631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

Depending on the way that it’s used, social media can be dangerous, regardless of your age or what you do for a living. The Internet’s anonymity is notorious for providing people the added veil of secrecy that allows them to do all sorts of unspeakable acts under the facade that they won’t be discovered or that there won’t be any repercussions for their actions. Whether it’s a troll or a full-on cyberbullying case, social media can enable some of the worst people out there.

On the business end of things, social media can be used to steal information through the use of phishing scams and hacking attacks. Hackers will use everything that they have at their disposal to steal whatever they can from unsuspecting victims. Personally identifiable information and contact information is usually at the top of their lists, though they will settle for anything remotely confidential or valuable that they can get their hands on. Social media accounts usually hold valuable information on them in their own right, including addresses, phone numbers, email addresses, and so forth, all for the taking of anyone who has permission to view it.

Phishing tactics are a bit harder to identify as they are specifically designed to trick users into willfully handing over any information. You might be surprised by the tricks they employ to make even the most vigilant users spill the beans on their most sensitive information. Impersonating social media accounts is a major way that hackers will attempt to steal data from users. Hackers can even use personal messages to try and coax information from unsuspecting users. It’s clear that users should be smart about what they post, but how can they do so?

The first thing you need to consider is that everything you post on social media is likely to be seen by just about anyone. If you post pictures of your house or your family, all of that can be traced back to you. A hacker could use this information against you. Furthermore, anything you post can and will be used against you. If you post something in the public domain, it could affect your business in a negative way.

Beyond that, you have to make sure that any information that you share over social media isn’t confidential or sensitive in nature. If someone messages you and it seems out of place, chances are that you should put them through the ringer to guarantee you’re dealing with the genuine article. Never share sensitive information if you don’t have to, and always take any request for such information with a healthy dose of skepticism.

Does your business need help staying secure? Suffolk Computer Consultants can help. To learn more, reach out to us at 631-905-9617.

The Tangled History of Wireless Charging
Tech Term of the Week: Hard Drives
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Privacy Cloud Cybersecurity Managed IT Services Communications Malware Tech Term Network Security Backup Smartphones Hardware Microsoft Passwords Communication Business Management Software Hackers Outsourced IT Hosted Solutions Ransomware Business Small Business Google Android Productivity Save Money Social Media Alert VoIP Wi-Fi Email Data Backup Router Microsoft Office Data Recovery Business Intelligence Applications Twitter Smartphone Internet Computer Employer-Employee Relationship Efficiency Data Phishing BDR Virtualization Apps Blockchain Windows 10 Excel Browser Internet of Things Cloud Computing Office Innovation Password Patch Management Network User Tips Miscellaneous Settings Automation Saving Money Vulnerability Analytics Collaboration VoIP Bandwidth Government IT Services Mobile Devices IT Support Data Breach Data Management Remote Monitoring Tech Terms Word Law Enforcement Retail Holiday Virtual Assistant WiFi Cybercrime Productivity Gadgets Scam How To Workers VPN Wireless Charging Information Computers Data Protection Website Office 365 Physical Security Managed IT Service Battery Cortana Gmail Artificial Intelligence Company Culture App Politics Spam Hacking Wireless Networking Mobile Device Management Windows Paperless Office Chrome Cost Management Tip of the week Remote Computing IT Support Virus Business Continuity Managed IT Services Compliance Access Control eCommerce Printer Server Botnet Plug-In Spam Blocking Connectivity Business Technology Office Tips Automobile Lead Generation Mobile Security Tech Support Cables Laptop Copy Printing Apple Facebook Shortcut Bring Your Own Device Entertainment Telecommuting Biometrics Spyware News Recovery Safety Data loss Multi-Factor Security Unified Communications Conferencing Disaster Recovery Operating System Licensing Cleaning Online Shopping Hard Drives Printers Marketing Proactive IT Network Attached Storage Email Management Streaming Media Sales Maintenance Voice over Internet Protocol Paste Paper iPhone CrashOverride Technology Tips Hybrid Cloud Millennials Access HP Database Telephone System Server Reporting Staff RAM Content Filtering WannaCry Environment Travel Remote Monitoring and Management Server Management Downloads Antivirus Tablet Google Maps Big Data Users Ink Backup and Disaster Recovery BYOD Document Management Tactics Phone System Medical IT Websites Microsoft Teams Education Smart Technology HIPAA e-waste Live Streaming Analysis Trends Knowledge Amazon IT budget Telephone Systems PowerPoint File Sharing Spotify SSD Files SaaS Telephony Digital Internet Explorer Remote Support GDPR Dark Web Managing Stress User Tip Hard Drive disposal WhatsApp Hiring/Firing Staffing Managed Service Machine Learning Google Drive A.I. Comparison Workplace Tips IT Management Remote Control Sports User Security Inventory Voice over IP Two-factor Authentication Edge Hosted Solution Threat Work/Life Balance Gadget Dongle G Suite Information Technology Processors Value Managed IT Telecommute Movies Specifications Emergency HaaS Printer Augmented Reality Wireless Technology 5G Error IBM Encryption Regulation Unified Threat Management Yahoo Hacker The Internet of Things Budget Current Events Leadership Search Mobile Device Customer Relationship Management Vendor Management Competition Computer Care Autocorrect IP Address Net Neutrality Avoiding Downtime Personal Information Customer Service Scheduling Dark Data Upgrade Gaming Console Mobile Office Samsung Domains Managed Service Provider Scalability Instagram DDoS Windows 10 Video Games Money Synergy Worker Employer Employee Relationship Public Speaking IaaS Credit Cards Presentation Storage Television Fun Lithium-ion battery Emoji Freedom of Information

Newsletter Sign Up