The term ‘egosurfing’ comes from the Latin ‘ego’ meaning ‘I’, from the English ‘surfing’, which translates as ‘surfing the Internet’. We have all, or almost all of us, at some time or another searched for our data on the Internet, and it is a good practice to know the security of our data on the Internet. In this article we are going to see how to perform egosurfing in our company in a safe way.
There are three ways to practice egosurfing in our company:
One thing that should not be ignored when searching for us on social networks is the name of the account and of our company. If for example our company is called ‘ZepoApp’, we should try different combinations of names in the search engine of the social network, such as: ‘zepoaplicación’, ‘appzepo’, ‘zepoapk’, etc… It seems silly, but these differences can make cybercriminals impersonate us, asking our customers for sensitive data in our name or phishing them (making them believe that for example they have won a prize draw), discrediting the name of our company.
What if I don’t want what I have found in my company to be published?
First of all, if the information we have found was published by ourselves, we only need to delete it from the social network or platform where it is located.
Second, if that information is not published by us, we have several options:
- For example, if it is a malicious comment or we have been tagged in a post without our permission, we can configure our profiles to block certain comments and allow who tags us or not.
- If the information we have found violates the honor, reputation and/or privacy of our company, we must directly request the responsible or administrator of the profile or web page to remove the content. If we understand that the dissemination of such data goes against the honor of our company and could constitute a crime, we could file a formal complaint.
In summary, if we see a fake profile impersonating our company or one of our employees, we must report it directly to the relevant social network through all the channels made available for this purpose.
With Zepo. you can develop a sustainable cybersecurity culture within your organization in 3 simple steps:
Register your employees.
You can do it manually or through a CSV file.
Launch attacks and test your teams.
You will be able to check in real time who falls into the trap
Train them in cyber-attack prevention.
Creates customized prevention courses