{"id":274,"date":"2020-09-04T07:49:24","date_gmt":"2020-09-04T06:49:24","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=274"},"modified":"2020-09-04T07:49:24","modified_gmt":"2020-09-04T06:49:24","slug":"social-media-protecting-what-you-publish","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/social-media-protecting-what-you-publish\/","title":{"rendered":"Social media: protecting what you publish"},"content":{"rendered":"\n<p>If your organisation uses social media platforms (such as Twitter, Facebook, LinkedIn or Instagram), it&#8217;s important you take steps to reduce the likelihood of damaging content being posted on your behalf.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Social media: what is the risk?<\/h2>\n\n\n\n<p>Poorly judged content, malicious posts, or posting personal views (rather than the &#8216;official&#8217; company line) can damage trust in organisations of all sizes. Inappropriate content within your social media channel can be at best embarrassing, and at worst cause serious reputational damage. These types of content can harm organisations both large and small, and can <a href=\"https:\/\/www.bbc.co.uk\/news\/business-52504187\" target=\"_blank\" rel=\"noreferrer noopener\">dramatically affect your company share prices<\/a> or your reputation. They may even lead to your product or service being boycotted.&nbsp;<\/p>\n\n\n\n<p>The steps outlined below can reduce risks arising from:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>attempts to spread misinformation or fake news<\/li><li>hijacking for malicious purposes, such as redirecting to malicious websites<\/li><li>internal staff who have a grudge posting damaging comments<\/li><li>draft, incomplete or inaccurate messages being rushed into the public eye<\/li><\/ol>\n\n\n\n<p class=\"has-text-align-left\">Underlying all of these risks are a few key principles; make sure that only <strong>authorised staff<\/strong> can publish content, make sure the content is <strong>accurate and up-to-date<\/strong>, and make sure the content has gone through the necessary <strong>authorisation<\/strong> channels prior to release. <a href=\"https:\/\/www.ncsc.gov.uk\/guidance\/social-media-protect-what-you-publish\">Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If your organisation uses social media platforms (such as Twitter, Facebook, LinkedIn or Instagram), it&#8217;s important you take steps to reduce the likelihood of damaging content being posted on your behalf. Social media: what is the risk? Poorly judged content, malicious posts, or posting personal views (rather than the &#8216;official&#8217; company line) can damage trust &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/social-media-protecting-what-you-publish\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Social media: protecting what you publish&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[18,19,7,9],"tags":[],"class_list":["post-274","post","type-post","status-publish","format-standard","hentry","category-cyber-security-best-practice","category-home-cyber-security","category-privacy","category-training"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/274\/revisions"}],"predecessor-version":[{"id":275,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/274\/revisions\/275"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}