“HELP! My Skype Got Hacked” SKype is a great communication and marketing tool until...your account gets HACKED! Your first reaction, after screamning, is probably to simply open a new Skype account. If you happen to have a csv file of your Skype contacts, you can add them all at once to your new account. BUT there are two reasons why this might not be the best idea. 1) Your old hacked Skype account is out there in someone else's hands with your name and brand on it and you have NO idea what they are doing under your name. More than likely it is NOT something you would be happy to have associated with your name. After all, they STOLE your account. AND as the first hacker was able to get into your first account, he or she probably left some unwanted goodies on your computer that may very well be leaving your new account and all your personal information susceptible to being hacked as well. The better choice is to recover your hacked account. You work hard to brand yourself and don't want a hacker to ruin your reputation. In addition, your hacked Skype account may very well come back to bite you and your contacts. The good news is that you CAN get your hacked account back. The first step is to scan your computer and get rid of the malware you more than likely have on your computer as a result of being hacked. The 3 best products to use are Malawarebytes, SuperantiSpyware and Avast or any good anti-virus program. You want to be sure to rid your computer of any keyloggers to protect yourself and your information. All you need to do is recover. And know you can… we know from extensive experience. People have referred others to Julie for years now to help them recover their hacked Skype accounts. She has a 100% recovery rate so we know it can be done, no matter what. It just takes in some cases, lots of time and persistence and sometimes, a supervisor at Skype Live Chat Support. A recovery kicks out the hacker and prevents them from getting in again. IF you change your password for your Skype registered email or better yet, change the registered email on the Skype account FIRST. Then recover with a change of password. But these are steps 2 and 3… after cleaning and FINDING the malware FIRST! Learn more about Skype Hack Safety and Recovery, Skype Marketing, and more about how to use Skype to grow your business. Contact Julie Wolf Skype Coach by visiting seeyouonskype.com. See you on Skype.

12 Suggested Security and Privacy Guidelines for Social Media

Recently a colleague of mine who’s a social media marketer posted a question on Facebook. She said she was sitting down to update her company’s social media guidelines and asked her network for suggestions.

There then helpfully followed a number of good suggestions to which I added my own: “Don’t forget to include security/privacy guidelines,” I wrote.

She wrote me back thanking me and asking me what exactly that would mean.

The exchange we had got me thinking about the importance of guidelines. We in security and privacy regularly speak to the importance of guidelines, policies, and procedures. We talk about how they’re a critical foundation for any good security practice because they set the principles. But the most common question non-experts ask us about guidelines, policies, and procedures is “What should they contain? Can you give me an example”?

And this is where we usually provide the classic engineer’s answer that is technically accurate and honest but completely not helpful: “No, I can’t tell you what your business’ policies should be: they have to be developed by you to reflect your company’s goals and requirements”.

These exchanges generally leave the non-expert frustrated, lost, and directionless. They’ve been told to build something but when they ask for help, they’re told only they can build it.

This is one reason why some organizations never actually develop guidelines: the project gets stuck right in this place between the business side and the technical side.

But many businesses don’t actually understand the importance of having these guidelines in place or the risks they are running into when not having proper security measures in place.

According to Hari Ravichandran, Americans lost $6.9 billion to cybercrime in 2021. When cybercrime impacts a business, that’s even worse because it may result in data loss and a reputation crisis. Cybercrime is a major threat to your brand name and reputation.

It IS the most accurate answer to say that an organization should develop its own guidelines, policies, and procedures. This is because every organization is unique and that has to be reflected accurately in these foundational documents.

But I am also a pragmatist and believe that a basic, cookie-cutter set of guidelines is better than nothing at all.

With that in mind, this month I am providing a short list of security and privacy guidelines that you should feel free to adopt and adapt as part of your social media guidelines. This isn’t a comprehensive or detailed listing: it’s only meant to cover some critical basics. Ideally, this should be something you take and start working with to make truly yours (like we recommend). It’s really intended to give you something to help jump-start your own process for developing guidelines.

  1. All devices (phones, laptops, computers, etc.) that access social media channels should be fully updated for:
    1. Operating systems (Windows, Mac OS, Android, iOS).
    2. Applications (Twitter, Facebook, Hootsuite, Microsoft Office, Adobe Acrobat).
    3. Helper programs (Java, Adobe Flash).
    4. Security software (latest version and signatures)
    5. Any content management and content marketing systems you are using should always be upgraded to the latest versions (which usually come with an updated security system)
  2. All these devices must be running a full security suite that protects against malware (viruses), spam, phishing, and other threats. (Often it’s best to pick a package for a company and mandate it be used. Also, free security packages only offer very basic layers of protection and shouldn’t be considered adequate). Install some anti-spam plugins and apps.
  3. All these devices must be password protected to prevent any unauthorized access.
  4. A full scan by the security software must be done at least once a week.
  5. A weekly backup of any critical computers or devices should be made and stored in a secured location to prevent theft.
  6. Computers and devices used to access social media channels should not be used for personal accounts or use. Only approved software and apps should be installed. (Mandating a specific package for managing social media accounts is a good idea here).
  7. To request a reset for social media-linked email accounts, they should either be corporate email addresses managed by the IT team or if they’re webmail accounts (like Gmail), they must have two-factor authentication enabled.
  8. All social media accounts should use two-factor authentication when possible.
  9. Utilize a password manager to create unique, intricate passwords for each social media account (and webmail if needed). Avoid writing passwords down; instead, exclusively handle them through the password manager.
  10. Official social media channels should never be accessed using “kiosks” or other untrusted, shared devices. A VPN should be used whenever possible. Social media channels should never be used over an unencrypted Wifi network without a VPN.
  11. All computers, devices, corporate social media accounts, and corporate email are considered the property of the company and must be surrendered or access provided immediately on demand.
  12. Using website monitoring best practices will also help you react to potential risks and mitigate the consequences.

These guidelines cover essentials that can help protect your social media channels from various threats as well as provide clarity and direction for employees.

If you’ve not worked with guidelines before, one thing you may be surprised to find is that many people welcome the clarity that prescriptive guidelines like this give. Not everyone wants to figure out what social media package to use, or what security software to use. And in IT we’ve known for a long time that it’s cheaper to support a standard configuration. So while there’s a lot of buzz about “BYOD” (bring your device to work) don’t feel that means you can’t establish some standards. You may find people welcome that.

One critical thing when talking about guidelines: if they’re going to work, they have to apply to EVERYBODY. Nothing kills the effectiveness of guidelines more than a CEO or execs who think they don’t apply to them. If you’re the head of an organization or division and you want people to follow guidelines, set the example and lead from the front.

These guidelines are a baseline and won’t protect against everything that could go wrong. But they do represent a good starting point that gives protection against common threats. Most of all, I think you’ll find that they make people think about things they hadn’t thought about before. And that can help improve your overall security posture.

In time, as you and your folks get used to following guidelines like these, you may feel comfortable taking these and making them more your own and maybe even introducing even better practices. If nothing else, this is a great first step on the path of thinking about security and privacy like a professional.

Scroll to Top