Connect with us

Tech & Innovation

7 Tips on mitigating cyber risks to your corporate social media in 2023

As many businesses use social media to promote their products and services, these threats are relevant to an extremely large number of companies. To help them stay safe, Kaspersky experts are offering the following advice to mitigate the cyber risks associated with social media in 2023. 

Published

on

Anna Larkina, Web content analysis expert, Kaspersky
and
Roman Dedenok, Spam analysis expert, Kaspersky 

Threats to corporate social media are evolving along with perpetrators’ social engineering skills at a blistering pace. Sometimes their techniques reach such a high level that even the tech-savvy administrator of a corporate network can’t tell the difference between a scam and the truth. 

As many businesses use social media to promote their products and services, these threats are relevant to an extremely large number of companies. To help them stay safe, Kaspersky experts are offering the following advice to mitigate the cyber risks associated with social media in 2023. 

Use caution with direct messages and drafts folder, delete old irrelevant information  

Companies should be careful about keeping sensitive information in direct messages – it can pose cyber risks. 

People often use corporate social media to write directly to brands, asking for help, using the account holder’s product or service. Also, some partnerships, such as those with bloggers, can be negotiated in direct messages. Sometimes personal or financial information is shared during these conversations, which could remain in the messages folder long after the interaction. If there is a breach allowing cyber criminals to gain unauthorized access to the account, sensitive data may be leaked or used to organize an attack.

To avoid this risk, make it a useful habit to delete irrelevant messages when the dialog is finished and the information it contains is no longer relevant. The same applies to posts – It is worth carefully reviewing what is saved in the drafts folder from time to time.

Review old posts to minimize reputational risks  

The power of reputation is growing: every word, action, and decision can either help or harm the company’s image. 

Everything published online is of great importance in terms of cyber security as well: when sensitive information (re)appears in public, it almost always ends up hurting a company’s reputation and could incur financial losses.

To be on the safe side, spend some time reviewing already published posts, as they might contain information that doesn’t fit into the current reality – that might be anything from inappropriate jokes to controversial advertising campaigns.

What was normal yesterday, can cause a negative public reaction today. A review of publications made over the past few years largely reduces related reputational risks.

Be careful posting your success stories 

Having signed a lucrative contract or reached a deal, we want to post it on social media to tell as many people as possible about our success. But we really need to be aware of unwanted cybercriminals’ attention. If a potential attacker knows who your suppliers or contractors are, they could try to conduct an attack impersonating them or breaching their accounts and acting on their behalf. 

Moreover, the clearer you reflect your company’s structure and working methods on social media, the easier it is for perpetrators to organize an attack. For example, if it is possible to trace who is responsible for finance, an attacker can pretend to be this person’s supervisor and try to lure them into urgently transferring a large sum of money to a fake account to “close a deal” or “purchase necessary equipment”. Exercising various social engineering techniques, a perpetrator can convincingly impersonate another person, and a victim would hardly notice the fraud.

Warn newcomers about risks associated with “new job” posts on social media

After getting a new job, newcomers usually share the news on social media, but they do not yet understand how cybersecurity processes are built in this company: for example, how identification works or with whom they can share sensitive information. Therefore, a newcomer is more vulnerable to cyberattacks.

Imagine: a perpetrator tracks this person in social media and collects information about them. Then the criminal writes the new employee a malicious letter on behalf of the company’s IT administrator asking to share the password to set up a technical account.  It is highly likely that a newcomer will share the password because they do not know that the administrators would never write such a letter. Moreover, new employees are usually shy, and they might hesitate to ask their colleagues if the letter is authentic. A tiny little post on social media might turn the employee into an entry point for cybercriminals. 

To mitigate the risk, offer newcomers a course on information security immediately, and tell them to be extremely careful when posting about a new job. 

Control account access (and don’t forget to change the password when an employee leaves) 

Logins, passwords, and access to the email address used to create a social media account are just as valuable as other internal corporate documents. 

If an employee who has access to accounts and authentication data leaves the company, it is useful to apply the same rules as when blocking their access to the corporate network. 

To begin with, change the password for the e-mail account linked to the corporate social network; then unlink the ex-employee’s mobile phone number and check other authentication methods – for example, a spare mailbox.

Do not ignore two-factor authentication 

Any account on a social network, not to mention a corporate one, must be securely protected. Two-factor authentication is an absolutely necessary setting for any type of account.

The email address linked to the account should be as protected as the social media account itself. Often the attack begins with an initial access to email. After breaching an account, an attacker can configure filters in the mailbox settings to delete all support emails from the social network. Therefore, a user will not be able to restore access to their account, because all emails will be deleted automatically. Not to mention that in a stressful situation we won’t be checking which filters are currently configured in our mailbox. 

It is best to register a social media account using a corporate email address. To begin with, it is better protected (assuming the company cares about cybersecurity). Furthermore, in-house security specialists can block access to this mailbox along with all access to the corporate network.

Provide your employees with anti-phishing training 

To mitigate cyber risks in social media networks, it is not enough to protect your company’s account technically, it is equally important to conduct special training for employees on information security, various types of phishing, and other threats.

According to user statistics on the Kaspersky Gamified Assessment Tool, designed to educate workers and to assist managers in measuring their cyber skills, just 11% of nearly 4000 employees demonstrated a high level of cybersecurity awareness in 2022, while 28% could not prove sufficient cybersecurity proficiency.

Attackers use sophisticated methods of social engineering. Even the most advanced representatives of Gen Z can succumb to them. The human factor cannot be reduced to zero, but it can be minimized as much as possible with the help of dedicated training.

Tech & Innovation

Store-specific planogram: AI-driven trend that changes retail space planning

Through advanced tech, retail space planning driven by artificial intelligence is now possible. This is in the form of store-specific planograms. RELEX Solutions, a leading supply chain and retail solutions provider, shares its insights on this emerging trend.

Published

on

In the retail industry, customer expectations are straightforward: they want to easily find the products they need and enjoy a hassle-free shopping experience. If a store falls short in these aspects, it risks losing its place as a preferred shopping destination for customers. That is precisely why the foundation of a great customer experience lies in effective space planning.

Commonly referred to as a planogram, space planning involves optimizing a store’s layout and product placement to enhance customer experiences and increase sales. Effective strategies include positioning high-demand and seasonal items near the entrance, ensuring accessibility and visibility in key areas, and adapting layouts based on sales data and customer feedback.

In the Philippines, planogram preparation is mainly a manual process, although retailers use digital tools for sales data analysis. However, for larger retailers dealing with extensive data and numerous products, manual adjustments can become overwhelming. 

Through advanced tech, retail space planning driven by artificial intelligence is now possible. This is in the form of store-specific planograms. RELEX Solutions, a leading supply chain and retail solutions provider, shares its insights on this emerging trend.

“A store-specific or local planogram is one designed for a particular store or location.  Unlike a standardized planogram that may be used for multiple stores, a local planogram takes into account the unique characteristics of a specific store, such as its layout, customer demographics, and sales data,” said Donald “DJ” Felbaum, Head of Sales for the Philippines at RELEX Solutions. “It is tailored to the individual needs and conditions of that particular location to optimize product placement and merchandising to drive sales and improve customer service.”

However, it is often seen as challenging and time-consuming due to the anticipation of lengthy, costly, and uncertain implementation projects. For instance, imagine a retailer with 1,000 stores, each needing weekly updates to five planograms. If one planner creates ten planograms daily, it would require an impractical workforce of 100 planners, along with ongoing training. But the integration of AI and machine learning automation can address these challenges. AI-powered automation can help users configure parameters and apply them across thousands of planograms, saving costs and avoiding additional expenses related to inventory adjustments for layout and local consumer preferences.

The benefits of AI-generated local planogram optimization also include precise store shelf configuration and a one-touch replenishment model. This approach, which enables immediate stacking of incoming stock onto display units, facilitates one-way inventory that results in cost reduction by eliminating the need for staff to transport excess stock to back rooms, enhancing the efficient use of available storage space, and reducing restock frequency of fast-selling products. 

Furthermore, AI and machine learning automation usher in interactive, standardized merchandising reports. These insights unveil concealed issues and provide both macro and micro data perspectives, empowering retailers to proactively optimize product placement, fine-tune pricing, and enhance inventory management. 

Store-specific planograms epitomize the future of space retail planning, optimizing product placement, and enhancing customer satisfaction. Harnessing advanced technology in retail, this tailored approach allows retailers to adapt swiftly to market changes, leading to elevated customer experience, improved profitability, and fostering brand loyalty.

Continue Reading

Tech & Innovation

Concrete tips for effective SEO strategy

SEO is now more important than ever. More consumers are using the internet to research and purchase the products and services they require.

