Seven Ways That Social Media Sabotages Cyber Security

Social media websites have become one of the biggest fads to run through our society during the 21st century. The most interesting and slightly dangerous little known fact about social media is how little is known about the companies that sit behind them.  
 
By Christina Lee
 
Where does your data go? And how does having a social media webpage affect your cyber security? Although social media can do a lot for you as well, it also slyly takes a lot away.
 
Your data is being siphoned off in little chunks, even if you think you’ve done your utmost to make sure you are secure. However, this should not stave you off social media sites completely, but simply be a warning to be smart with how you use them and what information you give them. 

Here are seven ways that social media websites are slyly sabotaging your cybersecurity. 

1: Allowing for Identity Theft
 
Sharing too much personal information online can allow for identity thieves to have a field day with your data. Even sharing public pictures of your family members, your date of birth, or where you went to school or grew up can put your identity at risk. All that identity thieves need are a few important details, and you can find yourself in a world of trouble. 
 
2: Disgruntled Employees Damaging Business
 
This is a big one if you are a small business owner or operate any kind of business. Even if you don’t, you need to watch out that you don’t do it yourself. A few social media platforms are used to vent about things, and airing feelings online is never a good idea. You can get yourself into trouble by airing your feelings online, because everyone can see it! Social media is all about freedom of information, and sometimes its all too free. 
 
3: Allowing for Malware
 
Social media is a massive gateway for malware and hidden corruptive links. Malware can be found on social media in ads and links in bios. These can attach themselves to your computer, phone, or link themselves to your social media and ruin things for you online. 
 
4: Encouraging Catfishing 
 
Online interactions allow for much more than a connection with someone sans face to face activity. Building these interactions online with identity verification can lead to disappointment and heartbreak, but they can also allow for more sinister intentions such as identity hacking or the manipulation for personal data. 
 
5: Exposing yourself to Home Invasion Potential
 
If you leave your social media open and public to be viewed by just anybody, you allow yourself to be left vulnerable; more than just online. If potential thieves already know through social media or personal interaction where you live, it is a few short steps away to home invasion. Simply ‘checking in’ somewhere, or posting that you are going to be away for a few hours or days can give thieves the tip off needed to know they have free reign of the house and can break in. 
 
6: Leaving Accounts Unused
 
Even though using social media accounts can expose you to cyber attacks, not using an already active account can be dangerous too! If you are not careful, leaving an account untouched can let hackers break in to your account and start contacting your connections, post harmful things about you, or get the information they need to hack and steal your identity. 
 
7: Leaving your Phone Unprotected
 
Leaving your phone unprotected is an easy way to open yourself up to a cyber attack. If you potentially lose your phone or have it stolen, it could end up in the hands of someone who doesn’t have good intentions for it. Although this is a common occurrence, we can’t all protect our phones with encryption after encryption. The best thing to do is protect your phone, and all the subsequent data that is behind it, with a strong password.  
 
Although these seven tips are a stern word of warning to be careful on social media, it is not at all to say that social media is the devil incarnate. There are lots of great ways to use social media in safe and cyber secure ways, you just need to be careful with your personal data. 
 
Christina Lee is a social media strategist and youth mentor at Essay for sale
 
You Might Also Read: 
 
Social Media’s Effects On Mental Health:
 
« T-Mobile Customers Affected By Massive Breach
Webinar: Adapting detection and response strategies to the cloud »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Cyber Security Network

Cyber Security Network

Cyber Security Network provide specialist cyber security recruitment services.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Carbide

Carbide

Carbide (formerly Securicy) breaks down enterprise-class security and privacy requirements and makes them accessible to, and achievable by, companies of all sizes.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

NetRise

NetRise

NetRise was founded as a direct result of the many shortcomings currently in the device security market, specifically targeting the firmware of devices.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.