When it comes to social media safety, users are often unaware of the ramifications of their online posts. Many don’t realize they may be putting their personal data — and, by extension, their company’s data — at risk. While you may not be dealing directly with your customers, you’re only one step away from your clients on some social channels, and many organizations have spent a lot of time, money and effort to create brand loyalty through those channels.

Social media should be fun. We shouldn’t have to be so careful about what we do and say online, but cybercriminals aren’t going anywhere, and social media presents a natural gateway for bad actors to get what they want.

“I Thought That Was Safe to Post”

In many cases, there are common social media mistakes that employees don’t even realize they’re making. For instance, what if you’re taking a team selfie in the boardroom at the end of a strategic meeting and there’s information from a projector up on the whiteboard? Patrick McBride, chief marketing officer for ZeroFox, has more than two decades of cybersecurity experience and has heard many nightmarish stories about social media posts gone awry.

“With these posts, you could be inadvertently giving away confidential plans, financial information or other intellectual property,” he said. “Those kinds of things happen all the time.” Any information traditionally considered personally identifiable information (PII) is fodder for bad guys to monetize, McBride warned.

“Things like your Social Security number, your age, where you grew up, your mother’s maiden name and date of birth should be kept private,” he noted. “A lot of people put birthdates in the social platforms because they like to get the ‘Happy Birthday’ message.”

Armed with this information, hackers can increase their odds of engineering a successful password reset. Plus, PII only gives malicious actors more ammunition to launch social engineering attacks.

What Is Safe to Post?

According to McBride, anything outside of PII should be relatively safe. Generally speaking, the less you share about yourself or your company, the better. However, it may not be as much about the content as who can see it. That’s where privacy settings on social media can make a meaningful difference.

“Some of the social platforms have gotten better at pulling things together into a single place,” McBride said. “The platforms are making it easier for you to lock down content, but most preferences are open by default.” McBride also suggested ensuring that privacy settings are as restrictive as possible and auditing them at least annually.

Secure Social Media Tips and Tricks

Social media safety means showing without showing too much, according to independent security researcher Rod Soto. “Most of all, you want to protect as much of your sensitive, private information as you can.”

Soto offered seven recommendations for anyone who wants to participate in social media and mitigate the risks of the internet at the same time. Some of these may appear too restrictive, but I have to agree with him here — I’ve seen employees’ social media posts cause irreparable harm to either the individual or the company far too many times.

The first tip cannot be stressed enough:

  1. Think before you post. A post stays on the internet forever, even if you delete it. Not only will it remain public, but those who see it in the future may not have the context needed to understand it.
  2. Do not use your actual name. Use a nickname or some other moniker that does not give away your identity.
  3. Do not announce or reveal your location when you are away from home. Be mindful of backgrounds, people and landmarks that could reveal too much information — unless, of course, you mean to show them.
  4. Whenever possible, customize your privacy settings based on who you want to see your posts. In many cases, social media helps communicate and share special moments with friends, family and acquaintances. Target with your posts. Consider having one account for communicating only with people you trust and another account for acquaintances and the general public.
  5. Protect your accounts by using multifactor authentication (MFA), not repeating passwords and not recycling your security questions and answers.
  6. Don’t repost, retweet or share without scrutinizing or verifying. Many memes and pieces of viral content are inaccurate or exaggerated. Links, files, games or applications sent to you by anyone (including your family) could compromise your systems. Remember, the sender may already be compromised.
  7. Freedom of expression does have consequences. Employers, organizations, people or even friends may not like what you post.

Enterprise Best Practices for Social Media Safety

Many of the best practices and policies that help organizations increase social media security awareness in their workforce start at the top and work their way up and down the corporate hierarchy.

“It is very important for organizations to clearly state and promote security awareness in their employees, and this includes the use of social media in corporate related events,” noted Soto. “There are many times where employees themselves reveal sensitive corporate information by inadvertently revealing it on their own personal social media. This usually gives criminals enough information to target employees and executives.”

Soto advises that corporate social media accounts be considered assets in information security policies. As such, a safe social media policy must be implemented and followed. In addition, corporate accounts must also be monitored for threats.

McBride echoed this sentiment and added that best practices for social media safety should ideally be incorporated into standard security training administered by an organization’s IT or security team: “Focusing on how to identify social engineering tactics, impersonating accounts, scams and fraudulent posts, as well as how to strengthen account security settings to prevent account hacking, will help employees stay safe on social and protect both personal and corporate social accounts.”

Keeping employees off social media is like trying to keep a bee from honey: If you prohibit social completely, you will likely be stung. A middle ground must be established, and the best solution is to include everyone in the process instead of restricting their online behavior. As you develop your policies and practices around social media, remember that people respond well when they feel empowered and involved.

More from Data Protection

Heads Up CEO! Cyber Risk Influences Company Credit Ratings

4 min read - More than ever, cybersecurity strategy is a core part of business strategy. For example, a company’s cyber risk can directly impact its credit rating. Credit rating agencies continuously strive to gain a better understanding of the risks that companies face. Today, those agencies increasingly incorporate cybersecurity into their credit assessments. This allows agencies to evaluate a company’s capacity to repay borrowed funds by factoring in the risk of cyberattacks. Getting Hacked Impacts Credit Scoring As per the Wall Street Journal…

4 min read

IBM Security Guardium Ranked as a Leader in the Data Security Platforms Market

3 min read - KuppingerCole named IBM Security Guardium as an overall leader in their Leadership Compass on Data Security Platforms. IBM was ranked as a leader in all three major categories: Product, Innovation, and Market. With this in mind, let’s examine how KuppingerCole measures today’s solutions and why it’s important for you to have a data security platform that you trust. The Transformation of the Data Security Industry As digital transformation continues to expand, the impact it has had on enterprises is very apparent when…

3 min read

SaaS vs. On-Prem Data Security: Which is Right for You?

2 min read - As businesses increasingly rely on digital data storage and communication, the need for effective data security solutions has become apparent. These solutions can help prevent unauthorized access to sensitive data, detect and respond to security threats and ensure compliance with relevant regulations and standards. However, not all data security solutions are created equal. Are you choosing the right solution for your organization? That answer depends on various factors, such as your industry, size and specific security needs. SaaS vs. On-Premises…

2 min read

Understanding the Backdoor Debate in Cybersecurity

3 min read - The debate over whether backdoor encryption should be implemented to aid law enforcement has been contentious for years. On one side of the fence, the proponents of backdoors argue that they could provide valuable intelligence and help law enforcement investigate criminals or prevent terrorist attacks. On the other side, opponents contend they would weaken overall security and create opportunities for malicious actors to exploit. So which side of the argument is correct? As with most debates, the answer isn't so…

3 min read