71
would all be stolen by the hackers. Such type of data is expensive and
can be used to tear apart the organization by the hackers (Sayers,
2005). Therefore, it is paramount that endpoints in an organization be
secured. There are many endpoint security solutions that can offer
protection from malware and others that come with an endpoint
firewall. Therefore, if the worst happens, the organizational data on the
browsers will at least be secure.
vi.
Educating employees – Last in this framework is the greatest tool that
is effective against social media threats, educating users (Albrecht et
al., 2011). Users fall victim simply because they are not aware of the
risks they face. A user who does not know the existence of the
Nigerian prince scam, for example, will give a listening ear to hackers
that present their story to him or her. Similarly, a user who does not
know the risks of clicking on links sent via social media is also not
going to hesitate to click on them. Therefore, employees must be
educated on how to detect scams on social media. They must be made
aware of some of the scams that have been happening on social media.
They must also be told the risks that they put organizational computers
in when they open social media platforms and do prohibited actions,
such as clicking on shortened links.
Dostları ilə paylaş: