Cybersecurity Threats: Social Media

Have you ever received a Facebook friend request from your mom even though she is already a friend of yours on Facebook? So, you call her up to make sure she didn’t forget her password again and just create a new Facebook page.

Then, right after that, “she” sends you a video link saying you’re in a YouTube video. You think, “Well dang! I didn’t think she even knew how to use Messenger.” As the confusion mounts, you realize, momma’s profile has been cloned in an effort to hack your account. Not today hackers!

In this day and age of social media, there are specific ways hackers can compromise your data.

 

SOCIAL MEDIA PROFILE CLONING

Cloning is when someone makes a social media account by using someone else’s identity.

You’ve all seen them, mom is already your friend on FB, but now you’re receiving another friend request from her. The new page has one photo, no posts, and a handful of mutual friends that fell for the fake profile.

This within itself is not hacking. It’s incredibly easy to copy a photo and create a Facebook page with basic information.

The idea behind cloning is to get you to think this is your friend or loved one so they can hack your information. Social engineering can come into play, asking mutual friends for money – saying you’ve been arrested or are in an emergency situation. Another way is by having the clone account send malware to friends.

 

BUSINESS THREATS

But what does this have to do with your business? Mom may not work with you, but take her lesson as a valuable warning. When “funny business” happens on Facebook, a multitude of things could occur –  compromising your business, clients, and other important data you have stored.

Imagine receiving a message on your company’s Facebook messenger from a friend saying “you’re in a YouTube video.” The link is readily available, you have the urge to click on it. It could be bad PR, right? So, you click it, and instantly the malware takes over your computer. Passwords and logins are automatically stolen from you and in the hands of hackers. Not good.

This could compromise payment methods or pertinent company information. This hacked info could turn into full-blown social engineering if you don’t pay attention.

The worst part is that almost everyone on your friends list will get bombarded by a similar message creating a domino effect. It’s terrible to infect your loyal followers, and you’ll see a lot unfollow you because of the inconvenience.

Facebook is not the only platform to worry about. In fact, Instagram, Twitter, and Snapchat have all fallen victim to hacks. One huge reason for this is because people don’t know better when it comes to security information. Social media is so easy to use that people often forget that information can be compromised.

Careless clicking is another culprit. Aren’t you curious about what your favorite coffee says about your personality? It’s quizzes and fun time wasters like this that allow hackers to access information. Simply clicking on these silly things opens your account to malware and in some cases ransomware.

Users have reported being locked out of their accounts, accounts being deleted, and some even being held for ransom until users paid the hacker.

 

BE SMART ON SOCIAL – ESPECIALLY FOR BUSINESS

If you are using these platforms for business, you must be extra leery about what you are clicking on. It’s a terrible day when the content on your social media disappears over an avoidable breach.

These things don’t have to happen to you as long as you are smart about your social media. Make sure whoever is running it is well trained in cybersecurity.

Also, ensure your passwords are strong and not easy to hack.

Then go check on mom and give her a fast and efficient cybersecurity breakdown.

This subject seems obvious, but the amount of people that get hacked each year as well as the amount of stolen data continues to grow. Hackers are also constantly looking for new ways to take information. Be vigilant and up to date on current trends.

Protect your business from these sly social media mongers.

Security Posters

Take charge of 2025

IT is no longer a back-office function—it’s a driver of growth and innovation. By tackling this checklist, you can ensure your business is ready to thrive in the face of challenges and opportunities alike.

Ready to transform your IT strategy? Schedule a free consultation with Techvera today.

Techvera icon

Written by Team Techvera

l

October 30, 2019

You May Also Like…

IT Checklist: What Small Businesses Need To Prioritize in 2025

IT Checklist: What Small Businesses Need To Prioritize in 2025

Now is the perfect time to revisit your IT structure, processes, and strategy to ensure your small business operates at its fullest potential. From defending against evolving cyber threats to supporting hybrid teams and boosting productivity, a robust IT strategy is essential to staying ahead in today’s competitive market.

Here’s a refreshed IT checklist to set your business up for success in the year ahead.

Skip to content