The most popular social media platforms have billions of users, and the number keeps getting bigger every year. The juggernauts of the field—Facebook, YouTube and Instagram to name a few—have gone beyond their initial purpose of sharing, entertainment, and communication. Now, enterprises see them as valid advertising tools and users have built careers out of sharing content. Not only that, other applications are using major social media accounts to
validate user identity—you can sign up for different apps and games just using your Facebook or Twitter account. And employers now routinely check prospective employees on social media, using it as a type of character check. Because of the multi-purpose
aspect of social media platforms, they become valuable tools that the average person spends approximately 116 minutes on every day, according to a recent study. Because they are such ubiquitous platforms, and being linked to an increasing number of applications on phones and other devices, it becomes even more necessary to secure them. Below are some best practices
for social media management for users and enterprises. Mine personal information—social media accounts can lead to shopping accounts or even have banking information Gain access to corporate networks— hackers could compromise enterprise networks if your social media is linked to your work email Steal identity—one account can
be used to register on another site Blackmail user—in extreme cases, hackers can use sensitive information to harass the victim The different social media platforms have security features that you should take advantage of. Here are some tips for keeping your accounts secure: Social media is also used as the public face of enterprises or even entrepreneurs who use it as an advertising tool or an avenue to establish their brand. Hackers sometimes take over a company’s social media to
promote their own brand, gain followers, or even spread a specific message. This form of hacktivism is an ongoing problem, especially with Twitter accounts. Here are some tips to keep
corporate social media accounts secure: One of
the biggest issues facing social media platforms is their role in the distribution of fake news. Some platforms have already started addressing the subject and are working to stop the issue, but there are still a lot of ways to use social media for spreading fake news. Cyberpropaganda has been around for years, but 24/7 social media platforms allowed opportunistic hackers to manipulate public
perception quickly and efficiently. Twitter bots push fake stories in campaigns that are big enough to sway public opinion, fake Facebook stories are designed to catch likes and spread news, and popular platforms in other countries deploy similar tactics as well. News is easily created but difficult to verify. Figure 1. Example of Twitter bots disguised as different users pushing the same message [READ: Fake News and Cyber Propaganda: The Use and Abuse of Social Media] Because the platforms themselves are having a hard time managing fake news, users become the first line of defense. You have to protect yourself from being a victim of fake news, and also work to stop spreading misinformation. How can you tell if it’s fake news?The use of hyperbolic and clickbait headlines Spoofed websites that mimic legitimate sites Misspellings, errors in grammar and an unprofessional-looking website Doctored images Lack of author, sources, and data To check if a story is real, do the following:
Of course, there is always a chance that you could be compromised by a hacker—even after following best practices. Secure your social media accounts with comprehensive and multilayered protection. Effective and comprehensive security solutions can help you enjoy your digital life safely. Trend Micro™ Maximum Security secures multiple devices, helps manage passwords, and guards against the most prevalent online threats. HIDE Like it? Add this infographic to your site: Image will appear the same size as you see above. Nosotros recomendamos
Which of the following is a security best practice when using social networking sites?(Spillage) Which of the following is a best practice to protect information about you and your organization on social networking sites and applications? Use only personal contact information when establishing personal social networking accounts, never use Government contact information.
What is the best way to protect Common Access Card 2022?Use a common password for all your system and application logons. What is the best way to protect your Common Access Card (CAC)? Maintain possession of it at all times.
Which of the following is a good practice to prevent spillage quizlet 2022?Which of the following may be helpful to prevent spillage? Label all files, removable media, and subject headers with appropriate classification markings.
What can help to protect the data on your personal mobile device cyber awareness 2022?What can help to protect data on your personal mobile device? -Secure it to the same level as Government-issued systems. Which of the following is an example of near field communication (NFC)? -A smartphone that transmits credit card payment information when held in proximity to a credit card reader.
|