A common hacking technique is to cast a net that encompasses followers, connections, and mentions. For example, a hacker might post a non-descript image with many people tagged or mentioned. Before clicking, employees must remember to validate the authenticity of the individual who tagged or mentioned them, ensuring that it is a trusted friend or colleague.
Similarly, hackers tend to create accounts impersonating celebrities, politicians, athletes or large companies. The larger social networks have added “verified accounts” indicated with a checkmark to note their legitimacy. However, many companies have yet to pursue this validation.
If an employee receives a request, it’s important that they do their homework and search for the individual’s name or company online. If they find a verified account that doesn’t match the request, it’s most likely an impersonator. If this occurs, the employee should flag the account to their internal IT department so that other colleagues can become aware of the situation and avoid any interaction.
MORE: What the rise of social media hacking means for your business