
by
Block Party
May 20, 2025
Work and personal presences have become one in the same, and social media profiles often reveal more than we realize – home addresses, family connections, institutional affiliations – all of which can be used to target individuals and, by extension, the organizations they represent.
Humans are the weakest link in organizational security, and their online presence creates unintentional entry points for attackers. Details like institutional affiliations on LinkedIn or university directories make it easy to identify who is connected to your organization. Many people still reuse passwords, skip 2FA, or have sensitive information like their location or family members unintentionally exposed on their accounts. These gaps create opportunities for targeted attacks and social engineering campaigns that escalate into organizational compromises.
Bad actors don’t need direct access to their target to cause harm. Platforms like Venmo and LinkedIn publicly expose our social graphs by default, making it easy to map out someone's colleagues, friends, and family. These networks are used to gather intelligence, apply pressure, or harass by proxy, often across a large span of connections.
Staff in less visible roles can draw harassment or threats intended for the organization simply because they’re affiliated with it. For example, trust and safety teams at tech companies often experience harassment, even without public-facing responsibilities. A job title on LinkedIn, a contact email in a social bio, or a home address found through a simple Google search can make employees vulnerable targets when bad actors are looking for someone to take their frustration out on.
Block Party makes it easy to protect your people; enterprise customers across tech, journalism, non-profits, and political campaigns already use our browser extension to mitigate personal-to-professional risk, scale protections, and support the safety, retention, and visibility of their teams.
Want to explore how Block Party can support your team? Request more information or schedule a demo.