How Hackers Use Social Media to Target Your Employees
June 10, 2019

Social media is a gold mine for data because so many people use it. About 94% of Canadian internet users have at least one social media account, according to research from the Social Media Lab at Ryerson University. This means your employees are most likely on social networking sites. By simply looking up a company on LinkedIn, hackers can find out who their employees are. From there, they can do more research and find other social media accounts they have. Hackers can use information gleamed from social networking sites to engage in social media profiling and find ways to target your employees with attacks.

Source: Weber Shandwick

What is Social Media Profiling?

People share a lot on social media, from their interests the company they work for and even where they currently are. All this data is blueprint of who you are and can be used to create a profile. Social media profiling is commonly used in marketing. Marketers often build profiles of potential clients and use them to refine their marketing strategies. But just as marketers look through data to see how to get consumers to buy items, hackers can use social media data to see what will entice someone to click on a phishing link and spread malware.

How Social Media Can Be Exploited

Sharing on social media is so ingrained in our culture that we often don’t think about the impacts our posts can have. In fact, these platforms consistently encourage us to share ideas, videos and photos with others. Unfortunately, this can lead people to take social media data and use it maliciously. Here are three ways hackers can target you based on your social media posts.

1. Social engineering: Social media makes it easier for hackers to manipulate potential victims by impersonating friends, family, brands, or celebrities. It can be hard to determine a fake account because hackers can steal photos of real people and use them to seem legitimate.

2. Passwords: Hackers can guess your passwords or the answers to your security questions based on information from your social media accounts. People often use pop culture characters or sports teams as part of their passwords. If you constantly tweet about a sports team or like a Star Wars page on Facebook, hackers can use this information and engage in password spray attacks. If you happen to use an insecure password, this can give hackers access to your accounts.

3. Phishing: Social media makes it easier for hackers to craft phishing emails that you will most likely click on. For example, if you tweet about a Netflix show, chances are you have an account. Hackers can look at this and use this information to send a phishing email related to your Netflix account.

Using Social Media Safely

Social media is a fun tool for your employees to collaborate and unwind. It’s important that your employees use social media safely to help protect their data and your company. Here are three tips for using social media safely.

1. Train employees: Employees should undergo mandatory security training every year so that they are aware of the ever changing cyber risks they can experience while online. Cyber crime is a threat that can impact them in both their personal and professional lives. Enrolling employees in a cyber awareness training course like Secure IT – Training will help them understand the threat landscape and encourage them to build good cybersecurity habits that will protect them from these threats.

2. Be cautious: It’s important to use social media with caution when posting on your accounts and when deciding who to allow into your networks. Tweeting that your boss is away may seem innocent but a hacker can use this information to commit CEO fraud. It’s also important to use caution when accepting random friend requests or connections on LinkedIn. By letting strangers into your network, you open yourself up to the risk of your information being used for malicious purposes. Be wary when responding to messages and don’t click on links or download any attachments.

3. Protect your endpoints: It’s important to have endpoint security to protect your laptops, desktops and mobile devices. Some people use social media as part of their job but even those who don’t may be on social networking sites while at work. Using an endpoint solution like Secure IT – Endpoint will help prevent threats and improve your security posture.   

You May Also Like…


Submit a Comment

Your email address will not be published. Required fields are marked *

Solutions to Grow Your Business

We've got you covered with our comprehensive portfolio of solutions.

Cybersecurity Solutions

Cyber Incident ​Response
Endpoint Detection and Response (EDR)
Extended Detection and Response (XDR)
Firewall Security
Mail Security
Penetration Testing Services
Security Baseline Assessment
User Defence
Vulnerability Detection Response (VDR)
Wi-Fi Security

Backup & Recovery Solutions

Hybrid Backup
Enterprise Backup
Mail Archiving

Public & Private Cloud Solutions

Azure Management and Monitoring
Microsoft 365 Administration
Private Cloud
Microsoft CSP

Helpdesk & Field Services Solutions

Professional Services & Consulting Solutions

Monitoring & Management Solutions

Hardware Maintenance Solutions

Application Management Services

Telco Industry Solutions

AI Business Solutions

Your partner in digital transformation

Helping the next generation of MSP and IT solution providers transform and grow.

businessmans handshake

Types of Partners

Managed Services Provider (MSP)

Internet Service Provider (ISP)

Value Added Reseller (VAR)

businessmans handshake

Partnership Overview

Jolera’s partner program offers flexibility to engage with us on your terms. We have spent more than two decades building award-winning best in class partner enablement and turnkey end-customer solutions for you.

Partner Program

Jolera has three partner programs to choose from: Select, Preferred and Premier.

Learn about us and the legacy we have created

At Jolera, we treat each MSP partner with specialized care. With more than 20 years of IT experience, we offer the latest technology to navigate cloud, security, endpoint, and storage needs.

vintage pocket watch vintage background concept

About Us

Jolera is widely recognized as a global managed services leader. We started as managed services provider over 20 years ago and have been at the forefront of managed services innovation ever since.


Our People

As a service provider our main goal is to make the customer happy. For that final goal, we need passionate and happy people working with us – Our People Are Our Biggest Asset.


Our Leaders

We are performance driven at the core - tying together best of breed technology and industry leading expertise with pragmatic processes built to deliver outcomes.

Meet Our Leaders!