Social Media
Social Media
• Social media refers to the means of interactions among people • Image-based forms of entertainment have grown in popularity • Forums are crucial because they provide users with a place to Social media Theory: Content
in which they in recent years. pose queries and receive responses from • Content forms the backbone of social media for commercial use.
create, share, and/or exchange information and ideas in virtual • Infographics, pictures, and visuals attract the attention of users a wide variety of sources. • Having strong content contributes to many goals of social media
communities and more than text. • These platforms are intended to initiate interactions based on marketing and is the key to leveraging those all-important
networks. • Pinterest, Instagram, and Snapchat are social networking common interests or out of simple curiosity. algorithms.
• The Office of Communications and Marketing manages the main applications meant to facilitate the • Reddit and Quora are examples of such platforms. • Broadly speaking, social media content comprises of three
Facebook, sharing of photos. • Although individuals are not as easily identified on these different elements.
Twitter, Instagram, LinkedIn and YouTube accounts. • According to the adage "a picture is worth a thousand words," platforms as they are on others, the offered • Every piece of content shared on social media has a varying
• Social media platforms allow users to have conversations, share the use of images can have knowledge and value are what make these platforms valuable. degree of self- promotion, value-adding, and interaction:
information and numerous positive benefits. • Businesses can gain a deeper grasp of how consumers feel • Self-promotion – something directly selling goods or promoting
create web content. • Its engaging with their brand, people in business should about niche-relevant products, services, and the brand to its audience
encourage their audience to create original subjects. • Value-adding – entertaining the audience in some way; creating
Types of Social Media content. • It is a means to obtain unvarnished opinions and participate in a positive reaction
Traditional social networking sites Video sharing/streaming platforms the everyday conversations your • Interaction – aiming to make an actual two-way conversation
• It is primarily used to connect with family, friends, etc. • One of the most captivating and engaging forms of material is customer. with individuals online
• They emphasize interpersonal talks more. In addition to video content. Blogs and Community platforms Social Media Content Matrix
personal talks, these platforms promote • According to marketers and business owners, employing videos • Blogs are an excellent tool for organizations and marketers to • The derivation of this matrix forms what looks like a symmetric
the exchange of knowledge. has yielded great benefits. reach their target Venn diagram consisting of three overlapping circles.
• Systems support a variety of content formats, including text, • This type of content facilitates assimilation and comprehension, audience with relevant content. • The content matrix is a simplified ‘Reuleaux triangle’, which is
photographs, videos, and other which is why it is so popular among users. • Tumblr and Medium enable users to create communities where formed in the Centre of the Venn diagram.
creative content kinds. • YouTube is a significant platform that has transformed how individuals with • The circles represent value-adding, interactive and self-
• They are regarded as the communication hub and a jack-of-all- consumers interact with video content. similar interests may follow them and read what they have to say promotion and, therefore, show what kind of communication
trades. • More than one billion monthly active users, the platform about particular would fall outside the central social media content matrix.
• Users are able to generate unique, engaging material, share functions as a search engine for the majority of users. topics. Social media Theory: Strategy
their opinions, and form interest-based • People frequently use search engines to find video content that • Businesses can develop blogs on these platforms or on their • The model for social media strategy development is built on the
groups. answers their questions. website to provide three contributing factors; the social media goals, the brand and
• These websites are developed around the social requirements • This type of content can be utilized by a business or brand to further brand information. the audience.
of the users and everything that is communicate with clients, promote a new product, answer • Curating material that not only identifies you as an authority but • A number of factors determining and ways of deriving all three
significant to them. inquiries, and shine also allows of these component parts.
light on features and bundles. customers to freely express their opinions demonstrates your
brand's relatability.
• The combination of the goals, brand and audience give rise to Social Penetration Theory (SPT) Value of social media What is Video Conferencing?
three other vital elements of an effective social media strategy; • The theory was formulated by psychologists Irwin Altman and 1. Personal Connection and Expression Video conferencing is a technology that allows individuals or
your ‘hit list’, what your value-adding content looks like . Dalmas Taylor in 1973 to understand relationship development Communication: Social media bridges geographical gaps, enabling groups to communicate in real-time using audio and video over
Social selling and Interaction theory between individuals. real-time communication with friends, family, and colleagues. the internet. It facilitates face-to-face interaction without
• Social media is such a unique marketing channel because of the • It is also called the“onion theory” of personality, since “layers” Support Networks: It offers spaces for people to find requiring participants to be in the same physical location.
transparent, two-way potential of interaction. of personality are penetrated as time passes and intimacy grows. communities, share experiences, and receive emotional support. Key Features of Video Conferencing
• Rather than broadcasting corporate messages, brands could • SPT was developed to explain the evolution of interpersonal 2. Professional and Business Growth 1.Live Video and Audio
engage consumers on an individual basis as well as generate leads relationships. Marketing and Branding: Social media helps businesses promote Enables participants to see and hear each other, simulating an in-
in a very targeted fashion. • The social penetration theory states that the relationship products and build brands at low costs. Platforms like Instagram, person meeting experience.
• JC Social Media developed the concept of ‘conversation drivers’ development occurs primarily through self-disclosure, or LinkedIn, and TikTok enable targeted advertising and direct 2.Screen Sharing
which is just one of the ways brands can locate prospects,typically intentionally revealing personal information such as personal engagement with consumers. •Participants can share their computer screens to present slides,
on Twitter. motives or desires, feelings, thoughts, and experiences to Networking: Professionals use platforms like LinkedIn to connect documents, or other content during the meeting.
• This kind of tactic is sometimes balled up in a concept known as others. with peers, discover opportunities, and advance their careers. 3.Chat Functionality
‘social listening’, which is also used to gauge brand sentiment • This theory is also guided by the assumptions that relationship E-commerce: Many social media platforms integrate shopping •Allows users to send text messages, links, or files within the
online. development is systematic and predictable. features, driving sales and connecting businesses to global video conferencing platform.
• Beyond the concept of listening, however, social platforms like Strong and Weak Ties Theory markets. 4.Recording
Twitter and, increasingly, Instagram give us the opportunity to sell • It derives by Nick Granovetter . 3. Access to Information and Education •Meetings can often be recorded for future reference, training, or
to consumers quite directly. • The Strong and Weak Ties Theory says that people relationship News and Trends: Social media is a primary source for breaking documentation purposes.
Social Exchange Theory (SET) levels depends on time, emotional intensity, intimacy news, updates, and trending topics worldwide. 5.Collaboration Tools
• It is defined by sociologist, George Homans . and reciprocal service. Learning Opportunities: Platforms like YouTube and Instagram •Includes virtual whiteboards, polls, and annotation features for
• Social exchange as the exchange of activity, tangible or • The weaker connections also serve an important purpose, they offer free tutorials, skill-building content, and educational interactive discussions.
intangible, and rewarding or costly, between at least two persons. help you connect to another part of the world that we resources. 6.Breakout Rooms
• SET is influenced by a social psychological and sociological may not be aware of. 4. Social Awareness and Advocacy •Some platforms allow dividing participants into smaller groups
perspective. • Ties in social networks is defined as follows: a strong tie as being Amplifying Voices: It provides a platform for marginalized groups for focused discussions or workshops.
• It has been generally analyzed by comparing human interactions your close friend and a weak tie as your remote to share their stories and advocate for change. 7.Integration with Calendars and Apps
with the marketplace. friend. Campaigns and Movements: Social media has been instrumental •Video conferencing tools often integrate with calendars (e.g.,
• They are including reciprocity, fairness and negotiated rules, • An average Facebook user, who has no experience with social in driving social movements like #MeToo, #BlackLivesMatter, and Google Calendar) and productivity apps like Slack or Microsoft
with information, approval, respect, power, group gain and network theory or has never heard of Granovetters climate change awareness. Teams.
personal satisfaction among the rewards in successful theory, the individuals with few weak ties will be deprived of 6. Data and Analytics 8. Multi-Device Support
transactions.” information from distant parts of the social system and Businesses and organizations use social media data to understand •Accessible on various devices such as laptops, tablets, and
will be confined to the provincial news and views of consumer behavior, market trends, and feedback, aiding decision- smartphones, making it versatile and convenient.
their close friends making. Types of Video Conferencing
1. One-on-One Video Conferencing SOCIAL MEDIA MARKETING USING TWITTER SOCIAL MEDIA MARKETING USING FACEBOOK Limiting Personal Information on LinkedIn: Why and How
• Description: A direct communication between two • Focus on Brand promotions & microblogging (140 characters). • Side banner showing the company details such as what we are, LinkedIn is a powerful professional networking platform, but
participants, similar to a personal phone call but with video. • Build strong & powerful relation ship with prospective what we do, contact us etc sharing too much personal information can expose you to privacy
• Remote interviews customers. We can include our new product details - banner risks, unwanted contacts, or even professional harm. Here’s why
• Client consultations Attractive bio increases popularity . We can publish notes and create groups. and how you should limit personal information on LinkedIn:
• Mentorship sessions Educate them with our new product their uses, advantages etc • We can put like box in out site. Why Limit Personal Information on LinkedIn?
