Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.

7 Steps to a More Secure Social Media Policy

Social media accounts must be viewed as part of the IT and security infrastructure. Follow these tips for developing a workable social media security program at your company.

Steve Zurier, Contributing Writer, Dark Reading

August 16, 2021

8 Slides

Hacked social media accounts can cause more damage than just harming a company's reputation. Exposed credit card information, ongoing phishing schemes, and ransomware attacks result in financial damage. It takes years to develop a solid brand, and all that work can be undone in less than 24 hours if a corporate social media account falls into the wrong hands.

Yet based on Twitter’s recent study that only 2.3% of all active accounts have enabled at least one method of two-factor authentication (2FA) during the second half of last year, it’s clear that security teams need to take a closer look at securing their social media accounts.

“Social media should not be left out of the network security discussion,” says Heather Paunet, senior vice president at Untangle. “Hackers can access social media accounts through unattended accounts, third-party apps, fake coupons, and suspicious URLs concealed by using a shortener. Just recalling the infamous 2020 Twitter hack that affected accounts belonging to Apple, President Joe Biden, and Elon Musk shows the importance of having a security policy for social media.”

Here's a seven-step checklist companies can use to focus on the security of their social media accounts. Jim Zuffoletti, co-founder and CEO of SafeGuard Cyber, points out that the widespread use of corporate and personal social media accounts at businesses means companies have to start thinking of these accounts as part of their IT and security infrastructure.

About the Author(s)

Steve Zurier

Contributing Writer, Dark Reading

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights