Overview
A recent report by The Economic Times (CISO) revealed that more than 600 twitter accounts, emails and websites pertaining to the government of India were compromised in the last five years. CERT-In, the official government body that notifies the affected entities along with remedies, have also confirmed these shocking statistics. The ‘Digital India’ drive, announced by the Government of India, has received lots of applause and appreciation from both in India as well as the rest of the world. In order to fructify this grand initiative, it is important to safeguard the messaging and communications infrastructure though. Still, many entities have suffered cyber attacks due to inadequate cyber security measures, poor IT security policies, lack of knowledge from end-users among many other shortcomings. So what steps can be taken to ensure that similar statistics, as mentioned above, do not recur? In the information age, social media plays a pivotal role to stay connected - both personally and professionally. Socialization is no more a ‘trend’ - it has turned into a ‘necessity’. Today, not only government organizations but organizations and businesses of all shapes and sizes count on different social media platforms to stay connected with the audience to disseminate information. There are millions of Facebook, Twitter, LinkedIn and other social media accounts across the globe. How do government officials ensure that the social media accounts and the admin accounts are safe from misuse? Likewise, government organizations and government authorized agencies require intensive monitoring over hundreds or maybe thousands of emails coming in the inbox every now and then. Unless verified and secured, there could be threats of unwanted access through phishing emails.ARCON’s Analysis
ARCON has discussed the increasing vulnerabilities associated with government organizations in an exclusive whitepaper on essential IT safeguards in government organizations. ARCON has discussed the IT security limitations and how to reinforce end-user behaviour monitoring to keep anomalous user profiles at bay. In this backdrop, cyber threats on social media applications are not just restricted to government organizations. For instance, a twitter account of a government department could definitely be at risk if there are multiple users accessing the account for sharing different updates. Moreover, shared passwords always pose an additional threat of unauthorized access and hacking. Post analysis, it has been evident that organizations lack answers to the below:- Are the passwords of the accounts frequently changed or randomized?
- Is there any dedicated access control mechanism to monitor social media accounts?
- How many shared credentials are used to manage and control social media accounts?
- Do the employees have a casual attitude towards following IT security policies?