Category Archives: security

Protecting Your Brand’s Online Identity: Safeguarding Your Social Media Accounts from Hacking and Misuse

Social media handles of organisations they represent are often associated with the company’s brand and identity itself. If someone else gains control of the handle, they can damage the company’s reputation by posting inappropriate or misleading content.

It is said that nearly 20% of small and medium businesses have had their social media accounts hacked.

Social Media Checklist and Security

Here are some interesting incidents from the past: 

  • Concerned about fake news and hate speech, Sweden’s public radio closes Twitter accounts LINK
  • Prime Minister Narendra Modi’s Twitter account was hijacked in 2021
  • Popular Gaming Company PubG’s official YouTube account was  hacked 
  • Union Ministry of Information and Broadcasting’s Twitter account was hacked last year
  • Elon Musk’s twitter account has been hijacked repeatedly in the past to pump and dump Bitcoin scams.

Recent incidents targeting the accounts of the brands and large organisations have prompted regulators to call for additional measures to safeguard social media accounts. 

In fact, In India Reserve Bank of India (RBI) in its master directives for NBFCs has explicitly called out for its safeguard:

RBI Master Directive on Social Media 

What should you do to safeguard your Organisation’s Social Media Accounts ?

If you are managing company’s social accounts, here’s a checklist to ensure they are secure:

  1. Use official company email IDs to manage and map social accounts. I have seen personal email accounts used for managing brands. This could also lead to problems once the employee quits. Also, as these non-company email IDs are un-managed it is difficult to enforce security controls around them.
  2. Enable multi-factor authentication (MFA) to require two components for login. Even in case of password leak or theft, the hackers would still need the MFA to gain access. 
  3. Do not reuse passwords across different accounts. Hackers often try to see if a password found in a leak can be reused elsewhere.
  4. Get company’s official accounts verified for assurance and credibility. Prioritize and get this done as too many fake listings are causing a great loss for the customers. 
  5. If your company is using third-party tools or plugins, routinely review them for any vulnerabilities. A common phenomenon I have encountered during web security audits is that websites hosted using CMS like WordPress, Drupal etc often use the plugins which are integrated for social shares, marketing, analytics etc. If these plugins are not updated, chances are they can be hacked and gain entry into the websites. If your corporate website is hosted separately from the web applications,  the damage is limited. If not this could lead to much serious data breaches.
  6. If you engage third-party agencies, or consultants, ensure you review their security practices and is in line with all the regulatory requirements. Regulators like RBI, SEBI mandate that even the Third-Parties should have the same security practices outlined for regulated entities.
  7. Regularly monitor accounts for any suspicious activity or unauthorized access.
  8. Backup all social media account data regularly to minimize the impact of any security incidents or data loss.
  9. Limit access to social media accounts to only authorized personnel and use role-based access controls. Managing multiple email accounts for social media channels can be challenging sometimes. You can create a distribution list if multiple people log in to the account and then set different passwords.
  10. Consider using social media management tools to help manage and secure accounts more effectively.
  11. If you are a CISO / Security professional for your company, please do spend some time with Marketing and Customer Support teams on they handle these channels with regards to logging in, content review. Please also pay attention on they handle sensitive information shared by customers over these channels.
  12. Create a crisis communication plan to prepare for any potential security incidents, including who to contact, what to do, and how to respond to the public. You can write Standard Operating Procedures on these and share internally so that its easier in the event of a data breach.

Brand verification

Brand Verification is essential to confirm that social accounts truly represent your company. All platforms offer the option for brands to verify their accounts as official. Brand verification provides multiple benefits:

  • Assures customers that they are interacting with official company accounts
  • Adds credibility to information shared through verified accounts
  • Prevents rouge accounts from creating channels using our company name
  • Makes it easier to take down spam and unauthorized accounts

Verification Process Links:

Verification links for popular social media accounts are listed here:

If you found this useful, please like and reshare.

About Me: I help fast growing startups, fintechs and other companies  in the areas of Cyber Security. If you need pragmatic guidance or help in this regard, do not hesitate to get in touch with me: email@vprasanna.com 

Podcasts and Audiobooks for Commute

pic courtesy: unsplash

The traffic is back! This is what you would hear from your friends, colleagues who have resumed commuting to the office and my opinion is no different. I shuffle between self-drive, cab, and public transport and can feel the noticeable increase in the traffic between the covid and present days. Cycling is ruled out due to the distance 🙂

The usual options during the commute were to listen to the Radio, Songs on CD (incase you remember)/USB drive, but I rarely listen to these nowadays. I remember reading somewhere that many FM radio stations are closing due to low patronage. Couple of the ways I have managed to deal with the commuting boredom or stress is listening to Podcasts and Audiobooks. Podcasts are the best things to have happened in the recent past and I think its a win – win to both the content creators and content listeners. Bear with the Podcaster talking about their sponsors at the beginning and the end and you can listen to uninterrupted content. Don’t like something, skip it and you are in total control in terms of interests.

