{"id":7893,"date":"2024-06-13T22:11:59","date_gmt":"2024-06-13T22:11:59","guid":{"rendered":"https:\/\/tup.kxe.temporary.site\/risks-best-practices-and-tools-for-2024\/"},"modified":"2024-06-13T22:11:59","modified_gmt":"2024-06-13T22:11:59","slug":"risks-best-practices-and-tools-for-2024","status":"publish","type":"post","link":"https:\/\/okdesign.ca\/en\/risks-best-practices-and-tools-for-2024\/","title":{"rendered":"Risks, Best Practices, and Tools for 2024"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>Keeping your social accounts secure is a critical component of your social media strategy. Here, we\u2019ll walk you through the latest social media security risks. Then we\u2019ll explore how you can protect yourself, your brand, and your team.<\/p>\n<div class=\"&#10;&#9;&#9;&#9;&#9;&#9;&#9;content-upgrade _bonusVariantContentUpgrade&#10;&#9;&#9;&#9;&#9;&#9;&#9;style-default&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;\" style=\"&#10;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;&#9;\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<a rel=\"nofollow noopener\" href=\"https:\/\/hootsuite.com\/resources\/blog\/social-media-policy-template\" class=\"cover\" data-ga-track-id=\"blog_contentupgrade_inpost_gate\" target=\"_blank\"><\/p>\n<div class=\"all-content-wrapper\">\n<div class=\"text-wrapper\">\n<p><strong>Bonus: Get a free, customizable <span style=\"text-decoration: underline;\">social media policy template<\/span><\/strong> to quickly and easily create guidelines for your company and employees.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\"><span id=\"What_is_social_media_security\"><a rel=\"nofollow\" id=\"post-471895-_fetwljlxpjg8\"\/>What is social media security?<\/span><\/h2>\n<p>Social media security refers to the practices taken to protect your social media account, information and privacy. These measures provide security from threats like:<\/p>\n<ul>\n<li>Hacking<\/li>\n<li>Phishing<\/li>\n<li>Malware<\/li>\n<li>Data breaches<\/li>\n<li>Identity theft<\/li>\n<li>Spread of misinformation<\/li>\n<\/ul>\n<p>Nowadays, platforms like Instagram, Facebook, and LinkedIn are relied upon for communication, marketing, and customer service. Therefore, <strong>social media security awareness is important for both business and personal accounts<\/strong>.<\/p>\n<h2 class=\"wp-block-heading\"><span id=\"Why_is_social_media_security_awareness_so_important\"><a rel=\"nofollow\" id=\"post-471895-_ua26yudluft2\"\/>Why is social media security awareness so important?<\/span><\/h2>\n<p>Social media accounts contain a wealth of data. They\u2019re linked to personal information, customer connections, credit card details, and so much more. Without social media security protocols in place, all that information is at unnecessary risk.<\/p>\n<h2 class=\"wp-block-heading\"><span id=\"Common_social_media_security_risks\"><a rel=\"nofollow\" id=\"post-471895-_bnlmcny9ehwl\"\/>Common social media security risks<\/span><\/h2>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_wmk3s0qzxe7y\"\/>Phishing and scams<\/h3>\n<p>Phishing scams are some of the most common social media cyber security risks. The goal of a phishing scam is to get you or your employees to hand over passwords, banking details, or other sensitive information.<\/p>\n<p>Fake giveaways are one common type of phishing scam. Fraudsters impersonate companies like Best Buy or Bed Bath and Beyond to offer a significant coupon or prize. Of course, you have to provide personal information to access the non-existent reward.<\/p>\n<p>In another variation, someone claims to be a lottery winner who wants to share their winnings.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"\/>\n<p>Online shopping and investment scams are also significant problems on social media. Losses reported to the FTC that started on social media jumped from <a rel=\"nofollow\" href=\"https:\/\/www.ftc.gov\/news-events\/data-visualizations\/data-spotlight\/2024\/05\/whos-who-scams-spring-roundup\">$237 million in 2020 to $1.4 billion<\/a> in 2023.<\/p>\n<p>Social media is the most common contact method for scammers targeting Americans aged 20 to 69. In fact, 2023 was the first year social media became the primary contact method for those in their 40s through 60s. <\/p>\n<p>Warn your parents and grandparents (and your C-suite)!<\/p>\n<figure class=\"wp-block-image\"><a rel=\"nofollow\" href=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-2.png?ssl=1\"><img data-recalc-dims=\"1\" fetchpriority=\"high\" decoding=\"async\" width=\"620\" height=\"803\" src=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-2-620x803.png?resize=620%2C803&#038;ssl=1\" alt=\"graph of age and fraud loss FTC Consumer Sentinel Network\" class=\"wp-image-471965\" srcset=\"https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-2-620x803.png 620w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-2-310x401.png 310w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-2-768x994.png 768w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-2.png 849w\" sizes=\"(max-width: 620px) 100vw, 620px\"\/><\/a><\/figure>\n<p><em>Source: <\/em><a rel=\"nofollow\" href=\"https:\/\/public.tableau.com\/app\/profile\/federal.trade.commission\/viz\/AgeandFraud\/Infographic\"><em>Federal Trade Commission<\/em><\/a><\/p>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_kgndkpbnfjw0\"\/>Imposter accounts<\/h3>\n<p>It\u2019s relatively easy for an imposter to create a social media account that looks like it belongs to your company. This is one reason why <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/how-to-get-verified-on-facebook\/\"><strong>getting verified<\/strong><\/a><strong> on social networks is so valuable<\/strong>.<\/p>\n<p>Impostor accounts can target your customers, employees, or prospective hires. Your connections may be tricked into handing over confidential information. In turn, your reputation suffers. Imposter accounts may also try to con employees into handing over login credentials for corporate systems.<\/p>\n<p>LinkedIn\u2019s latest <a rel=\"nofollow\" href=\"https:\/\/about.linkedin.com\/transparency\/community-report\">Community report<\/a> notes that they took action on more than 63 million fake accounts in just the last six months of 2023. Most of those accounts (90.5%) were blocked automatically at registration. However, 232,400 fake accounts were only addressed once members reported them.<\/p>\n<figure class=\"wp-block-image\"><a rel=\"nofollow\" href=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-3.png?ssl=1\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"620\" height=\"408\" src=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-3-620x408.png?resize=620%2C408&#038;ssl=1\" alt=\"LinkedIn July to December 2023 Community Report &#10;Fake accounts detected and removed\" class=\"wp-image-471960\" srcset=\"https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-3-620x408.png 620w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-3-310x204.png 310w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-3-768x505.png 768w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-3.png 934w\" sizes=\"(max-width: 620px) 100vw, 620px\"\/><\/a><\/figure>\n<p><em>Source: <\/em><a rel=\"nofollow\" href=\"https:\/\/about.linkedin.com\/transparency\/community-report#fake-accounts-2023-jul-dec\"><em>LinkedIn<\/em><\/a><\/p>\n<p>Meanwhile, Facebook took action on<a rel=\"nofollow\" href=\"https:\/\/transparency.fb.com\/data\/community-standards-enforcement\/fake-accounts\/facebook\/\"> 631 million fake accounts<\/a> between January and March 2024. The social media platform estimates that 4% of monthly active users are fake accounts.<\/p>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_1jcn7qlocgww\"\/>AI information gathering<\/h3>\n<p>There\u2019s a lot of information about your business \u2013 and your employees \u2013\u00a0on social media. That\u2019s not new. What is new is the ability to gather crumbs of information from multiple sources and use it to train an AI tool to produce content.<\/p>\n<p>That makes it easier for bad actors to create convincing, fraudulent social media posts and direct messages.<\/p>\n<p>In fact, 20% of Gen X say it\u2019s hard to tell what\u2019s real or fake regarding <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/ai-compliance\/\">social content generated by AI<\/a>. Younger generations find it only slightly easier: 15% of Millenials and 14% of Gen Z also struggle here.<\/p>\n<figure class=\"wp-block-image\"><a rel=\"nofollow\" href=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-5.png?ssl=1\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"620\" height=\"473\" src=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-5-620x473.png?resize=620%2C473&#038;ssl=1\" alt=\"social content generated by AI graph of agreement with the following statements by age generation category\" class=\"wp-image-471950\" srcset=\"https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-5-620x473.png 620w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-5-310x236.png 310w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-5-768x585.png 768w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-5.png 816w\" sizes=\"(max-width: 620px) 100vw, 620px\"\/><\/a><\/figure>\n<p><em>Source: <\/em><a rel=\"nofollow\" href=\"https:\/\/www.hootsuite.com\/en-gb\/research\/social-trends\"><em>Hootsuite Social Media Consumer 2024 Survey<\/em><\/a><\/p>\n<p>Fraudsters can also use information gathered from social media to train an AI tool. They are then well-equipped to contact your employees through other means. AI social media and search tools can also support scammers by seeming to verify false information.<\/p>\n<p>Case and point: A Canadian man was<a rel=\"nofollow\" href=\"https:\/\/www.cbc.ca\/news\/canada\/manitoba\/facebook-customer-support-scam-1.7219581\"> recently scammed<\/a> by a fraudulent Facebook customer support line. He felt comfortable giving his information to the scammer because a chat with Meta AI told him the phone number he found online was legitimate. (It was not.)<\/p>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_yt8rslwv1v7\"\/>Malware attacks and hacks<\/h3>\n<p>In one of the more embarrassing recent social media cyber security incidents, the X (formerly Twitter) U.S. Security and Exchange Commission account was <a rel=\"nofollow\" href=\"https:\/\/www.sec.gov\/secgov-x-account\">hacked in January<\/a>.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The <a rel=\"nofollow\" href=\"https:\/\/twitter.com\/SECGov?ref_src=twsrc%5Etfw\">@SECGov<\/a> X account was compromised, and an unauthorized post was posted. The SEC has not approved the listing and trading of spot bitcoin exchange-traded products.<\/p>\n<p>\u2014 U.S. Securities and Exchange Commission (@SECGov) <a rel=\"nofollow\" href=\"https:\/\/twitter.com\/SECGov\/status\/1744837121406349714?ref_src=twsrc%5Etfw\">January 9, 2024<\/a><\/p><\/blockquote>\n<\/div>\n<\/figure>\n<p>If hackers gain access to your social media accounts, they can cause enormous brand reputation damage. <\/p>\n<p>A newer threat to <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-for-business\/\">social media business accounts<\/a> is hijacking a social media ad account with attached payment methods. They can then run fraudulent ads that appear to come from a legitimate source (you!) but actually direct the user to malware or scams (bad!).<\/p>\n<figure class=\"wp-block-image\"><a rel=\"nofollow\" href=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-4.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"353\" src=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-4-620x353.png?resize=620%2C353&#038;ssl=1\" alt=\"graph of security risks threat groups targeting Meta Business accounts\" class=\"wp-image-471955\" srcset=\"https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-4-620x353.png 620w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-4-310x176.png 310w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-4-768x437.png 768w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-4.png 1118w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\"\/><\/a><\/figure>\n<p><em>Source: <\/em><a rel=\"nofollow\" href=\"https:\/\/labs.withsecure.com\/publications\/meet-the-ducks\"><em>W\/Labs<\/em><\/a><\/p>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_zao2l82j84d4\"\/>Vulnerable third-party apps<\/h3>\n<p>Locking down your own social accounts is great. But <strong>hackers may still be able to gain access through vulnerabilities in connected third-party apps<\/strong>.<\/p>\n<p>Instagram<a rel=\"nofollow\" href=\"https:\/\/help.instagram.com\/588549329146493\"> specifically warns<\/a> about third-party apps that claim to provide likes or followers:<\/p>\n<p>\u201cIf you give these apps your login information \u2026 they can gain complete access to your account. They can see your personal messages, find information about your friends, and potentially post spam or other harmful content on your profile. This puts your security, and the security of your friends, at risk.\u201d<\/p>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_sl9w323jcex0\"\/>Password theft<\/h3>\n<p>Those social media quizzes asking about your first car or elf name might seem like harmless fun. But they\u2019re a common method for gathering password information. Or to learn personal details that are often used as forgotten password clues.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"\/>\n<p>By completing them, employees can compromise their cyber security on social media.<\/p>\n<p>Employees can also unwittingly provide clues to their forgotten password hints. This info may appear in posts about life events. Think: graduations, weddings, and birthdays. It\u2019s always best to limit personal information shared online, especially on public profiles.<\/p>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_fd0pemf9tj6x\"\/>Privacy settings and data security<\/h3>\n<p>People seem to be well aware of the potential privacy risks of using social media. Those concerns, of course, don\u2019t stop people from using their favorite social channels. The number of active social media users grew to<a rel=\"nofollow\" href=\"https:\/\/www.statista.com\/statistics\/617136\/digital-population-worldwide\/\"> 5.07 billion<\/a> as of April 2024.<\/p>\n<p><strong>Make sure you \u2013 and your team \u2013 understand privacy policies and settings<\/strong>. This applies to both your personal and business accounts. Provide privacy guidelines for employees who use their personal social accounts at work, or to talk about work.<\/p>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_dn8deer7hfim\"\/>Unsecured mobile phones<\/h3>\n<p>Surprisingly, <a rel=\"nofollow\" href=\"https:\/\/www.pewresearch.org\/internet\/2023\/10\/18\/how-americans-protect-their-online-data\/#:~:text=Smartphone%20access&amp;text=Among%20smartphone%20owners%2C%2016%25%20say,passcode%2C%20fingerprint%20or%20face%20recognition.\">16% <\/a>of Americans never use phone locking features such as a passcode, fingerprint, or face recognition. Their social accounts and other data are completely accessible to anyone who gets their hands on their mobile device.<\/p>\n<figure class=\"wp-block-image\"><a rel=\"nofollow\" href=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-6.png?ssl=1\"><img data-recalc-dims=\"1\" loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"820\" src=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-6.png?resize=620%2C820&#038;ssl=1\" alt=\"16% of smartphone owners don't use a security feature to unlock their device, older adults especially prefer not to\" class=\"wp-image-471945\" srcset=\"https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-6.png 620w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-6-310x410.png 310w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\"\/><\/a><\/figure>\n<p><em>Source: <\/em><a rel=\"nofollow\" href=\"https:\/\/www.pewresearch.org\/internet\/2023\/10\/18\/how-americans-protect-their-online-data\/pi_2023-10-18_data-privacy_2-06-png\/\"><em>Pew Research Center<\/em><\/a><\/p>\n<p>Failing to update phone software also exposes users to unnecessary risk. Only<a rel=\"nofollow\" href=\"https:\/\/www.pewresearch.org\/internet\/2023\/10\/18\/how-americans-protect-their-online-data\/#:~:text=Smartphone%20access&amp;text=Among%20smartphone%20owners%2C%2016%25%20say,passcode%2C%20fingerprint%20or%20face%20recognition.\"> 42%<\/a> of American smartphone users have their software set to update automatically, and 3% never update their smartphone software at all.<\/p>\n<h2 class=\"wp-block-heading\"><span id=\"Social_media_security_best_practices_for_2024\"><a rel=\"nofollow\" id=\"post-471895-_numdoyk6s3gg\"\/>Social media security best practices for 2024<\/span><\/h2>\n<p>Now that you know the risks, here are some <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-risk-management\/\">ways to mitigate them<\/a>.<\/p>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_nsg3qwsi712n\"\/>Implement a detailed social media policy<\/h3>\n<p>A <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-policy-for-employees\/\">social media policy<\/a> is a set of guidelines that outline how your business and your employees should use social media responsibly.<\/p>\n<p>At a minimum, the security section of your social media policy should include:<\/p>\n<ul>\n<li>Rules related to personal social media use on business equipment<\/li>\n<li>Social media activities to avoid, like quizzes that ask for personal information<\/li>\n<li>Which departments or team members are <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-governance\/\">responsible for each social media account<\/a><\/li>\n<li><a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-guidelines\/\">Guidelines<\/a> on how to create an effective password and how often to change passwords<\/li>\n<li>Expectations for keeping software and devices updated<\/li>\n<li>How to identify and avoid scams, attacks, and other security social media threats<\/li>\n<li>Who to notify and how to respond if a social media security concern arises<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_5915iivciyfl\"\/>Set up an approval process<\/h3>\n<p>Limiting the number of people who can access and post on your social accounts is an important defensive strategy.<\/p>\n<p>You might focus on threats coming from outside your organization. However, employees are a significant source of accidental data breaches.<\/p>\n<p>You may have whole teams of people working on social media messaging, post creation, or customer service. But not everyone needs to know the passwords to your social accounts \u2013 or have the ability to post.<\/p>\n<p>You can use<a rel=\"nofollow\" href=\"https:\/\/hootsuite.com\/\"> Hootsuite<\/a> to collaborate on secure social media without sharing passwords. Then, the post goes into an approval workflow.<\/p>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper\">\n<p><iframe title=\"Approving Posts Composed by Team Members\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/nv2eb8-KMzA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<\/figure>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_9thdkb1z8n02\"\/>Use two-factor authentication<\/h3>\n<p>Two-factor authentication is not foolproof. But it does provide <strong>a powerful extra layer of protection for your social media accounts<\/strong>. It\u2019s best practice to enable it for all secure social media accounts, even if it can sometimes be annoying.<\/p>\n<p>In fact, a lack of two-factor authentication contributed to the SEC Twitter account hack.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">We can confirm that the account <a rel=\"nofollow\" href=\"https:\/\/twitter.com\/SECGov?ref_src=twsrc%5Etfw\">@SECGov<\/a> was compromised and we have completed a preliminary investigation. Based on our investigation, the compromise was not due to any breach of X\u2019s systems, but rather due to an unidentified individual obtaining control over a phone number\u2026<\/p>\n<p>\u2014 Safety (@Safety) <a rel=\"nofollow\" href=\"https:\/\/twitter.com\/Safety\/status\/1744924042681897343?ref_src=twsrc%5Etfw\">January 10, 2024<\/a><\/p><\/blockquote>\n<\/div>\n<\/figure>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_lip0h8rvrnw2\"\/>Set up an early warning system with social media security monitoring tools<\/h3>\n<p>Keep an eye on all of your social channels. That includes the ones you use every day and those you\u2019ve registered but never used.<\/p>\n<p>Use your <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-listening-business\/\">social media monitoring plan<\/a> to watch for:<\/p>\n<ul>\n<li>Imposter accounts<\/li>\n<li>Suspicious activities<\/li>\n<li>Inappropriate mentions of your brand by employees<\/li>\n<li>Inappropriate mentions of your brand by anyone else associated with the company<\/li>\n<li>Negative conversations about your brand<\/li>\n<\/ul>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_e14v6a8226tm\"\/>Regularly review your social media security measures<\/h3>\n<p>Social media security threats are constantly changing. <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-audit-template\/\">Regular audits<\/a> of your social media security measures will help keep you ahead of fraudsters.<\/p>\n<p>At least once a quarter, be sure to review:<\/p>\n<h4 class=\"wp-block-heading\">Social network privacy and security settings<\/h4>\n<p>Social media companies routinely update their privacy and security settings. For example, X (formerly Twitter) <a rel=\"nofollow\" href=\"https:\/\/help.twitter.com\/en\/managing-your-account\/issues-with-login-authentication\">disabled<\/a> two-factor authentication via text message for non-premium users in March 2023. <\/p>\n<p>In April 2024, the platform rolled out Passkeys as a login for all iOS users worldwide. Both are important security changes that should be addressed in your social media policy.<\/p>\n<h4 class=\"wp-block-heading\">Access and publishing privileges and approval workflows<\/h4>\n<p>Regularly checking who has access to your social media management platform and publishing privileges on your social accounts. <\/p>\n<p>Update as needed. Make sure all former employees have had their access revoked. Check for anyone who\u2019s changed roles and no longer needs the same level of access.<\/p>\n<h4 class=\"wp-block-heading\">Recent online security threats<\/h4>\n<p>Maintain a good relationship with your company\u2019s IT team to improve your <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-security-awareness\/\">social media security awareness<\/a>. <\/p>\n<p>They can keep you informed of any new security risks and social engineering attacks. And keep an eye on the news\u2014big hacks and major new threats will be reported in mainstream news outlets.<\/p>\n<h4 class=\"wp-block-heading\">Your social media policy<\/h4>\n<p>As new networks gain popularity, security best practices change, and new threats emerge. A quarterly review will ensure this document remains useful and helps to keep your social accounts safe.<\/p>\n<h2 class=\"wp-block-heading\"><span id=\"3_Social_media_security_tools_to_keep_your_channels_safe\"><a rel=\"nofollow\" id=\"post-471895-_fb5ciwx53zy0\"\/>3 Social media security tools to keep your channels safe<\/span><\/h2>\n<h3 class=\"wp-block-heading\"><a rel=\"nofollow\" id=\"post-471895-_9utole5fmwae\"\/>1. Hootsuite<\/h3>\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper\">\n<p><iframe title=\"How to streamline your social media workflow (FREE TEMPLATE)\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/BHtqSrNnXws?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<\/figure>\n<p>With<a rel=\"nofollow\" href=\"https:\/\/hootsuite.com\/\"> Hootsuite<\/a>, team members never need to know the login information for any social network account. You can control access and permission, so everyone gets only the necessary access.<\/p>\n<p>You can then build an<a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-approval-workflow\/\"> approval workflow<\/a> that automatically bumps content from the creator to the approver. Notifications ensure everyone knows when they need to complete an approval or revision task.<\/p>\n<p>If someone leaves the company, you can disable their account without changing social media passwords.<\/p>\n<p><strong>You can add an extra level of security with<\/strong><a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/proofpoint-social-media\/\"><strong> Hootsuite\u2019s Proofpoint integration<\/strong><\/a>. This<a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-compliance\/\"> compliance<\/a> software automatically reviews social content before publishing. This ensures it follows your social policy and relevant legislation and regulations.<\/p>\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"590\" src=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2023\/03\/social-media-security-12-620x590.png?resize=620%2C590&#038;ssl=1\" alt=\"supervision compliance\" class=\"wp-image-472053\" srcset=\"https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2023\/03\/social-media-security-12-620x590.png 620w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2023\/03\/social-media-security-12-310x295.png 310w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2023\/03\/social-media-security-12-768x731.png 768w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2023\/03\/social-media-security-12.png 777w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\"\/><\/figure>\n<p><strong>Psstt:<\/strong> <a rel=\"nofollow\" href=\"https:\/\/help.hootsuite.com\/hc\/en-us\/articles\/1260804249450-Add-publishing-security-with-Proofpoint#manage-proofpoint-in-hootsuite-0-0\">Learn more about setting up Proofpoint here.<\/a><\/p>\n<p>Hootsuite is also an effective<a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/social-media-monitoring-tools\/\"> social monitoring<\/a> tool that keeps you ahead of threats. It monitors social networks for mentions of your brand and keywords. You then know right away when suspicious conversations about your brand emerge. <\/p>\n<p>For example, say people are sharing phony coupons, or an imposter account starts tweeting in your name. You\u2019ll see that activity in your streams and can take action before your customers get scammed.<\/p>\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"284\" src=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/Social-media-security-10-620x284.png?resize=620%2C284&#038;ssl=1\" alt=\"Hootsuite Streams\" class=\"wp-image-471980\" srcset=\"https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/Social-media-security-10-620x284.png 620w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/Social-media-security-10-310x142.png 310w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/Social-media-security-10-768x352.png 768w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/Social-media-security-10.png 1384w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\"\/><\/figure>\n<p><strong>Psstt: <\/strong>Hootsuite is also FedRamp authorized and Cyber Essentials compliant.<a rel=\"nofollow\" href=\"https:\/\/www.hootsuite.com\/trust-center\/compliance#\"> Learn more about our risk management program and information security policies<\/a>.<\/p>\n<h3 class=\"wp-block-heading\"><strong>2. <\/strong><a rel=\"nofollow\" href=\"https:\/\/www.zerofox.com\/\">ZeroFOX<\/a><\/h3>\n<figure class=\"wp-block-image size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"353\" src=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-7-620x353.png?resize=620%2C353&#038;ssl=1\" alt=\"Zero\" class=\"wp-image-471940\" style=\"width:640px;height:auto\" srcset=\"https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-7-620x353.png 620w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-7-310x177.png 310w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-7-768x438.png 768w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-7.png 784w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\"\/><\/figure>\n<p><em>Source: <\/em><a rel=\"nofollow\" href=\"https:\/\/www.zerofox.com\/protection\/\"><em>ZeroFOX<\/em><\/a><\/p>\n<p>ZeroFOX is a cybersecurity platform that provides automated alerts of:<\/p>\n<ul>\n<li>Dangerous, threatening, or offensive social content targeting your brand<\/li>\n<li>Malicious links posted on your social accounts<\/li>\n<li>Scams targeting your business and customers<\/li>\n<li>Fraudulent accounts impersonating your brand<\/li>\n<\/ul>\n<p>It also helps protect against hacking and phishing attacks.<\/p>\n<h3 class=\"wp-block-heading\">3. <a rel=\"nofollow\" href=\"https:\/\/brandfort.co\/\">BrandFort<\/a><\/h3>\n<figure class=\"wp-block-image size-full is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" loading=\"lazy\" decoding=\"async\" width=\"583\" height=\"625\" src=\"https:\/\/i0.wp.com\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-8.png?resize=583%2C625&#038;ssl=1\" alt=\"BrandFort content moderation tool removes spam in comments\" class=\"wp-image-471935\" style=\"width:640px;height:auto\" srcset=\"https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-8.png 583w, https:\/\/blog.hootsuite.com\/wp-content\/uploads\/2024\/06\/social-media-security-8-310x332.png 310w\" sizes=\"auto, (max-width: 583px) 100vw, 583px\"\/><\/figure>\n<p><em>Source: <\/em><a rel=\"nofollow\" href=\"https:\/\/brandfort.co\/\"><em>Brandfort<\/em><\/a><\/p>\n<p>BrandFort can help protect your social accounts from spam and phishing comments, and other <a rel=\"nofollow\" href=\"https:\/\/blog.hootsuite.com\/content-moderation\">content moderation issues.<\/a><\/p>\n<p>Why are spam comments a cyber security and social media risk? They\u2019re visible on your profiles and may entice legitimate followers or employees to click through to scam sites. You\u2019ll have to deal with the fallout, even though you did not directly share the spam.<\/p>\n<p>Brandfort also detects and hides personally identifiable information that followers post in comments on your posts. This helps protect them from phishing and fraud attacks.Plus, BrandFort uses AI to detect problem comments in multiple languages and hide them automatically. <\/p>\n<p>Plus, you can integrate Brandfort <a rel=\"nofollow\" href=\"https:\/\/apps.hootsuite.com\/apps\/brandfort\">directly into the Hootsuite dashboard<\/a>.<\/p>\n<p><strong>Easily manage all your company\u2019s social media profiles using Hootsuite. From a single dashboard, you can schedule and publish posts, engage your followers, monitor relevant conversations, measure results, manage your ads, and much more.