631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

Depending on the way that it’s used, social media can be dangerous, regardless of your age or what you do for a living. The Internet’s anonymity is notorious for providing people the added veil of secrecy that allows them to do all sorts of unspeakable acts under the facade that they won’t be discovered or that there won’t be any repercussions for their actions. Whether it’s a troll or a full-on cyberbullying case, social media can enable some of the worst people out there.

On the business end of things, social media can be used to steal information through the use of phishing scams and hacking attacks. Hackers will use everything that they have at their disposal to steal whatever they can from unsuspecting victims. Personally identifiable information and contact information is usually at the top of their lists, though they will settle for anything remotely confidential or valuable that they can get their hands on. Social media accounts usually hold valuable information on them in their own right, including addresses, phone numbers, email addresses, and so forth, all for the taking of anyone who has permission to view it.

Phishing tactics are a bit harder to identify as they are specifically designed to trick users into willfully handing over any information. You might be surprised by the tricks they employ to make even the most vigilant users spill the beans on their most sensitive information. Impersonating social media accounts is a major way that hackers will attempt to steal data from users. Hackers can even use personal messages to try and coax information from unsuspecting users. It’s clear that users should be smart about what they post, but how can they do so?

The first thing you need to consider is that everything you post on social media is likely to be seen by just about anyone. If you post pictures of your house or your family, all of that can be traced back to you. A hacker could use this information against you. Furthermore, anything you post can and will be used against you. If you post something in the public domain, it could affect your business in a negative way.

Beyond that, you have to make sure that any information that you share over social media isn’t confidential or sensitive in nature. If someone messages you and it seems out of place, chances are that you should put them through the ringer to guarantee you’re dealing with the genuine article. Never share sensitive information if you don’t have to, and always take any request for such information with a healthy dose of skepticism.

Does your business need help staying secure? Suffolk Computer Consultants can help. To learn more, reach out to us at 631-905-9617.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 26 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Cloud Privacy Business Computing Technology Cybersecurity Malware Managed IT Services Backup Hardware Communications Microsoft Network Security Hackers Ransomware Outsourced IT Business Wi-Fi Passwords Software Business Management Smartphones Android Email Save Money Alert Internet VoIP Twitter Smartphone Router Applications Hosted Solutions Small Business Productivity Data Breach Settings Computer Communication Microsoft Office IT Services Government Data Backup Data Management Bandwidth Windows 10 Phishing Cloud Computing Mobile Devices Vulnerability Password Office Excel Employer-Employee Relationship Miscellaneous Google Social Media VoIP Data Protection Business Intelligence Cybercrime WiFi Windows Cortana Battery Hacking VPN App Remote Computing Internet of Things Tip of the week Virus Blockchain Office 365 Website Word Computers Remote Monitoring Cost Management Saving Money Politics Automation How To Spam Mobile Device Management Holiday Physical Security Patch Management Business Continuity Scam Efficiency Managed IT Services Data Tech Terms Apps BDR Retail Productivity IT Support Gadgets Chrome Workers Browser Access Control Innovation Paperless Office IT Support User Tips Virtualization Wireless Law Enforcement Data Recovery Analytics Wireless Charging Machine Learning Server Gmail Inventory Gadget Lead Generation Threat Live Streaming Edge File Sharing Telecommute Facebook Telephone Systems Google Maps User Tip Mobile Security Disaster Recovery Dark Web Printer Server WhatsApp Laptop Cleaning Shortcut Virtual Assistant Printing Marketing User Security Data loss Remote Control Printers Operating System CrashOverride Paper Business Technology Staff Spam Blocking Work/Life Balance Education Telecommuting Environment Smart Technology WannaCry News Ink Sales Websites Email Management Botnet Millennials e-waste HIPAA Telephone System IT budget Hard Drives PowerPoint Tablet Networking Staffing Managed IT Service disposal Hard Drive IT Management Two-factor Authentication Sports Knowledge Dongle Information Technology Entertainment Telephony Value Files Processors Remote Support Recovery Collaboration Tech Support Connectivity Safety Comparison Maintenance Google Drive Spotify Biometrics Voice over IP Tech Term Spyware Network Attached Storage Hosted Solution Hiring/Firing Specifications Technology Tips Antivirus Access Big Data eCommerce Database HP Apple Server Management Copy Conferencing Backup and Disaster Recovery Company Culture Multi-Factor Security BYOD Phone System Managed IT Online Shopping Tactics Licensing Document Management iPhone Artificial Intelligence Paste Automobile Office Tips Content Filtering SSD Internet Explorer Travel Digital Credit Cards Mobile Device Presentation Emoji HaaS Vendor Management 5G Wireless Technology Unified Threat Management Managed Service Provider Scheduling IBM Current Events Samsung Hacker Computer Care Instagram Customer Relationship Management Net Neutrality IP Address Gaming Console Customer Service Mobile Office Freedom of Information Domains Video Games Worker Yahoo Television Public Speaking Lithium-ion battery Printer Augmented Reality Autocorrect Avoiding Downtime Dark Data Leadership The Internet of Things Budget Streaming Media DDoS Competition Personal Information Fun Money Emergency Users Network Employer Employee Relationship Downloads SaaS Upgrade Scalability Trends Synergy IaaS Search Encryption Windows 10

Newsletter Sign Up