The more one uses and shares on social media, the more information is publicly available for cyber attackers to use to exploit users’ personal and professional information.

It is hard for people to realize that every single thing shared on any social media platform is available for friends and foes alike to access and use. It is the detrimental use by criminals that is the concern and subject of this post.

A recent blog post by ISACA author Allen Ari Dziwa provides a great example of how seemingly innocuous posts on social media can turn into a CEO’s nightmare. In the example, the CEO receives an email from his “wife” about a recent golf trip. Since the CEO sees it is from his “wife,” a familiar source of emails, his guard is down, and he doesn’t check to see if it is a malicious phishing email. The result: he clicks on the link provided in the spoofed email and introduces malicious malware into his company’s network.

Social engineering is not a difficult thing to accomplish in just a few short minutes. It is scary to see how easy it is to spoof someone and by using familiarity, trick someone else into believing it is the person who is being spoofed.

Be wary of the information shared on social media and how it can be used by criminals to conduct social engineering scams.

Photo of Linn Foster Freedman Linn Foster Freedman

Linn Freedman practices in data privacy and security law, cybersecurity, and complex litigation. She is a member of the Business Litigation Group and the Financial Services Cyber-Compliance Team, and chair’s the firm’s Data Privacy and Security Team. Linn focuses her practice on…

Linn Freedman practices in data privacy and security law, cybersecurity, and complex litigation. She is a member of the Business Litigation Group and the Financial Services Cyber-Compliance Team, and chair’s the firm’s Data Privacy and Security Team. Linn focuses her practice on compliance with all state and federal privacy and security laws and regulations. She counsels a range of public and private clients from industries such as construction, education, health care, insurance, manufacturing, real estate, utilities and critical infrastructure, marine and charitable organizations, on state and federal data privacy and security investigations, as well as emergency data breach response and mitigation. Linn is an Adjunct Professor of the Practice of Cybersecurity at Brown University and an Adjunct Professor of Law at Roger Williams University School of Law.  Prior to joining the firm, Linn served as assistant attorney general and deputy chief of the Civil Division of the Attorney General’s Office for the State of Rhode Island. She earned her J.D. from Loyola University School of Law and her B.A., with honors, in American Studies from Newcomb College of Tulane University. She is admitted to practice law in Massachusetts and Rhode Island. Read her full rc.com bio here.