<\/strong><\/p>\n<div class=\"side-rail-container\">\n<div class=\"side-rail-cta-inner-wrapper\">\n<div class=\"side-rail-cta style-default  rail-light\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<!-- <img decoding=\"async\" class=\"icon\" src=\"https:\/\/blog.hootsuite.com\/wp-content\/plugins\/hs-content-upgrades\/images\/guide-icon.svg\"> --><\/p>\n<p>Do it better with <strong>Hootsuite<\/strong>, the <strong>all-in-one social media tool. <\/strong>Stay on top of things, grow, and beat the competition.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><script async src=\"\/\/www.instagram.com\/embed.js\"><\/script><br \/>\n<br \/><br \/>\n<br \/><a href=\"https:\/\/blog.hootsuite.com\/social-media-security-for-business\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Keeping your social accounts secure is a critical component of your social media strategy. Here, we\u2019ll walk you through the latest social media security risks. Then we\u2019ll explore how you can protect yourself, your brand, and your team. Bonus: Get a free, customizable social media policy template to quickly and easily create guidelines for your [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7894,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-7893","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-agency"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.8 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Risks, Best Practices, and Tools for 2024 - OK Design<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/okdesign.ca\/en\/risks-best-practices-and-tools-for-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risks, Best Practices, and Tools for 2024\" \/>\n<meta property=\"og:description\" content=\"Keeping your social accounts secure is a critical component of your social media strategy. Here, we\u2019ll walk you through the latest social media security risks. Then we\u2019ll explore how you can protect yourself, your brand, and your team. Bonus: Get a free, customizable social media policy template to quickly and easily create guidelines for your [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/okdesign.ca\/en\/risks-best-practices-and-tools-for-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"OK Design\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/okdesign.ca\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-13T22:11:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"OK Design\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OK Design\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/\"},\"author\":{\"name\":\"OK Design\",\"@id\":\"https:\/\/okdesign.ca\/en\/#\/schema\/person\/a8cdeff6d4fdb205ceabe60a22c77a75\"},\"headline\":\"Risks, Best Practices, and Tools for 2024\",\"datePublished\":\"2024-06-13T22:11:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/\"},\"wordCount\":2288,\"publisher\":{\"@id\":\"https:\/\/okdesign.ca\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png?fit=1080%2C1080&ssl=1\",\"articleSection\":[\"Agency\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/\",\"url\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/\",\"name\":\"Risks, Best Practices, and Tools for 2024 - OK Design\",\"isPartOf\":{\"@id\":\"https:\/\/okdesign.ca\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png?fit=1080%2C1080&ssl=1\",\"datePublished\":\"2024-06-13T22:11:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png?fit=1080%2C1080&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png?fit=1080%2C1080&ssl=1\",\"width\":1080,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/okdesign.ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risks, Best Practices, and Tools for 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/okdesign.ca\/en\/#website\",\"url\":\"https:\/\/okdesign.ca\/en\/\",\"name\":\"OK Design - Conception Graphiques et Sites Web\",\"description\":\"Conception graphique et sites Web\",\"publisher\":{\"@id\":\"https:\/\/okdesign.ca\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/okdesign.ca\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/okdesign.ca\/en\/#organization\",\"name\":\"OK Web Design\",\"url\":\"https:\/\/okdesign.ca\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/okdesign.ca\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2020\/09\/OKDesign-W.png?fit=7001%2C1376&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2020\/09\/OKDesign-W.png?fit=7001%2C1376&ssl=1\",\"width\":7001,\"height\":1376,\"caption\":\"OK Web Design\"},\"image\":{\"@id\":\"https:\/\/okdesign.ca\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/okdesign.ca\",\"https:\/\/www.instagram.com\/okdesignca\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/okdesign.ca\/en\/#\/schema\/person\/a8cdeff6d4fdb205ceabe60a22c77a75\",\"name\":\"OK Design\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/414d6a655f4d2b769d207dd5f01fd608ffbb3f6a8992a451bdb6d00e62dac102?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/414d6a655f4d2b769d207dd5f01fd608ffbb3f6a8992a451bdb6d00e62dac102?