Hashtag

Technology

Is social media sabotaging your cybersecurity?


There’s no doubt that social media is a part of our daily lives. It’s a fantastic way to stay in touch with friends and family members and connect with like-minded people around the world. You can build a business or a following, and even profit from your profile.

At some point, while refreshing your feeds, you might have asked yourself: is social media safe? Like anything, it has its dark side. The team at ESET are here to explain how social media can make users vulnerable to cyber attacks, and how to step up your social media cybersecurity.

Your personal information might be public

With many social media platforms, the default setting for profiles is “public.” Let’s take Facebook as an example. This means that if you fill out all the fields when you sign up, anyone looking at your profile can find out where you live, work or go to school. Chances are, they’ll also know your full name, age, birthday and religious or political affiliation. And if you’re quite active on social media, you most likely have photos of your friends and family members, as well as places that you regularly visit.

In the world of cybercrime, this is like leaving a trail of breadcrumbs for hackers to find. Unfortunately, talented cybercriminals only need one or two pieces of personal identifying information (PII) to carry out identity theft. By stealing your identity, someone can access your bank accounts, apply for credit cards or loans and even set up a business.

Identity theft and impersonation aside, revealing too much personal information can leave you vulnerable to stalkers and catfishing, which is when someone – usually a potential romantic partner — fakes their identity to trick you into passing on your financial information.

Solution: Setting your profiles to private is the safest way to use social media. Don’t accept friend requests from people you don’t know, and while you’re at it, consider culling your list of connections so it only includes people you trust. In other words, delete acquaintances, strangers and anyone you wouldn’t be comfortable sharing personal details with. Even with a tight network, avoid oversharing — save that for in-person conversations, phone calls and text messages!

New to social media? When you sign up, only fill out the fields with an asterisk and steer clear of handing over any extra information online.

Your location might be known

If you’re a smartphone user, you’re probably aware of apps that need to track your location to do their job. Think maps, weather apps and ridesharing services. When you use these apps, you have to give them permission to monitor your location (and you can just as easily take that access away).

The same goes for social media. Any time you “check in” to a place or tag your location, you are essentially telling people where you are. This can open you up to security issues, as for example, a criminal could know that you’re not home at that time.

App developers are legally required to state whether they’re planning to pull your data, such as your email address or social media login. However, some apps collect more data than is necessary, while others share data with third-party companies. As social media cybersecurity experts, we recommend restricting your data sharing as much as possible.

Solution: To stop social media apps from tracking you, go to your device settings and navigate to “privacy.” You’ll see an option called “location services” or “app permissions,” and from there you can either turn off tracking for individual apps (like Instagram and Facebook) or switch your settings to “only while using.” This means the app will only track your location while you’re actively on it.

If you want to share your location with your social media network, do it after the fact — aka once you’ve left that place. That way, hackers and criminals won’t know where you are in real-time.

You could be exposed to phishing scams

One of the many hallmarks of social media is unsolicited messages. Whether they’re direct messages or comments, people often reach out to strangers — and cybercriminals are guilty of doing this.

Phishing scams are incredibly common on social media platforms. For example, a cybercriminal might send you a friendly or informative message that includes a link or attachment. It will look authentic, but the link or attachment contains malware, which is short for malicious code. When you click on it, the malware will infect your device and steal, delete or damage your data.

Besides messages, hackers can hide malware in social media ads. As a user, you could click on the link, thinking you’ll be taken to another Instagram profile, but you might end up being exposed to social media cybersecurity threats.

Solution: Avoid opening messages from people you don’t know. Most social media platforms have pretty good filtering systems, so most of those messages will go to your “requests” folder, rather than your regular DMs. This makes following social media safety tips a little easier.

