{"id":247,"date":"2023-01-06T16:18:00","date_gmt":"2023-01-06T16:18:00","guid":{"rendered":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/?p=247"},"modified":"2025-11-04T16:21:12","modified_gmt":"2025-11-04T16:21:12","slug":"keep-your-business-social-media-accounts-safe","status":"publish","type":"post","link":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/2023\/01\/06\/keep-your-business-social-media-accounts-safe\/","title":{"rendered":"Keep your business social media accounts safe"},"content":{"rendered":"\n<p>Social media hacking is the most common cyber-dependent fraud, reported to <a href=\"https:\/\/www.actionfraud.police.uk\/news\/action-fraud-warns-of-social-media-account-and-email-takeover-scams\" data-type=\"link\" data-id=\"https:\/\/www.actionfraud.police.uk\/news\/action-fraud-warns-of-social-media-account-and-email-takeover-scams\">Action Fraud.<\/a> On top of this, a 2022 report from the National Cyber Security Centre found that social media hacking increased by 25%, and cyber crime overall grew by 40%.<\/p>\n\n\n\n<p>It\u2019s also important to remember, the true scale of social media hacking is likely to be far greater than the reported figures.<\/p>\n\n\n\n<p>Business social media accounts are often targeted for multiple reasons. Firstly, hackers know they may not have secure passwords and possibly won\u2019t have two-factor authentication set up. And secondly, holding a business\u2019s social media accounts to ransom, or stealing their data, can be lucrative. One hacked account compromise can spiral into dozens more victims via \u2018chain hacking\u2019.<\/p>\n\n\n\n<p>Young people under 30 make up the highest proportion of victims reporting to Action Fraud, with those at the higher end of the age bracket also being more likely to be a victim of investment fraud.<\/p>\n\n\n\n<p>Action Fraud also found that there has been an increase in AI deepfake technology being used in hacks &#8211; and this will only continue to rise as AI quickly becomes more sophisticated, with easier access.<\/p>\n\n\n\n<p>DI Dan Giannasi, head of cyber and innovation for the NWCRC, said: \u201cWe are seeing a large increase in the reporting of social media hacking recently, so we really need to spread awareness to our business community.<\/p>\n\n\n\n<p>\u201cIt\u2019s so important for businesses to make sure that all of their employees understand how to spot phishing or hacking attempts, as just one click can take down your social media account.<\/p>\n\n\n\n<p>\u201cBeing hacked can seriously affect a business\u2019s reputation and trust with their customers, which can be very difficult to win back. For small businesses like sole traders or freelancers, who rely on social media to operate, it can be devastating to lose your network of contacts and marketing opportunities. Protect your reputation &#8211; and your social media accounts &#8211; at all costs.\u201d<\/p>\n\n\n\n<p><strong>Our advice on protecting business social media accounts from cyber criminals is:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure two-factor authentication is enabled on all accounts.<\/li>\n\n\n\n<li>Use three random words to generate a complex and unique password for your social media accounts. Consider using a password manager to ensure security around team members using one password.<\/li>\n\n\n\n<li>Ensure all team members can recognise phishing links, and be very cautious around clicking on any links in social media posts or DMs.<\/li>\n\n\n\n<li>If one employee leaves, ensure that you change the passwords to your business social media accounts to prevent accidental password leaks or even revenge posting.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social media hacking is the most common cyber-dependent fraud, reported to Action Fraud. On top of this, a 2022 report from the National Cyber Security&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-247","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"acf":[],"_links":{"self":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/posts\/247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/comments?post=247"}],"version-history":[{"count":1,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/posts\/247\/revisions"}],"predecessor-version":[{"id":248,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/posts\/247\/revisions\/248"}],"wp:attachment":[{"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/media?parent=247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/categories?post=247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/crcnetwork-cfkr6.projectbeta.co.uk\/northwestcrc\/wp-json\/wp\/v2\/tags?post=247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}