• Common Platforms: Skype, Zoom, Google Meet and create an awareness and necessity • We can create page for products, organization, celebrity etc 1. Protect Privacy and Security
2. Group Video Conferencing Filling up the page with quick technique & tips. • We can upload photos, post links that direct to our site/blog. • Over-disclosing personal data (like phone numbers,
• Description: Involves multiple participants connecting Use search.twitter.com & twellow.com to find more users. • We can create events like recent activities, upcoming events etc. birthdates, or personal email addresses) can make you a target
from different locations to hold discussions or meetings. We can easily gain followers by following the active members • Create advertisements about the new & existing & upcoming for identity theft, phishing, or cyber-attacks.
• Team meetings in twitter. products (adds are paid based on click & rate /day). 2. Prevent Unwanted Contact
• Online classes We will get followers by following the followers of experts, • View insight menu consist of daily, monthly, weekly user details, • Sharing too much personal information can attract spam,
• Family or social gatherings gurus or of our competitors in twitter. pageviews, unique page view etc scams, or harassment from unsolicited individuals or
•Features: Includes tools like screen sharing, chat, and When we follow 100 members we will get atleast 70 followers. We can create multiple admin for a page. organizations.
breakout rooms. For getting the followers we have to follow many in a • We can apply theme for the fan pages based on product 3. Maintain Professional Image
• Common Platforms: Microsoft Teams, Zoom, Cisco consecutive manner. introduction, product description etc. • Including irrelevant personal details dilutes your
Webex We can post a product, link etc and ask for opinion and reviews. • We can send links, products details to the members, groups for professional image and distracts from your career-related
3. Webinars We can use affiliate marketing & micro blogging. getting opinion, reviews etc achievements and expertise.
•Description: Designed for one-to-many communication, Create banner about products, organizations etc We can send offers, promotional codes, discounts coupon to the 4. Safeguard Against Competitors
where a host or panel presents to a large audience. We can post promotional codes for products such as discount members, groups etc. • Over-sharing current roles, projects, or strategies can
• Online seminars or workshops coupon, buy 3 get 1 etc • Facebook allows to send messages to users you have no inadvertently give competitors insights into your work or
• Product launches or demonstrations Build a personal relation ship with the followers & create a connection with we can make use of it. organization.
• Educational training sessions trustworthiness among them. • Facebook provides classified add services. What Personal Information to Limit on LinkedIn
• Features: Q&A tools, polling, and attendee management. Upload genuine photo, company logo or product logo. • We can make friends from our competitors. We have to send 1. Contact Information
• Common Platforms: Zoom Webinars, GoToWebinar, Demio Try to be human and give respect the values. request to many friends (through competitors or through search). • Avoid listing personal phone numbers or email addresses
4. Telepresence Video Conferencing Don't take the customer directly to the product page. Give • Try to implement cross selling in website/product page publicly. Use a professional email address if necessary.
•Description: High-quality, immersive conferencing using them details (comparisons of products). 2. Personal Identifiers
advanced equipment to simulate an in-person meeting description before taking them to the product page. We need to add personal touch in marketing for it to work. • Do not include sensitive details like your full birthdate,
experience. • The followers want something from us so we always want to sell Customize our communication inorder to stand out. home address, or marital status.
• Executive meetings some thing more than they expect. • Highlight our brand we cannot make any compromise in quality 3. Job Details
• Cross-border negotiations Try to implement cross selling in website (pack include coke when and Brand • Be cautious about revealing too much about ongoing
• High-stakes presentations we buy pizza establishment. projects, company strategies, or proprietary processes.
4. Photos and Media Information Leakage 4.Cyberattacks Cybercrime associated with social media
• Use a professional headshot for your profile picture and • Information leakage refers to the unauthorized or unintended • This is when hackers or malicious actors gain unauthorized • Identity theft: Cybercriminals can use social media to steal
avoid sharing casual or overly personal photos in posts. disclosure of sensitive or confidential information. access to users' social media accounts and steal their personal personal information, such as names, birthdates, and social
5. Connections • In the context of social media can occur when individuals share information. security numbers, which can be used to commit identity theft.
