631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

Depending on the way that it’s used, social media can be dangerous, regardless of your age or what you do for a living. The Internet’s anonymity is notorious for providing people the added veil of secrecy that allows them to do all sorts of unspeakable acts under the facade that they won’t be discovered or that there won’t be any repercussions for their actions. Whether it’s a troll or a full-on cyberbullying case, social media can enable some of the worst people out there.

On the business end of things, social media can be used to steal information through the use of phishing scams and hacking attacks. Hackers will use everything that they have at their disposal to steal whatever they can from unsuspecting victims. Personally identifiable information and contact information is usually at the top of their lists, though they will settle for anything remotely confidential or valuable that they can get their hands on. Social media accounts usually hold valuable information on them in their own right, including addresses, phone numbers, email addresses, and so forth, all for the taking of anyone who has permission to view it.

Phishing tactics are a bit harder to identify as they are specifically designed to trick users into willfully handing over any information. You might be surprised by the tricks they employ to make even the most vigilant users spill the beans on their most sensitive information. Impersonating social media accounts is a major way that hackers will attempt to steal data from users. Hackers can even use personal messages to try and coax information from unsuspecting users. It’s clear that users should be smart about what they post, but how can they do so?

The first thing you need to consider is that everything you post on social media is likely to be seen by just about anyone. If you post pictures of your house or your family, all of that can be traced back to you. A hacker could use this information against you. Furthermore, anything you post can and will be used against you. If you post something in the public domain, it could affect your business in a negative way.

Beyond that, you have to make sure that any information that you share over social media isn’t confidential or sensitive in nature. If someone messages you and it seems out of place, chances are that you should put them through the ringer to guarantee you’re dealing with the genuine article. Never share sensitive information if you don’t have to, and always take any request for such information with a healthy dose of skepticism.

Does your business need help staying secure? Suffolk Computer Consultants can help. To learn more, reach out to us at 631-905-9617.

The Tangled History of Wireless Charging
Tech Term of the Week: Hard Drives
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Communications Tech Term Backup Productivity Smartphones Microsoft Passwords Communication Hackers Hosted Solutions Hardware Small Business Google Business Management Software Android Browser Outsourced IT Efficiency User Tips Business Internet VoIP Ransomware Email Alert Social Media Save Money Wi-Fi Employer-Employee Relationship Data Data Recovery Windows 10 Bandwidth Cloud Computing Microsoft Office Business Intelligence Router Applications Innovation Miscellaneous Collaboration Saving Money Twitter Smartphone Data Backup Computer Automation Data Management Analytics Apps VoIP Phishing Virtualization Gadgets Mobile Device Settings Patch Management Managed IT Services Data Breach BDR Vulnerability Users Password Workplace Tips Blockchain IT Support Access Control Excel Internet of Things Office Mobile Devices Government IT Services Network Company Culture Networking Remote Monitoring How To Politics Law Enforcement Marketing Wireless Charging Productivity Holiday Information Windows Physical Security Managed IT Service WiFi Cybercrime Data Protection Gmail Tech Terms Scam Business Continuity Website Office 365 Battery Dark Web Virtual Assistant Retail Cortana App Tip of the week Remote Computing Compliance Wireless Chrome Spam Workers Mobile Device Management Computers Hacking Virus VPN Word Artificial Intelligence Paperless Office IT Support Cost Management Digital Internet Explorer Managed IT Licensing Online Shopping Touchscreen Managing Stress Email Management Sales Voice over Internet Protocol SaaS Tech Support Hard Drive disposal Botnet Millennials Reporting Machine Learning A.I. Office Tips Automobile Paste iPhone Content Filtering Remote Monitoring and Management Safety IT Management Sports Telephone System Update Inventory Staffing Edge Threat Travel Microsoft Office 365 Dongle G Suite Tablet Processors Value Hard Drives Medical IT Telecommute Movies Analysis Gadget Connectivity Outlook Information Technology Lead Generation Mobile Security Amazon Laptop Printing Server Live Streaming Authentication Big Data Bring Your Own Device Knowledge Printer Server Spyware Files Telephony GDPR Data loss Unified Communications Google Maps Telephone Systems File Sharing User Tip Managed Service Facebook Shortcut Network Attached Storage Streaming Media Remote Support Entertainment Biometrics Operating System Google Drive Comparison Recovery Paper WhatsApp Authorization Disaster Recovery Technology Tips Hybrid Cloud Cleaning Printers HP Database Voice over IP Storage Maintenance Staff RAM Remote Control User Security WannaCry Environment CrashOverride Server Management Downloads Spotify Hosted Solution Access Specifications Plug-In Ink Backup and Disaster Recovery Document Management Tactics Hiring/Firing eCommerce Error Antivirus Websites Microsoft Teams Spam Blocking Business Technology Cables Two-factor Authentication BYOD HIPAA e-waste Telecommuting Trends Copy Apple Multi-Factor Security Conferencing Proactive IT Phone System IT budget PowerPoint Work/Life Balance News Troubleshooting Education Smart Technology SSD Gaming Console Augmented Reality Freedom of Information Wireless Technology 5G Scalability IBM Video Games Hacker Encryption Synergy The Internet of Things Yahoo IaaS Budget Worker Search Competition Credit Cards Television Customer Relationship Management IP Address Vendor Management Emoji HaaS Autocorrect Printer Avoiding Downtime Customer Service Mobile Office Scheduling Unified Threat Management Upgrade Dark Data Domains Samsung Managed Service Provider Current Events Leadership Instagram Quick Tips Windows 10 DDoS Computer Care Money Emergency Public Speaking Personal Information Regulation Presentation Net Neutrality Employer Employee Relationship Fun Lithium-ion battery

Newsletter Sign Up