Published

on

The digital marketing industry is often clouded by myths and misconceptions, particularly when it comes to Search Engine Optimization (SEO). Geek Certified CEO Scott Wilson, SEO presenter with two decades of experience, is here to set the record straight with valuable insights and actionable tips for businesses looking to improve their online presence.

SEO is now more important than ever. More consumers are using the internet to research and purchase the products and services they require. At this very moment in time, someone is searching online, for the products you sell and the services you offer. Will they find you in the jungle we call the internet or connect with one of your many rivals?

Debunking Common SEO Misconceptions

In an industry rife with “snake oil salespeople” and misleading promises, Wilson emphasizes that despite the daily barrage of emails promising to elevate websites to the coveted number one spot for a fee, SEO is not an arcane art shrouded in mystery. Contrary to popular belief, search algorithms from Google and other search engines are not re-written on a daily or even monthly basis. Instead, updates are methodical improvements to refine the process of organizing global information.

Wilson states, “Search rankings among websites are quite stable. We track our customers’ results and their competitors’ monthly, and while there are fluctuations, the overall landscape remains consistent.” Scott’s team’s monitoring of search results over the past 20 years affirms the stability of search rankings when businesses provide an exceptional customer experience.

Truths About SEO: Stability and Quality Over Gimmicks

The core of Wilson’s message is that the quality of the user experience is paramount. Google and other search engines aim to guide users to the most relevant and valuable web pages for their queries. “If you prove to Google by providing an outstanding customer experience, your ranking results will be stable without the need for constant page reinvention,” Wilson advises.

He outlines three pillars essential for maintaining a robust SEO strategy:

1. Substantial Content

Wilson recommends having at least 1500 words of quality content to ensure depth and engagement on your web page.

2. Receiving Links

Just as social media teams request “likes”, Wilson suggests businesses should ask for links from related web pages within their business networks. Search engines treat each link as a vote of confidence.

3. User Interaction

By examining Google Analytics, businesses can ensure that their web pages facilitate interaction. Providing valuable downloadable content, creating smooth e-commerce experiences, and engaging visitors with videos are all strategies to keep users on your page longer.

Real Tips for Real Results

By following these tactics, Wilson promises businesses can achieve higher search engine rankings and attract more qualified leads. “It’s about building a digital space where users can find value and have their needs met effectively,” he explains.

Continue Reading

BizWiz

Micro-entrepreneur ‘hybrid-sells’ with the help of fiber broadband connection

Rogelia Dasco, a Cebu-based homemaker who buys and sells imported goods from the US, does her trade mostly online.

Published

on

The post-pandemic environment demands flexibility and adaptability from everyone but most especially entrepreneurs who are slowly recovering from the pandemic slump. One online Facebook seller is employing her business acumen not just in the virtual marketplace but in real life, as she does “hybrid selling” of her consumer goods.

Rogelia Dasco, a Cebu-based homemaker who buys and sells imported goods from the US, does her trade mostly online.

“The items, like lotions and perfumes, are from the US. My sister sends them, I take a picture of them, and I post them on Facebook Marketplace,” she shares.

However, unlike most online sellers, she doesn’t stop in the virtual world; When she gets to her buyer’s address, she then goes house to house in the community. The strategy pays off – she is able to sell out her goods in one afternoon instead of waiting for online sellers to finish off her inventory.

“When someone buys from me, for example, I go to their house but I bring my other items too. After I deliver to the buyer, I go to the neighbors and offer my other goods. Right now, I’m all sold out. The next shipment will come at the end of the month,” Dasco proudly says.

Supporting this diligent hybrid approach is BIDA fiber, the new mass market offering of Converge targeting the lower C and D income classes.

BIDA fiber is the most affordable postpaid broadband plan in the market today, and the cost savings makes a difference for smaller entrepreneurs.

“It’s so affordable and I’m able to save too. My old plan was priced at P 1,299 with an additional P 200 every month so that’s P 1,499. With BIDA, I’m able to save more than P 500,” said Rogelia Dasco.

The reliable connection – that can go up to 35 Mbps – also makes sure Rogelia keeps her ties with her supplier sister strong as every night they call each other through video. Even with a 3-hour video call, her husband watching YouTube videos, and her son playing Mobile Legends with friends at home, Rogelia’s connection never falters.

“I’ve really maximized my connection. It’s really good, even if we all use the internet at the same time,” she added. BIDA fiber is now available in more than 300 cities and municipalities in the Philippines and has more than 40 partner distributors selling the postpaid plan.

Continue Reading
Advertisement
Advertisement

Like us on Facebook

Trending