(855) ER-TECH-1
healthcare managed it services
msp healthcare
(855) ER-TECH-1

How to Keep Your Business Safe from Social Media Burglary

Apr 06, 2023

In 2016, a group of burglars snuck into Hôtel de Pourtalès and robbed celebrity businesswoman Kim Kardashian at gunpoint in her hotel room.


The perpetrators were a group of older men aged 60 to 72 years old, and they stole over $10 million worth of jewelry.


When asked how they prepared for the crime, the 70-year-old suspect
Yunice Abbas said, “I went to the Internet…I saw her jewelry, I saw her ring, I saw that she showed it everywhere, and we knew this information through social media.”


According to VICE’s
Crimewave, “In the lead-up to the event, Kim [Kardashian] was posting her lavish lifestyle on Snapchat and Instagram.”


After the incident went viral, Abbas and his gang of “grandpa robbers” influenced thieves around the world to use social media to their criminal advantage.


They unknowingly triggered a global trend of social media burglary.

What is Social Media Burglary? And How Does It Affect My Business?

What is Social Media Burglary? And How Does It Affect My Business?

Social media burglary is when criminals use social media to execute burglaries, which the Federal Bureau of Investigation (FBI) defines as the unlawful entry of a structure to commit a felony or theft.


After the 2016 jewelry heist, many more social media burglaries occurred.


In 2019, the Houston Police Department
reported that criminals used social media to identify and surveil burglary targets in upscale Houston neighborhoods.


They checked social media posts to find out when wealthy homeowners would be at work or on vacation so they could plan out the burglary timeline. The criminals ended up stealing artwork worth hundreds of thousands of dollars.


Homes and hotels aren’t the only victims of social media burglaries. Criminals can leverage social media to steal from businesses like yours, too!


In fact,
34% of burglaries each year affect small businesses.


In 2021, mayors in California
investigated the possibility of thieves using social media to facilitate a string of organized retail robberies across several cities.


“Speed, coordination, mass volume. That’s tough to do. Social media makes all that easier. You can engage a lot of people,” Center for Cyber and Homeland Security Senior Fellow Clint Watts said. “In terms of that many people showing up at the same time to hit a place, I don’t know how you pull it off without social media.”


When it comes to crimes involving social media,
hacking, phishing scams, and ransomware attacks aren’t the only threats you should keep an eye out for.


Read More: Signs and Symptoms of Ransomware Attack

How Burglars Use Social Media Against You

How Burglars Use Social Media Against You

Using the power of social media, burglars get real-time access to where you are, what you’re doing, what you own, and what your home or office looks like. All the information they need to find and track targets is just a tap away.


Here are some of the ways criminals use social media to their advantage:

Scout for Potential Targets

In an anonymous interview with Crimewave, a UK-based robber admits using social media to scout for potential targets. 


He uses one of his fake accounts to follow people’s social media pages and check out their posts. He looks into what people own, where they go, and how they spend their money.


When asked how easy it would be to locate a person’s house using social media, the robber says you can get it by looking for photos of their cars and running a car registration check.


“At the same time, if I go to their live [broadcast], sometimes their address is there,“ he adds. 


By lurking on social media, criminals can anonymously find out who you are, what you have, where you live, and when your home or office will be most vulnerable.


For criminals targeting businesses, cybersecurity company Proofpoint says LinkedIn is a common tool. Thieves can use it to collect business emails and identify employees with access to financial information, valuable data, and privileged network access.


With enough information, malicious actors can launch a reverse social engineering attack against your business.


Read More:
How Cybercriminals Use Reverse Social Engineering to Steal Your Medical Data

Conduct Reconnaissance

According to a study by alarm company Friedland, 80% of criminals return to the targeted location several times before breaking in.


They conduct reconnaissance operations to study and gather as much information as possible about your home or office, such as points of entry, hours of operation, camera location, escape routes, and people present.


In our highly digital world, social media is the burglar’s perfect tool for conducting surveillance and reconnaissance remotely. Here are a few ways they utilize it:



  • Your social media tags, check-ins, and posts tell burglars when you’re out on vacation or away from the targeted location.
  • Geo-tagging features on some apps reveal your real-time location to burglars whenever you upload photos or videos online, telling them whether or not you are at the targeted property.
  • Google Street View gives burglars an up-close look at the targeted location and its surrounding areas without having to go there in person.
  • Unsecure CCTV cameras allow burglars to hack into live cameras inside your home or office. They can watch and hear everything without any restrictions. If you’re a medical office, this could lead to a massive HIPAA violation.


Read More: How to Avoid HIPAA Violations on Social Media

How to Prevent Social Media Burglary

How to Prevent Social Media Burglary

As technology evolves, so does the complexity of crimes. To avoid falling victim to criminals leveraging social media, stay one step ahead of them by keeping your personal and business information hidden. Here are a few ways to do that:

Think Before You Post

After losing over $50,000 to a social media burglary, Italian influencer Eleonora Incardona admits she had to change her social media habits and be more careful about her posts. 


“I never publish a story made at the moment,” Incardona
says. “[When I’m in an event] and I’ve made some content, I’ll publish an hour or two hours after I leave so that criminals can’t…follow me.”


Because critical information is available to criminals through social media profiles, always double-check your posts before publishing them online.


Will it give away too much information? Will it give burglars a virtual tour of your home or office? Will it reveal your address to strangers?


