Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

3 reasons why criminals exploit social networks (and tips to avoid getting scammed)

William Pelgrin | June 7, 2013
The popularity and influence of social media continues to increase at lightning speed, and recent events bear evidence to the impact -- both positive and negative --this medium presents. As the tragedy of the Boston Marathon bombing unfolded, millions of people turned to social media for information, and government officials and law enforcement used it to keep the public informed and solicit their help.

3.) Whats the most popular post on social media this week? Malware!
Social media serves as a prime vector for malware distribution. The 2013 Symantec Internet Security Threat Report notes that 43 percent of attacks used on social networking websites were related to malware.

The same technologies that invite user participation also make the sites easier to infect with malware that can shut down an organization's networks or deploy keystroke loggers that can steal your credentials.

The shortened URLs used by social media sites are also key vectors for attack, as they can more easily disguise a fake site. When you click on a shortened link, you really cant be sure what site you are being taken to. According to Websense's 2013 Threat Report, 32 percent of malicious links in social media used shortened web links.

How Do We Protect Ourselves?
Security and privacy related to social media sites are fundamentally behavioral issues, not technology issues. Many of the tips below are ones that you have no doubt heard before, but they bear repeating -- especially since we often arent following them. It's not enough to just know what to do -- we have to actually do it. Here's what we need to be doing:

Create strong passwords and use separate ones for each account. Using the same password on all accounts increases the vulnerability of these accounts if one becomes compromised.

Think before you share. You should only post information you are comfortable disclosing to a complete stranger.

Organizations should have a policy in place regarding social media use for employees.The policy should clearly identify what information is acceptable for posting on the organizations official social media sites and who is authorized to post. Confidential information should not be shared. Provide employee training on the policy in addition to periodic awareness training about social media risks.

Ensure that any computer you use to connect to the Internet has proper security measures in place. This includes up-to-date anti-virus software as well as updated applications and operating systems. Set the configuration to "auto update" so patches can be applied automatically.

Be cautious about what you download. Some social networking sites provide the ability to add or install third party applications, such as games. The application may have full access to your account and the data you share. Malicious applications can use this access to interact with your friends on your behalf and to steal and misuse personal data. Only install applications that come from trusted, well-known sites. If you are no longer using the app, remove it. Also, note that installing some applications may modify your security and privacy settings.


Previous Page  1  2  3  Next Page 

Sign up for CIO Asia eNewsletters.