10 Ways to Improve Your Social Media Security Policy and Posture

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 10 Ways to Improve Your Social Media Security Policy and Posture-4 Next

Be Mindful of Your Surroundings

Pay attention to your online posture. As Trevor Hawthorn, CTO, Wombat Security, explains, it pays off to be mindful of your social surroundings and ask yourself questions like: Is my Bluetooth constantly on? Does my Wi-Fi have a secure password? Is it time for me to change my password? "Additionally, don't forget to continue learning on your own about emerging attacks to protect your personal and professional identity as well as your organization's confidential information," he says.

Social media is a culmination of tons of information being converged in one location, which makes it a vulnerable target. As Andre Bagrin, CEO of My Digital Shield points out, when phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily.

"Because social media has become so central, someone really does have the ability to essentially highjack someone's life," Bagrin adds. "You can become a victim through your social accounts and not even know right away. Potential job opportunities can be cut short among many other unfortunate repercussions."

Social media can become a security nightmare in a couple of ways, says Rob Sadowski of RSA, the Security Division of EMC. First, social media can be used to distribute malicious content (malware, malicious links), and the likelihood of users engaging with that content is much greater because it comes from friends or known contacts they trust. Second, personal details shared on social media can be very useful for hackers looking to compromise users' identities or find high-value targets for attacks, fraud, or cybercrime.

Improve your social media security posture by considering the following tips on social media best practices for business.

Sue Marquette Poremba has been writing about network security since 2008. In addition to her coverage of security issues for IT Business Edge, her security articles have been published at various sites such as Forbes, Midsize Insider and Tom's Guide. You can reach Sue via Twitter: @sueporemba


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.