9 Steps to Social Media Security
Think before posting images: Avoid posting pictures of expensive personal items. Never share images that may reveal your personal address.
Don’t broadcast outings: Announcing on Twitter or Facebook that you are away is an open invitation for burglars. Geolocation apps like Foursquare share your exact location, which lets criminals know you are not at home.
Use strict privacy settings: View privacy policies on all social networking sites and choose the highest settings. Only allow your actual friends into your network.
Avoid giving too much detail: Hackers commonly enter personal accounts through the “forgot password” link. If your mother’s maiden name, your hometown, birth date and pet’s name are all readily available on your Facebook, you may have handed out the key to your account.
Be aware: Make sure a link looks legitimate before clicking. Be wary of suspiciously vague posts like “look at the picture I found of you.”
Use secure passwords: Chose strong, complex, unique passwords and never share them.
Update your security software: Make sure your security suite is up to date and includes antivirus, antispyware, antis-spam, a firewall and a website safety advisor.
In their article, “Predicting Social Security Numbers from Public Data”, Alessandro Aquisti and Ralph Gross reported that they could accurately predict the full, nine-digit Social Security numbers for 8.5 percent of the people born in the United States between 1989 and 2003 – nearly five million individuals” (2009). This eye-opening statistic forced me to take precautionary steps in securing my information shared on social media networks. I advise you to do the same.
Watch this video from Susan Rink on Social Media Policy:
References:
Aquisti, A., & Gross, R. (2009). Predicting social security numbers from public data. PNAS, 106(27). Retrieved from http://www.pnas.org/content/early/2009/07/02/0904891106.full.pdf+html
Herrin, B. (2012, June). National labor relations board posts template social media policy. Retrieved from Legal HIMformation website: http://www.legalhimformation.com/articles/2012/201206.asp
Lohr, S. (2010, March 16). How privacy vanishes online. The New York Times. Retrieved from http://www.nytimes.com/2010/03/17/technology/17privacy.html?_r=1&