Social Media Cybersecurity 2020 The Rise Of Social Media Threats

Social Media Cybersecurity 2020: The Rise Of Social Media Threats

Last Updated: 24th July, 2022

Social Media Cybersecurity as of in 2020 represent an emerging branch of cybersecurity that deals with the understanding of considerate behavior. Studies in Social Media Cybersecurity cut across different and seemingly unrelated fields such as (communication) technology, machine learning, psychology, sociology and forensics, among others.

More so, to differentiate it from traditional cybersecurity, the Military Review of The United States Army explains, therefore: “Traditional cybersecurity involves humans using technology to ‘hack‘ technology. The target is information systems. Social media cybersecurity involves humans using technology to ‘hack‘ other humans. The targets are humans and the society that binds them.

In his paper, Sauvik Das, of the Georgia Institute of Technology, asserts that “social media influences strongly affect cybersecurity behaviors, and it is possible to encourage better cybersecurity behaviors by designing security systems that are more social.


CCI Inquiry Accused That Google Misemployed Android To Block Its Rivals

Social Media Cybersecurity 2020

Social media cybersecurity looks to investigate how people handle attacks and threats and also influence them to make better security decisions through social identity proof techniques. For instance, research has proven over time that people are more receptive to new and better security systems if they know that more people (especially those they know) hitherto employ them.

Most efforts in social media cybersecurity are yet restricted to universities and colleges’ research centers, as researchers continue to determine how best to manipulate the psychology of humans to oblige them and their devices more secure.


Guy Fawkes: The Story Behind Hacking, Cyberattacks By Anonymous Mask (Facade)

The Social Identity Proof Principle

In recent years, there has been a massive increase in the rate of cyber security attacks; there has likewise been a corresponding improvement in security infrastructure, systems, and features. It is so much so that the severe problem of cybersecurity today is not a lack of technology to mitigate threats; if I had my druthers, it is the challenge of convincing people to embrace these innovations.

Robert Cialdini, in his book, Influence: Science and Practice highlight six principles of influence in cyber security, one of which is the social identity proof theory. The social identity proof principle says, “people tend to have more trust in things that are endorsed by people that they trust.” For instance, an online shopper is more likely to go for a product with more favorable reviews.

Influencing this to cyber security, by making it appear as though the best cybersecurity practices remain the norm, tech companies can help achieve a more secure internet for everyone.


Google Fixes Critical PNG Security Bug, Though Billions of Android Users Still Vulnerable

Many people still adopt poor security strategies, sometimes because of plain ignorance, but also because they do not care. For instance, it is hilarious that no less than six million accounts have their password as either ‘12345’, ‘abcd’, ‘xyz’,‘123456’, ‘1234abcd’ or ‘12345678.’

One way social identity proof can drive positive cybersecurity behaviors are by highlighting the right that others are doing. For instance, allowing a person knows that a certain number of their friends use a certain security feature (for instance, multi-factor authentication) can encourage a person to adopt that feature. But efforts to achieve this sometimes hit the wall.

The Optimistic Favoritism Debate

This has to do with the fact that human beings are more optimistic than what reality presents. In cybersecurity, most people still adopt poor security strategies (such as weak passwords, using the same password for multiple accounts) because they do not consider themselves potential victims.

Even small and medium-sized enterprisesSMEs” the same approach, that only the companies, like, and others are susceptible to. In fact, according to Accenture, only 14 percent of small and medium-sized enterprises “SMEs,” maintain strong defenses against cyber attacks, yet SMEs are the targets of 43% of all cyber attacks.


Vulnerability Disclosure: Navigating The Responsible Disclosure Landscape

The most distressing thing is that all the news about the unprecedented increase in cyber attacks does not seem to produce any beneficial effect. Many people understand that cyber threats are real and deadly to a company; they utterly refuse to believe that their kind of company can be affected.

This is still somewhat connected to the social media cybersecurity principle. Every so often, people consider others who upgrade their security systems as being unnecessarily paranoid, which is undoubtedly not in reality.

There is paranoia; there possesses a profound sense of security. In this information age, has enhanced the most valuable resource, so much so that many big cyber-attacks are not to directly rob the victim of money, but firstly to extract useful data that can be manipulated later.


Electron Framework Vulnerabilities: Securing The Electron Apps Backdoor

Social Media Cybersecurity In Workplace

In most businesses, employees constitute the greatest threat to cyber security, sometimes intentionally, and more often, inadvertently. Enterprises can remedy this by not only providing adequate security systems and infrastructure, but also by giving their employees consistent training on the best and the latest security practices. Performing regular audits of the activities of employees help as well to deter threats at bay.

This is not limited to onshore workers, but extends to remote workers as well. For instance, according to Ashkan Rajaee, the CEO of a software company, TopDevz, in an interview said: “many companies look for an offshore developer to significantly conserve on.” But as an employer of labor, you should factor in your enterprise’s security when considering offshore labor.

Bruce Schneier has long explained that security comprises people, process and technology, and not just the last. Therefore, any system that is not built around people is destined to fail. These social media cybersecurity techniques have to be adopted in ways that do not make the security systems of other people vulnerable to attack. Or would they backfire? Perhaps the exposure.

, , , , , , , , , , , , ,
Previous Post
Dangerous Deepfakes: Analysts Concerned For Growing Prevalence Of Deepfake Technology
Next Post
Big Data, Big Risks 2020: Handling High-Tech And Telecoms Threat Landscape

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed