4 Ways to Mount a Cyber Defense in Light of the U.S. Military's Social-Media HackJust because it wasn't data or computer networks that were attacked doesn't mean it's not detrimental to your business.

This week's hijacking of several social-media accounts run by U.S. Military Central Command underscores a powerful message: Just because it wasn't data or computer networks that were attacked doesn't mean it's not detrimental to your business.

While we've heard about powerful data breaches at Target, Home Depot and even JP Morgan Chase (to the tune of 70 million customer accounts), social-media accounts themselves are another risk.

Related:7 Basics for Keeping Your Company's Data Safe

As a quick background, this week, theWashington Post reportedthat hijackers claiming ties to the Islamic State took over both the Twitter and YouTube accounts of U.S. Military Central Command, tweeting out what were apparently military powerpoints and data on retired Army personnel.

Social media is changing the way we think, market and operate. Businesses around the world are scratching their heads, trying to figure out how to operate and leverage this new medium.

So what can businesses do to go on the "cyber defense?"

From an organizational perspective, firms need to consider how they will provide access to social networks, how they will manage the publishing workflow and engagement to posts, detail procedures for securing networks and individual devices, including the heuristic approach to sniffing out possible unpublished malware and attacks, and recovery procedures for handling widespread compromises.

But there are a few other key things business leaders can do:

1. Do the basics

Lock and encrypt computers, use anti-virus software and a password manager and avoid relying on obvious passwords. Train employees and conduct simulations of a data or social-media breach. What would they do? Who would they report the act to?

Related:If 2014 Was the Year of Stolen Consumer Data, Are Corporate Secrets Next?

2. Create a customer feedback loop

It's surprising the number of financial firms that do not have an easy way for customers to communicate online about issues or a breach. Consider a message in statements or online directing consumers to alert leaders to possible cybersecurity threats.

3. Protect publishing platforms

Web publishing is a straightforward process. The key is in the tools you use to post content. For example, if using WordPress,securethat platform to better protect yourself and prevent the uploading of files that could infect your site or your visitors. Never allow others to upload files without first scanning them for potential risks.

If you are using a content management system, you can mitigate this risk by having third-parties log in as a contributor, which limits them to typing in their content for your moderation and publication.

4. Protect your accounts on Facebook, Twitter, LinkedIn and Google

Using two-factor authentication is essential. It prevents most, if not all, hacks of social accounts.

评价这些资料呢?我们的年代ay someone hacks your Facebook account and posts something unsavory, such as pornography. You'll need to remove the content, secure your account (changing password, etc.), recover it so you can delete any content, and turn on two-factor authentication to prevent it from happening again.

On Twitter, if someone posts something offensive about you, block them from being connected to your account and report them as a spammer. (The networks are pretty good about following up on this.)

It's a new world that calls for new ways of thinking and approaching social media. Use this latest breach as a reminder that protecting your business and your reputation is paramount and that these new, powerful and instantaneous communications channels are not to be ignored.

Editor's Pick

Related Topics

Business News

'This Is My Life Now': Man Hysterically Documents Elon Musk's 'X' Sign Blaring Flashing Lights Into His Bedroom Window

The sign, reportedly put up without a permit, is shining bright at X HQ in San Francisco.

Living

How Spending Time Alone Has Transformed My Life

It's time to embrace the power of spending time alone.

Business News

An 81-Year-Old Florida CEO Just Indicted for a $250 Million Ponzi Scheme Ran a Sprawling Senior Citizen Crime Ring

Carl Ruderman is the fifth senior citizen in the Miami-Fort-Lauderdale-Palm Beach metropolitan area to face charges in connection with the scam.

Growing a Business

3 Overlooked Keys to Success on TikTok

How to successfully leverage TikTok to grow your business

Money & Finance

Want to Become a Millionaire? Follow Warren Buffett's 4 Rules.

企业家是不能过度指狗万官方望太多a company exit for their eventual 'win.' Do this instead.

Employee Experience & Recruiting

4 Attributes To Look For When Hiring Remote Workers

While adoption rates vary by country, industry and company size, the remote working trend continues to gather momentum as more employees demand flexible working arrangements and many organizations recognize the potential benefits, such as increased productivity, reduced overhead costs and access to a larger talent pool.