{"id":16660,"date":"2021-03-09T07:50:32","date_gmt":"2021-03-09T07:50:32","guid":{"rendered":"https:\/\/businessadapter.es\/risks-in-social-networks\/"},"modified":"2024-12-11T10:48:36","modified_gmt":"2024-12-11T10:48:36","slug":"risks-in-social-networks","status":"publish","type":"post","link":"https:\/\/businessadapter.es\/en\/risks-in-social-networks\/","title":{"rendered":"Risks in social networks"},"content":{"rendered":"\n<h2 style=\"text-align: justify;\"><strong><span style=\"color: #800000;\">Risks in social networks<\/span> <\/strong><\/h2>\n<p style=\"text-align: justify;\">If we are still wondering whether the use of social networks poses risks to the <a href=\"https:\/\/businessadapter.es\/servicios\/proteccion-de-datos\/proteccion-datos-valencia\">protection of personal data<\/a> and corporate information of companies, there is still a long way to go.<\/p>\n<p style=\"text-align: justify;\">Today, social networks are our primary channel of communication with our customers.<a href=\"https:\/\/businessadapter.es\/ciberseguridad\/\"><img decoding=\"async\" class=\" wp-image-5155 alignright\" src=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-300x200.jpg\" alt=\"\" width=\"459\" height=\"306\" srcset=\"https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-300x200.jpg 300w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-1024x683.jpg 1024w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-768x512.jpg 768w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1-1536x1024.jpg 1536w, https:\/\/businessadapter.es\/wp-content\/uploads\/2020\/08\/hacker-2883632_1920-1.jpg 1920w\" sizes=\"(max-width: 459px) 100vw, 459px\" \/><\/a>  others, whether in the professional or personal sphere. Those who do not keep their social networks up to date are in danger of extinction. <\/p>\n<p style=\"text-align: justify;\">Under this premise, and focusing on the professional world, the use of social networks is a direct communication channel, open to all and with 24\/7 use, with all the advantages that this entails, since the company is in constant communication with its customers or potential customers at all times, in a direct and personal way.<\/p>\n<p style=\"text-align: justify;\">But &#8230;. are we aware that social networks put our most precious asset, our information, at risk? <\/p>\n<p style=\"text-align: justify;\">And what personal data do I put at risk? &#8230;.?<\/p>\n<p style=\"text-align: justify;\">Well, they can be many, such as personal contact data, e-mails, postal addresses, telephone numbers, images, voice, numbers that identify us, such as ID card or Social Security number, are some very common examples.<\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Risk in social networks  <\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.incibe.es\/\" target=\"_blank\" rel=\"noopener\">INCIBE<\/a> has identified risks that directly affect the protection of our information and personal data when using social networks. These are: <\/p>\n<p style=\"text-align: justify;\">&#8212; The main risk in the use of social networks is ourselves, <strong> i <\/strong>.e., human error.<\/p>\n<p style=\"text-align: justify;\">&#8212; <strong> Weak <\/strong>configuration in the privacy section of the social networks we use.<\/p>\n<p style=\"text-align: justify;\">&#8212; Identity <strong> theft <\/strong>.<\/p>\n<p style=\"text-align: justify;\">&#8212; <a href=\"https:\/\/businessadapter.es\/fraudes-electronicos\/\">Malware<\/a> campaigns, through addresses to infected pages or chats.<\/p>\n<p style=\"text-align: justify;\">&#8212; <a href=\"https:\/\/businessadapter.es\/fraudes-electronicos\/\">Phishing<\/a> campaigns to steal personal, bank or company data.<\/p>\n<p style=\"text-align: justify;\">If we transfer these actions to the business environment, we find the same problems and with greater consequences in all aspects: human errors that expose valuable company information, vulnerable privacy policies, impersonation of suppliers or customers, with the aim of introducing a virus into the system, theft of data or money.<\/p>\n<p style=\"text-align: justify;\">Examples of real business situations that have put their reputation at risk and have affected them economically are the case of the <a href=\"https:\/\/www.20minutos.es\/noticia\/4577992\/0\/estafan-21-000-euros-al-palacio-de-congresos-de-valencia-haciendose-pasar-por-la-empresa-de-seguridad\/\" target=\"_blank\" rel=\"noopener\">Palacio de Congresos<\/a> and the <a href=\"https:\/\/www.lavanguardia.com\/local\/valencia\/20190930\/47719655163\/juan-garlos-galindo-estafa-emt-ceo-grezzi.html\" target=\"_blank\" rel=\"noopener\">EMT<\/a>. Another recent case is the attack on the <a href=\"https:\/\/www.elmundo.es\/economia\/2021\/03\/09\/6047578dfc6c83411b8b4795.html\" target=\"_blank\" rel=\"noopener\">SEPE<\/a>, in which the 710 offices throughout Spain and the 52 telematic offices have been affected and, at the date of publication of this article, are still unable to provide their services. <\/p>\n<h3 style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>Put yourself in expert hands<\/strong><\/span><\/h3>\n<p style=\"text-align: justify;\">Motivated by these striking cases, the largest and most affected companies have already started to <a href=\"https:\/\/www.europapress.es\/comunitat-valenciana\/noticia-palacio-congresos-valencia-refuerza-protocolos-internos-fraude-21000-euros-detectado-20210215145716.html\" target=\"_blank\" rel=\"noopener\">work<\/a> to prevent this type of risk, hiring expert consultants in <strong><a href=\"https:\/\/businessadapter.es\/ciberseguridad\/\">cybersecurity<\/a><\/strong>.<\/p>\n<p style=\"text-align: justify;\">But when cybercriminals can no longer attack the big guys, they will flock to attack millions of small and medium-sized businesses.<\/p>\n<p style=\"text-align: justify;\">That is why all companies should be properly advised on <a href=\"https:\/\/businessadapter.es\/ciberseguridad\/\">cybersecurity<\/a>, since no one is exempt from cybercriminals, who in turn, every day improve their techniques causing greater damage to companies.<\/p>\n<p style=\"text-align: justify;\">For less than you think, <strong><a href=\"https:\/\/businessadapter.es\/en\/\">Business Adapter\u00ae cybersecurity<\/a><\/strong>Business Adapter\u00ae cybersecurity, will provide you with specific and customized plans according to your needs.<\/p>\n<p> <\/p>\n<p style=\"text-align: center;\">[su_button url=&#8221;https:\/\/businessadapter.es\/contacto&#8221; target=&#8221;blank&#8221; background=&#8221;#f6f903&#8243; color=&#8221;#181818&#8243; size=&#8221;7&#8243; center=&#8221;yes&#8221; icon_color=&#8221;#000000&#8243;]WE HELP YOU[\/su_button]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Risks in social networks If we are still wondering whether the use of social networks poses risks to the protection [&hellip;]<\/p>\n","protected":false},"author":1373,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[],"class_list":["post-16660","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16660","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/comments?post=16660"}],"version-history":[{"count":1,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16660\/revisions"}],"predecessor-version":[{"id":16662,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/posts\/16660\/revisions\/16662"}],"wp:attachment":[{"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/media?parent=16660"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/categories?post=16660"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessadapter.es\/en\/wp-json\/wp\/v2\/tags?post=16660"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}