If you do open an unsolicited message, comb through it carefully for signs of a phishing scam. These include poor spelling or grammar, excessive use of emojis (like exclamation marks) and a promise that sounds too good to be true. Above all, don’t click on any links or attachments. Instead, go to your browser and search for the person or company name they claim to be messaging from, and see what comes up. Finally, if you discover a scammer, report them to the social media platform.

Rely on antivirus software from ESET

Sophisticated antivirus software can protect you from a diverse range of cyberattacks, such as identity theft, malware, ransomware and phishing scams. ESET Internet Security does all that, plus scans attachments and images for viruses, and analyses any devices that are trying to tap into your WiFi network or webcam. You can download it onto multiple devices, including your smartphone, tablet and laptop. For Android users, ESET Mobile Security is a premium mobile phone antivirus that offers the same line of defence, blocking unwanted users, harmful content and hackers from accessing your WiFi.



News Reports

A car collision in Perth injured two persons and caused thousands of dollars in damage

An accident occurred in Perth's North-Western suburbs in the first days of December. A vehicle lost control and crashed into a house in the early hours of the morning. A man was injured when the ...

Hashtag.net.au - avatar Hashtag.net.au

Buying Your First Family Car? 4 Things To Consider

Buying your first family car is a big decision and financial purchase, you want to make sure you get the perfect vehicle. Before you can head to the dealership and secure online car finance, there...

NewsServices.com - avatar NewsServices.com

Why Australians Are Opting out of College

A survey by the Australian Government revealed that a staggering 46 percent of college-aged Australians opt-out of college. Getting a tertiary education might be a dream come true for a lot of people ...

NewsServices.com - avatar NewsServices.com

Safe on the move: forklift personal protective equipment

Employers know that protecting their team is priority number one. Not only can illness, injury, distraction or discomfort cause serious ongoing health problems for employees, it can also cause sev...

NewsServices.com - avatar NewsServices.com

5 tips for building a shipping container home

Shipping container homes have been all the designer rage in the last few years, with Instagram-worthy styles popping up all over the world. There is something so cool and funky about the shipping ...

NewsServices.com - avatar NewsServices.com

Top Reasons To Consider Enrolling Your Kids In A Private School

Sending your kids to a private school for first-class education has numerous benefits. For example, with the COVID-19 pandemic, many private learning institutions such as The King’s College have i...

NewsCo - avatar NewsCo

10 Steps To Writing A Will - A Comprehensive Guide

When it comes to writing your will, time is of the essence.  Don’t be tempted to put it off until you’re old, sick, or have spare time with nothing to do. After all, none of us knows what the f...

NewsCo - avatar NewsCo

8 Best Sites To Buy Instagram Followers, Likes & Views From

Social media is one of the great things technology has introduced to the world. Gaining online followers, especially on Instagram, is very crucial. First of all, it is essential to those who have ...

NewsCo - avatar NewsCo

Health & Wellness

6 Treatments to Reduce & Eliminate Chest Wrinkles

NewsServices.com - avatar NewsServices.com

When it comes to skin care, many people place a greater emphasis on the face than on other regions of the body. While this is understandable, it does not negate the fact that other regions of the ...

Dental Habits You Must Practice For A Better Smile

Hashtag.net.au - avatar Hashtag.net.au

It's no secret that having a great smile can do wonders for your self-confidence. A beautiful smile is one of the first things people notice about you, and it can make a lasting impression. Unfort...

Various Phases of Vein Disease and When to Seek Treatment

NewsServices.com - avatar NewsServices.com

The different systems in the body function simultaneously to ensure the body is healthy. This is why it always affects the entire body when one system falls to an infection. Parts like the veins p...

Keep glowing: 5 tips for maintaining that stunning cosmetic dentistry

NewsServices.com - avatar NewsServices.com

Whatever cosmetic dentistry you’ve undertaken - whether it be bonding, implants, veneers or something different - you want to keep your new teeth absolutely glowing. After all, this type of d...



NewsServices.com

Content & Technology Connecting Global Audiences

More Information - Less Opinion