Info Advantage Blog

Quick Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

We’ve put together a list of easy ways that you can mitigate the risks associated with oversharing your personal information on the Internet:

  • Mind what you post: You need to understand that there is some information that’s not supposed to be shared on the Internet. A fairly obvious example of this is personal information like Social Security numbers; if someone shared their Social Security number online, and a fraudster got ahold of it, they could easily steal the identity and perform who knows what with it. Other information that shouldn’t be shared includes birthdays, home addresses, phone numbers, and so on. Even something as simple as your dog’s name could be used to crack a potential security question for an online banking account. Basically, you should keep your personal life off the Internet; otherwise, you’re inviting disaster.n
    • Side note: You may trust your privacy settings and your contacts, but you should still be conservative about posting your agenda and your physical address online. Never announce when your home will be empty on social media. Doing so could lead to uninvited guests while you’re vacationing in Tahiti.
  • Limit your employment details: Sites like LinkedIn can help you work on your professional networking, but they also provide identity thieves with a treasure trove of personal information. Unless you’re actively seeking employment, it’s a good idea to include only information that’s absolutely necessary. It should be just enough to get people to view your profile, and information on how they can get in touch with you. Take advantage of privacy settings to maximize your personal security.
  • Perform an online audit: The Internet is a huge place. Your information could be, quite literally, in a thousand different locations. Friends and contacts of yours could post information about where you are and what you’re doing. Plus, information could exist outside the realm of your social media accounts, lingering in online databases, waiting to be picked up by hackers or other thieves.
  • Perform a social media audit: This is often called a “friend purge,” where you go through your social media contacts and remove those whom you have fallen out of contact with, or those who you simply don’t know. Ask yourself if you would let your social media contacts into your home, or share intimate details about your life with them. Chances are that the majority of them don’t need access to your full account and information.

Social media can be a great way to connect with people, but you need to take your personal security into your own hands. If you don’t, who will? For more information about how to stay safe online, keep tabs on our blog; or, call Info Advantage at (585) 254-8710.

How Backup and Recovery Can Save Your Company
6 PC Troubleshooting Guidelines that Every User Sh...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, October 23 2018

Captcha Image

Support Options

  • Phone Support +

    Speak to a support team member on the phone!

    Phone: (585) 254-8710
    Fax: (585) 254-8766

  • Ticket By Email +

    Send an email to the Help Desk to create a ticket automatically and communicate with your team or any member.

    Submit A Ticket

  • Ticket By Portal +

    Create and manage tickets via our secure online Help Desk Portal. (Members Only Requires login)

    Enter Support Portal

  • 1

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security technology Tip of the Week Best Practices Privacy Current Events Hackers malware technology solutions backup Productivity cyber attacks Business practice Software Business Management Ransomware Innovation Hardware Network Security Microsoft Business Continuity cloud Mobility Disaster Recovery Efficiency Computer Avoiding Downtime Internet Mobile Devices business Quick Tips hardware solutions Windows 10 Office tips Business Computing Health Law Enforcement cyber criminals email Flexibility Education Passwords Wi-Fi data breach Social Operating System Laptop Saving Money Information Technology Automation cloud capabilities Personal Information Smartphone Risk Management servers Facebook Mobile Computing History IT Support IT Identity Theft Humor Miscellaneous Office 365 data Small Business internet user Upgrade Application voip IT Services Antivirus Communication Money ecommerce Password content Artificial Intelligence Government Managed IT Services Microsoft Office time intel Virtualization Automobile threats Legal Software-based phone systems Managing Stress Employer-Employee Relationship BDR byod Google Cybercrime phone systems cars Router Reputation virtualized servers Apps Virtual Reality Wireless Scalability Internet Protocol Workplace Tips Marketing Video Games Server Text Messaging Encryption Data recovery spam Windows Search Recovery holiday Gadgets business continuity plan Update Alert Battery Net worth Remote Computing ATMs hardware refreshes emails downtime iPhone How To HaaS Point of Sale Telephony Social Media End of Support Google Drive Entertainment VPN Hosted Solutions USB Touchpad Smartphones computer network Robot Internet Exlporer Advertising Hosted Solution Worker Commute VoIP right Relocation Telephone Systems Instant Messaging Users Private Cloud Work/Life Balance PDF Black Market User Tips

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name