631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

Depending on the way that it’s used, social media can be dangerous, regardless of your age or what you do for a living. The Internet’s anonymity is notorious for providing people the added veil of secrecy that allows them to do all sorts of unspeakable acts under the facade that they won’t be discovered or that there won’t be any repercussions for their actions. Whether it’s a troll or a full-on cyberbullying case, social media can enable some of the worst people out there.

On the business end of things, social media can be used to steal information through the use of phishing scams and hacking attacks. Hackers will use everything that they have at their disposal to steal whatever they can from unsuspecting victims. Personally identifiable information and contact information is usually at the top of their lists, though they will settle for anything remotely confidential or valuable that they can get their hands on. Social media accounts usually hold valuable information on them in their own right, including addresses, phone numbers, email addresses, and so forth, all for the taking of anyone who has permission to view it.

Phishing tactics are a bit harder to identify as they are specifically designed to trick users into willfully handing over any information. You might be surprised by the tricks they employ to make even the most vigilant users spill the beans on their most sensitive information. Impersonating social media accounts is a major way that hackers will attempt to steal data from users. Hackers can even use personal messages to try and coax information from unsuspecting users. It’s clear that users should be smart about what they post, but how can they do so?

The first thing you need to consider is that everything you post on social media is likely to be seen by just about anyone. If you post pictures of your house or your family, all of that can be traced back to you. A hacker could use this information against you. Furthermore, anything you post can and will be used against you. If you post something in the public domain, it could affect your business in a negative way.

Beyond that, you have to make sure that any information that you share over social media isn’t confidential or sensitive in nature. If someone messages you and it seems out of place, chances are that you should put them through the ringer to guarantee you’re dealing with the genuine article. Never share sensitive information if you don’t have to, and always take any request for such information with a healthy dose of skepticism.

Does your business need help staying secure? Suffolk Computer Consultants can help. To learn more, reach out to us at 631-905-9617.

The Tangled History of Wireless Charging
Tech Term of the Week: Hard Drives


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy Network Security Productivity Cybersecurity Malware User Tips Tech Term Managed IT Services Smartphones Microsoft Communications Backup Hardware Internet Efficiency Passwords Communication Hackers Outsourced IT Business Hosted Solutions Email Small Business Software Ransomware Browser Business Management Google Android VoIP Wi-Fi Data Backup Data Recovery Mobile Device Alert Social Media Collaboration IT Support Save Money Data Smartphone IT Services Internet of Things Windows 10 Microsoft Office Cloud Computing Network Holiday Innovation Applications Saving Money Wireless Password Managed IT Services Mobile Devices Twitter Access Control Computer Apps Employer-Employee Relationship Business Intelligence Users Bandwidth Miscellaneous Router Information Business Continuity BDR Data Breach Blockchain Government Word Workplace Tips Excel Marketing Data Management Office Gadgets Phishing Virtualization Automation Networking Patch Management Analytics Settings Vulnerability VoIP Windows Dark Web Battery Tech Terms Connectivity Remote Monitoring and Management Spam Mobile Device Management Cortana Chrome Medical IT Tip of the week Remote Computing App Virus Facebook Virtual Assistant Hacking Retail Mobility Paperless Office Managed Service Computers Cost Management Workers IT Support VPN Productivity How To Remote Monitoring BYOD Artificial Intelligence Compliance Wireless Charging Law Enforcement Data Protection Physical Security Managed IT Service Company Culture Website Office 365 WiFi Cybercrime Gmail Politics Scam Edge Threat Server Voice over Internet Protocol Telephone Systems Wearables File Sharing Staffing Dongle G Suite Upgrade Touchscreen Files Telephony Processors Value Help Desk Remote Support Telecommute Movies Google Maps Reporting User Tip Update WhatsApp Information Technology Google Drive Comparison Gadget Lead Generation Mobile Security Laptop Printing Remote Control Healthcare User Security Bring Your Own Device Microsoft Office 365 Voice over IP Spyware Hosted Solution Certification Printer Server Data loss Unified Communications Two-factor Authentication Outlook Entertainment Biometrics Network Attached Storage Streaming Media Spotify Analysis Specifications Shortcut Operating System Paper Amazon Spam Blocking Data Security Business Technology Recovery Technology Tips Hybrid Cloud Authentication eCommerce Disaster Recovery HP Database Hiring/Firing Copy Apple Cleaning Printers Staff RAM GDPR Telecommuting Maintenance Tech Support Profitability News Access Server Management Downloads Multi-Factor Security Conferencing CrashOverride WannaCry Environment Ink Safety Work/Life Balance Email Management Sales Backup and Disaster Recovery Authorization Licensing Online Shopping Document Management Tactics Managed IT Paste Training iPhone Websites Microsoft Teams Storage Antivirus Millennials Botnet Eliminating Downtime Telephone System Trends Office Tips Automobile Content Filtering HIPAA e-waste Travel Education Smart Technology IT budget PowerPoint Plug-In Tablet Phone System SSD Digital Internet Explorer Cables Security Cameras Managing Stress Big Data Error disposal Hard Drives Wireless Internet SaaS Machine Learning A.I. Hard Drive Troubleshooting Live Streaming IT Management Sports Proactive IT Knowledge Inventory Mobile Office Vendor Management Video Games Synergy Autocorrect IaaS Domains Worker Television Avoiding Downtime Credit Cards Scheduling Windows 10 Dark Data Emoji HaaS Public Speaking Samsung Printer Managed Service Provider Presentation Lithium-ion battery Instagram DDoS Emergency Unified Threat Management Money Augmented Reality Leadership Wireless Technology 5G Employer Employee Relationship Current Events IBM Fun Hacker Computer Care The Internet of Things Freedom of Information Budget Personal Information Net Neutrality Competition Customer Relationship Management Quick Tips IP Address Encryption Gaming Console Yahoo Regulation Scalability Customer Service Search

Newsletter Sign Up