Social Media Security – Sweeny Legal

SweenyLegal-Logo copy


Social [Media] Security

October 10, 2013
By Dr. Scott A. Wells

Facebook now has 1.15 billion users who share 4.75 billion content items such as comments, photos and status updates and send more than 10 billion messages each day. When added to other social media platforms such as Twitter, LinkedIn and Google+, the number of users is staggering. With so many people disclosing personal details and often unknowingly leaking confidential organizational information, social media has become the main platform for hackers to execute social media engineering attacks, phishing attacks and identity theft; social networking is now the main vehicle for spreading malware.

Here’s how a social media user can compromise an organization’s information security: Let’s say a health care professional accesses Twitter via a mobile device and clicks on a malicious link in a tweet, which installs malware on his smartphone. The malware opens up his phone to external access, enabling a hacker to access a secured hospital website via the cached information on the smartphone and tap into confidential patient health care information.
These dangers shouldn’t stop social e-interaction. Here are some social security tips:

  • Keep in mind that the information you share on social media channels is near permanent.
  • Be mindful of indicating your location. Some social networks do not automatically remove geotags from the images you take with smartphones, but most smartphones allow users to turn off geotagging for some or all applications. 
  • Don’t treat security as an afterthought. Review and modify the default security settings of your profile to fit your unique situation. A study the Gartner Group conducted showed that roughly 60 percent of Facebook users have not changed the default security settings. Many of these users end up displaying their information publicly.
  • Do not share vital information such as birth date, hometown, high school and current address, which can be used in an identity theft attack.
  • Check that friend requests are from real people and actual friends. More than 75 percent of all Facebook users refer to the number of friends they have in common as the most compelling reason to accept an incoming friendship requests. But, if that friend hasn’t already checked for authenticity, you may be dealing with a hacker.
  • Finally, as tempting as it is, don’t access social media sites from public Wi-Fi spots. Many people understand the dangers of accessing their bank account information from these locations but fail to apply the same logic to social media. A hacker who’s accessing the same Wi-Fi network can use a tool to execute a session hijack, gather enough information to mimic your mobile device then access your bank account. From there, the hacker can conduct unauthorized purchases.
  • Organizations also must take care that their employees don’t inadvertently allow access to corporate information when using social networks.
  • User training is the most effective way to protect information because of the strong social engineering component present in many social media breaches.
  • Implement safeguards such as two-factor authentication, which adds another layer of security to authenticate a login request, forcing an SSL connection. Keep in mind that few automated mechanisms can detect many of the common social media hacks such as an evil twin attack where a hacker can impersonate users without their knowledge.
  • Develop a social media policy customized to you unique business model and strategy. Outline guidelines for responsible social media conduct as part of official and unofficial social media engagement and protect the organization and employees from violating rules, regulations and laws through social networking channels.

Social media has captured an enormous audience and will continue to play a large role in our lives, which makes it an increasingly attractive target for cyber criminals. With the current proliferation rate, it will continue to directly influence the future of the Web. Sites and apps are relying more and more on single sign-on through social media, which can be convenient but may increase the risk of private information falling into the wrong hands. It is crucial that information security professionals as well as users familiarize themselves with the risks involved in social networking and are prepared to defend their personal and their organizations’ confidential information to prevent potentially devastating security breaches.

Brandsworth Licensing logo
How can we work together? Please contact me if you have any needs in relation to Intellectual Property or Commercial Corporate law needs.

Sweeny Legal announces its Virtual Lawyer Service Available in WollongongTomorrow’s Lawyer Today.

This Service saves you time, it is convenient, and saves on costs. Alternatively I can come and visit your Office and review your needs.

Please contact me if you need commercial assistance or  if you need commercial agreements, either reviewed, gap analysis or drafting, for example, Commercial and IP Agreements, Business Relationship Agreements or License Agreements.

Please contact Sweeny Legal  or Brandsworth Licensing should you require any assistance with any Intellectual Property (IP) rights, Commercial Agreements of any type, or IP Business Strategies.


Filed under Cyberspace law, Due diligence, Risk Management

6 responses to “Social Media Security – Sweeny Legal

  1. With thanks for sharing your excellent website.


  2. With thanks for sharing your well put together web site.


  3. Thanks for the marvelous posting! I seriously enjoyed reading it,
    you can be a great author. I will make certain to bookmark your blog and will eventually
    come back in the foreseeable future. I want to encourage you to continue your great
    work, have a nice morning!


  4. I benefit from reading through your site. Thank you so


  5. Simply want to say your article is as astonishing. The clarity in your
    post is simply cool and i could assume you’re an expert on this subject.
    Well with your permission let me to grab your feed to keep up to
    date with forthcoming post. Thanks a million and please continue the rewarding work.


  6. Je sսis clairement du même avis que toi


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s