Social media platforms take up nearly two hours of our time every day, according to research firm GlobalWebIndex. (Marcel De Grijs/Dreamstime/TNS)

Arm Your Business Against Social Media Brandjacking

By Ann Marie van den Hurk
Lexington Herald-Leader

WWR Article Summary (tl;dr) According to new research by social media security firm ZeroFOX, the number of fake social media profiles created for fraudulent purposes increased 1,100 percent from 2014 to 2016. But as PR expert Ann Marie Van Den Hurk points out, there are steps you can take to protect yourself and your brand.

Lexington Herald-Leader

The use of social media can give small businesses a big boost. But social channels can also be minefields of trouble.

Potential headaches include fraudsters falsely assuming your or your business‘s identity, what’s called “brandjacking”, with the intent of ruining your reputation or scramming consumers.

Brandjacking, unfortunately, is pretty easy to pull off, requiring only a Twitter, Facebook or Instagram account and a desire to inflict damage on a targeted organization. And the issue is getting worse.

The number of fake social media profiles created for fraudulent purposes increased 1,100 percent from 2014 to 2016, according to new research by social media security firm ZeroFOX.

Meanwhile, research from ProofPoint, a cybersecurity company, suggests social media phishing attacks have become disturbingly common. More specifically, the firm has seen a rise in what are called “angler phishing” attacks, in which a fake customer support account is set up to lure consumers into giving out their personal information.

Other scams include verification phishing, in which troublemakers impersonate actual social networks by offering users allegedly verified accounts and then asking those users to provide personal information as part of the bogus verification process. There’s also ad phishing, in which the fraudsters set up fake corporate accounts on their made-up social networks, making them look more legitimate and proliferating their scam.

These traps are well developed, and the con artists, to make things seem more realistic, will participate in online discussions and back-and-forth tweets before directing users to other, less-public channels like email and direct messaging.

Related News

Leave a Reply

Your email address will not be published. Required fields are marked *