3 Tips From Burger King, Jeep Twitter Hacks
In about 24 hours, the Twitter accounts of Burger King, Jeep and other well-known companies were hacked. Follow these three strategies to avoid a similar fate.
As with all things security, there are no guarantees, but here are three guiding principles for keeping your business as safe as possible on social.
- Core Systems Modernization: Harnessing the Power of Rules-Based Policy Administration
- The Oracle Insurance Survey: Overcoming IT Hurdles to Success
1. Guard Login Credentials.
It is not clear how hackers gained access to Burger King's or Jeep's official Twitter accounts, but for any company, protecting login credentials to public social networks is critical. This might mean limiting the distribution of account user names and passwords to a select few employees who post on social media outlets, or not distributing them at all. Using a solution like HootSuite, companies build social media teams through permissions-based profiles. This keeps the keys to the kingdom safe while also ensuring that users post only to the accounts they should be posting to. It's also important to formally train any user who is or might be posting to social networks on behalf of your company, and to get them to sign off on your social media policy. (If you don't have such a policy, now is the time to develop one.)
2. Be Aware.
Companies should continually be auditing their social media presence to make sure that nothing untoward is going on. The updates that were posted on Burger King's and Jeep's Twitter pages after the organizations' accounts had been hacked made it pretty clear that something fishy was going on. It will be harder to catch on to a hacker who is more subtle in his or her approach.
[ Want more Twitter tips? Read 5 Steps To Prevent Twitter Hacks. ]
The cautions apply to employees' email communications too, of course. In an ironic twist, last November Twitter let users know that its servers had been breached by sophisticated hackers who might have made off with the user names and passwords of 250,000 users. Twitter sent an email to affected parties and asked them to reset their logins. The trouble was, some users rightly feared that the emails purporting to be from Twitter were not legitimate and were a clever phishing scam. They were legit, but the lesson here is that organizations need to be constantly vigilant and that nothing -- not even a warning from a relatively trusted source -- can be taken for granted.
3. Be Honest With Customers.
Hacks happen. When they do, affected organizations should respond immediately and honestly. Let your customers know that you are aware of the situation, that you are doing everything in your power to make sure that they are not compromised in any way, and that you are also doing everything in your power to make sure a hack like this doesn't happen again.
Above all, own it and apologize (sincerely) if warranted. On the day that that Burger King hack occurred, the company released the following statement:
"Earlier today, our official BK Twitter Account was compromised by unauthorized users. Upon learning of this incident, our social media teams immediately began working with Twitter security administrators to suspend the compromised account until we could re-establish our brand's official Twitter page. We apologize to our loyal fans and followers, whom might have received unauthorized tweets from our account. We are pleased to announce that the account is now active again."
This statement was clear, honest and direct, and it paved the way for Burger King to re-establish its social credibility.
What do you think is behind this flurry of hacks? Do you think we should expect to see more of the same? What is your company doing to protect itself? Please let us know in the comments section below.
Follow Deb Donston-Miller on Twitter at @debdonston.
Join this interactive webinar with panelists from Gartner and PricewaterhouseCoopers to discuss the latest research, market trends and tactics for driving value with social business technology. You'll learn about the evolution of social business technology and how you can roll it out to yield measurable gains. Register for Creating Value With Social Collaboration Platforms today. It happens Feb. 27.