Science claims that all of us are related by genealogy, regardless of the language we speak, the color of our skin, or where we are in the world. Interestingly, interrelationships beyond one’s ancestry are also very much true when one traces their relationship with another person they don’t know or haven’t met their entire life. Social networking sites and social media made these relationships overt, even to owners of profiles set to private. Someone is related to someone else at some point, a thread that connects one to another individual, organization or family. And these threads pretty much make up the sophisticated Web of online relationships.
Other than human behavior, this interconnectivity is also taken advantage of by online criminals that rely heavily on social networks like Facebook, Twitter and Instagram as part of their malicious activities. Online threats, such as malware, phishing and scams, are propagated, almost worm-like, across these platforms either via spammed public posts or via private messages. Regardless of what social network users tend to spend most of their time with, one thing remains certain: It is necessary for these users to keep their online social life secure. Online criminals are getting smarter and more sophisticated in their malicious tactics. We need to be more vigilant in our efforts of keeping the bad guys away from our systems, our online banking accounts and our inboxes.
Security, of course, involves more than just tinkering with a social networking service’s privacy settings. Below is a brief list, compiled by Jovi Umawing writing for ThreatTrack Security, of what users can do to protect themselves from miscreants who will do anything for information and cash.
Many fear-driven employers still keep workers caged in a single office building, but with broadband connection speeds more readily available than ever, employee demand will soon reach a breaking point. ... More >>
Five e-commerce lessons learned from this past shopping season for e-tailers to leverage and use for greater success in 2015. ... More >>
Thanks to today's 24/7 information flow, shoppers are leveraging technology to plot their own tactics for finding the best deals, avoiding shopping at peak busy times, and making their customer experiences into something that is overall faster, more economic and just better. ... More >>