A chain, as the saying goes, is only as strong as its weakest link. Apply that logic to a business, and when it comes to social malware, you're only as secure as your most gullible employee.
By now, even the most gullible employees will probably not fall for email-based phishing schemes. But social media, thanks to its newness, is another story.
What can you do? Educate your employees about the risks of social media and establish policies for social media use, especially in regard to malware, which can infect PCs and compromise sensitive information.
Common Social Media Malware Scams
There are a few common scams that should be known to all employees. These include links and apps purporting to let you "See who viewed your profile" or "View your top profile stalker." Other come-ons are offers for free stuff for social games, fake Facebook features (like "See who poked me the most") and games not offered on Facebook.
And the most common trick is when these things come from someone you know. It can be hard not to accept that interesting Facebook or Twitter message at face value, but your friend's account may have been hacked. "An employee might get an update from a friend saying 'Check out this cool cat video,'" says Anton Chuvakin, principal of Security Warrior Consulting. But you should always "be cognizant of what links you click that look sensational," says national security expert Robert Siciliano.
The good news is that Facebook and Twitter are aware of such schemes and are working to shut them down. The bad news: Malware makers are working just as hard.
Smart Social Media Malware Tips
It doesn't make much business sense to ignore the value of social media, so aside from training employees, be proactive in employing a strong defense against social malware. Experts suggest these precautions:
Use strong antivirus software.
If your antivirus software is doing its job, it will stop malware from infecting computers in your network.
Use a good browser.
The latest versions of Google's Chrome browser and Firefox have features that "help a browser-based infection stay there," says Chuvakin. Most current browsers offer much better security than they did years ago. In particular, Internet Explorer 6 is known for offering poor security. If you have an older machine in the office using IE6, consider upgrading.
Use a service that scans links to make sure they're legitimate.
Update security patches.
Employ a strong firewall.
And make sure it's turned on.
Decode links before clicking.
One technique spammers use to camouflage a bad link is to shorten it, so use a short URL decoder before clicking on anything. You can find good free ones on TrueURL.net and Extractor.Links-Share.com.
- Home Movies: Then and Now
- Is Social Media Malware Infecting Your Business?
- Is Your Tween (Illegally) on Facebook?
- Are Free Public Wi-Fi Networks Safe?
- Explosion of Creativity: Power of Online Communities
- The Future According to Google
- 5 Cheap Alternatives to Hiring a Personal Trainer
- When Your Dream Company is Hiring on Twitter
- Colleges Bring Campuses to Facebook
- Technology Powers Revolutions and Saves Lives
- Best Photo Apps
- Virtual World No Substitute for Real One
- Best Phone Apps for Busy Women
- How to Prevent Identity Theft
- How to Use Facebook So It Does not Use You
- Worst-case Computer Scenarios
- Google Chrome OS Notebook: A Security Game Changer?
- What Is Cloud Computing?
- How to Prevent Data Breaches
- Best Tips for Sharing Videos
- Do You Need an iPad for Your Small Business?
- The App Guide: 5 Must-have Shopping Apps
- Project Management Tips From the Pros
- Finding the Right Skill Set
- Who's Gawking at Your Photos?
- Dealing With Virtual Stalking
- CES 2011 Report - Consumer Electronics Show
- Time to Gear up for 3-D TV?
- How to Get the Best Service From IT Vendors
- Dating Apps: The Lowdown
- New Website Streamlines College-Aid Application
- Gift-card Resale Market Thrives Online
- Stop Cyberbullying Now!
- 5 Cloud Tools to Boost Your Productivity
- Mobile Pay Can Give You an Edge
- How to Find the Best Deals Online
- Should You 'Friend' Your Teens Online?
- Should You Really Post That Comment?
- 5 Smart Tactics for LinkedIn Self-Promotion
- How Repressive Regimes Use the Internet to Keep Power
- WikiLeaks: Diplomacy as Usual
- The Rising Threat of USB Drives
- Integrate Cloud Solutions With Caution
- Tech Solutions to Track Your Resolutions
- Crash Course in Computer Maintenance
- How to Pick the Right Cloud Provider
- Web Tools for Starting a Small Business
- 4 Life-changing Resolutions You Can Stick to
- Create Your Own Social Network
- What the Web Says About You
- FTC Chairman: 'Do Not Track' Rules Would Help Web Thrive
- 'Do Not Track' Rules Would Put a Stop to the Internet As We Know It
- Are Federal 'Do Not Track' Rules Needed?
- The Political Power of Social Media
- Top 3 Kid-safe Social Networks
- 5 Ways to Cultivate Your Kids' Online Reputation
- Preparing Our Children for Global Digital Citizenship Success
- The Great E-reader Roundup
- The NFL's Highest-scoring Apps
- New Gadgets Straight From the Big Screen
- A Game Plan for Protecting Stored Data
- The Drive for Real-time Collaboration
- Hang Onto People Who'll Help You Advance
- Leading New Developments in Visual Computing
- Meet Mr. Industrial: Justin Lassen's Music Machine
- Must-see TV on the Internet
- Share Safely on Social Networks
- 6 Essential Rules for Safe Online Shopping
- Five Steps to Kid-friendly Surfing
- High-tech Help for Weight Loss
- Create a Web Site or Blog for Your Family
- Video Eyewear for Sunglass Cinema
- Smart Phone Apps Help Stop Distracted Driving
- Online Computer Backup Services Remove Hassle
Copyright © 2011 Studio One Networks. All rights reserved.