Skip to content

Menu

United States Cybersecurity Magazine
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • CMMC – ArCybr
    • Security Software & Services – Wind River
    • Cyber Training and Workforce Development – Chiron Technology Service, Inc.
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
Welcome! | Subscribe | Sign In
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • CMMC – ArCybr
    • Security Software & Services – Wind River
    • Cyber Training and Workforce Development – Chiron Technology Service, Inc.
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
  • Subscribe
  • Sign In

Strengthen Your Social Media Account Security

Lauren Abshire
Director of Content Strategy   United States Cybersecurity Magazine

Brand Protection is Essential for Cybersecurity
How to Protect Yourself and Your Data from Privacy Invasion Both On and Offline

Whether you have a business social media account or a personal social media account, your information is valuable. It is of paramount importance to strengthen your social media account security. It does not matter if you have 5,000 followers, 500 connections, or 5 followers. Your information ending up in the wrong hands is a powerful tool that can be used against your company or used against you personally. Social media continues to rise in popularity for businesses and individuals alike; therefore, strengthening social media account security is more important than ever.

Last year alone, famed names were victims of Twitter account hacks. Elon Musk, Bill Gates, and Jeff Bezos were amongst the targeted in a Bitcoin scam. This goes to show that no one is exempt or off-limits when it comes to being exploited by cybercriminals. We must strengthen social media account security and do our best to protect our company’s information and/or our information. Hackers will hack, exploit and use the stolen information against you. You must have good cyber hygiene and mitigate risk. 

What Can We Do?

If a business uses social media, a social media policy should be in order. This policy should include (but not be limited to):

  1. Classes/educational courses teaching employees how to identify and avoid scams and cyberthreats. 
  2. Chain of Command: If a social media account is compromised or other security concerns arise, the policy should indicate: who should be notified, who should respond, and how should they respond.
  3. Keeping software, antivirus and firewalls updated. 
  4. Rules/Regulations of an employee’s use of company social media, and the company’s rules of confidentiality. Furthermore, it should be noted what activity should be included and what activity should be prohibited. 
  5. Limiting the number of employees who have access to company social media profiles. This reduces the number of chances of an attack on a per-employee basis. If ten employees operate a social media account, that is ten chances of becoming a victim of a cyber-attack. If three employees operate a social media account, that is seven fewer chances. Minimize the risk.
  6. TRAINING! Train your employees on social media security and more importantly, on your social media policy.

Password Security

Password security is constantly emphasized and for good reason. Too often people fall victim to comfortability and repetitiveness. Your dog’s name and your grandmother’s birthday are not strong passwords and certainly not for all of the accounts you own. Complex passwords containing numbers, symbols, and varying in upper and lower cases should be used. Moreover, you should routinely change your passwords. No one social media account should have the same password. You should not save your login information to your browser either. If a system gets compromised and you have all of those passwords and usernames saved, a cybercriminal can access your accounts within seconds. You should also enable 2FA for your accounts.  It is a necessity to strengthen social media account security. Routine password changing, and security must be mandatory. 

Blocking/Reporting

Social media platforms offer blocking as an option for good reason. An important practice to strengthen social media account security is to verify friend requests. Facebook and Instagram are both notorious for fake profiles. Fake profiles/accounts can belong to literally anyone. This includes hackers and cybercriminals. Do not blindly accept requests. First, verify and if sketchy or suspicious, utilize the block option. This also will apply to our next section: Monitoring Inboxes. If you receive a spam link or phishing link, do not skip the message over. BLOCK the sender and then REPORT them on the respectable platform. This helps stop the cybercriminal at their effort and can save someone else from future advances the cybercriminal will attempt. 

Monitoring Inboxes

To strengthen your social media account security, you must practice vigilance. Both on and off the platforms. When you are logged in, as mentioned above, monitor your direct messages. Phishing scams do not just happen via email. Cybercriminals will go above and beyond to disguise links to appear as they are from a friend, not a foe. By monitoring your DM’s and inspecting (not clicking!) links and whom they are from, you can be proactive as opposed to reactive. Do not blindly click a link. Check the profile and the context of the message. If it is indeed a foe, BLOCK that account. 

Monitoring inboxes also applies to your email inbox. Monitor the email(s) attached to your social media accounts. Social media platforms usually alert you of a newly detected log-in. If you receive this email in error, immediately change your password. 

