|Cyber crime: Not as cool as being |
in the mafia. Credit: Boaz Yiftach
Although your technical or engineering company is unlikely to be criticised for killing orang-utans and destroying their habitats, malicious attacks can still taint your organization’s reputation. In order to protect from such image spoilers, a good understanding of how social media outlets and content management systems work is a must:
- To begin with, all passwords and user names need to be kept safe. They must be distinct from one another and – if you find yourself using ‘password’ as key term – just use a password generator instead.
- Make sure you reject spam comments on Blogs and Facebook pages
- Do not click and follow spam links on Twitter and Facebook - they often allow hackers to take over the account
- Ensure that the posting and privacy settings on the company Facebook Wall are restricted so that only admins and preferred users can post new content (everyone should be allowed to comment)
- Finally, moderate and keep a close eye on your company social media, so that you can counteract any sort of negative publicity your company may be faced with