Information visibility is key for brand protection

Issue 1 2021 Cyber Security

Social media is revolutionising brand growth and consumer engagement, highlighting the importance of a brand protection programme. Ideally, one should use a platform that secures their organisation against critical issues like account hijacking, offensive content posted to corporate pages, brand impersonation accounts and scams that target customers.

Considering customers and prospects increasingly engage online and contracts can be won or lost on social networks, businesses need a solution that will immediately block, hide or remove racial slurs, sensitive data like credit card numbers, competitor posts, scams and malicious links.

Digital risk has become a key driver for management. Attackers mimic your domain to dupe unsuspecting users into believing they are interacting with the official brand. You therefore need to be able to protect your corporate websites, brand and revenue by finding and eliminating domain squatters and typo phishing campaigns that target your employees and customers.

Bearing in mind that high-value employees now give away more information in the social media age than ever before, putting executives and VIPs at substantial physical and cyber risk, it has become paramount to extend visibility and situational awareness to the social and digital world. Organisations need to consider an artificial intelligence platform that rapidly identifies cyber and physical risks across social media. Added to this, all organisations should employ a paid-for email service as opposed to a free one to assist in protecting all employees.

There has been a huge increase in the publishing of sensitive and personal information on public and social media platforms. Also known as doxing, this trend is not illegal as a specific offence, making it more difficult to control. Privacy-protecting actions are beneficial in a general sense and can help protect a person’s information in the event of a data breach. It is therefore advisable to adopt a doxing protection solution that monitors and alerts on the publishing of sensitive and personal information such as names, addresses, workplace/school, phone numbers or other identifying information. Ideally, you want a solution that also allows you to request takedowns on Facebook, Instagram, LinkedIn, Twitter, YouTube and Paste-bin for impersonating accounts and personal data information leakage. An all-encompassing solution has to moderate and scan for illicit content, scan for social media fraud, as well as have the ability to take down and remediate immediately.

For more information contact Digimune, simon@digimune.com, www.digimune.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

More is less in cybersecurity
Issue 2 2021 , Cyber Security
Post-pandemic paradox: more solutions do not bring better protection. Despite 80% of organisations running up to 10 different protection and cybersecurity solutions simultaneously, more than 50% of them experienced downtime from data loss last year.

Read more...
Ransomware and Microsoft Exchange Server attacks are surging
Issue 2 2021 , Cyber Security
Check Point Research sees global surges in ransomware attacks, alongside increases in cyberattacks targeting Microsoft Exchange Server vulnerabilities at a time where CISA has raised the alarm about ransomware attacks against Microsoft Exchange servers.

Read more...
Malware disguised as meeting apps spiked by 1067%
Issue 2 2021 , Cyber Security
Atlas VPN analysis reveals that cyber threats disguised as videoconferencing applications jumped by 1067% in a year. The data analysed was provided by Kaspersky.

Read more...
Free technology to boost future careers
Issue 2 2021 , Cyber Security, Security Services & Risk Management
A global shortage of cybersecurity professionals has become so severe that companies are increasingly at risk from hacking and industrial espionage.

Read more...
IoT malware attacks worldwide surge by 66%
Issue 2 2021 , News, Cyber Security
Based on the ‘Global Cyberattack Trends’ report by SonicWall, in 2020, malware attacks on IoT devices spiked by 66% compared to 2019. In a year, they grew from 34,3 million cases to nearly 56,9 million.

Read more...
New security frontiers: An opportunity to rewrite the rules
Issue 2 2021 , Cyber Security
Paul Crichard, chief security technology strategist, BT, explores how organisations can reimagine their security for the cloud, turning it into an enabler for better ways of operating.

Read more...
Seven simple steps to keep your SME cyber-safe
Issue 2 2021 , Cyber Security
Cybersecurity experts at ENHALO, a full-circle cyber defence group, understand the cyber-challenges facing the SME owner; here are seven simple steps to keep your SME cyber-safe in 2021.

Read more...
Snyk launches in South Africa
Issue 2 2021 , News, Cyber Security
Snyk provides a platform to secure all of the critical components of today’s cloud native application development, including the code, open source libraries, container infrastructure and infrastructure as code.

Read more...
Acronis acquires Synapsys in South Africa
Issue 2 2021 , News, Cyber Security
Acronis has acquired Synapsys, its long-time partner located in Cape Town, South Africa, that specialises in distributing Acronis Cyber Protection Solutions through the service provider channel.

Read more...
Gallagher achieves UK cybersecurity standard
Issue 1 2021, Gallagher , Access Control & Identity Management, Cyber Security, Government and Parastatal (Industry)
The Gallagher UK CPNI CAPSS High Security System features compliances to the Cyber Assurance for Physical Security Systems (CAPSS) standard, and the Centre for the Protection of National Infrastructure (CPNI) Readers and Tokens standards.

Read more...