Social media Humans are attractive because they are social creatures in nature. We like to connect, share and discuss. However, it is clear that these impulses can go the wrong way in remote, detached online settings where social media takes place.
A key issue with the use of social media, often not understood or recognized, is the cybersecurity risk it poses. This risk does more than just affect the individual. As an employer, the behavior of employees on social media can pose significant risks to the organization.
A malicious attacker needs to understand how to collect information about employees from social media platforms. Digital artifacts A collection of personally identifiable information across platforms, relationships, and platforms.
See also below. Digital Transformation Guide: Definitions, Types, Strategies 1) Information for everyone is valuable
Creating a digital profile allows anyone to see your information. This allows malicious attackers to collect it. People tend to use similar images, usernames, and email addresses repeatedly on different platforms. We also use these email addresses for other, more sensitive online activities, such as banks. Every time we publish information online, the risk increases.
The number of people who believe that online information is not the target of malicious individuals is amazing. I don’t think anyone would be interested in it because they are neither rich nor famous. But the money in your bank account is interesting to criminals. Your computer is at risk and can be used as a resource to target other people who are interested in criminals. In other words, everyone has some interest in criminals. 2) Oversharing creates the risk of curated phishing
Everyone knows someone in the social media circle who overestimates. The virtual social butterfly has too many “friends” to provide running commentary on what they are doing, where they are going, and all their personal problems.
What most people don’t know is that this kind of over-sharing can put people at risk. Spearfishing And similar attacks. Why? The more information an attacker can connect about you, the more likely it is that the attacker will be able to compose a realistic email or text that involves you.
For employers who value future employees, habitual over-co-owners are at high risk of phishing attempts, which put the company at risk. And that leads to the next point.
See also below. Phishing campaigns used Morse code to avoid detection 3) Malicious people can aggregate data across forums
Any information you put in your social media account is potential Datapoint , But it’s not just the content you share. Villains can collect information from the memes and quizzes you fill out. Responding to a meme like “Your secret agent’s name is your mother’s maiden name plus your favorite color” is a seemingly harmless diversion.
What else do those answers remind you of? What about the security questions that the site asks to recover passwords? First pet, first car, favorite color, etc. Some of these quizzes have been shown to have been created by malicious attackers to access […]