77
4.7.3
From identity theft
It is common for identity theft to occur especially when the attackers are able to take
control of a user’s account by stealing the actual credentials and changing the passwords. The
best way to recover the account is by trying to recover the account with the ‘forgot password’
option. This may lead to a point that requires the account
to be re-authenticated with
information such as real ID card, which the hackers may lack but the real user will have. If
everything fails, it is best to write an email to the social media platform.
4.7.4
From sensitive information disclosure
There is a common saying that the Internet does not forget and this is something that a
user should always be mindful of. If some sensitive information has accidentally gotten to
social media, it is best to remove it upon discovery. This may prevent people with malicious
motives from accessing this information.
4.8
Conclusion
This chapter has looked at the security cyberspace of social media networks. It has
discussed the different types of threats that users on social media face. These threats emanate
from the information they share on their bio, the posts they make, the messages they receive,
and the shared links they click on. The existing security policies
in different organizations
have been reviewed. Their intents,
accomplishments, and failures have also been discussed. A
tactical threat intelligence for the discussed social media threats has been created and
discussed.
To deal with threats, a framework has been established that can be applied by
organizations to reduce the risks that they and their employees face from social media. A
practical solution on putting an end to the issue of users falling victim to social media threats
is end-user awareness. This chapter has delved into it and given several points on what users