Social Media Data Leaks: an increasingly data theft

Social Media Data Leaks: an increasingly data theft

Personal data leaks have occurred to both large and small businesses. In addition, it happens very frequently, more and more in recent years.

Most of them are a consequence of cyber-attacks on networks or e-commerce security breaches. Incidents such as these can devastate a company.

Why do social networks allow data leaks?

Social media platforms are a primary security weak point for businesses due to data leaks. Social media is quickly turning into a primary security weak point. A single data breach within one of the social media networks can result in millions of records being stolen.

Social media is one area where security teams have faced a steep learning curve. Beyond the fact that through LinkedIn, Facebook and Twitter employees can connect with each other, social networks have another attraction for companies.

For example, to take advantage of social media platforms as tools to carry out brand recognition, customer service, advertising and recruitment processes. Yet every user on every platform presents a social media risk to security professionals. And the risks are many.

One of the most affected sectors during the pandemic was the health sector. Know the key points of healthcare cybersecurity.

Top areas for attention

  • Account tracking
  • Conduct regular security and privacy reviews
  • Keep access up-to-date
  • Use a Virtual Private Network
  • Ensure adequate device protection
  • Monitor your social media channels
  • Employee training is crucial
  • Beware of third-party apps

At the same time as the rapid growth of technology occurred, social networks increased in popularity. The fundamental reason for this is the ability of networks to connect people.

Because it provided an ideal platform to connect with your friends, family and colleagues. Since it provided an ideal platform to connect with your friends, family and colleagues.

The information shared in social network spreads fast, almost instantaneously. For that reason, it attractive for attackers to gain information.

The secrecy and security of social media platforms must be consulted from various positions. There are many security and privacy issues related to shared user information. Especially when a user uploads personal content like photos, videos, and audios.

Finally, the attacker can maliciously use shared information for illegitimate purposes. See how Soffid can help you stay ahead of the curve in a rapidly evolving digital world. Let’s talk?

(3) Forbes

Picture: Foto de redes sociales creado por –

Password security : Are passwords becoming a weak spot at companies?

Password security : Are passwords becoming a weak spot at companies?

Passwords are designed to give you access to an online world while companies protecting your informationHowever, password security can lead to attacks. This first point of cybersecurity is becoming a weak spot that can involve dire consequences if unaddressed for companies.

Relying on passwords for security has become increasingly problematic. Devising and remembering a complex password for every account and website is virtually impossible on your own. But using weak and simple passwords is a recipe for data breaches, account takeovers, and other forms of cyberattack.

Password security and Reports tell us about the situation…

For its report The misfortunate passwords of Fortune 500 companies, NordPass researchers analyzed data from public third-party breaches that affected companies. The data included details from more than 15 million breaches across 17 different industries.

The researchers looked at the top 10 passwords used in each industry. In addition the percentile of unique passwords, and the number of data breaches that hit each sector.

The word “password” is still being used, and misused as the most common password across all industries. Including retail and e-commerce, energy, technology, finances, and even IT and technology. Among other passwords in the top ten list, some common choices were “123456,” “Hello123,” and “sunshine.”

According to a Verizon report, more than 80 per cent of data breaches occur from weak or compromised passwords. Because creating the likelihood of an ongoing vulnerability regardless of how much technology is deployed to defeat hackers.

Certified cybersecurity. Multifactor authentication

Education and awareness are becoming more crucial in cyber security, especially in SMEs.

Two-factor authentication is great but you need to educate people about it because most employees complain about it.

The term “two-factor authentication” refers to a second step to confirm who you are. An additional layer of protection will, by default, provide more security than a single barrier.

The easiest way to “lock the door” on technology is employing multi-factor authentication. This security measure requires users to present at least two pieces of evidence before gaining access to a server, device, database or software program. A cybercriminal who has obtained a user’s username and password will not be able to access the system. You would still need to have access to that person’s unlocked cell phone or email to get an urgent verification code.

Especially, to avoid Data Leaks on Social Networks.

See how Soffid can help you stay ahead of the curve in a rapidly evolving digital world. Share your requirements and a representative will follow up to discuss how Soffid can help secure your organization.

Government cybersecurity

Government cybersecurity

Knowing about government cybersecurity is vitally important. Because any government’s primary security challenge is data loss related to security breaches. Protecting sensitive data from being exfiltrated and falling into the wrong hands is a government’s responsibility to their people. This task is hard to accomplish because of the high number of user profiles and application systems.

For one thing, a typical company has a large workforce with a limited number of profiles. On the other hand, a government agency used to have more profiles than users. For government, cybersecurity isn’t only a challenge—it’s a big obstacle to long-awaited digital transformation.

Government entities struggle to hire cybersecurity professionals. Because the risk landscape is constantly changing. Furthermore, the amount of personal and sensitive data collected is increasing by the minute.

Increasingly sophisticated adversaries are using machine learning, automated intelligence, and other tools to exploit information. So how can government entities gain the upper hand? They must be innovative in protecting key assets and maintain a more sophisticated risk management strategy. And they must mature and expand their technology capabilities — including the latest in automation and analytics.


Biggest Cybersecurity Challenges in 2022

Because government agencies have data or other assets that malicious cyber actors want, they will often go to great lengths to get it.

Government organizations cannot afford the luxury of operating poor cybersecurity. Because they cannot put citizen data and potentially essential services at unacceptable levels of risk.