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/414d6a655f4d2b769d207dd5f01fd608ffbb3f6a8992a451bdb6d00e62dac102?s=96&d=mm&r=g\",\"caption\":\"OK Design\"},\"sameAs\":[\"https:\/\/tup.kxe.temporary.site\"],\"url\":\"https:\/\/okdesign.ca\/en\/author\/okdesign\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Risks, Best Practices, and Tools for 2024 - OK Design","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/okdesign.ca\/en\/risks-best-practices-and-tools-for-2024\/","og_locale":"en_US","og_type":"article","og_title":"Risks, Best Practices, and Tools for 2024","og_description":"Keeping your social accounts secure is a critical component of your social media strategy. Here, we\u2019ll walk you through the latest social media security risks. Then we\u2019ll explore how you can protect yourself, your brand, and your team. Bonus: Get a free, customizable social media policy template to quickly and easily create guidelines for your [&hellip;]","og_url":"https:\/\/okdesign.ca\/en\/risks-best-practices-and-tools-for-2024\/","og_site_name":"OK Design","article_publisher":"https:\/\/www.facebook.com\/okdesign.ca","article_published_time":"2024-06-13T22:11:59+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png","type":"image\/png"}],"author":"OK Design","twitter_card":"summary_large_image","twitter_misc":{"Written by":"OK Design","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#article","isPartOf":{"@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/"},"author":{"name":"OK Design","@id":"https:\/\/okdesign.ca\/en\/#\/schema\/person\/a8cdeff6d4fdb205ceabe60a22c77a75"},"headline":"Risks, Best Practices, and Tools for 2024","datePublished":"2024-06-13T22:11:59+00:00","mainEntityOfPage":{"@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/"},"wordCount":2288,"publisher":{"@id":"https:\/\/okdesign.ca\/en\/#organization"},"image":{"@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png?fit=1080%2C1080&ssl=1","articleSection":["Agency"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/","url":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/","name":"Risks, Best Practices, and Tools for 2024 - OK Design","isPartOf":{"@id":"https:\/\/okdesign.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#primaryimage"},"image":{"@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png?fit=1080%2C1080&ssl=1","datePublished":"2024-06-13T22:11:59+00:00","breadcrumb":{"@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#primaryimage","url":"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png?fit=1080%2C1080&ssl=1","contentUrl":"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png?fit=1080%2C1080&ssl=1","width":1080,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/okdesign.ca\/risks-best-practices-and-tools-for-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/okdesign.ca\/"},{"@type":"ListItem","position":2,"name":"Risks, Best Practices, and Tools for 2024"}]},{"@type":"WebSite","@id":"https:\/\/okdesign.ca\/en\/#website","url":"https:\/\/okdesign.ca\/en\/","name":"OK Design - Conception Graphiques et Sites Web","description":"Conception graphique et sites Web","publisher":{"@id":"https:\/\/okdesign.ca\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/okdesign.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/okdesign.ca\/en\/#organization","name":"OK Web Design","url":"https:\/\/okdesign.ca\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/okdesign.ca\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2020\/09\/OKDesign-W.png?fit=7001%2C1376&ssl=1","contentUrl":"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2020\/09\/OKDesign-W.png?fit=7001%2C1376&ssl=1","width":7001,"height":1376,"caption":"OK Web Design"},"image":{"@id":"https:\/\/okdesign.ca\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/okdesign.ca","https:\/\/www.instagram.com\/okdesignca\/"]},{"@type":"Person","@id":"https:\/\/okdesign.ca\/en\/#\/schema\/person\/a8cdeff6d4fdb205ceabe60a22c77a75","name":"OK Design","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/414d6a655f4d2b769d207dd5f01fd608ffbb3f6a8992a451bdb6d00e62dac102?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/414d6a655f4d2b769d207dd5f01fd608ffbb3f6a8992a451bdb6d00e62dac102?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/414d6a655f4d2b769d207dd5f01fd608ffbb3f6a8992a451bdb6d00e62dac102?s=96&d=mm&r=g","caption":"OK Design"},"sameAs":["https:\/\/tup.kxe.temporary.site"],"url":"https:\/\/okdesign.ca\/en\/author\/okdesign\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/okdesign.ca\/wp-content\/uploads\/2024\/06\/social-media-security.png?fit=1080%2C1080&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/posts\/7893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/comments?post=7893"}],"version-history":[{"count":0,"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/posts\/7893\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/media\/7894"}],"wp:attachment":[{"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/media?parent=7893"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/categories?post=7893"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/okdesign.ca\/en\/wp-json\/wp\/v2\/tags?post=7893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}