• Limit your network to people you know or share too much personal information online, when their accounts are • This can occur through phishing scams, malware, or social • Phishing attacks: Cybercriminals can create fake social media
professional interests with to avoid giving strangers access to your hacked, or when they fall prey to phishing or other social engineering tactics. profiles or messages that look legitimate, in order to trick users
profile and network. engineering attacks. 5.Unintentional Leakage into revealing their login credentials, credit card numbers, or
• It's important to discuss information leakage because it can • This occurs when a user's social media account is compromised other sensitive information.
Top tips for your Linkedin profile have serious consequences, such as identity theft, financial loss, due to weak passwords or lax security measures, such as not • Malware attacks: Cybercriminals can use social media to
• Your profile is not a resume or CV. Write as if you are having a reputation damage, and legal consequences. logging out of their account on a public computer or using the distribute malware, such as viruses, trojans, or ransomware,
conversation with someone. Inject your personality. Let people same password for multiple accounts. which can infect users' devices and steal their data.
know your values and passions. In your summary, discuss what Types of Information Leakage (Contd) • This can lead to sensitive information being leaked to • Cyberstalking and harassment: Social media can be used to stalk
you do outside of work. You want people to want to know you. 1.Accidental Leakage unauthorized individuals or organization or harass individuals, which can lead to emotional distress and
• Join groups related to your area of expertise, industry, alumni, • This happens when users unknowingly share sensitive Methods to prevent information leakage even physical harm.
passions, social causes, and other aspects of your identity. This information, such as personal or financial information, with their • Set strong passwords: Use strong, unique passwords for each Cybercrime associated with social media
gives you access to more people who matter to your brand. social media network. social media account and avoid using easily guessable information • Scams and fraud: Cybercriminals can use social media to carry
SOCIAL MEDIA MARKETING USING LINKEDIN • For instance, a user may post a picture of their credit card or like your name or birthdate. out scams and fraud, such as fake job offers, investment schemes,
We can create group and make others to follow us share their login credentials for a service on their social media Consider using a password manager to keep track of your or merchandise sales, which can result in financial loss for victims.
We can request for the opinion and suggestion. account. passwords. • Fake news and disinformation: Social media can be used to
We can expose our skill set. 2.Intentional Leakage • Enable privacy settings: Take advantage of the privacy settings spread fake news and disinformation, which can have serious
We can follow the companies and make other to follows us • This type of information leakage occurs when users knowingly offered by social media platforms. Make sure that your personal consequences for individuals and society, including political
We can create a professional network ask for opinion and share sensitive or confidential information with unauthorized information, such as your emailaddress, phone number, and manipulation and public health risks.
reviews etc. individuals or organizations. home address, is not visible to everyone. Backing up social media
Increase your visibility. • For example, an employee may leak confidential company • Limit personal information shared online: Be mindful of the • Social media platforms can experience outages, data breaches,
Improve your connect ability. information to a competitor through their social media account. personal information you share on social media, especially if it's and other issues that can result in the loss of valuable data.
Improve your Google Page Rank. 3.Third-Party Leakage sensitive or confidential. Avoid sharing financial information, • Backing up your social media data can help protect against the
Enhance your search engine results. • This happens when a third-party company, such as an social security numbers, or login credentials on social loss of important memories, contacts, and other information.
Perform blind, "reverse," and company reference checks. advertising or analytics firm, collects media. • Social media data that can be backed up includes photos, videos,
and uses users' personal data without their knowledge or consent. • Be cautious of unknown users: Be cautious of friend requests or messages, posts, and contacts.
• This type of information leakage can occur when users use messages from unknown users.Verify the identity of the person • There are several ways to back up social media data, including
social media to sign in to other services or when they interact • Avoid clicking on suspicious links:Be wary of suspicious links or using cloud storage services,downloading data directly from social
with social media content on other websites or apps. attachments in messages or posts media platforms, and using backup tools or software.