As I work in the InfoSec, I started off with the podcasts around this topic to keep myself up-to-date, but later added other areas once the routine set in. I have found some of these podcasts very enriching and hence thought of sharing. Irrespective of commute or not, it is better to set aside some time in the day for listening to audio books or podcasts:

The Darknet Diaries

podcast darknetdiaries

If you work in the security field or just even an enthusiast, this is a great one. Jack Rhsyider interviews the people from the wide range of spectrum in the security industry ranging from hackers to CxOs, Hacktivists, self proclaimed vigilantes, Rappers, Social Engineers, Regime Survivors and more. My favorite episode was one about the investigation on Linkedin Incident , which actually led to breaches in other companies. If you are on the defensive side of the security, you can actually use this as a benchmark for enhancing security in your own companies. All the TTPs will unravel as you listen and you can connect the dots.  What I also like about this podcast is the music from BreakMaster Cylinder (fancy name eh!) which is pleasant to hear unlike the opening and closing notes of many podcasts.

Work Life by Adam Grant

work life

This is not related to InfoSec but do not miss this one as it touches various aspects of professional and personal life skills. Some of the episodes that have I have found very helpful include “The 4 Deadly Sins of Work Culture“, “How to Rethink a Bad Decision“, “Networking for People who hate Networking”

Some of the pointers in the podcasts talks about identifying the traits of the organisation culture before joining using a method called as culture audits. The podcast episode mentioned above in itself deserves a separate writeup and I will share some thoughts on them in future

Huberman Lab Podcast

Huberman lab podcast

Andrew Huberman is a neurobiologist. What the heck does Neurobiologist have to do with security for me to be recommending this ? Well, there are couple of changes I did based on this podcast and is helping me in my journey of physical and mental fitness including sleeping well ! Huberman podcasts are usually long (~1.5 hours on an average) and very detailed. Topics include managing stress, sleeping well, improving gut health. Handy tip: Do make you are not actually driving while listening this to Huberman’s podcast as any missed out attention will require listening from scratch 🙂

CISO Series Podcast

ciso series podcast

 If you are someone who works in the field of Information Security you will enjoy listening to this show as the speakers talk from a corporate angle dealing with vendors, the board, the management, peering teams. The podcasts are short with most of them ranging from 10-20 minutes and is hosted by David Spark.  A few topics that I liked include: “A look back at the Foolish Security Policies of Past and Present”, “After a Breach Its really easy to calculate Risk“, “Finding the perfect Time to Quit Your Job“,

When Audiobooks launched, I was skeptical initially but soon one book led to another and currently there are close to 20+ audiobooks in the library some of which I have listened to again. I listen to them not just during the commute but also during workouts, walks and even as a break from work. Most of the podcasts I listen to are themed around Information Security with the exception of few. Here are some of the books I have been listening/reading (mostly in audio book format) and it includes both fiction and non-fiction as well

Cult of the Dead Cow

cult of the dead cow

 

 

 

 

Fascinating book on the journey of Hacker Culture, the origin of DefCon, Blackhat, hacktivism, CyberLegal stuff and a lot more

Why I Am an Atheist and Other Works
Why I Am an Atheist and Other Works
This is the collection of letters Indian Revolutionary Bhagat Singh wrote while he was imprisoned

Permanent Record
Permanent Record
Biography on Snowden, great  insights on inner workings of surveillance program at NSA

The Phoenix Project
Phoenix Project
Book that made concept of DevOps popular

Ikigai
IKIGAI
Self-help / motivational

Talking to Strangers
Talking to Strangers
Non-fiction and a book that touches upon Inherent biases and how it affects our judgements

Zero to One
zero to one
From the Startup guru Peter Thiel, its actually notes from his lecture classes which a student compiled

Essential Calvin and Hobbes
Calvin and Hobbes
Calvin fan, hence 🙂 PS: This is a kindle ebook

An Astronaut’s Guide to Life on Earth Chris Hadfield
an astronauts guide
Fan of Space and Astronauts, hence

The Goal
The Goal
More like a precursor to The Phoenix Project, can draw parallel to modern day monolits

Outliers
outliers
Name says it all

The order of Time
The Order of Time
A good read on the captured history of time measurement. Felt this was philosophical as well during the listening of audiobook, probably will listen to it again.

Atomic Habits (still listening)
ATOMIC habits

The Almanac of Naval Ravikant (still reading)
The almanack of naval ravikant

What are your tips to beat the commuting boredom ? Feel free to share through comments: