Social media vulnerability: A headache for employers?

Personal information has become the currency of the digital economy. Despite growing awareness of the importance of protecting one’s right to privacy, many people find themselves sharing, providing, conveying and divulging information across multiple platforms and devices as part of their daily ritual of engaging, trading and communicating with others. Unfortunately, it is exactly this carefree mindset which plays into the hands of lurking cybercriminals and can also impact employers.

With social media a cornerstone of daily life for most individuals, it is easy to succumb to the lure of posting all your personal data online, presumably only for your followers to see, but often quite easily accessible to the world at large. Information about travels, hobbies, partners, work, interests and everything in between is laid out on a silver platter for criminals to profile and identify unsuspecting victims to target for hacking, impersonation and other fraudulent intentions. 

With cybercrime a global phenomenon and South Africa having the dubious honour of being one of the leading countries falling prey to cyberattacks, it is vital that persons and businesses take note of this risk and take steps to protect themselves.

When one considers that still more than 80% of data breaches result from human error or negligence, it speaks to the danger of employees creating opportunities for a business to suffer from an attack or data breach.

Employees have social media accounts and online presences that make profiling possible. And they may be unaware or insensitive to the lurking dangers posed by cybercriminals, taking little or no steps to protect themselves, like ensuring proper privacy settings on accounts, setting secure and complex passwords, using different and impersonal passwords for different accounts etc. Often employees even use the same or similar passwords on their social media accounts as for a work account. If the personal profile is compromised, it becomes easy to also compromise work accounts that the employee has access to. If an employee’s personal account is hacked it can also be used to impersonate that employee towards customers or partners, so compromising the employer.  

Clearly the lines of personal and business risk become blurred when an employee’s accounts are compromised, as this may not only be harmful to the employee but also the employer. 

So, what can employers do to limit this risk? 

Probably the most important aspect is awareness training on how to secure your personal accounts, set good passwords, and avoid certain types of public information sharing. To help reduce the ‘human error’ aspect, understanding the risks and what good practices you can implement, can go a long way to reducing this risk.

Adding a policy framework for allowed social media use, password management, device management etc. are also tools that can help a business create a secure environment that will help limit the impact on the business should an employee’s personal accounts be compromised.

Ultimately, the focus of an employer should be to create a separation between the impact on the employee and business in the event of a compromise through training, clear policies and a secure security environment. 

For assistance with establishing the necessary policy frameworks for your business, reach out to our Compliance Team to help ease your social media headaches. 

Disclaimer: This article is the personal opinion/view of the author(s) and is not necessarily that of the firm. The content is provided for information only and should not be seen as an exact or complete exposition of the law. Accordingly, no reliance should be placed on the content for any reason whatsoever and no action should be taken on the basis thereof unless its application and accuracy have been confirmed by a legal advisor. The firm and author(s) cannot be held liable for any prejudice or damage resulting from action taken on the basis of this content without further written confirmation by the author(s).

 

May 1, 2024
Protecting creators in the digital era – Copyright amendments

Protecting creators in the digital era – Copyright amendments

Nearly 5 decades after its original enactment, South Africa’s copyright regime is undergoing one of the most significant reforms in its history. The Copyright Amendment Bill [B13F-2017] introduces modern protections to secure the financial and digital interests of authors and performers, thereby strengthening their economic rights in an increasingly digital world. While parts of the Bill remain under constitutional review, a landmark 2025 court ruling has already enforced critical protections for users with disabilities. This article breaks down the primary measures intended to safeguard South African creativity.

The importance of due diligence in M&A

The importance of due diligence in M&A

The excitement of a merger or acquisition often sits in the “big picture” strategy, but the success of the deal lives or dies in the details. Due diligence is not a box-ticking exercise. It is the point at which assumptions are tested, risks are priced, and uncomfortable questions are asked. This article explores why looking before you leap, by conducting a thorough due diligence, is the golden rule of mergers & acquisitions (“M&A”) transactions.

Customary marriages stand equal

Customary marriages stand equal

In a landmark judgment delivered on 21 January 2026, the Constitutional Court pronounced welcomed clarity on the interplay between customary marriages, civil marriages, and antenuptial contracts (“ANC”). The Court, by majority decision in VVC v JRM and Others (CCT202/24) [2026] ZACC 2 (21 January 2026) , declined to confirm a High Court order that had declared section 10(2) of the Recognition of Customary Marriages Act 120 of 1998 (“the Recognition Act”) unconstitutional. The majority decision powerfully reaffirmed the equal constitutional status of customary marriages and established that spouses cannot unilaterally alter their matrimonial property regime without judicial oversight.

Sign up to our newsletter

Pin It on Pinterest