• Cloud storage services like Google Drive, iCloud, and Dropbox False Information Weaponization of False Information: Risks of Social Media
allows users to automatically back up their social media data to • Social media platforms have effectively supplanted traditional • Social media platforms have adopted design choices that have While social media offers numerous benefits, it also comes with
the cloud. information networks in India. led to a mainstreaming of misinformation while allowing risks that can impact individuals, organizations, and society. Here
• Direct download from platforms: Social media platforms like • The relationship between online content, traditional media and themselves to be weaponized by powerful vested interests for are some of the key risks:
Facebook, Instagram, and Twitter offer options for users to political networks is so strong that the messages are propagated political and commercial benefit. 1. Privacy Issues
download their data directly from the platform. effectively to even those who are not yet online. • The consequent free flow of disinformation, hate and targeted •Data Breaches: Personal information shared on social media can
• There are third-party backup tools and software available that • Many times, false information, intentionally or unintentionally, intimidation has led to real-world harm and degradation of be exposed during data breaches.
can help users backup their social media data. gets transferred through social media and manipulates the beliefs democracy in India. •Oversharing: Users may unintentionally reveal sensitive details,
• Regularly backing up social media data is important to ensure of the people towards a particular community, the government or leading to identity theft or stalking.
that you have the most up-to-date version of your data and to some ongoing issue. Digital Media Illiteracy among Children: •Targeted Advertising: Platforms collect user data, raising
avoid losing important memories. Concerns regarding the spread of False Information • The National Education Policy 2020 is a missed opportunity to concerns about how this information is used or shared.
Red-Herring: insert media literacy in the curriculum. 2. Cyberbullying and Harassment
• The content moderation-driven approach to disinformation by • Although ‘digital literacy’ is mentioned once in the document, •Online Abuse: Social media can expose individuals to bullying,
all major social media platforms is a red herring designed to social media literacy is entirely neglected. trolling, and threats.
distract from the far larger problem of amplified distribution of • This is a serious gap as social media is the primary source of •Psychological Impact: Constant harassment can lead to stress,
disinformation as part of business models. students’ literacy. anxiety, or depression.
Opacity of Social Media Platforms: 3. Spread of Misinformation and Fake News
• Social media platforms are increasingly becoming the primary •Viral Falsehoods: Fake news can spread quickly, leading to
ground for public discourse over which a handful of individuals confusion or harm.
have inordinate control. •Manipulation: Malicious actors use social media to influence
• One of the biggest hurdles in being able to curb misinformation opinions or sow discord.
is the lack of transparency by social media platforms. 4. Addiction and Overuse
Inadequate Measures: •Time Wastage: Excessive use of social media can reduce
• Various social media platforms have been unable to evolve a productivity and disrupt daily routines.
coherent framework to stop misinformation and have instead •Mental Health Impact: Overuse is linked to anxiety, depression,
responded erratically to events and public pressure. and low self-esteem due to constant comparison with others.
• The absence of a uniform baseline approach, enforcement, and 5. Scams and Fraud
accountability vitiated the information ecosystem. •Phishing: Users may fall victim to fake links or fraudulent
messages designed to steal personal information.
•Financial Scams: Fake accounts and promotions often scam
users into losing money.
6. Impact on Relationships What is Malware? How to Combat Malware in Social Media Methods of distribution
•Miscommunication: Online interactions can lead to Malware is an umbrella term for a variety of malicious software Use Strong Passwords and Two-Factor Authentication (2FA): Shared Files: Viruses can spread through infected files shared in
misunderstandings or conflicts. that is designed to infiltrate systems and cause Ensure social media accounts are protected by strong, unique messages, posts, or downloadable content.
•Neglect of Real-Life Connections: Excessive focus on virtual damage without the user’s consent. passwords and enable 2FA for an additional layer of security. Tagging and Posts: Users may unknowingly spread viruses by
interactions can harm face-to-face relationships. It can infiltrate social media platforms through infected ads, Avoid Clicking Suspicious Links: clicking on infected tags or posts, which can redirect them to
7. Reputational Damage compromised accounts, and malicious links shared Be cautious of unfamiliar or unsolicited messages, posts, or ads, malicious sites.
•Professional Risks: Careless posts or comments can harm in posts or messages. and avoid clicking on suspicious links or downloading unknown Phishing Links: Fake messages with infected links can trick users
reputations, affecting career prospects or business credibility. Common types of malware: attachments. into downloading virus-infected files or sharing their credentials.
•Public Backlash: Posts that are deemed offensive or 1. Viruses: Self-replicating code that attaches itself to legitimate Keep Software Updated:
controversial can lead to cancel culture. files, infecting them and spreading to other Regularly update browsers, social media apps, and security How to Combat Viruses in Social Media
8. Security Threats devices when the files are shared. It often causes damage to files software to patch vulnerabilities that malware can exploit. Avoid Downloading Files from Untrusted Sources:
•Hacking: Social media accounts can be hacked, leading to misuse or systems by corrupting or deleting data. Viruses Do not download files, attachments, or software from
of the account or personal data. 2. Worms: A standalone malware that spreads automatically Viruses in social media are a form of malicious code that unknown or unverified social media accounts or posts.
