{"id":81914,"date":"2023-02-02T08:00:00","date_gmt":"2023-02-02T16:00:00","guid":{"rendered":"https:\/\/honeybook.site.strattic.io\/?p=81914"},"modified":"2023-02-08T13:58:07","modified_gmt":"2023-02-08T21:58:07","slug":"social-hacking-defense","status":"publish","type":"post","link":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/social-hacking-defense","title":{"rendered":"Social media hacking and how to defend against it"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><em>If you use social media to generate income, you may be a target for social media hacking. Here we discuss how to defend yourself against nefarious actors.<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"793\" src=\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-1024x793.jpg\" alt=\"Friends gather around a table with their tech devices.\" class=\"wp-image-81918\" srcset=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-1024x793.jpg 1024w, https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-300x232.jpg 300w, https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-768x594.jpg 768w, https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-1536x1189.jpg 1536w, https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Small businesses are often vulnerable to hacking because they often don&#8217;t have extensive resources or security measures like larger companies. Independent businesses may not be equipped to handle being hacked, resulting in significant financial losses and damage to their reputation.<\/p>\n\n\n\n<p>According to the <a href=\"https:\/\/www.staysafeonline.org\/small-business-resource-center\/smb-statistics\/\">National Cyber Security Alliance, 43% of cyber attacks target small businesses<\/a>. Even worse, 60% of those businesses go out of business within six months of a cyber attack. Cybercrime costs worldwide are measured in the hundreds of billions, and independent businesses are seen as an easy target.<\/p>\n\n\n\n<p><strong>Jump to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#social-tools\">Social media accounts are a powerful tool for small businesses<\/a><\/li>\n\n\n\n<li><a href=\"#hackers-hack\">Why do hackers hack?<\/a><\/li>\n\n\n\n<li><a href=\"#avoid-hack\">How to avoid getting hacked on social media<\/a><\/li>\n\n\n\n<li><a href=\"#financial-safety\">Build a financial safety net<\/a><\/li>\n<\/ul>\n\n\n\n<a id=\"social-tools\"><\/a>\n\n\n\n<h2 class=\"wp-block-heading\">Social media accounts are a powerful tool for small businesses&nbsp;<\/h2>\n\n\n\n<p>Social media accounts are crucial for the marketing and distribution efforts of independent businesses. According to research by <a href=\"https:\/\/www.prnewswire.com\/news-releases\/77-percent-of-us-small-businesses-use-social-media-for-sales-marketing-and-customer-service-300704921.html#:~:text=77%20Percent%20of%20U.S.%20Small,Sales%2C%20Marketing%20and%20Customer%20Service\">SCORE<\/a>, 77% of independent businesses utilize social media platforms to build brand awareness, improve customer service, and increase revenue.<\/p>\n\n\n\n<p>Whether you are a photographer, graphic designer, coach, or event planner, social media platforms provide a cost-effective way to reach a large audience. Social media allows you to target specific demographics and increase your visibility.&nbsp;<\/p>\n\n\n\n<p>The ability to engage with customers in real-time, communicate and gather feedback is also a key benefit of social media. Additionally, most social media platforms offer analytics tools that track metrics like engagement, reach, and conversion, which helps them to improve their marketing strategies and measure their success.&nbsp;<\/p>\n\n\n\n<p>Lastly, influencer marketing can help small businesses to reach a larger audience and increase their credibility. It allows them to distribute their product and services and reach a wider audience beyond their current customers.&nbsp;<\/p>\n\n\n\n<a id=\"hackers-hack\"><\/a>\n\n\n\n<h2 class=\"wp-block-heading\">Why do hackers hack social media accounts?<\/h2>\n\n\n\n<p>There are several reasons why hackers may target social media accounts, but one of the main motivations is financial gain. Social media accounts often contain personal information and broad reach, making them valuable assets for hackers.<\/p>\n\n\n\n<p>For example, a <a href=\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/cybersecurity-for-small-businesses\">hacker<\/a> may use a hacked account to scam others by sending messages to the account&#8217;s contacts, asking them to transfer money, or providing personal information. Hackers may also use the account to steal sensitive information, such as credit card numbers. In some cases, the hacker may even demand ransom money in exchange for returning the account to its rightful owner. And if you don\u2019t pay? They will sell the hacked account on black marketplaces for a profit.<\/p>\n\n\n\n<p>When dealing with hackers after you\u2019ve been hacked, it&#8217;s important to remember that, in most cases, their primary goal is to make money. These hackers are essentially operating as a business, intending to benefit from their actions financially. It&#8217;s essential to keep this in mind during any communication with them, as it can help inform your decisions and actions.<\/p>\n\n\n\n<a id=\"avoid-hack\"><\/a>\n\n\n\n<h2 class=\"wp-block-heading\">How to avoid getting hacked on social media<\/h2>\n\n\n\n<p>As a service-based business, you need to understand that being targeted by a hacker is a matter of <em>when<\/em> and not if.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Most of your interactions are probably online and if you use social media to run your business, you might be getting inbound leads multiple times a day.&nbsp;<\/p>\n\n\n\n<p>Protecting your social media accounts by following the steps below is an essential part of running your business without incident.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use a strong and unique password&nbsp;<\/h3>\n\n\n\n<p>A strong password should be at least 12 characters long and include a mix of uppercase and lowercase letters, numbers, and special characters. It will take 17 billion years to crack your 12 characters password if it contains symbols, numbers, upper case, and lower case. (<a href=\"https:\/\/www.passwordmonster.com\/\">Check your password here<\/a>.)<\/p>\n\n\n\n<p>Avoid using easily guessable information such as your name or birthdate. It&#8217;s also a good idea to use a different password for each social media account so that if one account is compromised, your other accounts will still be protected.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enable two-factor authentication&nbsp;<\/h3>\n\n\n\n<p>Two-factor authentication adds an extra layer of security to your social media accounts by requiring a code sent to your phone in addition to your password to log in. This means that even if someone manages to get a hold of your password, they will not be able to access your account without the additional code. Many popular social media platforms offer this feature, so be sure to turn it on.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Insure your social media account<\/h3>\n\n\n\n<p>Consider getting insurance for your social media account. Insurance for your social media account can provide financial protection in cases of account takeover or suspension from the platform. For example, <a href=\"https:\/\/www.get-notch.com\/instagram\">Notch Social Media Insurance<\/a> can help cover lost revenue if your account gets hacked. This is a niche coverage specifically designed for service-based businesses, using social media as a source to generate leads. It&#8217;s worth checking with your insurance agent to see if this type of coverage is available and if it&#8217;s a good fit for you.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Be cautious when clicking on links&nbsp;<\/h3>\n\n\n\n<p>Even if a link comes from someone you know, be cautious before clicking on it. The most common cyber attacks on Instagram and other social media platforms include: <\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>fake support and copyrights infringement scams, <\/li>\n\n\n\n<li>impersonations, <\/li>\n\n\n\n<li>free giveaways or prizes, <\/li>\n\n\n\n<li>\u2018get rich quick\u2019 scams and <\/li>\n\n\n\n<li>\u2018vote for me\u2019 scams. <\/li>\n<\/ul>\n\n\n\n<p>In most cases, the hacker creates a fake account that looks like a legitimate account (for example, Meta support or public figure) and sends direct messages to users asking them to click on a link or enter their login information.&nbsp;<\/p>\n\n\n\n<p>It&#8217;s essential to be aware of these types of attacks and to always verify the authenticity of the account or link before providing personal information or clicking on any links.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Keep your email and phone number up-to-date<\/h3>\n\n\n\n<p>People might lose access to an old email inbox or they may switch phone numbers. According to research by <a href=\"https:\/\/about.instagram.com\/blog\/announcements\/continuing-to-keep-instagram-safe-and-secure\">Meta<\/a>, your chances of getting your account back if you get hacked are twice as high if you have up-to-date contact details in your account. Make sure to update your email and phone number in your account\u2019s settings.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Be mindful of the information you share online<\/h3>\n\n\n\n<p>Social media is a great way to connect with friends and family, but it&#8217;s important to be mindful of the information you share online.<br>You might think you\u2019re talking to someone you know, but it may also be a hacker impersonating your friend.<br>Avoid sharing personal information such as your home address, phone number, or financial information. Be especially careful when you get a request with a sense of urgency, in a manner you did not expect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Keep your social media apps and devices up to date&nbsp;<\/h3>\n\n\n\n<p>Keeping your apps and devices up to date is important in protecting your social media accounts. This includes your operating system, web browser, and any apps you use to access social media. Software updates often contain security patches that fix known vulnerabilities, so installing them as soon as they become available is important.<\/p>\n\n\n\n<a id=\"financial-safety\"><\/a>\n\n\n\n<h2 class=\"wp-block-heading\">Build a financial safety net<\/h2>\n\n\n\n<p>Building a financial safety net to protect your income and business is important. In addition to covering your accounts with <a href=\"https:\/\/www.get-notch.com\/\">social media insurance<\/a>, a clientflow management platform like <a href=\"https:\/\/hbbadmin.reliablepenguin.com\/all-in-one-business-platform\">HoneyBook<\/a> can also help you protect your information. HoneyBook helps you manage all client conversations, email lists, <a class=\"wpil_keyword_link\" href=\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/invoicing\" target=\"_blank\" rel=\"noopener\" title=\"invoicing\" data-wpil-keyword-link=\"linked\">invoicing<\/a>, and payments from one place. Using HoneyBook means that you\u2019ll still be able to run your business, even if your social media account is hacked.&nbsp;<\/p>\n\n\n\n<p>Social media has become an essential part of running your business. As a service-based business owner\u2014this might be where you create the most value for your business. Where value is generated, hackers will soon follow.<\/p>\n\n\n\n<p>Individuals and businesses need to stay informed and take proactive measures to protect their accounts and personal information. This includes using strong passwords, enabling two-factor authentication, and being vigilant about suspicious activity. Additionally, investing in <a href=\"https:\/\/www.get-notch.com\/\">social media insurance<\/a> can provide financial protection in the event of losing your account to a hacker.&nbsp;<\/p>\n\n\n\n<p>As a business owner, you need to think about where investing small amounts of money may generate the biggest impact for your business.&nbsp; Investing in prevention and insurance is much cheaper than trying to rebuild your entire social media presence and reputation.<\/p>\n\n\n\n<p>Stay safe out there.<\/p>\n\n\n\n<div class=\"banner banner--light banner--bulb\">\n<div class=\"banner__text-container\">\n<h2 class=\"banner__title\">Manage your leads with HoneyBook<\/h2>\n<p class=\"banner__body\">Use HoneyBook to generate leads, track your highest-performing lead sources, and nurture them into clients!\n<\/p>\n<a class=\"banner__cta\" href=\"https:\/\/hbbadmin.reliablepenguin.com\/\">Start Free Trial<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>If you use social media to generate income, you may be a target for social media hacking. Here we discuss how to defend yourself against nefarious actors. Small businesses are often vulnerable to hacking because they often don&#8217;t have extensive resources or security measures like larger companies. Independent businesses may not be equipped to handle [&hellip;]<\/p>\n","protected":false},"author":846,"featured_media":81918,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[20],"tags":[69],"class_list":["post-81914","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-best-practices","tag-social-media"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg",2000,1548,false],"thumbnail":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-150x150.jpg",150,150,true],"medium":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-300x232.jpg",300,232,true],"medium_large":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-768x594.jpg",768,594,true],"large":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-1024x793.jpg",1024,793,true],"1536x1536":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21-1536x1189.jpg",1536,1189,true],"2048x2048":["https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg",2000,1548,false]},"post_excerpt_stackable_v2":"<p>If you use social media to generate income, you may be a target for social media hacking. Here we discuss how to defend yourself against nefarious actors. Small businesses are often vulnerable to hacking because they often don&#8217;t have extensive resources or security measures like larger companies. Independent businesses may not be equipped to handle being hacked, resulting in significant financial losses and damage to their reputation. According to the National Cyber Security Alliance, 43% of cyber attacks target small businesses. Even worse, 60% of those businesses go out of business within six months of a cyber attack. Cybercrime costs&hellip;<\/p>\n","category_list_v2":"<a href=\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/category\/business-best-practices\" rel=\"category tag\">Business best practices<\/a>","author_info_v2":{"name":"Elool Jacoby","url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/author\/elool-jacoby"},"comments_num_v2":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Social Media Hacking Trends | HoneyBook<\/title>\n<meta name=\"description\" content=\"For some independents, social media is the key to their income. Social media hacking is super common\u2014learn how to defend yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Media Hacking Trends | HoneyBook\" \/>\n<meta property=\"og:description\" content=\"For some independents, social media is the key to their income. Social media hacking is super common\u2014learn how to defend yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense\" \/>\n<meta property=\"og:site_name\" content=\"HoneyBook\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/honeybook.co\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-02T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-08T21:58:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1548\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Elool Jacoby\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@honeybook\" \/>\n<meta name=\"twitter:site\" content=\"@honeybook\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Elool Jacoby\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense\",\"url\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense\",\"name\":\"Social Media Hacking Trends | HoneyBook\",\"isPartOf\":{\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg\",\"datePublished\":\"2023-02-02T16:00:00+00:00\",\"dateModified\":\"2023-02-08T21:58:07+00:00\",\"author\":{\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#\/schema\/person\/4726265422bc6ce7de065b46045a1bc9\"},\"description\":\"For some independents, social media is the key to their income. Social media hacking is super common\u2014learn how to defend yourself.\",\"breadcrumb\":{\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#primaryimage\",\"url\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg\",\"contentUrl\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg\",\"width\":2000,\"height\":1548,\"caption\":\"Friends gather around a table with their tech devices.