You’ve Been Hacked!
Handling hacked social media accounts for public figures and high profile executives
This is an article by Luciana Shortal. She is a digital marketing expert with a corporate and start-up background and a primary focus on B2B, tech companies and e-commerce. She is currently digital marketing evangelist at NorthPage, a digital marketing intelligence firm. Luciana can be reached for freelance and consulting engagements via LinkedIn and Twitter.
Having a social media account hacked can be a devastating experience for anyone. The target of the attack has been violated and victimized. Depending on the hacker’s activities while in control, such as offensive posts, tweets, or comments, the victim may feel embarrassed, even defamed. Furthermore, your connections, whether friends or family may become needlessly alarmed, concerned, or offended by the posts.
When the target of the profile hijacking is a public figure or celebrity, the consequences can be even more far-reaching and damaging. Not only is the individual’s reputation at stake, but with an audience in the hundreds of thousands or even millions the reach of the rogue posts will be exponentially larger.
Since today’s reality is that many public figures have a third party or team managing their public persona, this article is written to guide these social media managers and PR professionals in responding to a social media hack. These individuals should work collaboratively with the public figure to respond in a swift and comprehensive manner to achieve the best outcome.
Read on to learn the immediate steps to take when a hack occurs and how to manage social media accounts to prevent future incidents.
First Things First
Party’s over
You’ll want to act quickly to end the hacker’s fun at your client’s expense. The fastest and easiest way is to change the account password, locking them out of the account. Next you’ll want to notify the social media platform of the breach through the resources they provide under “Help” or “Customer Support.” If the hacker has already changed the account password, proceed directly to contacting the social platform for assistance. Use the online support mechanisms and follow-up by calling any customer support number when available.
Now that you’ve gone to the source to begin addressing the issue…
Take a deep breath
While this may seem a nightmare for the person in question and you as someone they depend on, now is not the time for impulsive or emotional reactions. Engaging with the hacker on the social media platform through other profiles will only feed the hacker’s ego and draw more attention to the situation playing out. Often this is exactly the violator’s intent, so avoid feeding the fire.
Opportunity knocks
Sometimes the stance on responding to a hack is to restore order but not acknowledge it at all. However this is a missed opportunity to create goodwill and recognize that it can happen to anyone. These situations have become incredibly common and people understand.
So your next step is to prepare a thoughtful response. The ideal response makes light of the situation and lets followers know it’s “business as usual.” Here is a great example of a response to a recent Twitter account hack from Bob Lord, Chief Digital Officer at IBM:
Even the most digitally-minded of us can fall victim to a hack. Apologies for any unsavory tweets – all is fixed! #backtonormal #digital
— Bob Lord (@rwlord) January 4, 2017
This candid response is perfect – a little self-deprecating, apologizes for the “unsavory tweets” and lets followers know order has been restored. The above reinforces that breaches can happen to even the most “tech-savvy” of us!
Be the change
This last step is optional, but can help address this issue on a larger scale, potentially causing hackers to think twice in the future. Apart from notifying the platform of the hack, you may want to work with them to see whether the hacker can be identified and whether legal action might be in order. At the end of the day, it is important to decide whether you want to spend more time and energy on the situation than it merits or just move forward.
Preventing Future Hacks
As mentioned, account hacks have become incredibly common and will never be fully prevented, but there are steps you can take to shore up your social media accounts making them less attractive and less “hackable” targets.
Change is good
Following the breach you’ll want to change the passwords on all social media accounts. This is critical if any accounts had the same password as the hacked account, but also a good measure in case the hacker gained access to credentials for more than one account. Make the passwords strong using a combination of uppercase and lowercase letters, numbers, and symbols.
Limit risk
While it is not advisable to store credentials anywhere, the reality is it is somewhat unavoidable. It is important however to minimize access to usernames and passwords as much as you can. A password management tool is incredibly helpful for this and should be implemented if you’re not using one already.
Keep it fresh
Establish a cadence for updating the passwords associated with the social media accounts you manage – and stick to it! Quarterly or monthly are good schedules to follow.
Be a star
When the platforms you use introduce additional security features such as two factor authentication, take advantage of them to add extra layers of security.
