Being a great way to socialize in this modern world, the online platforms namely the Facebook, LinkedIn, Twitter, Instagram, and so forth, is indeed meeting the needs of our social culture. Apart from this, the social sites are the valuable tool[s] for businesses, professionals, and customers too.
But, the Facebook data breach, India’s notice to Facebook, and the immediate attacks that followed on data breach is creating panic in the society.
In real terms, it is not the data breach, but the breach of trust.
What can we do to stay safe on the Social Media?
The online social sites are agreeable for network, business, profession, and what not? It has already created a direct impact on the rest of our life.
The Facebook and Cambridge Analytica data breach scandal has created a wave of doubt across the globe for the use of social media.
With more news hitting the headlines one after the other regarding data breach through social media, the use of social networking sites itself is in question now.
Besides the Facebook data breach, the other recent alerts that add on to the public panic include:
A data breach at Department Store Chains Saks Fifth Avenue, Saks OFF Fifth and Lord & Taylor has compromised the personal information on their customers. The chains’ parent company, Canada-based Hudson’s Bay Co., announced the breach of its store payment systems on Sunday.
Forbes reported that the unauthorized access compromised 150 million MyFitnesspal accounts. MyFitnessPal is the popular fitness tracking app that enables the users to monitor the intake calorie and exercise routine.
The online booking website, Orbitz, announced that its legacy site, Amextravel.com, was compromised owing to the data breach. The company reports that up to 888,000 payment cards could have been exposed. As a result, Orbitz calls for its US customers to sign up for free credit card monitoring.
Sivarama Krishnan, Cybersecurity leader, India said,” “Privacy regulations in Europe, Singapore, and other markets compel app owners to seek explicit and more specific approvals from users who can be more discerning while in India they take a blanket approval. Because of this, the risks could be higher in India,”
Though the fact remains stable that without a social environment, no stability could be brought to the status of an individual, an alarming call is that the networking life is impacting our conversations as it is seemingly no more a private/business affair.
The feasibility to share about ourselves on the network is continuously getting questioned as there is every chance and evidence that it could be intruded for unwanted motive, a cause of personal and/or professional disturbance or maniac leading to downfall.
The possible risks include stalking, hacking, bullying, identity theft, impersonators to damage reputation, standing, and, etc.
And, the recent incidents are acting like an alarming bell and everyone wants reassurance about, How to stay safe on social media?
Save yourself by sharing not many details that may lead to identity theft or personal attack at times.
Do Not Share Your
Note every site like Facebook has the option to conceal the identities. If the sites being used, do not have the protective features for these kinds of information[s], it is necessary to request for or abandon the site. It is recommended to customize your privacy settings on Facebook.
You have to check the settings, configuration, and privacy sections, look for the options to limit your action[s] display, like who can view your post, send a friend request, see basic info, and so forth.
If your resume is open online, there is every chance that it could be used to impersonate you or social engineer into the company"s network.
It is recommended not to elaborate the work details on linkedIn. When you are searching for a job, you may elaborate for a certain period, and cut it short enough to attract the prospective recruiters thereafter.
LinkedIn offers option[s] to shut off the access to a network of contacts, which is a common practice for the recruiters and the sales team to protect themselves from poaching of customers or the prospects.
It happens with everyone that with a sheer enthusiasm, we tend to share our travel plan, personal gainings, ceremonies attended, and other incidents of life on Twitter or the Facebook.
Over time, we unconsciously share information that may look not very significant for us. But, when put together, it may pave way for the lurker to have a complete picture of us.
For instance, details of our family, interests, immediate plans, and, etc., would lead the lurker to put the possessions, dear and near one’s life in danger.
It is recommended to conceal updates on real-time with the social media channels.
It is recommended to search for yourself on the Google, and see what information is available for others.
You may remark the profiles accordingly as you show up in the search. In case, you find your name in unknown locations, there is a chance that the account has got impersonated. Even if there are people with the same name, it would definitely help you avoid confusion.
They say “Ignorance is also a disease”. In this world, it is necessary to educate oneself.
And mention not to say, I believe that I need not emphasize on the factors like having a strong password [that has special character, caps, numerals and alphabets eg: A1$23sdf4&], frequent change of passwords, password protection of device having social connections, logging off the account, installing antivirus, and etc., as these are the basic must know factors to use a social media channel.
Moving forward, in addition to these basic security measures, it is recommended that everyone understands the sophisticated secure computer world irrespective of job profile, one is serving into. It may include watching video tutorials, audios, surfing Google, or any other learning materials.
Apart from these, there is one special certification course i.e., Certified Secure Computer User [CSCU], offered by the EC-Council to know more about information security valuable for an individual or the professional as well.
The certification mainly deals with the modules as mentioned below and equips you with the fundamental knowledge of the cybercrime activities and increases your credibility across the network and security.
The certification covers up the topics like Protection using Antivirus software; data encryption; Disaster recovery and data backup; Internet security; Foundation of Computer security; security of operating systems and email communications; social engineering and Identity thefts; security of online transactions, social networking websites, network connections, mobile devices; legal compliances and Information security.
This two-day course would enable you to have a concise and precise knowledge regarding the security system and comes handy for online related networking and functions.
Additionally, you should spread awareness and ask friends to use privacy settings too. It not only make their information secure but makes the comments and posts you are tagged in is safer.
There are a lot of scams prevailing and people disguise themselves as the common friends or try to become your friend.
If you can inculcate these small habits while surfing social media networking sites, you would be definitely safe from cybersecurity threats.
Mercury Solutions Destination Training Program DUBAI 2019 - Submit Your Interest!
Database Administrator Roles and Responsibilities in an Organization
[Infographics] Top 5 Virtualization Certification in the 2019
[CISSP Benefits] Winning Benefits of CISSP Certification
Top 11 Most Asked Power BI Interview Questions in 2018
How to Become an Ethical Hacker? Benefits, Syllabus and Fee
[Infographics] 11 Top IT Certifications In Demand Today in 2018
PMP Vs Prince2: Which one you should go for?
6 Highest Paying Top IT Certifications And Learning Portfolio 2018
Complete the VAPT Learning Track: Attain the Industry’s Most Sought After Credentials
Mercury Solutions Ltd. is rated 4.6 stars by www.facebook.com/mercurysol based on 18 reviews.