Malicious actors are also aware that government security teams are increasingly asked to “do more with less”. And that many agencies may face shrinking budgets and resources. Federal, state and local government agencies are also connected with a wide range of outside contractors and partners. One more reason why they can be subject to theft of user credentials and access to government networks.

Cyber risks are higher than ever and their impacts increasingly severe – every organisation needs to take steps to respond accordingly.”

Paul Kallenbach

Even the most sophisticated solutions may not be able to eliminate all vulnerabilities, but they can stymy many threats and help protect against the worst outcomes.

The biggest cybersecurity challenges in 2022 are:

  • Increase in Cyberattacks
  • Supply Chain Attacks Are on the Rise
  • The Cyber Pandemic Continues
  • Cloud Services Are A Primary Target
  • Ransomware Attacks Are on the Rise 
  • Mobile Devices Introduce New Security Risks


See how Soffid can help you stay ahead of the curve in a rapidly evolving digital world. Let’s talk!


(1) Forbes
(2) KPMG
(3) Mckinsey
(4) Deloitte

A convergent approach to enterprise security

A convergent approach to enterprise security

Globalization, easy access to information, exponential growth of immigration and society diversity, worldwide political and cultural conflicts, all these phenomenons have impacted the threat paradigm of security that has also been immutably changed by domestic and foreign terrorism.
Everywhere you go, organizations are in the middle of some sort of transformation. Whether it’s modernizing the platforms that have been there forever, trying to launch a data center in the cloud, or trying to manage manufacturing or IoT devices more efficiently, the size and shape of our digital footprint is changing. We no longer just have a “digital network”, or “digital services”, we now have an entire “digital ecosystem” and even that keeps expanding.

There’s no denying that we’re living in a time where the cybersecurity threat landscape is increasingly dynamic and complex. The landscape includes cloud-native environments, Infrastructure-as-Code (IaC), containers, secrets management, remote work

These new technologies and practices logically require security tooling to help address potential vulnerabilities and respond to threats and incidents when they do occur. However, there is a cost associated with the increased tool introduction and use.

Using multiple security applications results in identity sprawl. When a company uses siloed systems to manage its security risks without synchronizing them all, it creates a different identity for each application user. Few applications do not connect with the central server, forcing organizations to manage multiple identities.

Many organizations using cloud services have to suffer through various identity management. Organizations need to resolve identity sprawl issues to strengthen their cybersecurity and maximize security alerts. As every identity requires different credentials and passwords, it is impossible to keep track of them. Therefore, companies use the same passwords and account credentials for every application, pushing them to credential-stuffing.

If a company’s one application is targeted and breached, the attackers will gain access to the rest of the security applications and then sell this information on the dark web. From here, threats snowball, leaving the organization vulnerable to considerable brute force and hybrid attacks.

Product sprawl wastes many resources as the IT teams have to work overboard in software maintenance and individually train every employee to use all security products. It also wastes valuable time finding, opening, navigating, obtaining vital information, and switching between multiple products.

Product sprawl negatively affects individual and team productivity. When the teams have to operate numerous applications, it reduces the opportunity to work together and stay on the same page. Moreover, the transition from existing tools also becomes impossible as it requires training sessions to get them up to speed with every software.

What about Convergence?

We can define Convergence as the identification of security risks and interdependencies between business functions and processes within the Enterprise, and the consequential development of managed business process solutions to address those risks and interdependencies. This definition captures a significant shift from the emphasis on security as a purely functional activity, to security as an “added-value” to the overall mission of business. This is an important starting point because it essentially changes the way the concept of security is positioned within the enterprise.

Future of Security 

Managing the successful convergence of information and operational technology is central to protecting your business and achieving crucial competitive advantage
Identity Governance and Administration is– and to have effective security must be– that common meeting point of many different security disciplines.

To efficiently and effectively draw the security perimeter, it makes more sense to have a single, holistic view of organizational identities where you can determine policy, view posture, enact compliance, and respond to risk.

GRC (Governance, Risk Management, and Compliance) is the future of cyber security. A well-thought GRC strategy improves security objectives by better decision making, information quality, and team collaboration.

A cybersecurity platform makes it easy to transition new employees without extensive training. As the previous cybersecurity system needs to be manually monitored and tracked, GRC has automated firewalls. High-quality antiviruses and firewalls make businesses more secure, catching and destroying viruses before they breach the central data platform.

For organizations that are already worried about their cybersecurity incident response preparation, the accelerated pace of migration to the cloud brings on new and unique challenges. In an attempt to close these security gaps, organizations spend on the latest cybersecurity tools.

Some special accounts, credentials, and secrets allow anyone who gains possession of them to control organization resources, disable security systems, and access vast amounts of sensitive data. Their power can provide unlimited access, so it’s no surprise that internal auditors and compliance regulations set specific controls and reporting requirements for the usage of these credentials. Interconnected IT ecosystems streamline business processes but often obfuscate core risks that need to be identified, analyzed, and monitored to create an enterprise Governance, Risk, and Compliance (GRC) vision. Soffid is is equipped with federation functionalities, privileged account management, low level permits, separation of functions and recertification processes.

Our intelligent analytics continuously monitor for and identify new access risks while providing native connectors with GRC solutions so risk managers can create holistic enterprise risk management strategies.


(2)  Pwc
(3) Deloitte

Picture: <a href=’’>Vector de Fondo creado por freepik –</a>