Skip to main content

Stay Safe on Social

 


Social networking sites have revolutionized the way we interact with others, you don’t meet people anymore, nowadays you added them. The features of social media sites differ, but they all have one thing in common, they collect a ton of personal information. Information sharing is encouraged on social media to power the communications that these sites rely on. This is how they can show you matches, interests, and more importantly Ads, which is one of the main revenue sources of social media platforms. Essentially, your information is being sold to the highest Advertiser, in a bidding format, for the right to show you an Ad that you might find interesting.

When it comes to your personal information, you the consumer is solely responsible for making sure that you only share what you are comfortable with. This about this, when you meet someone in person, would you exercise a certain amount of caution? I believe you would, after all this person is a total stranger. Yet on social, you will add someone that you do not know, and they immediately can see pictures of where you live, your friends, places you hang out, where you go to school, etc.

The fact of the matter is that people do not exercise the same amount of caution because they either believe the internet offers them anonymity, or they believe that since they are not making physical contact, they are somehow safe. We often forget that whatever we share with our friends on social media is also possibly visible to our friend’s friends.

Social media are full of people with good intentions, looking to make new friendships. Unfortunately, they are also a playground for false advertisement, disinformation, and folks with malicious intent looking to gather information about potential targets. How do you think that phishing attacks are so successful? For a phishing attack to be successful, the attacker has to know enough about a victim to craft an email that is likely to elicit a response. How do they get the information? You gave it to them when you signed up for Facebook, Instagram, and LinkedIn, and started sharing your life with the world.

How can you protect yourself?

  • Limit the amount of shared information that can be used to identify you or make you vulnerable. In the state of Florida for example, real estate purchases are public records. This means that if you are a homeowner you are listed there by first and last name, along with your address. Therefore, someone who has your first and last name, google, and a little bit of perseverance can find exactly where you live. Sometimes they do not even have to, because people will go on FB and post about the vacation they are going to, including a little map route with the source and destination. This is great, no only are you telling the world where you live, but also that you will not be there for the next two weeks.
  • Remember that the internet is public, once you share something there is no way to get it back. You can delete a post, but that does not guarantee that someone else has not already re-shared it or copied its content and posted it on another site, etc. Make sure that you are comfortable and aware of what you put out there.
  • Be wary of strangers. The internet makes it easy for people to mask their true identity and motives, while also making it easy for victims to misinterpret intentions from strangers.
  • Do not believe everything you read online, and stop re-sharing or re-posting without proper investigation of the content of what you are helping to spread. During this past election, I could not open Facebook without being bombarded with articles bad mouthing both candidates. Most of them were being shared and re-shared by people on my friend’s list. A ton of them was just clickbait, old news being re-branded and re-published, or just plain fake.  If you value your friends’ opinion of you, and we often do, ask yourself this. What will they think of you when they open an article you re-posted and find out that the source is bogus.
  • Use privacy settings, they are there for a reason. All social media platforms have privacy settings. Make sure that you review them and are comfortable with the configuration in place, keep in mind that many of the restrictions that are available on these settings might be turned OFF by default. Also, make sure that you check the social media site’s information-sharing policy, particularly how it will share your information and that of your friends.
  • Beware of 3rd party apps, the next Cambridge Analytica is just around the corner. Data is the commodity of the 21st century, and whoever has it can leverage it to make reasonable predictions about products, behavior, affiliations, etc. This is why everywhere you go on the internet, you are entering information. 3rd party apps on social media might provide additional functionality, but also might be snooping into your data when they do not need to.
  • Keep your browser up-to-date, many attacks are the result of clickbait on social media, exploiting vulnerabilities on older versions of your favorite browsers.
  • Use antivirus software with up-to-date definitions. Countless times I have been called by friends whose computer is infected with spy, adware, or worse after the kids were clicking around on the internet or downloading games from social media sites, without antivirus. If something bad makes it to your computer through a clicked link or email attachment, AV can save the day. 


Kids are especially at risk. If you are a parent, you must ensure that your child is having a safe and constantly monitored social media experience. I would think no social media experience would be even better, it is your choice.

Please enjoy social media responsibly and remember, technology is a tool, not a necessity. 

J.

-  


Comments

Popular posts from this blog

Who's Responsibility is it?

Work From Home is going to become the new norm for many organizations across the world thanks to mother nature. Covid has forced many industries to evolve at an accelerated rate. Financial Technologies, for example, has experienced a growth of adoption rate that under normal circumstances would probably be observed across 5 to 10 years.  If there is one great thing about us humans, we can adapt to new conditions. Overall, we are great at rolling with the punches.  Working from home, as is the case with any new dynamic, will introduce new challenges and questions that need to be answered with regards to data protection.  These are some of those questions... 1. Now that I am working from home, is my employer at least partially responsible for the security of my network and personal data? This might seem like a reach but think about it... Organizations are constantly targeted by cybercriminals because looking to steal sensitive data about users, employees, patients, etc. Instead, cybercri

Your Router is Under Attack

The coronavirus spread quickly but it’s possible cyber criminals moved even quicker in distributing all manner of pandemic-themed scams. Exploit attempts against several consumer-grade routers and IoT were amongst the top Intrusion detections in 2020. This stems from criminals trying to take advantage of “The New Normal” of the network perimeter extending to the home. The barriers that existed between a corporate office network and a home network were eroded in 2020. Networks were turned inside out, with most workers now accessing critical networked resources and applications from their homes. This change happened suddenly, which left little time to plan an effective cybersecurity strategy. As a result, ‘PWING’ an outdated and insufficiently secured home office now also means PWING the corporate network. When the dust settles, who is going to be blamed for that? Some organizations are still trying to figure out how to effectively scale their enterprise security protections out to their

My Review of BlackBerry | Cylance

  Most of us associate the Blackberry brand name with its relative dominance in the early 2000s when almost everyone who had a smartphone had a Blackberry. Nothing lasts forever. Unfortunately for the brand, 2007 marked the introduction of touch screen phones with the new iPhone unveil. Android phones also arrived on the scene soon after. What most of us do not know is that Blackberry also provided to their users a secure and at the time revolutionary way for users of Blackberry devices to communicate with each other. In essence, security has always been a part of the Blackberry brand. It takes a lot of courage, work, and time to reinvent yourself as a company. Many do not succeed. For Blackberry, the road to reinventing itself as a cybersecurity brand has not been without its few bumps. Today, Blackberry is recognized as one of the top cybersecurity companies offering protection for enterprises and consumers alike. This review will look at Blackberry | Cylance’s ratings against