Networking

04:34 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

3 Tips From Burger King, Jeep Twitter Hacks

In about 24 hours, the Twitter accounts of Burger King, Jeep and other well-known companies were hacked. Follow these three strategies to avoid a similar fate.

10 Social Networks For Special Interests
10 Social Networks For Special Interests
(click image for larger view and for slideshow)
Within a span of little more than a day, the Twitter accounts of Burger King and Jeep were hacked. Then it was MTV and BET. Do the hacks mean that there will be fewer Whoppers eaten or fewer Jeeps sold? Not likely. It doesn't appear that any intellectual property or customer data was or is at risk in any of the attacks. But the affected companies' reputations have been tainted: Moving forward, they will become footnote examples of social business victims. And, although Burger King at least got several thousand new followers out of the situation, no company wants to be a victim.

As with all things security, there are no guarantees, but here are three guiding principles for keeping your business as safe as possible on social.

1. Guard Login Credentials.

It is not clear how hackers gained access to Burger King's or Jeep's official Twitter accounts, but for any company, protecting login credentials to public social networks is critical. This might mean limiting the distribution of account user names and passwords to a select few employees who post on social media outlets, or not distributing them at all. Using a solution like HootSuite, companies build social media teams through permissions-based profiles. This keeps the keys to the kingdom safe while also ensuring that users post only to the accounts they should be posting to. It's also important to formally train any user who is or might be posting to social networks on behalf of your company, and to get them to sign off on your social media policy. (If you don't have such a policy, now is the time to develop one.)

2. Be Aware.

Companies should continually be auditing their social media presence to make sure that nothing untoward is going on. The updates that were posted on Burger King's and Jeep's Twitter pages after the organizations' accounts had been hacked made it pretty clear that something fishy was going on. It will be harder to catch on to a hacker who is more subtle in his or her approach.

[ Want more Twitter tips? Read 5 Steps To Prevent Twitter Hacks. ]

The cautions apply to employees' email communications too, of course. In an ironic twist, last November Twitter let users know that its servers had been breached by sophisticated hackers who might have made off with the user names and passwords of 250,000 users. Twitter sent an email to affected parties and asked them to reset their logins. The trouble was, some users rightly feared that the emails purporting to be from Twitter were not legitimate and were a clever phishing scam. They were legit, but the lesson here is that organizations need to be constantly vigilant and that nothing -- not even a warning from a relatively trusted source -- can be taken for granted.

3. Be Honest With Customers.

Hacks happen. When they do, affected organizations should respond immediately and honestly. Let your customers know that you are aware of the situation, that you are doing everything in your power to make sure that they are not compromised in any way, and that you are also doing everything in your power to make sure a hack like this doesn't happen again.

Above all, own it and apologize (sincerely) if warranted. On the day that that Burger King hack occurred, the company released the following statement:

"Earlier today, our official BK Twitter Account was compromised by unauthorized users. Upon learning of this incident, our social media teams immediately began working with Twitter security administrators to suspend the compromised account until we could re-establish our brand's official Twitter page. We apologize to our loyal fans and followers, whom might have received unauthorized tweets from our account. We are pleased to announce that the account is now active again."

This statement was clear, honest and direct, and it paved the way for Burger King to re-establish its social credibility.

What do you think is behind this flurry of hacks? Do you think we should expect to see more of the same? What is your company doing to protect itself? Please let us know in the comments section below.

Follow Deb Donston-Miller on Twitter at @debdonston.

Join this interactive webinar with panelists from Gartner and PricewaterhouseCoopers to discuss the latest research, market trends and tactics for driving value with social business technology. You'll learn about the evolution of social business technology and how you can roll it out to yield measurable gains. Register for Creating Value With Social Collaboration Platforms today. It happens Feb. 27.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Apprentice
2/22/2013 | 8:12:10 PM
re: 3 Tips From Burger King, Jeep Twitter Hacks
Is it me or does this just seem like common knowledge if you are currently working as an IT professional. With all the information floating around and all the recent breaches why wouldnG«÷t every IT department within every organization take a second look at the way they have their systems configured, and come to a conclusion if they are vulnerable for attacks. I could not agree with you more Deb about being honest with the customers. If a breach occurs, it happens, do not lie about it and then have me find out that you lied about it. It will destroy the companyG«÷s reputation period, regardless of the reasoning behind the lie. My opinion is that these attacks are going to continue because even with all the information that is out to date people are still under the assumption that it will no happen to them, until it does.

Paul Sprague
InformationWeek Contributor
Hot Topics
15
Open Source Vs. Open Enough
Bob Laliberte, ESG senior analyst,  7/18/2014
5
Do We Need 25 GbE & 50 GbE?
Jim O'Reilly, Consultant,  7/18/2014
5
Guide: The Open Compute Project and Your Data Center
James M. Connolly, Editor in Chief, The Enterprise Cloud Site,  7/21/2014
White Papers
Register for Network Computing Newsletters
Cartoon
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ≠extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Slideshows
Twitter Feed