Securing Social Media: National Safety, Privacy Concerns

  /     /     /  
Publicated : 22/11/2024   Category : security


Securing Social Media: National Safety, Privacy Concerns


Its a critical time for social media platforms and the government agencies and private businesses and individuals using them.



RSA CONFERENCE 2018 – San Francisco – Governments and businesses around the world are navigating concerns around social media, which is playing an increasingly important role in both national and enterprise security.
Cyberspace is redrawing borders we havent seen before, said James Foster, CEO at ZeroFOX, in a session entitled POTUS is Posting: Social Media and National Security. Borders between people, once based on geography, are now based on apps. He presented a graphic illustrating their size: Facebook has 2 billion  users, YouTube has 1.5 billion, WhatsApp has 1.2 billion, WeChat has 938,000.
Social media is unavoidable, said Dr. Kenneth Geers, senior research scientist at Comodo Group. Platforms like Twitter and Facebook have greater influence on national security as they become a communication tool for global leaders and an attack vector for threat actors.
The presenters turned to the example of President Donald Trump, who is notorious for sharing updates and making national policy decisions on Twitter. Geers pointed out how the former Secretary of State, who didnt have a good relationship with the President, printed tweets to see the foreign policy of the day from the White House. Earlier on April 18, Trump tweeted an update stating CIA director Mike Pompeo had recently met with Kim Jong Un in North Korea.
I promise you, people are printing out this tweet to figure out what to do today, said Geers. The power of social media, to some degree, speaks for itself.
In this sense, Foster said, modern social media is the technological medium for sharing messages the same way television was decades ago. Like it or not, regardless of the side of the aisle youre on, this is the new communication form for government, and its not going to go away, Foster said. Of course war can be declared on social media, for the first time in history.
The power and reach of social media extends to threat actors, who are leveraging it as a platform in increasingly large and dangerous attacks. Its a perfect area for information operations and false accounts; after all, social media provides the perfect amount of anonymity and distance for attackers to fire their virtual weapons from afar.
We should believe half of what we hear and see on social media, said Geers. When it comes to national security, everything is suspicious. Accounts and activity are easy to fake. As an example of account hijacking, he pointed to a fake Twitter account for the US Central Command. The account had a broad reach of 110,000 followers, giving its owners a great deal of influence.
Social media and cyberattacks are more important than we think if they have any impact on national security at a high level, Geers noted.
In the private sector, one of the biggest threats to the business will be fraudulent and spoofed accounts, Foster pointed out. With social as their platform, attackers can get to the two most important groups of enterprise targets: employees and customers. It puts businesses in a strange position: to what extent do employees social media accounts pose a threat? How do they govern social media? Are they responsible for protecting employees accounts?
Foster and Geers outlined several steps organizations can take to lessen the risk of social media-based threats in the enterprise. Their recommendations: work with the communications teams to build a social media policy and dictate what can and cannot be posted. Tell employees how to report abuses and potential threats. Teach best practices for hardening their accounts, and establish a policy around breach notifications and lost credentials.
Data Privacy: An Ongoing Issue
Alongside national security, data privacy is another critical issue facing social platforms and users today. A few days ago, Facebook shed more light on its privacy practices. The social media giant has been in the thick of controversial congressional hearings on how it uses customer data, and its account holders want to know whats going on.
People are placing higher value on their privacy and showing greater concern for how companies use their information. In a 10,000-person study conducted by Harris Poll and sponsored by IBM,
researchers
found 78% of US respondents say an organizations ability to keep their data private is extremely important but only 20% completely trust them to do so.
In one post, Facebook explained its reasoning for collecting data when users arent on the platform. Several websites and apps use Facebook services, like its login and analytics tools, to personalize their content. When users visit a site or app that uses its services, Facebook gets info even when the user is logged out - or doesnt have a Facebook account at all.
There are three main ways in which Facebook uses the information we get from other websites and apps: providing our services to these sites or apps, improving safety and security on Facebook, and enhancing our own products and services, wrote product management director David Baser in a
blog post
discussing its data usage and users information control.
In a follow-up post the next day, Erin Egan, vice president and chief privacy officer for policy, and vice president and deputy general counsel Ashlie Beringer 
explained
how Facebook is complying with new privacy laws and adding new protections.
As part of continued privacy efforts, Facebook plans to ask for users input on various aspects of their activity on the platform. People will be able to weigh in on ads based on data from Facebook partners, information in their profiles, and facial recognition technology. Its also rolling out new GDPR-compliant tools to access, delete, and download information.
Related Content:
First Public Demo of Data Breach via IoT Hack Comes to RSAC
DHS Helps Shop Android IPS Prototype
Cyber War Game Shows How Federal Agencies Disagree on Incident Response
Data Visibility, Control Top Cloud Concerns at RSA
Join Dark Reading LIVE for a two-day Cybersecurity Crash Course at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the agenda 
here
. Register with Promo Code DR200 and save $200.

Last News

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security

▸ Travel agency fined £150,000 for breaking Data Protection Act. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Securing Social Media: National Safety, Privacy Concerns