•Geotagging Risks: Sharing location data can expose users to across networks by exploiting vulnerabilities, often attaches itself to files, posts, or messages and spreads rapidly Regularly Scan for Viruses:
physical risks like stalking or burglary. causing network congestion, system slowdowns, or data loss as it through user interactions. Use antivirus software to frequently scan your device for
replicates itself without user interaction. They often disguise themselves as legitimate content, such as a potential infections, especially after downloading any
Ransomware: Encrypts a user's files or locks them out of their shared video, link, or downloadable file. When users files from social media.
system, demanding payment (ransom) to restore unknowingly click on or download the infected content, the Be Cautious of Shared Content:
access Often distributed through phishing emails or malicious virus replicates and spreads to their device or account. Be skeptical of any unsolicited tags or posts, especially if they
downloads, leading to potential data loss if unpaid. encourage downloading or clicking on links.
Spyware & Adware: Spyware covertly monitors user activity and Types of Viruses in Social Media Educate Users on Phishing and Fake Applications:
collects sensitive information such as login Clickjacking Virus: Be aware of phishing attacks and fake apps disguised as
credentials Tricks users into clicking on hidden buttons or links by overlaying legitimate software to prevent virus infections.
Methods of Distribution: them with visible content. This can trigger malware downloads
Malicious Links: Users are tricked into clicking on infected links Phishing Virus:
shared in posts, messages, or comments. Disguised as legitimate links or messages, this virus tricks users
Compromised Accounts: Once an account is infected, it can into entering their login credentials or personal information on
automatically send malicious content to the user’s friends, fake login pages, leading to account compromise.
spreading the malware further. Fake App Virus:
Infected Ads: Malvertising on social media platforms can Spread through seemingly legitimate third-party applications or
distribute malware through deceptive advertisements that lead games that request excessive permissions. Once installed, they
to malicious websites. can steal personal data or spread malware to other users.
Risk Management Step 3: Risk Mitigation Laws and Regulation Digital Millennium Copyright Act (DMCA)
• Risk management in social media security is the process of • XYZ Corp implements measures to reduce the identified risks. In today’s digital age, social media platforms connect billions of The Digital Millennium Copyright Act (DMCA) addresses the legal
identifying, assessing, and mitigating risks associated with the use • Technical Controls: users but also raise concerns over privacy, data protection, and responsibilities of online platforms when it comes to protecting
of social media platforms by organizations and individuals. • Enable Multi-Factor Authentication (MFA): All employees cybersecurity. copyrighted materials. Social media platforms must comply with
Step 1: Risk Identification managing social media accounts must use MFA, General Data Protection Regulation (GDPR) D M C A takedown requests if they host copyrighted content
• XYZ Corp starts by identifying the risks associated with its social • Password management: Use a password manager to enforce The General Data Protection Regulation (GDPR) is one of the most uploaded by users.
media presence. strong, unique passwords for each account. Passwords should be comprehensive data protection laws globally, applying to The law includes a safe harbor provision, which shields platforms
• Phishing attacks: Hackers may send fake emails to employees, changed regularly. organizations both within and outside the European Union that from liability if they act quickly to remove infringing content upon
pretending to be from social media platforms, asking them to • Monitoring tools: Implement tools like Security Information and handle the personal data of E U residents. receiving a complaint from the copyright owner.
reset passwords. Event Management (SIEM) to monitor account activity, alerting GDPR focuses on data privacy by mandating that organizations Cybersecurity Laws
• Account takeover: Hackers could gain unauthorized access to the company if suspicious behavior (e.g., login attempts from process personal data lawfully, fairly, and transparently. It Various cybersecurity laws aim to safeguard systems and
social media accounts, unusual locations) occurs. empowers individuals with the right to access, rectify, erase, or networks from unauthorized access, breaches, and other cyber
• Vulnerabilities: Step 4: Risk Treatment restrict the processing of their data. threats. Laws such as the Computer Fraud and Abuse Act (CFAA)
• Weak passwords or password reuse across accounts. • Now, XYZ Corp decides how to handle each identified risk: Children’s Online Privacy Protection Act (COPPA) and the National Cybersecurity Protection Act outline strict
• Employees using personal devices without adequate security • Phishing attacks: The Children’s Online Privacy Protection Act (COPPA) is designed penalties for hacking, unauthorized access, and misuse of
measures. • Mitigate: Implement security awareness training and MFA to to protect the privacy of children under the age of 13. This law information systems.
