Social Media & Crisis Management

Of all of the developments that have had an impact on crisis management over the last ten years, one of the most significant has undoubtedly been the rise of the use and availability of social media.

If we think of the events of September 1st 2001, with the attack by the two planes on the World Trade Centre in New York that marked the start of the modern security management era, then the vision that you have of that event will undoubtedly have come from iconic images that you saw on the television.

And then if you think to the Boston marathon bombing that took place in June 2013, then the likelihood is that the images that you have in your mind from that event are not from some centrally controlled television broadcaster, as sent to them by a professional news crew, but rather pictures taken on people’s mobile phones and uploaded almost instantly onto the internet.

The ability that modern social media has to connect people instantly across the globe is something that we are still coming to terms with, but from a security manager’s perspective it is undoubtedly one of the most powerful tools that they have for accessing, managing and controlling information on a whole range of levels.

The use of social media, that is, shared open access media such as Facebook, YouTube and Twitter, as well as SMS texting systems, is something that is still developing as it concerns crisis and emergency management, but it is generally accepted that the first ‘social media disaster’ was the Haiti earthquake in January 2010.

Haiti was an example of a ‘true crisis’ in that there was an almost total destruction of local infrastructure, and complete lack of reliable information sources.

For many companies with employees in the area, social media was the only way that they could communicate with them, assess their needs and maintain an on-going dialogue throughout the early days of the disaster. Even for international news agencies, such as the BBC, social media was one of their main sources of information.

Uses of Social Media

In general terms, social media can be used in one of three ways. It can be used to ‘push out’ information, that is it can be used by the central command or headquarters to send out information to everyone it is connected to.

As an example, it could be used to inform the public of an emergency telephone number, or where the meeting point for an evacuation might be.
 
Secondly, it can be used to ‘pull in’ information, using its network of connected people out in the world to supply information. In the event that there is a flood, for example, social media is an excellent way of understanding what is going on with outlying facilities, what the damage has been, what the impact has been and what steps need to be taken.

Another example is if an incident has occurred in a foreign country, and you need to have local information translated into English. It is possible that you do not have a native-speaker within your own organisation, but that is something that is easily accessible on social media.

The third use of social media is to monitor general situations through ‘crowd sourcing’, that is, by plugging into the world-wide online community and seeing what other people are talking about.

As one journalism blog reported, the power of crowd-sourcing can be seen by the fact that within 48 hours of the Haiti earthquake, the ‘Earthquake Haiti’ Facebook group had 170,000 members, and the Red Cross, whose previous largest fundraising campaign had raised $190,000 had raised $8 million, within the first three days through social media.

In another example, the first twitter message put out by the Boston Police Department immediately following the Boston Marathon bombing on 15th April 2013 was re-tweeted 516 times. Five days later the message that the fugitive bomber had been captured was re-tweed 143,000 times.

However, as with any aspect of crisis management, however powerful social media might be, it doesn’t just happen. It is the ability of an organisation to understand how it works, how it can be used, and what effect it might have that allows it to become the powerful tool that it has the potential to be.

The design and use of social media is one area of security management that requires expert knowledge, and any system that is designed by non-experts is likely to be less than optimally effective (and actually, may well fail completely) under the pressure of a crisis situation.

In order for it to be effective, the use of social media needs to be woven into the fabric of a company’s daily routines, so that if a crisis does occur, everyone is already familiar with social media and comfortable with how they can use it.

Training can be contracted with www.deltar-ts.com

UKSecurityExpo:

You Might Also Read: 

Cybersecurity And Media Companies:

London Terrorist Attack Is A Wake-Up Call For Social Media:

Social Media & The New Advertising Model (£)

 

« What Does The UK’s Data Protection Bill Mean For Business?
North Korean Cyber Gangs Blitz the Irish »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Andrisoft

Andrisoft

Andrisoft develops WANGUARD, an anti-DDoS Software solution that monitors IP traffic using packet-based and flow-based Sensors, and protects networks

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Espria

Espria

Espria is a leading independent managed service provider with expertise in Cloud, IT, Communications and Document Solutions.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

Early Game Ventures (EGV)

Early Game Ventures (EGV)

Early Game Ventures invests in startups that jumpstart new industries in the emerging markets of Europe.

Twine Security

Twine Security

Twine is pioneering the creation of AI digital cybersecurity employees to help improve efficiency for cybersecurity teams.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.