{"id":668,"date":"2015-02-25T16:37:57","date_gmt":"2015-02-25T16:37:57","guid":{"rendered":"https:\/\/blog.ladsolutions.com\/?p=668"},"modified":"2023-04-01T10:05:20","modified_gmt":"2023-04-01T10:05:20","slug":"4-tips-for-securing-social-media-accounts-from-hacking","status":"publish","type":"post","link":"https:\/\/ladsolutions.com\/blog\/4-tips-for-securing-social-media-accounts-from-hacking\/","title":{"rendered":"4 Tips for Securing Social Media Accounts from Hacking"},"content":{"rendered":"<p><a href=\"https:\/\/ladsolutions.com\/blog\/wp-content\/uploads\/2015\/02\/Social-Media-.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-672\" title=\"Securing Social Media \" src=\"https:\/\/ladsolutions.com\/blog\/wp-content\/uploads\/2015\/02\/Social-Media-.png\" alt=\"Securing Social Media\" width=\"690\" height=\"300\" srcset=\"https:\/\/ladsolutions.com\/blog\/wp-content\/uploads\/2015\/02\/Social-Media-.png 690w, https:\/\/ladsolutions.com\/blog\/wp-content\/uploads\/2015\/02\/Social-Media--300x130.png 300w\" sizes=\"auto, (max-width: 690px) 100vw, 690px\" \/><\/a><\/p>\n<p>So you think your Twitter and Facebook accounts are secure from hacking? We bet those in charge at the U.S. military\u2019s Central Command thought so as well. And then one day last month, CENTCOM\u2019s Twitter account profile picture was changed to show an Islamic State militant. Plus rogue tweets were being sent out such as \u201cAMERICAN SOLDIERS, WE ARE COMING, WATCH YOUR BACK\u201d.<br \/>\nCENTCOM was discovering the embarrassment of having a social media account hacked just as had been suffered in the past by businesses such as Jeep and Burger King. The latter\u2019s Twitter profile image was changed and said that McDonald\u2019s had bought Burger King because the \u201c<em>Whopper had flopped<\/em>\u201d. During 71 minutes, 53 bogus tweets were sent out (including one offering illegal drugs when a Whopper was purchased) and were retweeted over 73,000 times!<br \/>\nIf the U.S. military and multinational corporations are vulnerable to social media hacking, what can your small business do to protect against such embarrassment? Although there\u2019s no such thing as a 100 percent safe social media account, these 4 tips will keep your business from falling easy prey to the wild wild west that is the World Wide Web.<\/p>\n<h2><strong>Complex Passwords<\/strong>:<\/h2>\n<p>Those that are simple such as a pet\u2019s name or your name and lucky number tacked on the end are definite no-no\u2019s. Even medium strength passwords will not suffice. Only the strongest passwords should be used. And the excuse that they can\u2019t be easily remembered isn\u2019t valid with the password management applications that now exist such as PasswordWallet, LastPass and KeePass. Additionally, passwords should not be saved on shared computers, recorded on spreadsheets or on mobile device memos (the device can be lost or stolen) or written on Post It notes stuck to your keyboard.<\/p>\n<h2><strong>Limiting Password Access<\/strong>:<\/h2>\n<p>Many businesses have multiple employees posting to social media accounts. From the founder down to sales associates. Through the use of Single Sign On (\u201cSSO\u201d) technologies or secure third party social media posting platforms (Hoostuite, Buffer, et al.) you can avoid employees having access to the actual passwords for your accounts. An additional method is to keep the passwords in the hands of a central administrator in your business that grants various levels of permission to your employees (e.g., being able to only post on Facebook, but not edit the account preferences or grant permissions to others).<\/p>\n<h2><strong>Avoiding Malicious Links<\/strong>:<\/h2>\n<p>Hackers are known for sending out spammy and \u201cphishing\u201d emails with links designed to get access to your computers or passwords. You and your employees should not click on any links that are in any way suspicious or not from a trusted source. And if an email purports to be from a social media platform and requests that you change your password by clicking on a link, don\u2019t do it! Twitter and Facebook don\u2019t send out such emails.<\/p>\n<h2><strong>Third Party Social Media Posting Platforms<\/strong>:<\/h2>\n<p>In addition to such platforms being a way to \u201chide\u201d your social media account passwords from employees, Hootsuite, Buffer, TweetDeck and their ilk have many security features already built into them. And many of them include features for the posting of paid, promoted posts on social media platforms such as Twitter and Facebook. As a result, you are also adding a layer of security as to where your business credit card information can be accessed.<br \/>\nOnce again, there currently is no way to absolutely guarantee the security of your social media accounts. But following these tips and best practices will go a long way toward avoiding your small business becoming an Internet viral sensation for all the wrong reasons.<br \/>\nLAD Solutions has a team of social media professionals that have been using and researching social media marketing for many years now. During that time, we have created quite a few highly successful advertising campaigns for a wide variety of companies. To learn more about our <a href=\"http:\/\/ladsolutions.com\/services\/social-media-management.php\"><strong>social media management<\/strong><\/a>, please call <a href=\"callto:(888) 523-2926\"><strong>(888) 523-2926<\/strong><\/a> or <a href=\"http:\/\/ladsolutions.com\/no-obligation-consultation.php\"><strong>submit your request<\/strong><\/a> and one of our representatives will be in touch with you shortly!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So you think your Twitter and Facebook accounts are secure from hacking? We bet those in charge at the U.S. military\u2019s Central Command thought so as well. And then one day last month, CENTCOM\u2019s Twitter account profile picture was changed to show an Islamic State militant&#8230;<\/p>\n","protected":false},"author":3,"featured_media":677,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,217],"tags":[186,187,188,189],"class_list":{"0":"post-668","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog","8":"category-social-media","9":"tag-securing-social-media-accounts","10":"tag-social-media-accounts-maintenance","11":"tag-social-media-campaign-management","12":"tag-social-media-marketing"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=668"}],"version-history":[{"count":2,"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/668\/revisions"}],"predecessor-version":[{"id":1474,"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/668\/revisions\/1474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/media\/677"}],"wp:attachment":[{"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ladsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}