well-encrypted and allows for management between a number of platforms and devices.
A few of the more prominent password management tools on the market include 1Password, KeePass, and Dashlane.
Suppose someone does come into possession of your password â what then? In all likelihood, theyâll appropriate your username in order to gain access to your social network accounts â at the very least â unless youâve initiated two-factor authentication.
Two-factor authentication is a security method that provides a computer user access only after they have supplied multiple forms of evidence verifying that they are legitimately the user they claim to be.Â
Letâs say youâre connecting from a computer or location that you havenât used before â if you have two-factor authentication set up, the application will send a PIN to your phone which you must then reproduce. If someone has pilfered your password and is trying to connect to one of your accounts, youâll receive a notification of an unauthorized access attempt.
If it obviously isnât you whoâs attempting to log in from a new source or location, youâll know that a hacker has moved past the first stage â that is, accessing your password. If that is the case, deny access, change your password right away, and be grateful you set up two-factor authentication.
Through the use of social engineering or malware, cybercriminals will masquerade as an individual involved in these money transfers to trick the victim into sending money to a bank account owned by the cybercriminal.
Once the fraud is exposed, itâs often too late to recoup the money. Scammers are quick to relocate the money to other accounts and withdraw the cash or use it to buy cryptocurrencies.
However, the scam is not always associated with an unauthorized transfer of funds. One BEC variation involves compromising legitimate business email accounts and requesting personally identifiable information (PII), wage and tax settlement (W-2) forms, or even cryptocurrency wallets from recipients.
More and more apps are connecting back and forth and enabling users to access multiple channels with a single sign-on (SSO).
Youâve likely encountered apps where you can create an account or sign in automatically simply by using your Facebook credentials. Convenient? Smart? Not exactly.
While it might seem like a timesaving method, should your Facebook credentials become exposed, hackers could take advantage of them to access other accounts under your name. Whenever possible, refrain from taking advantage of these opportunities.
The supposed convenience of social media-based SSO is appealing, but bear in mind that if you are compromised on one platform, you could be compromised on another. The more interconnected systems you have, the more you are at risk.
âDonât accept any new friend requests from me. My account has been hacked.â
âDonât click on the link in the message it looks like I sent you on Facebook. It isnât me.â
You see these kinds of posts in your newsfeed all the time. But those are just the ones weâre aware of for certain. You might have friends or online acquaintances who donât yet realize theyâve been compromised, and hackers may already be using their accounts to make phishing attempts.
Other times, hackers are merely paying attention to and gathering information that people post voluntarily on social media.
Whatâs the solution? Itâs simple.
Donât post confidential information on social media! Donât make mention of your dogâs name on social media then use âWhat is your petâs name?â as the security question on your online banking account.
And if your account is breached, let your friends knowâ¦immediately! Particularly on social media.
Itâs all about creating a culture of information security. By presenting this information to users, organizations can demonstrate that theyâre not just preoccupied with their own pursuits, but theyâre concerned about the well-being of their employees as well.
Â
DataGroup Technologies, Inc. (DTI) offers a wide variety of cybersecurity services to help protect your business from cyberthreats, including security risk assessments, web and DNS filtering, next-generation firewalls, network security monitoring, operating systems and application security patches, antivirus software, and security awareness training. Give us a call today at 252.329.1382 to learn more about how we can help you #SimplifyIT!
Subscribe now to keep reading and get access to the full archive.