Users can authenticate to a company’s web applications using their credentials from a popular
social media site. Which of the following poses the greatest risk with this integration?
A.
Malicious users can exploit local corporate credentials with their social media credentials
B.
Changes to passwords on the social media site can be delayed from replicating to the company
C.
Data loss from the corporate servers can create legal liabilities with the social media site
D.
Password breaches to the social media site affect the company application as well