• Limited monitoring of account activity, which might delay reduce the chances of phishing attacks succeeding. requires websites and online services, including social media
detection of unauthorized access. • Account takeover: platforms, to obtain verifiable parental consent before collecting
Step 2: Risk Assessment • Mitigate: Use strong password management practices and MFA, personal information from children.
• Once the threats are identified, XYZ Corp assesses the risks and limit account access to only necessary employees. In addition, platforms must make their privacy policies easily
based on their likelihood and Step 5: Continuous Monitoring and Review understandable and disclose what data is being collected and how
impact. • XYZ Corp continues to monitor the effectiveness of the security it is used.
• Phishing attacks: High likelihood, as phishing is a common tactic measures and regularly reviews their risk management approach. California Consumer Privacy Act (CCPA)
used to steal social media credentials. • Regular Audits: The California Consumer Privacy Act (CCPA) grants enhanced
• Account takeover: Medium likelihood, especially if employees • Conduct periodic audits of the company’s social media accounts privacy rights to residents of California, making it one of the
use weak passwords or share to ensure compliance with security policies. strictest privacy laws in the U.S. Under CCPA, consumers have the
credentials. • Updates and Patch Management: right to know what personal data is being collected, request
• Impact: • Ensure all social media platforms and associated apps are up to deletion, and opt-out of the sale of their information.
• Phishing attacks: High impact, as successful phishing can lead to date, with security patches applied regularly. Businesses, including social media platforms, must be transparent
account takeovers or leaks of private information. • Evolving Threat Landscape: about how they collect and use data. CC PA requires companies to
• As new threats (e.g., deepfake impersonation of company disclose their data practices clearly and provide mechanisms for
executives) emerge. users to exercise their rights.
INSURANCE Forensics is a critical part of the criminal justice system, where Steps involved in digital forensics: Definition of a Fake Account
As social media platforms expand, the risks of data breaches, scientific techniques are applied to gather, analyze, and present 1. Identification: Detect potential digital evidence that may help A fake account is a social media or online profile created with
privacy violations, and cyberattacks also increase. These incidents evidence in court. In the digital age, forensics has evolved to in the investigation. false or misleading information. These accounts often
can lead to significant financial and reputational damage for include the analysis of data from digital devices. This includes identifying sources such as emails, texts, social impersonate real individuals, organizations, or create entirely
businesses and individuals media posts, and files. fictional identities to mislead others or achieve certain objectives.
Cyber Liability Insurance What is Digital Forensics? 2. Collection: Gather the digital evidence in a way that preserves Types of Fake Accounts
Cyber liability insurance is one of the most relevant types of Definition: Digital forensics refers to the recovery and its original state. 1.Impersonation Accounts:
insurance for social media security. It covers the financial losses investigation of material found in digital devices such as This step ensures that the evidence remains unaltered during •Mimic real individuals, celebrities, or businesses to deceive
associated with cyberattacks, data breaches, and other security computers, smartphones, networks, and databases. collection. others.
incidents that affect a company's online presence. Common devices: Smartphones, computers, cloud services, hard 3. Preservation: Store the digital evidence securely, using •Often used for scams, phishing, or reputation damage.
For businesses using social media, this insurance can help drives, and USB devices. measures such as cryptographic hashing to ensure the data has 2.Spam or Bot Accounts:
mitigate the costs of legal defense, regulatory fines, and customer Types of digital forensics: Computer forensics: Investigates files, not been tampered with. •Automated accounts created in bulk to spread spam,
notification in the event of a data breach. emails, or deleted data. 4. Analysis: Use forensic tools to examine the data, reconstruct promote products, or inflate followers, likes, and views.
Media Liability Insurance Mobile forensics: Deals with data from smartphones and tablets. events, and uncover hidden or deleted files. Metadata analysis •Operated by scripts or bots rather than real people.