This can also be taken a step further. If you receive a suspicious email/link from what appears to be someone you know, you should make them aware. They can then immediately change their password and fix what is needed on their end. You would want someone to alert you, so you should alert someone else of suspicious account activity.

Mind What You Disclose/Share

Less is more. This can especially apply to social media account security. Utilize the privacy options that are offered on these platforms. Hiding identifying factors for both business and personal accounts are key, or even making the entire profile private. For instance, a security question is the make/model of your first car. Low and behold, back in 2008 you posted a picture of your first car. That can then be used for access to your account. You have unknowingly presented a vulnerability that can be exploited. Date of birth, schools you have attended, interests, and mobile numbers should all be kept private. Social media platforms also offer security questions a user must answer before a successful request can be sent to your account. 

Stay Updated

Keep your browser, antivirus, and firewalls up to date. Do not skip the update or ask to be reminded later. Update as soon as it is available. Updates are released for various reasons, a notable reason is security patches. To strengthen your social media account security, it is imperative to keep your systems (all of them) up to date.

Log OFF

Logging off is such a simple task. Log off when you sign off or clock out. Do not leave any program or application running or logged in if you are not presently using it. It is a good habit to get into and can minimize risk.

Conclusion

Your account is your responsibility. If you strengthen your social media account security and continue to practice good cybersecurity hygiene, you can enjoy the benefits of social media knowing you are doing everything possible to mitigate risks. If you are a business owner or an employee, create a social media policy, educate, train, and meet regularly. Knowledge is power. Do not let a cybercriminal take your power by leaving the knowledge they need vulnerable. Strengthen social media account security.


Lauren Abshire

Tags: account security, Best cybersecurity practice, Cybersecurity, Cybersecurity Practices, Social Media, social media account security

Related posts:

  1. Social Media Platforms are Vulnerable to Hackers
  2. Why People are Ditching Social Media
  3. How to Set up Two-Step Verification on Your Social Media Accounts
  4. Social Media Data Exploitation
  5. Social Phishing: How Hackers Trick You With Basic Sales Techniques
Claim your WHITE PAPER
National Cybersecurity Strategy
DOWNLOAD HERE

Events Calendar

« March 2023 » loading...
Sun Mon Tue Wed Thu Fri Sat
26
27
28
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1

Browse By Topic

  • Engineering and Vulnerability Management
  • Training and Workforce Development
  • Industry and Business Best Practices
  • Data Storage and Access
  • Legal

Recent Posts

  • Aircraft Networks Face New Cybersecurity Challenges in 2023
  • AI May Not Steal Your Job, But It Could Eliminate It with A Devastating Cyber-Attack
  • 4 Tips for Making Cybersecurity Awareness Programs More Human-Centric
  • Understanding and Accepting CSF 2.0: Changes Coming to the Cybersecurity Framework
  • Securing Data Throughout the Digital Transformation Process

SUBSCRIBE TO OUR CYBERSECURITY COMMUNITY

Subscribe today for free and gain full access to the
United States Cybersecurity Magazine and its archives. In addition, via our newsletter, you will hear from cybersecurity subject matter experts, and will be notified of the release of the next issue of the magazine!

SUBSCRIBE NOW

US CyberSecurity Magazine

Tweets by USCyberMag
Follow @USCyberMag

  • Subscribe
  • Log In
  • Home
  • Magazine
  • Cybersecurity Channels
    • ArCybr
    • Security Software & Services – Wind River
    • BOC INTEL
  • Contact Us
  • About
  • Cyber Daily
  • Calendar
  • Resources
  • Advertise With Us
  • Write for Us
  • Privacy Policy
Facebook-f Twitter Linkedin-in Instagram

© 2023 American Publishing, LLC™ | 17 Hoff Court, Suite B • Baltimore, MD 21221 | Phone: 443-231-7438
  • Subscribe
  • Log In
  • Home
  • Magazine
  • Cybersecurity Channels
    • ArCybr
    • Security Software & Services – Wind River
    • BOC INTEL
  • Contact Us
  • About
  • Cyber Daily
  • Calendar
  • Resources
  • Advertise With Us
  • Write for Us
  • Privacy Policy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo