Red faces are not unusual at social media networks, where hacking and manipulation of the masses is like a contact sport. As soon as one vulnerability is covered, the attackers force their way through the narrowest inkling of a weakness somewhere else.

The problem is that the focus is almost entirely on protecting access to hardware and software. Securing the people behind these systems? Not so much.

BL Premium

This article is reserved for our subscribers.

A subscription helps you enjoy the best of our business content every day along with benefits such as exclusive Financial Times articles, ProfileData financial data, and digital access to the Sunday Times and Sunday Times Daily.

Already subscribed? Simply sign in below.



Questions or problems? Email helpdesk@businesslive.co.za or call 0860 52 52 00. Got a subscription voucher? Redeem it now