Science claims that all of us are related by genealogy, regardless of the language we speak, the color of our skin, or where we are in the world. Interestingly, interrelationships beyond one’s ancestry are also very much true when one traces their relationship with another person they don’t know or haven’t met their entire life. Social networking sites and social media made these relationships overt, even to owners of profiles set to private. Someone is related to someone else at some point, a thread that connects one to another individual, organization or family. And these threads pretty much make up the sophisticated Web of online relationships.
Other than human behavior, this interconnectivity is also taken advantage of by online criminals that rely heavily on social networks like Facebook, Twitter and Instagram as part of their malicious activities. Online threats, such as malware, phishing and scams, are propagated, almost worm-like, across these platforms either via spammed public posts or via private messages. Regardless of what social network users tend to spend most of their time with, one thing remains certain: It is necessary for these users to keep their online social life secure. Online criminals are getting smarter and more sophisticated in their malicious tactics. We need to be more vigilant in our efforts of keeping the bad guys away from our systems, our online banking accounts and our inboxes.
Security, of course, involves more than just tinkering with a social networking service’s privacy settings. Below is a brief list, compiled by Jovi Umawing writing for ThreatTrack Security, of what users can do to protect themselves from miscreants who will do anything for information and cash.
Marketing pros love to talk about Big Data, and with good reason. Unfortunately, many marketers continue to overlook their most valuable data source: their customers. ... More >>
The use of microservices is a new way of app building that breaks up application services into smaller, independent parts and functions. ... More >>
Taking a broader view of e-signature security will help companies strengthen their legal and compliance position while ensuring maximum adoption. ... More >>