Seven Ways That Social Media Sabotages Cyber Security

Social media websites have become one of the biggest fads to run through our society during the 21st century. The most interesting and slightly dangerous little known fact about social media is how little is known about the companies that sit behind them.  
 
By Christina Lee
 
Where does your data go? And how does having a social media webpage affect your cyber security? Although social media can do a lot for you as well, it also slyly takes a lot away.
 
Your data is being siphoned off in little chunks, even if you think you’ve done your utmost to make sure you are secure. However, this should not stave you off social media sites completely, but simply be a warning to be smart with how you use them and what information you give them. 

Here are seven ways that social media websites are slyly sabotaging your cybersecurity. 

1: Allowing for Identity Theft
 
Sharing too much personal information online can allow for identity thieves to have a field day with your data. Even sharing public pictures of your family members, your date of birth, or where you went to school or grew up can put your identity at risk. All that identity thieves need are a few important details, and you can find yourself in a world of trouble. 
 
2: Disgruntled Employees Damaging Business
 
This is a big one if you are a small business owner or operate any kind of business. Even if you don’t, you need to watch out that you don’t do it yourself. A few social media platforms are used to vent about things, and airing feelings online is never a good idea. You can get yourself into trouble by airing your feelings online, because everyone can see it! Social media is all about freedom of information, and sometimes its all too free. 
 
3: Allowing for Malware
 
Social media is a massive gateway for malware and hidden corruptive links. Malware can be found on social media in ads and links in bios. These can attach themselves to your computer, phone, or link themselves to your social media and ruin things for you online. 
 
4: Encouraging Catfishing 
 
Online interactions allow for much more than a connection with someone sans face to face activity. Building these interactions online with identity verification can lead to disappointment and heartbreak, but they can also allow for more sinister intentions such as identity hacking or the manipulation for personal data. 
 
5: Exposing yourself to Home Invasion Potential
 
If you leave your social media open and public to be viewed by just anybody, you allow yourself to be left vulnerable; more than just online. If potential thieves already know through social media or personal interaction where you live, it is a few short steps away to home invasion. Simply ‘checking in’ somewhere, or posting that you are going to be away for a few hours or days can give thieves the tip off needed to know they have free reign of the house and can break in. 
 
6: Leaving Accounts Unused
 
Even though using social media accounts can expose you to cyber attacks, not using an already active account can be dangerous too! If you are not careful, leaving an account untouched can let hackers break in to your account and start contacting your connections, post harmful things about you, or get the information they need to hack and steal your identity. 
 
7: Leaving your Phone Unprotected
 
Leaving your phone unprotected is an easy way to open yourself up to a cyber attack. If you potentially lose your phone or have it stolen, it could end up in the hands of someone who doesn’t have good intentions for it. Although this is a common occurrence, we can’t all protect our phones with encryption after encryption. The best thing to do is protect your phone, and all the subsequent data that is behind it, with a strong password.  
 
Although these seven tips are a stern word of warning to be careful on social media, it is not at all to say that social media is the devil incarnate. There are lots of great ways to use social media in safe and cyber secure ways, you just need to be careful with your personal data. 
 
Christina Lee is a social media strategist and youth mentor at Essay for sale
 
You Might Also Read: 
 
Social Media’s Effects On Mental Health:
 
« T-Mobile Customers Affected By Massive Breach
Webinar: Adapting detection and response strategies to the cloud »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Cybellum

Cybellum

Cybellum provides software risk assessment for DevOps and security executives, by detecting vulnerabilities automatically, without source code.

Corvid

Corvid

Corvid is an experienced team of cyber security experts who are passionate about delivering innovative, robust and extensive defence systems to help protect businesses against cyber threats.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Infopercept Consulting

Infopercept Consulting

Infopercept is a leading cybersecurity company in India, providing a critical layer of security to protect business information, infrastructure & assets across the organization.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

Anxinsec

Anxinsec

Anxinsec Technology is a security solution and service provider with a focus on new technology and innovations in cybersecurity.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.