The tribes share: what NOT to do on social media

Blog

Have you heard about the tribes at Start-Up Chile? Start-Up Chile doesn´t set limitations regarding the industries our startups explore. As long as your business idea can scale fast and globally, you are free to explore green tech, social media, marketing, media, education, health, hardware, etcetera. No limits. 

Joining such a diverse community will definitely expand your creativity, but everyone can benefit from sharing and collaborating with peers, right? This is why the Start-Up Chile participants are organized in tribes, according the industries they devote their time to. They meet every week to discuss the challenges they have in common, and every once in a while they host meetups to open the discussion with local entrepreneurs. 

This time, what we have to share with you comes from one of their private sessions. Quynh Pham, founder at Reachoo and leader of the Social Media Tribe, organized a meeting where the whole tribe explored “What NOT to do on social media”. 

——————————

There were a number of areas covered in the Social Media Risk presentation. Several of the areas of risk included “brandjacking”, location based risk, hacked social media apps and monitoring solutions to understand what the audience is saying about you.

On the “brandjacking” topic, some people in the audience did not really understand this new type of threat. What it basically boils down to is an attack which can take over you profile, (such as the hack of Burger King’s Twitter account on February 18th) or can create false accounts that seem to be the real company or real person. Two great examples that were discussed was the Facebook profile of Bank of America. All the graphics seemed legitimate, same wording as the real sight,but then, the posts made to this profile were definitely an attack against the brand. A great free site that the audience liked was http://knowem.com/. Here you can enter your name or company name and see where its been registered in social media. It could be surprising to see your name registered on a site when you know you have not done so.

The second good example was the fake Twitter account for BP during the oil spill that they had in the Gulf of Mexico. The person who created the fake account made it seem originally as a real BP Twitter account and then proceeded to bash BP. And had over 100,000 followers in weeks.

Location based risk is something that the audience hadn´t really considered. When you check-in someplace to share your location with your friends, it can also be used to stalk you. In business, if you check-in with a client, you competitors might gain valuable information about which you are dealing with and could target your client base. The nefarious side of location based check-in is really not considered by most of the audience. Another really interesting point about social media risk that was brought up was how people monitor social media. Or lack thereof. If customers say something negative about a company on social media, it could go viral within hours. The great and funny example of this was Kevin Smith (the actor and director) was kicked of a Southwest Airlines plane for being too “fat” for one seat. He proceeded to bash Southwest for 24 hours before anyone from Southwest even knew they were being “attacked” by a customer. Have monitoring tools in place at all hours of the day is now a necessity for using social media.