888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

Depending on the way that it’s used, social media can be dangerous, regardless of your age or what you do for a living. The Internet’s anonymity is notorious for providing people the added veil of secrecy that allows them to do all sorts of unspeakable acts under the facade that they won’t be discovered or that there won’t be any repercussions for their actions. Whether it’s a troll or a full-on cyberbullying case, social media can enable some of the worst people out there.

On the business end of things, social media can be used to steal information through the use of phishing scams and hacking attacks. Hackers will use everything that they have at their disposal to steal whatever they can from unsuspecting victims. Personally identifiable information and contact information is usually at the top of their lists, though they will settle for anything remotely confidential or valuable that they can get their hands on. Social media accounts usually hold valuable information on them in their own right, including addresses, phone numbers, email addresses, and so forth, all for the taking of anyone who has permission to view it.

Phishing tactics are a bit harder to identify as they are specifically designed to trick users into willfully handing over any information. You might be surprised by the tricks they employ to make even the most vigilant users spill the beans on their most sensitive information. Impersonating social media accounts is a major way that hackers will attempt to steal data from users. Hackers can even use personal messages to try and coax information from unsuspecting users. It’s clear that users should be smart about what they post, but how can they do so?

The first thing you need to consider is that everything you post on social media is likely to be seen by just about anyone. If you post pictures of your house or your family, all of that can be traced back to you. A hacker could use this information against you. Furthermore, anything you post can and will be used against you. If you post something in the public domain, it could affect your business in a negative way.

Beyond that, you have to make sure that any information that you share over social media isn’t confidential or sensitive in nature. If someone messages you and it seems out of place, chances are that you should put them through the ringer to guarantee you’re dealing with the genuine article. Never share sensitive information if you don’t have to, and always take any request for such information with a healthy dose of skepticism.

Does your business need help staying secure? Strata Information Technology can help. To learn more, reach out to us at 888.678.7282.

The Tangled History of Wireless Charging
Tech Term of the Week: Hard Drives


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 28 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Business Computing Privacy Managed IT Services Technology Best Practices Cloud Hackers Malware Ransomware Productivity Backup Communications Outsourced IT Alert Internet Cybersecurity Software VoIP Save Money Smartphones Business Management Hardware IT Support Network Security Phishing Business Microsoft Passwords Vulnerability IT Services App Email Twitter Smartphone Data Breach Social Media Android Windows 10 Business Continuity Microsoft Office Office 365 Excel Workers Remote Monitoring Saving Money Mobile Device Management Cybercrime Data Small Business Law Enforcement Settings Miscellaneous User Tips Data Backup Google Scam Politics Bandwidth Government Cloud Computing Password Patch Management Mobile Device Entertainment Retail Recovery Maintenance Antivirus Website Chrome Holiday Access Control Office Personal Information Spam Vendor Management Hosted Solutions Data Recovery Internet of Things Blockchain Windows Apps Productivity Computers Facebook Browser Employer-Employee Relationship Virus Word Education BDR Wi-Fi How To Applications Computer Communication Efficiency Television Database Physical Security Document Management Information Technology Avoiding Downtime Managed Service Provider HIPAA Tablet Backup and Disaster Recovery Marketing Printer Tactics Files Paperless Office Biometrics Collaboration Hard Drive Remote Support Knowledge SSD Battery Leadership Managed IT Managed IT Service Internet Explorer Digital Access Employer Employee Relationship Processors Comparison Inventory Phone System Encryption Telephony Threat Emergency Edge BYOD Apple Network Automobile Hard Drives Spyware DDoS Specifications Multi-Factor Security Company Culture Synergy SaaS Mobile Devices Voice over IP Licensing Analytics Two-factor Authentication iPhone Data loss Scalability HP Gadget IaaS Travel Tech Support WiFi Staff Credit Cards Dark Data Safety Content Filtering Router Smart Technology Shortcut HaaS The Internet of Things Live Streaming Printer Server Budget Data Protection Websites Gadgets Telephone Systems Hiring/Firing Gmail e-waste Unified Threat Management CrashOverride Cleaning Cost Management Wireless Charging PowerPoint WhatsApp IT budget Printers Innovation Networking Users Remote Control Current Events Botnet disposal Dark Web VPN Computer Care Lead Generation Sports IT Management Dongle Net Neutrality Data Management Wireless Value Disaster Recovery Google Maps Gaming Console Virtual Assistant Connectivity News Tech Terms Automation Email Management Yahoo Tech Term Staffing Video Games WannaCry Telephone System Sales Technology Tips Worker Cortana 5G Telecommuting Wireless Technology Managed IT Services Downloads IBM Server Management Hacker Money Millennials Trends Customer Relationship Management Artificial Intelligence IP Address Google Drive IT Support Machine Learning Hosted Solution Customer Service Mobile Office Domains Telecommute Copy Mobile Security VoIP Printing Public Speaking Laptop Paste Lithium-ion battery Conferencing Operating System Scheduling Augmented Reality eCommerce Paper Business Intelligence Environment Emoji Instagram Online Shopping Ink Samsung Competition Fun Big Data File Sharing User Tip Upgrade User Security Spam Blocking Virtualization Tip of the week Windows 10 Search Business Technology Server Autocorrect Remote Computing Presentation Streaming Media Network Attached Storage

Newsletter Sign Up