Stay connected
It is a good best practice to have notifications turned on for all the social media accounts you manage. This ensures that you are alerted to any unusual activity on accounts in real time, enabling a more rapid response.
Conclusion
These guidelines can be helpful in securing your social media presence individually and that of your high-profile clients. While hackers have become a part of our digital lives, these measures can go a long way to addressing an account breach swiftly and limiting the potential for them in the future.
18 Comments
https://tinyurl.com/ym5s35rm https://tinyurl.com/bder6rsc https://is.gd/N0bbOs https://tinyurl.com/mvan9nm9 http://ubezpieczenianaraty.pl https://cutt.ly/JHvbOy1 https://rebrand.ly/c2f455 http://bielsko-ubezpieczenia.pl https://is.gd/fTxlD1 https://Tinyurl.com/bp5z6kjw
https://is.gd/vSr3BK https://bit.ly/39Slb4E https://Tinyurl.com/bdfpxcwz https://cutt.ly/gHvbWnk https://rebrand.ly/c237ee https://rebrand.ly/4fee99 https://rebrand.ly/98206d https://is.gd/1mQ4ga https://cutt.ly/BHvcZPK http://dobrzeubezpieczamy.pl
cutt.ly cutt.ly http://kancelaria-Ubezpieczen.pl/ Bit.ly http://ubezpieczenia-bydgoszcz.net.pl https://bit.ly http://ubezpieczenia-warszawa.com.pl bit.ly
tinyurl.com https://tinyurl.com bit.ly https://tinyurl.com/4tdytrmu https://bit.ly/ https://cutt.ly/kHvbjd3 http://stolicaubezpieczen.pl https://Rebrand.ly/
885152 292654Hi. Cool article. Theres a problem with the site in chrome, and you might want to check this The browser could be the marketplace chief and a big component of other folks will miss your outstanding writing due to this dilemma. I like your Post and I am recommend it for a Site Award. 107425
596247 639943Just added this weblog to my favorites. I enjoy reading your blogs and hope you maintain them coming! 849045
Hello there! This is kind of off topic but I need some guidance from an established blog.
Is it hard to set up your own blog? I’m not very techincal but I
can figure things out pretty fast. I’m thinking about setting up my own but I’m
not sure where to start. Do you have any tips or suggestions?
With thanks
Spot on with this write-up, I actually believe this
web site needs far more attention. I’ll probably be returning to read more, thanks for the information!
973184 761003Aw, it was an incredibly excellent post. In thought I would like to set up writing similar to this moreover – taking time and actual effort to create a very excellent article but exactly what do I say I procrastinate alot and also no indicates manage to go done. 318456
Sutter Health
This is the perfect blog for anybody who really wants to find out about this topic.
You realize a whole lot its almost tough to argue with you (not that
I actually will need to…HaHa). You certainly
put a fresh spin on a topic which has been discussed for ages.
Great stuff, just great!
This is my first time pay a quick visit at here and i am actually happy to read everthing at single place.
Hello, i read your blog occasionally and i own a similar one and i was just curious if you get a lot of spam comments?
If so how do you protect against it, any
plugin or anything you can advise? I get so much lately it’s
driving me insane so any assistance is very much appreciated.
trap bass
451309 735969There exist a couple of a lot of different distinct levels among the California Weight loss program and each and every a person is pretty crucial. Youre procedure stands out as the the actual giving up with all the power. weight loss 314549
Hi there to all for the reason that I am genuinely keen of reading this website†s post to be updated on a regular basis. It carries pleasant stuff.
Superb post however I was wanting to know if you could write a litte more on this topic? I’d be very grateful if you could elaborate a little bit more.
Pretty! This has been a really wonderful post. Many thanks for providing these details.
This is my first time pay a quick visit at here and i am really happy to read everthing at one place
It’s going to be ending of mine day, but before finish I
am reading this enormous piece of writing to increase my experience.
Hi there, I discovered your website by means of Google even as searching for a comparable matter, your web site got here up, it looks good.
I’ve bookmarked it in my google bookmarks.
Hi there, simply became alert to your weblog thru Google, and found that it’s really informative.
I’m gonna be careful for brussels. I’ll be grateful in case
you proceed this in future. Numerous people will likely be benefited out of your writing.
Cheers!