Six Ways to Have a Healthy (and Secure) Online Social Life

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8
Previous Next

Click through for six steps users should take to ensure they remain safe while on social networking sites, as identified by Jovi Umawing writing for ThreatTrack Security.

Science claims that all of us are related by genealogy, regardless of the language we speak, the color of our skin, or where we are in the world. Interestingly, interrelationships beyond one’s ancestry are also very much true when one traces their relationship with another person they don’t know or haven’t met their entire life. Social networking sites and social media made these relationships overt, even to owners of profiles set to private. Someone is related to someone else at some point, a thread that connects one to another individual, organization or family. And these threads pretty much make up the sophisticated Web of online relationships.

Other than human behavior, this interconnectivity is also taken advantage of by online criminals that rely heavily on social networks like FacebookTwitter and Instagram as part of their malicious activities. Online threats, such as malware, phishing and scams, are propagated, almost worm-like, across these platforms either via spammed public posts or via private messages. Regardless of what social network users tend to spend most of their time with, one thing remains certain: It is necessary for these users to keep their online social life secure. Online criminals are getting smarter and more sophisticated in their malicious tactics. We need to be more vigilant in our efforts of keeping the bad guys away from our systems, our online banking accounts and our inboxes.

Security, of course, involves more than just tinkering with a social networking service’s privacy settings. Below is a brief list, compiled by Jovi Umawing writing for ThreatTrack Security, of what users can do to protect themselves from miscreants who will do anything for information and cash.

 

Related Topics : SharePoint, Web Video and Voice Conferencing, UK, MySpace, Intranets

 
More Slideshows

Social8-190x128 Six Tips for Turning Customer Feedback into a Powerful Business Tool

Marketing pros love to talk about Big Data, and with good reason. Unfortunately, many marketers continue to overlook their most valuable data source: their customers. ...  More >>

DataM30-190x128 The Microservices Revolution: Five Points You Need to Know

The use of microservices is a new way of app building that breaks up application services into smaller, independent parts and functions. ...  More >>

infra44-190x128 Six E-Signature Security Requirements for Digital Transactions

Taking a broader view of e-signature security will help companies strengthen their legal and compliance position while ensuring maximum adoption. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date