1
SOCIAL MEDIA LAWYER by Jeffrey C. O'Brien, Lommen Abdo Cole King & Stageberg, P,A. Tipson How to Avoid Social Media Hacking passwords. Choose unique passwords and change them regularly. Also, when an employee leaves, change the pass- words to your accounts. • Act quickly if you do fall victim to a security breach. Try to log in to your account and change the password. Also, temporarily disconnect any access to third-party applications regarding your accounts, and quickly notify your online followers (via your website and/or blog) that your account(s) were compromised and that you are working to remedy the situation. • Use of third-party social media dashboards such as Hootsuite can also provide great security for your social media activities. • Finally, if anyone on staff is using smartphones to access your busi- ness' social media platforms, be sure O'BRIEN that those phones are also password protected. It is unfortunate that some bad actors work so hard to create mayhem through businesses' social media platforms. Fortu- nately, by utilizing key security measures and closely monitoring your company's social media presence, your business will not be the next Burger King or Jeep story. Jeffrey C.0 'Brien, Attorney at Law Lommen Abdo Cole King & Stageberg, PA. (612) 336-9317 [email protected] B urger King sold to McDonalds? Jeep sold to Cadillac? If you believe everything you read on Twitter, you may have thought these things happened, thanks to some clever and malicious social media hackers. Social media has become big business. Both Facebook and Twitter now sell strategically-placed advertising, and these platforms have become critical in companies' efforts to establish and promote their brands, A successful social media campaign takes time. By contrast, the damage incurred due to a social media hacking attack can be far more immediate and longer lasting. How does a business get "hacked" in the social media universe? A hacking attack can happen many ways. Someone could stumble upon your password through illicit means. Other attacks come in the form of a virus found on a website or sent via email. In terms of the various social media sites, a hacking attack can be most devastating in the Twitter universe. Why? Because everyone can see your Twitter account (by contrast, your Facebook page is visible only to your desired friends and followers). Twitter continues to take steps to improve the security of its online environment, but the company's security measures can only go so far. Simply choosing not to participate on social media sites is not a viable security strategy for a business in these times. So how does a business stay safe in the social media space? Here are a few tips: • Monitor your business' social media presence. It's not enough to set up an account; you need to pay attention to it. Also, setting up a daily query on Google Alerts for your company's name wouldn't hurt either. • Protect your social media passwords. Hackers try to find points of entry into businesses' social media accounts by testing a variety of passwords. Do not make it easy for them to discovery your A LITTLEMORE TIME continued from page 21 Further, an average electrical plant run by coal generates approximately 3,700,000 tons of carbon dioxide every year. That same plant also creates about 10,000 tons of sulfur dioxide, which is known to cre- ate acid rain. This is all before pointing out the undue burden a regulation such as this would have on the cost to consumers, especially to those living in HOAs. Older furnaces, it was noted, vent through a flue on the roof. Higher efficiency fur- naces require a sidewall vent because of the demands for oxygen to run. This in turn makes it difficult to install such a furnace in an HOA. Not only is space limited, but much like T.v. dishes in the 90's, HOA's also must determine issues with architectural consistency, as well as who is responsible for maintenance when a new hole is punched through a common element such as siding. It was also noted that in many two-story homes, a furnace can also be found in the attic. Because this type of high efficiency furnace also produces condensation, this can freeze in colder weather, causing further damage in those attics. The most compelling argument of all was the APGA pointing out that most of their information about the impact on the envi- ronment came from the DOE. Therefore, this new ruling would actually cause greater problems than it would solve. Therefore, it is always good to keep in mind that in any important decision the demands to act now never take the place of deliberate and thoughtful investigation and debate. - Gene Sullivan - President, New Concepts Management and radio host of "Where You Live" with Gene & Toni, Saturdays at 1 0:00 a.m. on AM 1280, the Patriot. SPRING 2013 CIC MIDWEST NEWS 23

SOCIAL MEDIA LAWYER TipsonHowtoAvoidSocial …jeffreyobrien.today/wp-content/uploads/2016/08/Social...businesses' social media platforms. Fortu-nately, by utilizing key security measures

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SOCIAL MEDIA LAWYER TipsonHowtoAvoidSocial …jeffreyobrien.today/wp-content/uploads/2016/08/Social...businesses' social media platforms. Fortu-nately, by utilizing key security measures

SOCIAL MEDIA LAWYER

by Jeffrey C. O'Brien, Lommen Abdo Cole King & Stageberg, P,A.