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business best practices\",\"item\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/category\/business-best-practices\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Social media hacking and how to defend against it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#website\",\"url\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/\",\"name\":\"HoneyBook\",\"description\":\"Resources to empower independent business owners\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#\/schema\/person\/4726265422bc6ce7de065b46045a1bc9\",\"name\":\"Elool Jacoby\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b2fc266842f787332d3e05380f39fb0594ab3c5bebe8983c6ef072430acf5b7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b2fc266842f787332d3e05380f39fb0594ab3c5bebe8983c6ef072430acf5b7?s=96&d=mm&r=g\",\"caption\":\"Elool Jacoby\"},\"description\":\"Elool Jacoby is the CPO and Co-Founder at Notch Insurance. He is exploring the synthesis between insurance and digital assets. He's dedicated to helping digital businesses protect themselves against emerging online risks.\",\"url\":\"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/author\/elool-jacoby\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Media Hacking Trends | HoneyBook","description":"For some independents, social media is the key to their income. Social media hacking is super common\u2014learn how to defend yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense","og_locale":"en_US","og_type":"article","og_title":"Social Media Hacking Trends | HoneyBook","og_description":"For some independents, social media is the key to their income. Social media hacking is super common\u2014learn how to defend yourself.","og_url":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense","og_site_name":"HoneyBook","article_publisher":"https:\/\/www.facebook.com\/honeybook.co","article_published_time":"2023-02-02T16:00:00+00:00","article_modified_time":"2023-02-08T21:58:07+00:00","og_image":[{"width":2000,"height":1548,"url":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg","type":"image\/jpeg"}],"author":"Elool Jacoby","twitter_card":"summary_large_image","twitter_creator":"@honeybook","twitter_site":"@honeybook","twitter_misc":{"Written by":"Elool Jacoby","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense","url":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense","name":"Social Media Hacking Trends | HoneyBook","isPartOf":{"@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#primaryimage"},"image":{"@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#primaryimage"},"thumbnailUrl":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg","datePublished":"2023-02-02T16:00:00+00:00","dateModified":"2023-02-08T21:58:07+00:00","author":{"@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#\/schema\/person\/4726265422bc6ce7de065b46045a1bc9"},"description":"For some independents, social media is the key to their income. Social media hacking is super common\u2014learn how to defend yourself.","breadcrumb":{"@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#primaryimage","url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg","contentUrl":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-content\/uploads\/2023\/01\/Feature-Images-21.jpg","width":2000,"height":1548,"caption":"Friends gather around a table with their tech devices."},{"@type":"BreadcrumbList","@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/social-hacking-defense#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Business best practices","item":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/category\/business-best-practices"},{"@type":"ListItem","position":3,"name":"Social media hacking and how to defend against it"}]},{"@type":"WebSite","@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#website","url":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/","name":"HoneyBook","description":"Resources to empower independent business owners","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#\/schema\/person\/4726265422bc6ce7de065b46045a1bc9","name":"Elool Jacoby","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hbbadmin.reliablepenguin.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b2fc266842f787332d3e05380f39fb0594ab3c5bebe8983c6ef072430acf5b7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b2fc266842f787332d3e05380f39fb0594ab3c5bebe8983c6ef072430acf5b7?s=96&d=mm&r=g","caption":"Elool Jacoby"},"description":"Elool Jacoby is the CPO and Co-Founder at Notch Insurance. He is exploring the synthesis between insurance and digital assets. He's dedicated to helping digital businesses protect themselves against emerging online risks.","url":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/author\/elool-jacoby"}]}},"_links":{"self":[{"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts\/81914","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/users\/846"}],"replies":[{"embeddable":true,"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/comments?post=81914"}],"version-history":[{"count":0,"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/posts\/81914\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/media\/81918"}],"wp:attachment":[{"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/media?parent=81914"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/categories?post=81914"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hbbadmin.dev.reliablepenguin.com\/blog\/wp-json\/wp\/v2\/tags?post=81914"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}