888.678.7282    Get SUPPORT

Strata Information Technology Blog

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

Depending on the way that it’s used, social media can be dangerous, regardless of your age or what you do for a living. The Internet’s anonymity is notorious for providing people the added veil of secrecy that allows them to do all sorts of unspeakable acts under the facade that they won’t be discovered or that there won’t be any repercussions for their actions. Whether it’s a troll or a full-on cyberbullying case, social media can enable some of the worst people out there.

On the business end of things, social media can be used to steal information through the use of phishing scams and hacking attacks. Hackers will use everything that they have at their disposal to steal whatever they can from unsuspecting victims. Personally identifiable information and contact information is usually at the top of their lists, though they will settle for anything remotely confidential or valuable that they can get their hands on. Social media accounts usually hold valuable information on them in their own right, including addresses, phone numbers, email addresses, and so forth, all for the taking of anyone who has permission to view it.

Phishing tactics are a bit harder to identify as they are specifically designed to trick users into willfully handing over any information. You might be surprised by the tricks they employ to make even the most vigilant users spill the beans on their most sensitive information. Impersonating social media accounts is a major way that hackers will attempt to steal data from users. Hackers can even use personal messages to try and coax information from unsuspecting users. It’s clear that users should be smart about what they post, but how can they do so?

The first thing you need to consider is that everything you post on social media is likely to be seen by just about anyone. If you post pictures of your house or your family, all of that can be traced back to you. A hacker could use this information against you. Furthermore, anything you post can and will be used against you. If you post something in the public domain, it could affect your business in a negative way.

Beyond that, you have to make sure that any information that you share over social media isn’t confidential or sensitive in nature. If someone messages you and it seems out of place, chances are that you should put them through the ringer to guarantee you’re dealing with the genuine article. Never share sensitive information if you don’t have to, and always take any request for such information with a healthy dose of skepticism.

Does your business need help staying secure? Strata Information Technology can help. To learn more, reach out to us at 888.678.7282.

The Tangled History of Wireless Charging
Tech Term of the Week: Hard Drives
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Internet Malware Hackers Cybersecurity Tech Term Communications Ransomware User Tips Backup VoIP Microsoft IT Support Software Productivity Business Management Outsourced IT Efficiency Productivity Passwords Alert Smartphones Email Data Communication Data Recovery Small Business Browser IT Services Network Google Social Media Business Data Backup Hardware Windows 10 Save Money Hosted Solutions Cloud Computing Mobile Device Smartphone Microsoft Office Holiday Phishing Users Internet of Things Business Continuity Apps Vulnerability Data Breach Collaboration Miscellaneous Android Saving Money App Access Control Bandwidth Twitter Wi-Fi Computer Compliance BDR Applications Workplace Tips Blockchain Law Enforcement Patch Management Workers Settings Office 365 Innovation Employer-Employee Relationship Remote Monitoring Scam Excel Company Culture Networking Politics Wireless Cybercrime Mobile Device Management Government Word Mobile Devices Windows Virtual Assistant Connectivity How To Facebook Entertainment Antivirus Recovery Marketing Maintenance Password Computers Retail Office Website Education Personal Information BYOD Managed IT Service Dark Web Vendor Management Managing Stress Automation Chrome SaaS Virus Spam Information Remote Monitoring and Management Edge DDoS Threat Authorization Dongle Video Games Google Maps Security Cameras Apple Worker Storage Multi-Factor Security Specifications Movies IaaS Wireless Internet News Two-factor Authentication Spyware Value Email Management Tech Terms Dark Data Television Information Technology Technology Efficiently Licensing Voice over IP Avoiding Downtime Amazon Credit Cards Smart Technology Bring Your Own Device Staffing iPhone Printer Error Data loss HaaS Printer Server Help Desk Telephone System Tech Support WannaCry HP Cortana Regulation Gadget Sales Safety Streaming Media Unified Threat Management Biometrics Outlook Travel Troubleshooting Business Intelligence Physical Security The Internet of Things Managed Service Provider Technology Tips Cost Management Hybrid Cloud WiFi Database Touchscreen Router Content Filtering Staff Managed IT RAM Cleaning Printers Certification Gadgets Budget HIPAA Document Management Current Events Reporting Shortcut Tablet Botnet Downloads VPN Leadership Access Managed Service Live Streaming Hiring/Firing Employer Employee Relationship VoIPMyths Files Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Paperless Office Battery Tactics Data Management Microsoft Office 365 Gmail Websites Encryption Microsoft Teams Computer Care Mobility Remote Support Hard Drive Net Neutrality Medical IT CrashOverride Knowledge Artificial Intelligence Trends Profitability WhatsApp Wireless Charging e-waste Automobile IT budget PowerPoint Synergy Disaster Recovery VoIPSavings Upgrade SSD Voice over Internet Protocol Proactive IT Remote Control Digital Internet Explorer Yahoo Authentication Gaming Console Training Processors GDPR Comparison A.I. Analytics Eliminating Downtime Lead Generation disposal IT Management Sports Update Emergency Telephony Hard Drives Inventory Scalability Phone System Copy Public Speaking Tip of the week Search Scheduling G Suite Windows 10 Presentation Telecommute Server VoIP Business Technology Lithium-ion battery Emoji Mobile Security Laptop Printing Quick Tips Paste Remote Computing Augmented Reality Instagram Wearables Samsung Wireless Technology Conferencing 5G Money Unified Communications Network Attached Storage IBM eCommerce Operating System Paper Telecommuting Managed IT Services Healthcare Hacker Competition Server Management Customer Relationship Management Online Shopping Environment IP Address Ink Big Data Millennials Fun Google Drive Customer Service File Sharing Mobile Office IT Support Hosted Solution Domains User Tip Machine Learning Autocorrect Virtualization Spam Blocking User Security

Newsletter Sign Up