Tipson How to Avoid Social Media Hacking

passwords. Choose unique passwordsand change them regularly. Also, whenan employee leaves, change the pass-words to your accounts.

• Act quickly if you do fall victim to asecurity breach. Try to log in to youraccount and change the password.Also, temporarily disconnect any accessto third-party applications regarding

your accounts, and quickly notify youronline followers (via your websiteand/or blog) that your account(s) werecompromised and that you are workingto remedy the situation.

• Use of third-party social mediadashboards such as Hootsuite can also

provide greatsecurity for yoursocial mediaactivities.

• Finally, if anyoneon staff is usingsmartphones toaccess your busi-ness' social mediaplatforms, be sure O'BRIEN

that those phonesare also password protected.

It is unfortunate that some bad actorswork so hard to create mayhem throughbusinesses' social media platforms. Fortu-nately, by utilizing key security measuresand closely monitoring your company'ssocial media presence, your business willnot be the next Burger King or Jeep story.

Jeffrey C.0 'Brien, Attorney at LawLommen Abdo Cole King & Stageberg, PA.(612) [email protected]

Burger King sold to McDonalds?Jeep sold to Cadillac? If youbelieve everything you read on

Twitter, you may have thought thesethings happened, thanks to some cleverand malicious social media hackers.

Social media has become big business.Both Facebook and Twitter now sellstrategically-placed advertising, andthese platforms have become criticalin companies' efforts to establish andpromote their brands, A successful socialmedia campaign takes time. By contrast,the damage incurred due to a socialmedia hacking attack can be far moreimmediate and longer lasting.

How does a business get "hacked" in thesocial media universe? A hacking attackcan happen many ways. Someone couldstumble upon your password throughillicit means. Other attacks come in theform of a virus found on a website orsent via email.

In terms of the various social media sites,a hacking attack can be most devastatingin the Twitter universe. Why? Becauseeveryone can see your Twitter account(by contrast, your Facebook page isvisible only to your desired friends andfollowers). Twitter continues to takesteps to improve the security of its onlineenvironment, but the company's securitymeasures can only go so far.

Simply choosing not to participate onsocial media sites is not a viable securitystrategy for a business in these times.So how does a business stay safe in thesocial media space? Here are a few tips:

• Monitor your business' social mediapresence. It's not enough to set up anaccount; you need to pay attention toit. Also, setting up a daily query onGoogle Alerts for your company'sname wouldn't hurt either.

• Protect your social media passwords.Hackers try to find points of entry intobusinesses' social media accounts bytesting a variety of passwords. Do notmake it easy for them to discovery your

A LITTLEMORE TIME continued from page 21

Further, an average electrical plant run bycoal generates approximately 3,700,000tons of carbon dioxide every year. Thatsame plant also creates about 10,000 tonsof sulfur dioxide, which is known to cre-ate acid rain.

This is all before pointing out the undueburden a regulation such as this wouldhave on the cost to consumers, especiallyto those living in HOAs.

Older furnaces, it was noted, vent througha flue on the roof. Higher efficiency fur-naces require a sidewall vent becauseof the demands for oxygen to run. Thisin turn makes it difficult to install sucha furnace in an HOA. Not only is spacelimited, but much like T.v. dishes in the90's, HOA's also must determine issueswith architectural consistency, as well aswho is responsible for maintenance whena new hole is punched through a commonelement such as siding.

It was also noted that in many two-storyhomes, a furnace can also be found in theattic. Because this type of high efficiencyfurnace also produces condensation, thiscan freeze in colder weather, causingfurther damage in those attics.

The most compelling argument of all wasthe APGA pointing out that most of theirinformation about the impact on the envi-ronment came from the DOE. Therefore,this new ruling would actually causegreater problems than it would solve.

Therefore, it is always good to keep inmind that in any important decision thedemands to act now never take the placeof deliberate and thoughtful investigationand debate. -

Gene Sullivan - President, New ConceptsManagement and radio host of "WhereYou Live" with Gene & Toni, Saturdaysat 10:00 a.m. on AM 1280, the Patriot.

SPRING 2013 CIC MIDWEST NEWS 23