Contributed By

patrick-king

Patrick King

Founder and CEO of Imagine

View Profile

Anti-Hacking Steps the Big Guys Wish They’d Known

February 05, 2015

Hacked social media accounts are so common that Facebook, Twitter, LinkedIn, and just about every social networking site actually have long had SOPs for this. While the sites insist they constantly update security, users need to take better care of their accounts and make them less vulnerable to hackers.

Hacked social media accounts are so common that Facebook, Twitter, LinkedIn, and just about every social networking site actually have long had SOPs for this. While the sites insist they constantly update security, users need to take better care of their accounts and make them less vulnerable to hackers.

Businesses must protect their social media accounts as closely as their financial ones. At the very least, they need to take basic steps, such as frequent password changes IT staff have long urged. CMOs and marketing staff understand a brand needs to be safeguarded along the same lines as identity protection; indeed, ID protection services work on the premise that a person’s name is as valuable as a brand. Here are examples of what happens when brands are compromised on social media:

Burger King’s McTweets

Back in 2013, hackers broke into Burger King’s Twitter account and changed it to look like McDonald’s account, using the famous McD logo and name. They proceeded to tweet gems like this to @BurgerKing:

  • “RT ‘Shout out ya local iThug$'”
  • “We caught one of our employees in the bathroom doing this” accompanied by a photo of a man injecting himself
  • “We just got sold to McDonalds! Look for McDonalds in a hood near you.”

The hackers continued to post for another hour and 15 minutes until Twitter shut down the account. Even after it was restored four hours later, the bogus tweets remained, including a plug for McDonald’s short-lived Fish McBites. It took another three hours to remove them, according to the Chicago Tribune, which noted BK had the presence to welcome thousands of new followers it gained during the hack.

The very next day, hackers took over Jeep’s Twitter account. This time, they continued to tweet under Jeep’s name and changed the bio to read “The official Twitter handle for the Jeep® – Just Empty Every Pocket, Sold To Cadillac.”

Minnie Mantlez at Short? Say It Ain’t So!

In June 2012, the Facebook pages of several Major League Baseball teams were hacked. The New York Yankees’ page posted that All-Star shortstop Derek Jeter was planning to have sex reassignment surgery. (He would return in 2013 as “Minnie Mantlez.”) Other MLB team pages included a free pitbull giveaway at that night’s Miami Marlins game and a very rude comment about comedian Bill Murray, purportedly by the Chicago Cubs.

How to Stop Social Media Hacks

Most hackers are passionate hobbyists who see security as challenges to overcome or anticipate. CMOs need tools that safeguard their company’s social media accounts. Writing for Forbes, Steve Garrity, cofounder and CTO of the marketing and sales software firm Hearsay Social, says the Twitter hacks could have been avoided if the companies had adopted deep enterprise architecture designed to quickly recognize, block, and report attempts for improper posts. Here are some examples:

  • An LDAP (Lighweight Directory Access Protocol) uses single sign-ons to control access to social media accounts. Only authorized employees can sign on. This prevents login sharing, accidental posts, posts by angry ex-employees, and gives hackers fewer passwords to bypass or steal.
  • Define inappropriate content that sets off automatic alerts.
  • Implement approval workflows automated to look for inappropriate content.
  • Use webcrawling software to conduct regular searches for rogue accounts.

Train Employees on Social Media Management Software

Many smaller companies that don’t have staff to setup and run these tools use social media management software that allow them to cross-post and schedule posts to various sites. Marketing staff must be properly trained to use them.

Back in 2011, a Red Cross staffer accidentally mixed up her personal Twitter account with the organization’s account on HootSuite and tweeted a photo of aid workers relaxing over beers. The staffer blamed it on her own lack of HootSuite skills; happily, the Red Cross handled it well and the employee survived the debacle. “We are an organization that deals with life-changing disasters and this wasn’t one of them,” its social media director told Mashable. “It was just a little mistake.” But it could have been a lot worse.

This article originally appeared on the Imagine blog.

This article is available exclusively to
Comcast Business Community Members.

Join the Comcast Business Community to read this article
and get access to all the resources and features on the site.

It's free to sign up

OR

Join the Discussion

300 Characters Left

Tags

Resource Center

Why Comcast
Comcast Business delivers fast, reliable networking solutions built for business performance and growth

Current Offers
Take advantage of our limited time offers with a customized plan built to give your business an edge over competitors

Community Forums
Find solutions, share knowledge and get answers from customers and experts

Help & Support
Get help and support from Comcast experts

Resource Library
Find out how Comcast has helped clients like you meet their needs with informative White Papers, Case Studies and more

Internet Speed Test
Try the Comcast Business Internet Speed Test to see how your business stacks up

Social Media
Connect with Comcast and join the conversation on LinkedIn, Twitter, Facebook and Google+