Media liability insurance is particularly relevant for businesses Network forensics: Monitors and analyzes network traffic for can also reveal important details like the creation time of files 3.Phishing Accounts:
and individuals active on social media. This type of insurance suspicious activities. and their origins. •Designed to trick users into sharing sensitive information,
protects against risks such as defamation, copyright Relevance: Plays a crucial role in uncovering evidence in such as passwords or financial data.
infringement, and invasion of privacy. cybercrimes, hacking, and fraud cases. 4.Troll Accounts:
With the viral nature of content on social media, businesses can Key tools used in digital forensics: •Created to spread negativity, provoke arguments, or post
easily face lawsuits over content posted or shared. Media liability • EnCase: Widely used for investigating digital data, providing a inflammatory content to disrupt discussions.
insurance covers legal fees, settlements, and damages that arise comprehensive 5.Fake Review Accounts:
from such claims. suite for identifying, recovering, and analyzing digital evidence. •Used to post fake reviews to boost or damage the
Social Engineering Fraud Insurance • FTK (Forensic Toolkit): Allows for deep scans of large datasets, reputation of products, services, or businesses.
Social engineering fraud insurance is designed to protect recovering lost or
businesses from fraudulent activities, such as phishing scams or deleted files.
impersonation attacks, often carried out via social media • Autopsy: Open-source platform used for digital forensic
platforms. investigations, with features like timeline analysis, hash filtering,
These attacks can trick employees into transferring funds or and image verification
disclosing sensitive information. Social engineering fraud
insurance covers the financial losses resulting from such schemes.
Impact of Fake Accounts on Social Media Blocking Users in WhatsApp: How and Why? 4. Alternatives to Blocking: Blocking Users on YouTube: How and Why?
1.Erosion of Trust: 1. How to Block Users in WhatsApp? • Mute Notifications: If the messages are not urgent but
•Users may lose trust in social platforms if fake accounts • Standard Method: not spam, mute the contact instead. 1. How to Block Users on YouTube?
dominate conversations or spread false information. 1. Open the chat of the user you want to block. • Go to the chat > Tap the contact name > Select “Mute From a Comment:
2.Spread of Misinformation: 2. Tap on their name or phone number at the top to open Notifications”. 1. Go to the comment made by the user you want to block.
•Fake accounts amplify false narratives, conspiracy theories, their profile. • Restrict Status Viewing: 2. Click the three dots (⋮ ) next to the comment.
and fake news, affecting public perception. 3. Scroll down and tap “Block”. • Go to Settings > Privacy > Status and customize who can 3. Select “Hide user from channel”. This blocks them from
3.Damage to Reputations: 4. Confirm the action by tapping “Block” again. see your updates. commenting on your videos.
•Impersonation accounts can tarnish the image of individuals • Alternative Way: • Report Contact: If the user is sending inappropriate or
or businesses. 1. Go to Settings in WhatsApp. harmful content, report them by going to their profile and From a Channel Page:
4.Reduced User Experience: 2. Navigate to Privacy > Blocked Contacts > Add New. selecting “Report”. 1. Visit the user’s channel by clicking their name.
•Spam content and trolling disrupt genuine interactions and 3. Select the contact you wish to block. 2. Go to their channel’s About section.
discussions. 2. Why Block Users on WhatsApp? Blocking is an essential tool to protect your privacy, mental well- 3. Click the flag icon (or three dots) and select “Block user”.
5.Economic Loss: • Avoid Harassment or Spam: Prevent unwanted being, and online safety. Use it as needed to maintain control 4. Confirm the action.
•Fake reviews, scams, and phishing attempts can lead to messages, calls, or media from strangers, spammers, or abusive over your WhatsApp experience.
financial losses for individuals and businesses. contacts. Alternative Way (Using YouTube Studio):
6.Security Threats: • Maintain Privacy: Block users who may misuse your 1. Open YouTube Studio.
•Phishing accounts can compromise user privacy and personal information. 2. Go to Settings > Community > Hidden users.
sensitive information. • Focus and Peace of Mind: Avoid distractions or 3. Add the username or channel you want to block.
disturbances from specific individuals.
• Protect Yourself from Scams: Prevent potential 2. Why Is It Important to Block Users on YouTube?
scammers or phishing attempts. • Prevent Harassment or Bullying: Block individuals who
3. What Happens When You Block Someone? leave offensive, hateful, or abusive comments.
• They can no longer send you messages, view your status, • Avoid Spam: Protect your channel from spammy or
or see your profile updates. irrelevant content in the comments section.
• They won’t be notified about the block but might notice • Maintain a Positive Community: Foster a constructive
changes (e.g., no “Last Seen”). and respectful environment by removing toxic users.
• Any messages sent during the block won’t be delivered. • Protect Privacy: Prevent users who might misuse or
exploit your content or personal information.
• Improve Mental Well-being: Avoid exposure to
negativity or criticism that is not constructive.