Sharing travel photos while you are still on vacation quickly shows burglars that you’re away from home. Similarly, your employee posting about being alone in the office can tell criminals that your business is less secure and more vulnerable to a break-in.

Adjust Your Privacy and Location Settings

One of the ways social media burglars gather information about you is by using fake accounts to pose as friends, connections, or even potential business partners. They start conversations with you to collect any information that can help them execute a crime.


Be wary of strangers who contact you online, even when you share mutual connections. Always run a thorough check before allowing people into your social media circle.


Keep your social media profile private. Turn off any geo-tagging features on your account to avoid sharing your location with strangers. Update your privacy settings so your posts aren’t visible to users outside your immediate friend group.

Install Secure CCTV Cameras

Security systems like cameras, sensors, and alarms effectively deter burglary.


According to
Luke Harris, a former-burglar-turned-security-consultant, security cameras make thieves think twice before breaking into your property. 


“Spotting a security camera is likely to stop a burglar in their tracks,” Harris said. “They not only know that the property is well protected, but also that there is a chance that their face is being recorded and passed on to the police.”


However, not all security camera systems offer the level of security you need.


Unsecure cameras can be an advantageous asset for criminals. They can hack your camera system, use it to stalk you from inside your home, spy on your business operations from inside your office, and steal company data. The latter is especially dangerous for healthcare organizations that handle valuable medical data.


Read More: Things You Need to Know About CCTVs in Your Clinic


Only purchase
secure camera systems from a reputable company specializing in security-compliant technology. They ensure your camera system is secure by disabling excessive connectivity features, checking for valid certificates to connect to your network, and isolating potentially compromised cameras.

Protect Your Home and Business with Cybersecure Technology

Protect Your Home and Business with Cybersecure Technology

Technology is a double-edged sword. The applications and programs we use for efficiency and convenience can be the weapons burglars use against us.


Use trusted and secure technology to protect yourself, your family, and your business from social media burglary. If you’re not sure how to start or who to partner with, ER Tech Pros is a reliable IT company that focuses on providing cybersecure and compliant technology.


Whether you need cloud-based CCTV cameras that deter criminals or cybersecurity awareness training for your staff, ER Tech Pros can help equip you against social media burglary.


Learn More

Search Articles

data diddling
By Aprillice Alvez 15 Apr, 2024
Protect your healthcare practice from data diddling by educating your team on vulnerabilities and investing in prevention techniques like data validation.
A businessman wearing headphones uses a cloud phone system to do business communications
By Karen Larsen 29 Feb, 2024
The business world is steadily shifting to cloud communications. Our new blog post gives you a few reasons why you should, too. Read on to learn more.
A digital brain is sitting on top of a computer motherboard, symbolizing AI in cybersecurity
By Karen Larsen 14 Feb, 2024
While AI can revolutionize cybersecurity practices, it can also expand the attack surface. How do you balance the risks & benefits of AI in cybersecurity?
A man is typing on a laptop computer with an email alert on the screen
By Karen Larsen 05 Feb, 2024
Phishing is the primary way cybercriminals access our healthcare systems. Our new blog post shows you how to stop an email phishing attack in its tracks.
An employee's laptop on a desk, showing the need for cybersecurity best practices in remote work
By Karen Larsen 22 Dec, 2023
Remote work is revolutionizing the world, but if you want it to work for your business, you’ll need to step up your cybersecurity game.
Mobile phone  displaying a health app with a padlock and a shield on it
By Karen Larsen 18 Dec, 2023
As the world becomes increasingly digital, thousands of patients and providers are downloading the first mobile health app they find. Here’s why you shouldn’t.
A stethoscope placed on a remote healthcare device, showing the connection between MSP & healthcare
By Karen Larsen 30 Nov, 2023
Remote healthcare is here to stay. Do you have the IT expertise to navigate it? Find out how partnering with an MSP can transform how you deliver care.
Computer keyboard with a key specifically for cloud network security
By Karen Larsen 15 Nov, 2023
Thanks to the massive influx of cloud technology, businesses are future-proofing their operations with cloud-based security. Here’s why you should, too!
A fingerprint staying securely on a circuit board symbolizing MFA benefits and cybersecurity
By Karen Larsen 03 Nov, 2023
Multifactor authentication (MFA) prevents 99.9% of account compromise attacks. Find out how MFA protects your business and why you must implement it ASAP.
Cloud securely stores data from a microchip and utilizing powerful ransomware prevention
By Karen Larsen 23 Oct, 2023
Falling victim to a ransomware attack can ruin everything you worked so hard to build. Here’s how you can keep cybercriminals out of your cloud environments.
Show More

Healthcare & Tech Articles

data diddling
By Aprillice Alvez 15 Apr, 2024
Protect your healthcare practice from data diddling by educating your team on vulnerabilities and investing in prevention techniques like data validation.
A businessman wearing headphones uses a cloud phone system to do business communications
By Karen Larsen 29 Feb, 2024
The business world is steadily shifting to cloud communications. Our new blog post gives you a few reasons why you should, too. Read on to learn more.
A digital brain is sitting on top of a computer motherboard, symbolizing AI in cybersecurity
By Karen Larsen 14 Feb, 2024
While AI can revolutionize cybersecurity practices, it can also expand the attack surface. How do you balance the risks & benefits of AI in cybersecurity?
More Posts
Share by: