Social Media Monitoring

Social Media presents a new set of challenges for the business and is a growing area of online brand abuse and fraud. Social Media provides a new mechanism for cybercrime affording the opportunity to distribute phishing and malware content.

Social engineering is a key component of Advanced Persistent Threats — APT attacks and often infrastructure breaches start with a social penetration, with the use of spear phishing.

Social Media provides a broad avenue for brand abuse, copyright infringements via unauthorized or fake accounts, groups and profiles.

Some of the potential uses for a fake social media profile are;

gain a trusted audience for the purpose of a phishing attack


harvest person information for other types of social engineering


distribution of targeted malware, malicious mobile Apps, or drive by links


collect a specific and captive audience to spread false or misinformation


social-squatting for the purpose of profit

Unauthorised Social Media accounts, groups can lead to a range of associated threats;

fraud losses from phishing and malware


customer or employee personal identifiable information loss


defamatory information being spread under the business’s brand


dilution of the business’s marketing message from duplicate accounts


C-level staff maybe directly targeted resulting in a range of issues

SOCIAL MEDIA MONITORING

iZOOlogic Social Media Monitoring penetrates deep into the social media spectrum to include:

Global and local social sites


Keyword and image based heuristics


Powerful visibility and control


Threat categorisation


Correlation of multiple data sources


Global Security Incident Response

SOCIAL MEDIA PROTECTION

Management of Social Strategy


Maintain the Social Message


Reduce Reputational Risk


Mitigate Adverse Social exposure


Social Brand Protection


Corporate Compliance

About the author

11 Responses

Leave a Reply