My organization uses Twitter to communicate with customers, so I was concerned by reports of man-in-the-browser...
attacks affecting Twitter users. Could you explain what attackers are doing and if there is any way to defend against them?
Ask the Expert!
SearchSecurity expert Nick Lewis is standing by to answer your questions about enterprise security threats. Submit your question via email. (All questions are anonymous.)
Social media security is a quickly evolving area of information security. As enterprises increasingly use social media accounts to engage customers and promote brands, attackers, as they are always wont to do, will follow enterprise activity and seek to exploit any and every weakness they can find in the major social media platforms.
There are several ways to protect your organization's accounts against Twitter-based malware. First and foremost, post links for Twitter followers that promote security awareness around Twitter usage; Twitter's official security awareness page is the obvious place to start, but organizations such as Forrester also maintain information to promote better social media security. Beyond user awareness, organizations should ensure that any system or user with access to an enterprise Twitter account is using a secure computer to help minimize the impact if the computer is compromised. Simple steps to ensure such security measures include making sure that users' software has been updated to the most recent versions and rolling out security patches from the likes of Microsoft and Adobe as soon as possible.
As for Twitter-specific security measures, an organization could detect if its Twitter account was compromised by downloading a copy of all its tweets and running any posted URLs through an anti-malware service to see if any of the links were malicious. If a malicious link is found, this could be a good indicator the Twitter account was compromised, and if this is the case, the organization should delete the malicious tweets and inform its followers that its account was breached so they can be aware their own systems may be compromised. In response to recent attacks on high-profile accounts, Twitter has also enabled two-factor authentication capabilities, which could further secure Twitter accounts against various attacks.
Related Q&A from Nick Lewis, Enterprise Threats
Chameleon malware targets insecure wireless access points. Enterprise threats expert Nick Lewis explains how to defend against the malware.continue reading
The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. ...continue reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.