Info Advantage Blog

Quick Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

We’ve put together a list of easy ways that you can mitigate the risks associated with oversharing your personal information on the Internet:

  • Mind what you post: You need to understand that there is some information that’s not supposed to be shared on the Internet. A fairly obvious example of this is personal information like Social Security numbers; if someone shared their Social Security number online, and a fraudster got ahold of it, they could easily steal the identity and perform who knows what with it. Other information that shouldn’t be shared includes birthdays, home addresses, phone numbers, and so on. Even something as simple as your dog’s name could be used to crack a potential security question for an online banking account. Basically, you should keep your personal life off the Internet; otherwise, you’re inviting disaster.n
    • Side note: You may trust your privacy settings and your contacts, but you should still be conservative about posting your agenda and your physical address online. Never announce when your home will be empty on social media. Doing so could lead to uninvited guests while you’re vacationing in Tahiti.
    n
  • Limit your employment details: Sites like LinkedIn can help you work on your professional networking, but they also provide identity thieves with a treasure trove of personal information. Unless you’re actively seeking employment, it’s a good idea to include only information that’s absolutely necessary. It should be just enough to get people to view your profile, and information on how they can get in touch with you. Take advantage of privacy settings to maximize your personal security.
  • Perform an online audit: The Internet is a huge place. Your information could be, quite literally, in a thousand different locations. Friends and contacts of yours could post information about where you are and what you’re doing. Plus, information could exist outside the realm of your social media accounts, lingering in online databases, waiting to be picked up by hackers or other thieves.
  • Perform a social media audit: This is often called a “friend purge,” where you go through your social media contacts and remove those whom you have fallen out of contact with, or those who you simply don’t know. Ask yourself if you would let your social media contacts into your home, or share intimate details about your life with them. Chances are that the majority of them don’t need access to your full account and information.

Social media can be a great way to connect with people, but you need to take your personal security into your own hands. If you don’t, who will? For more information about how to stay safe online, keep tabs on our blog; or, call Info Advantage at (585) 254-8710.

How Backup and Recovery Can Save Your Company
6 PC Troubleshooting Guidelines that Every User Sh...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 15 2019

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events Hackers malware backup technology solutions Software Business Management Ransomware Productivity cyber attacks Business practice Network Security Innovation Hardware Business Continuity Mobility Microsoft Disaster Recovery cloud Office tips Quick Tips Business Computing Windows 10 Efficiency hardware solutions Mobile Devices Computer Avoiding Downtime Internet business Social cyber criminals data breach Operating System Laptop Health Flexibility Education Wi-Fi Law Enforcement email Passwords Upgrade IT data internet user Money Personal Information Antivirus Risk Management Saving Money Information Technology Automation Mobile Computing IT Support Smartphone Facebook Office 365 Identity Theft History Application voip cloud capabilities IT Services Humor Miscellaneous Small Business Communication servers Remote Computing byod Server Marketing cars Windows Search How To Gadgets HaaS virtualized servers Point of Sale Password Alert Artificial Intelligence Managed IT Services Workplace Tips Microsoft Office Virtualization Data recovery Automobile iPhone Legal holiday Software-based phone systems Managing Stress spam business continuity plan Cybercrime Net worth Government ATMs BDR phone systems Router hardware refreshes emails Apps Virtual Reality downtime Employer-Employee Relationship ecommerce Wireless content Google Scalability Internet Protocol time intel Video Games threats Text Messaging Encryption Recovery Reputation Update Battery computer network Telephone Systems Instant Messaging Work/Life Balance Advertising PDF Black Market Hosted Solution Relocation Telephony Google Drive Users Private Cloud VoIP right Hosted Solutions USB End of Support Smartphones Social Media User Tips Touchpad Entertainment Robot Internet Exlporer VPN Worker Commute

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name