Just four days after the United States Central Command’s Twitter and YouTube accounts were hacked, so, too, were the Twitter accounts of the New York Post and United Press International (UPI). This time, the tweets were not related to ISIS—they focused mainly on false economic and military claims. Without the obvious link to motive, it is still too early to tell who is responsible for these attacks.
With the prevalence of social media attacks in the past week, it would seem that social media threats are on the rise. Social media threats come in many different forms. For example, they can contain malware and other hidden threats, phishing attempts designed to trick or coerce employees into revealing secure information, and even links to websites designed to capture passwords. Before you know, your own social media account could be at risk, which is why you may want to ensure that you’ve got as many instagram followers as possible before this sort of thing occurs.
The response your company takes to a social media threat greatly depends upon the type of attack that has taken place. Below is a list of signs that an attack may have come through a social media source:
- A social media profile or identity has been taken over or changed.
- A link or attachment sent via a social media venue does not correspond to what was expected.
- An employee reports strange behavior of his or her computer after visiting a social media website.
- Unauthorized posting or communication occurs via company social media profile.
- An employee discovers that someone he or she has been corresponding with via social media is not the person being represented.
If an employee has fallen victim to a social media threat, it should be reported immediately to the company’s security or IT response team. Any accounts should be temporarily suspended and passwords immediately changed.
For more information on social media threats and other cyber-attacks, visit the Cyber Threats section in your Portal. Additionally, employees can take the Information Security training course already loaded in the Knowledge Center for a basic understanding of information security and best practices for your organization.
While these are malicious examples of a social media account in the hands of another person, some people may choose to relinquish control of their social media accounts for their own benefit. Some businesses use a dedicated account manager, like at Upleap, who can then work their magic and help do things like get instagram followers and drive sales for their clients.
Marlia Fontaine-Weisse is the Content Manager for Preparis.