888.678.7282    Get SUPPORT

Strata Information Technology Blog

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

Depending on the way that it’s used, social media can be dangerous, regardless of your age or what you do for a living. The Internet’s anonymity is notorious for providing people the added veil of secrecy that allows them to do all sorts of unspeakable acts under the facade that they won’t be discovered or that there won’t be any repercussions for their actions. Whether it’s a troll or a full-on cyberbullying case, social media can enable some of the worst people out there.

On the business end of things, social media can be used to steal information through the use of phishing scams and hacking attacks. Hackers will use everything that they have at their disposal to steal whatever they can from unsuspecting victims. Personally identifiable information and contact information is usually at the top of their lists, though they will settle for anything remotely confidential or valuable that they can get their hands on. Social media accounts usually hold valuable information on them in their own right, including addresses, phone numbers, email addresses, and so forth, all for the taking of anyone who has permission to view it.

Phishing tactics are a bit harder to identify as they are specifically designed to trick users into willfully handing over any information. You might be surprised by the tricks they employ to make even the most vigilant users spill the beans on their most sensitive information. Impersonating social media accounts is a major way that hackers will attempt to steal data from users. Hackers can even use personal messages to try and coax information from unsuspecting users. It’s clear that users should be smart about what they post, but how can they do so?

The first thing you need to consider is that everything you post on social media is likely to be seen by just about anyone. If you post pictures of your house or your family, all of that can be traced back to you. A hacker could use this information against you. Furthermore, anything you post can and will be used against you. If you post something in the public domain, it could affect your business in a negative way.

Beyond that, you have to make sure that any information that you share over social media isn’t confidential or sensitive in nature. If someone messages you and it seems out of place, chances are that you should put them through the ringer to guarantee you’re dealing with the genuine article. Never share sensitive information if you don’t have to, and always take any request for such information with a healthy dose of skepticism.

Does your business need help staying secure? Strata Information Technology can help. To learn more, reach out to us at 888.678.7282.

The Tangled History of Wireless Charging
Tech Term of the Week: Hard Drives


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Cybersecurity Internet Network Security Malware Hackers Communications Backup Tech Term VoIP Ransomware Smartphones Outsourced IT Microsoft Passwords Productivity Software Alert Business Management Social Media Business Communication IT Support Browser User Tips Google Hardware Windows 10 Efficiency Save Money Hosted Solutions Email Data Small Business Productivity Phishing Miscellaneous Android Network Saving Money App Data Backup Bandwidth Twitter Internet of Things Data Recovery Cloud Computing Smartphone Microsoft Office Data Breach Vulnerability IT Services Users Settings Employer-Employee Relationship BDR Excel Remote Monitoring Scam Workplace Tips Company Culture Cybercrime Politics Blockchain Government Mobile Device Management Access Control Computer Business Continuity Apps Law Enforcement Mobile Device Patch Management Workers Innovation Collaboration Office 365 Compliance Education Personal Information Automation Managed IT Service Vendor Management Dark Web Chrome SaaS Spam Virus Word Wi-Fi Computers Windows Virtual Assistant How To Applications Networking Managing Stress Facebook Entertainment Recovery Marketing Antivirus Maintenance Password Retail Holiday Office Website Gmail Automobile Bring Your Own Device Net Neutrality CrashOverride Remote Support Hard Drive BYOD Data loss WhatsApp Wireless Charging Synergy HP Disaster Recovery Error Knowledge Gaming Console Outlook Yahoo Regulation Remote Control Streaming Media Troubleshooting Technology Tips Hybrid Cloud Wireless Processors Analytics Staff RAM Scalability Phone System Lead Generation Document Management Database Touchscreen Comparison Hard Drives Downloads Video Games Google Maps Emergency Telephony DDoS Mobile Devices Reporting VoIPMyths Backup and Disaster Recovery Cables Worker Plug-In Apple IaaS Two-factor Authentication Avoiding Downtime Websites Microsoft Teams Credit Cards News Dark Data Paperless Office Tactics Television Information Technology Microsoft Office 365 Multi-Factor Security Specifications Artificial Intelligence Trends Staffing Licensing Voice over IP e-waste Smart Technology Medical IT Email Management Tech Support VoIPSavings Cortana SSD Voice over Internet Protocol Printer Proactive IT iPhone IT budget PowerPoint HaaS Printer Server Gadget Safety Telephone System WannaCry Unified Threat Management Digital Internet Explorer Biometrics Authentication A.I. Travel disposal Business Intelligence The Internet of Things GDPR Sales Managed Service Provider Cost Management Gadgets Budget Update Physical Security Inventory Information Remote Monitoring and Management WiFi Managed IT IT Management Sports Cleaning Printers Router Content Filtering Hiring/Firing Employer Employee Relationship Dongle Current Events Shortcut HIPAA Botnet VPN Edge Threat Leadership Access Authorization Movies Live Streaming Spyware Value Storage Tablet Technology Efficiently Files Battery Data Management Amazon Telephone Systems Data Protection Encryption Tech Terms Connectivity Computer Care Quick Tips Laptop Printing Customer Service Unified Communications Mobile Office Upgrade Google Drive IT Support Operating System Hosted Solution Domains File Sharing Network Attached Storage User Tip Virtualization Autocorrect Paper Server Management Managed Service Environment Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server Windows 10 Presentation Ink VoIP Lithium-ion battery Emoji Paste Augmented Reality Business Technology Instagram Remote Computing Samsung Wireless Technology 5G Money IBM Conferencing Machine Learning Managed IT Services Hacker eCommerce Telecommuting G Suite Competition Customer Relationship Management Telecommute IP Address Online Shopping Big Data Millennials Mobile Security Fun

Newsletter Sign Up