(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Keep Security in Mind on Social Media

Keep Security in Mind on Social Media

Social media was created with the intent of staying in touch with others, but it comes with nasty repercussions. It comes at significant risk to both your personal and professional security. How can you make sure that your social media usage isn’t putting your organization at risk of compromisation or worse? The first thing that you want to take into account is awareness.

Depending on the way that it’s used, social media can be dangerous, regardless of your age or what you do for a living. The Internet’s anonymity is notorious for providing people the added veil of secrecy that allows them to do all sorts of unspeakable acts under the facade that they won’t be discovered or that there won’t be any repercussions for their actions. Whether it’s a troll or a full-on cyberbullying case, social media can enable some of the worst people out there.

On the business end of things, social media can be used to steal information through the use of phishing scams and hacking attacks. Hackers will use everything that they have at their disposal to steal whatever they can from unsuspecting victims. Personally identifiable information and contact information is usually at the top of their lists, though they will settle for anything remotely confidential or valuable that they can get their hands on. Social media accounts usually hold valuable information on them in their own right, including addresses, phone numbers, email addresses, and so forth, all for the taking of anyone who has permission to view it.

Phishing tactics are a bit harder to identify as they are specifically designed to trick users into willfully handing over any information. You might be surprised by the tricks they employ to make even the most vigilant users spill the beans on their most sensitive information. Impersonating social media accounts is a major way that hackers will attempt to steal data from users. Hackers can even use personal messages to try and coax information from unsuspecting users. It’s clear that users should be smart about what they post, but how can they do so?

The first thing you need to consider is that everything you post on social media is likely to be seen by just about anyone. If you post pictures of your house or your family, all of that can be traced back to you. A hacker could use this information against you. Furthermore, anything you post can and will be used against you. If you post something in the public domain, it could affect your business in a negative way.

Beyond that, you have to make sure that any information that you share over social media isn’t confidential or sensitive in nature. If someone messages you and it seems out of place, chances are that you should put them through the ringer to guarantee you’re dealing with the genuine article. Never share sensitive information if you don’t have to, and always take any request for such information with a healthy dose of skepticism.

Does your business need help staying secure? OnSite I.T. can help. To learn more, reach out to us at (403) 210-2927.

The Tangled History of Wireless Charging
Tech Term of the Week: Hard Drives


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, January 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Productivity Privacy Smartphones Internet Cybersecurity Malware Efficiency Mobile Device Cloud Hardware Microsoft Communication Browser Android Wi-Fi Email Data Passwords Small Business Network Google IT Support Ransomware Hosted Solutions Saving Money Wireless Data recovery Communications Internet of Things Mobile Devices IT Services Applications Data Backup Windows 10 Collaboration Holiday Software Business Management Managed IT services Users Innovation Backup Cloud Computing Blockchain Social Media Business Managed IT Services Workplace Tips VoIP Networking Smartphone Business Intelligence Employer-Employee Relationship Marketing Hackers Information Outsourced IT Government Managed IT Service Cortana Managed Service Save Money Mobility Data Management Computers Compliance Analytics Wireless Charging Automation Data Protection Computer Tech Terms Connectivity Phishing Artificial Intelligence Apps Access Control Data Breach Patch Management Virtual Assistant Excel Microsoft Office Gmail Remote Monitoring and Management Bandwidth Router Password Virtualization VPN Remote Computing Medical IT Cost Management Miscellaneous BDR Spyware Certification Trends Upgrade IT Management Database Specifications Amazon WannaCry Telecommute Eliminating Downtime Apple Sports Telecommuting SaaS Facebook Environment Knowledge Hybrid Cloud Threat Healthcare Microsoft Teams Spam Battery Server Management HP Websites Law Enforcement A.I. Telephony Touchscreen Cybercrime Conferencing HIPAA Data loss BYOD iPhone Workers GDPR Twitter e-waste Cables Troubleshooting Printing Tip of the week Technology Tips Business Technology Company Culture Document Management Training Movies Voice over IP Microsoft Office 365 Tactics Office Plug-In Hard Drive Virus Wireless Internet Millennials Storage IT budget Inventory disposal Voice over Internet Protocol Update Paper User Tip Managing Stress Lead Generation Safety Paperless Office Dongle Security Cameras File Sharing Online Shopping Network Attached Storage Content Filtering Proactive IT Processors Antivirus Help Desk Streaming Media Dark Web Mobile Security Value Machine Learning Outlook Ink Reporting Physical Security Backup and Disaster Recovery Sales G Suite Gadgets Digital Word Unified Communications eCommerce Authentication Maintenance Vulnerability Staff Business Continuity Chrome Downloads Error Big Data Operating System Hard Drives Comparison Profitability How To PowerPoint Office 365 Laptop SSD Tablet Bring Your Own Device Server Internet Explorer Analysis Edge Wearables User Security RAM Authorization Settings Mobile Office Domains Printers Quick Tips Windows 10 Mobile Device Management Public Speaking Managed Service Provider Presentation Data Security Two-factor Authentication Lithium-ion battery Hiring/Firing Augmented Reality Regulation Wireless Technology 5G Personal Information Fun Tech Support IBM Alert The Internet of Things Productivity Remote Monitoring Hacker Budget Competition Customer Relationship Management IP Address Website Search Customer Service Disaster Recovery