Friday, July 18, 2014

Social Media Security

As well as individuals, companies large and small can be the victims of lax social media security. Accounts have been hacked, changed and used to spread political and scatological messages. Brands have been besmirched, and customers and prospects lost.While large international corporations and other major players may be able to recover from these kinds of attacks easily enough, for the small business they can (and have) proved fatal.

So how can you counter these threats?

Getting out of social media is not a solution. More and more people are using this kind of media to follow companies and brands, to talk about them, and to decide whether to buy their products or services. The role of social media in marketing is expanding continuously and is set to stay. In fact it looks set to eventually overtake more traditional sales tools.

The reality of the threats is that most of the breaches of security that have happened so far were due to the business owner or an employee falling for simple scams… by opening suspicious e-mails or clicking through to rogue websites without a moment’s hesitation. Here are a few simple things you can do to protect yourself and your business.

Education and training
You or your staff may lack the caution needed to use networks securely. The only solution in these circumstances is education and training. Structured social media educational programs that deliver training on the use of special tools and how you can do so securely are available. These come in a variety of formats, from brief how-to manuals to webinars. You can find programs that fit for your business and financial resources through Google. Malicious links are a common way in which accounts are compromised. Caution is best, especially if links lead to pages that ask for usernames and passwords.

Thus a fundamental part of these educational programs is training in how to recognize a suspicious messages, e-mails or links that could act as a gateway into your systems for a hacker. In addition to improving basic security, these programs can also help improve the overall performance of social media campaigns. Indeed, many of them deliver training in the more advanced aspects of social media such as attracting new clients.

Protecting passwords

If you and a member of your staff are sharing social media activities, you are likely to be sharing accounts and passwords. The more accounts you have, the more the passwords that will be shared. How can you keep these passwords secure? The answer is… with great difficulty. Here’s what you need to do: First, you should create strong (complex) passwords, rather than relying on simple, very common passwords such as 12345etc or password. Password generating tools are available.

Secondly, you must make sure that passwords are never stored on shared computers, on mobile phones or in e-mails, nor on post-it notes or other scraps of paper. Complex passwords can be hard to remember, especially where several are in use. You can reduce the number of passwords your staff uses by ensuring that they sign into your firm’s accounts using the same username and password as they use for their company e-mail account.

This has the additional advantage that, should an employee leave, their access to all company media can be disabled in an instant. A disgruntled employee can wreak havoc through your social media accounts if he or she still has access.

Centralizing control over social media

Most people and businesses, even the very smallest firms, will have multiple accounts on many different networks, eg: LinkedIn, Twitter, Facebook and so on. Maintaining control over several accounts can be difficult and time-consuming, especially if you company includes several people who are involved in creating tweets and posting updates. The first think you need to do is to undertake an audit of all your accounts, noting who manages them and who has access to them. Then you can close-down any accounts you don’t need and remove permissions for the remaining account from any employees who don’t need them.

Once that is done, you can consolidate these accounts within a social media management system. An SMMS will allow you:
  • Write messages and publish them to several accounts on several social networks from a single interface or dashboard
  • Monitor all social activities from one place (thus simplifying a time-consuming task).
Several well-known SMMS are available. Most operate on a freemium basis, ie: basic services are free to users but additional services are delivered on a paid basis. A good SMMS will have built-in malware tools to notify users when a suspect link is clicked. A secure system will also notify you if suspicious activity is taking place on your accounts, giving you a chance to shut-down a possible security threat.

Paid social media, such as Facebook’s Promoted Posts, has made the need to bring all social media under central control using an SMMS all the more urgent. Imagine a situation in which you invest tens of thousands of Euro or dollars into Promoted Tweets on Twitter and someone who hacked your account ruins the whole campaign with an offensive tweet.

The malware tools built into an SMMS should be able to prevent scenarios like this happening. In addition, such an SMMS should also be able to monitor the outcomes of paid social media without requiring the additional passwords usually associated with paid media platforms.

Message approval

A mistweet or other mistake on social media can happen easily. The only way to avoid these kinds of errors, which can seriously damage your reputation, is to set up an approval process that must be followed before a social message can be posted.

Of course, a formal approval process is only applicable if more than one person is undertaking social media activities. In these circumstances the process will probably be vital in order to ensure that the standards you expect in your social messages are achieved.

The simplest approval process is just to allow another person to review a tweet, message or update before it is posted. Good social media management systems should include an approval process for all social media messages.
As well as allowing the content of posts to be checked, an approval process means that typos and spelling errors can be corrected and links checked. The process also gives you and your employees a chance to learn from each other as suggestions and corrections are made.

An approval process will dramatically reduce the likelihood of a major social media crisis. However, it will not guarantee that nothing goes wrong.

Disaster recovery

Mistakes happen. No matter how many security measures you undertake, there is always a chance that something will go wrong and an inappropriate message will be sent, either because something was missed by accident during the approval process or a hacker gained access.

So, what can you do if the worst happens?

The only answer is the boy scouts’ motto: be prepared.

‘Being prepared’ means that you and your employees must have a specific plan on how to respond quickly and effectively when a crisis erupts. As crises tend to be unpredictable, this plan must be flexible. You should test and evaluate your plan to ensure that it will actually work in emergency. You also need to practice the plan so your and your people know instinctively what to do.

Social media happens in real-time so you need to respond in real-time. Social media, in fact, can help you respond appropriately. This is best doing using a tried and tested social media management system. A good SMMS will enable you to monitor how your customers, prospects and the public at large are reacting to the issue so that you can respond with appropriate messages.

Social media allows you to reach a massive number of people quickly so you can tell them about the problem and how you are working to resolve it. This can increase your credibility with customers and prospects and the public at large… which is what social media for business is all about.

Source: http://www.sitepronews.com/2014/07/18/social-media-security/

No comments:

Post a Comment