Free Consulation

Call 866-629-3757

3 Strategies for Dealing With a Social Media Disaster

Almost every business nowadays have a Facebook page, Twitter account, YouTube Channel, and more which is great for marketing, but you need to be extremely cautious when you put out all that information about your business.

Social Media Disaster

Some companies choose to hire someone in-house to manage their digital marketing and others choose to outsource their digital marketing to a firm or contractor externally, but the truth is, you need to be precautious no matter what. Check out our three highly recommended strategies for dealing with social media:

Watch Employee Behavior

When you handing off content management to another person either in-house or externally, you need to be extremely careful. You need to ensure that the person is responsible enough to produce valuable and appropriate content. Social media is great for building up a positive reputation, but when things go wrong, social media can also ruin a reputation very easily, so you’ll want to ensure the person is able to positively build your reputation.

Watch Legalities

Social media networks are a great way to introduce great new offers, deals, coupons, and more, but if you happen to have one slight glitch in your deal or offer, it could cost you. Unfortunately many businesses find themselves caught up in this mess of “false advertising” and although it’s almost always unintentional on the business’s side, it opens a legal gateway for consumers to get their revenge. So just ensure you cover ALL legal aspects when offering a deal, coupon, or offer.

Keep Security Up – to-Date

You might think “What does this have to do with social media?” – but it greatly impacts your social media security. If you accidentally allow your computer security get out-of-date and therefore, have ineffective security on your computer system, it opens a gateway to ALL of your usernames and passwords. We had one case where a business simply forgot that their computer system’s security had expired, and their Twitter login credentials were stolen – this resulted in someone beginning to post extremely inappropriate tweets which greatly damaged the companies reputation when their over 10,000 followers saw these inappropriate tweets. So ensure ALL security is always up-to-date.

Don’t forget to visit our website at JenningsSmith.com and follow us on Twitter @JenningsSmith


Tags: , ,

Call 1-866-629-3757 for expert, discreet private investigation and security consulting services.

Click here to visit Jennings Smith Investigations, Inc. on Twitter. Click here to visit the Private Investigator Blog. Click here for the Private Investigator Blog RSS Feed.
  • Jennings Smith Associates Professional Certifications

    • Professional Certified Investigator (PCI), ASIS International
    • Certified Protection Professional (CPP), ASIS International
    • Physical Security Professional (PSP), ASIS International
    • Certified Homeland Security Level 5 (CHS-V), American Board for Certification in Homeland Security
    • Certified Business Continuity Professional (CBCP), Disaster Recovery Institute International
    • Certified Healthcare Safety Professional (CHSP), Board of Certified Hazard Control Management
    • Certified Healthcare Emergency Professional (CHEP), Board of Certified Hazard Control Management
    • Certified Safety & Health Manager (CSHM), Institute for Safety and Health Management
    • Certified Hazard Control Manager (CHCM), Board of Certified Hazard Control Management
    • Certified Forensic Consultant (CFC), American College of Forensic Examiners International

    Certifications Continued


    Cyber Forensic Investigations

    JSA's cybersecurity experts are ready to assist you with a complete array of cybercrime protection, data recovery, and evidence collection services. Cyber forensic Investigations include: unauthorized data access; PII (personal identifiable information) exposure; IP (intellectual property/proprietary information) theft; employee social media/email/messaging abuse; ransomware data corruption; and more.

    Cyber Forensics Continued

  • Share

  • Major Credit Cards Accepted