Archives - Social Media Tips


Conduct a periodic security audit of your social media profiles

By conducting regular audits on each of your social media accounts, look to review privacy settings, update passwords, ensure two-factor authentication is functioning properly and remove any suspicious connections. As cybercriminals commonly leverage public social media information, these routine checks strengthen your digital security and protect your personal information from potential breaches and attacks.

Be cautious when sharing personal information with online surveys or quizzes.

Scammers may use fake surveys to collect personal data for the purpose of identity theft or fraud, therefore, exercise caution when participating in online surveys or quizzes that request personal information. Always verify the credibility and legitimacy of the website or application before sharing any data, and avoid providing sensitive details like your social security […]

Avoid oversharing on social media

While social media is made for sharing, ensure that the information you publicly release doesn’t unnecessarily expose you to cyber risks. Avoid posting personal information like your full address, phone number, birth date or financial details, as such information can be exploited by malicious actors. Refrain also from sharing your vacation plans in real-time, as […]

Unlink unfamiliar devices from your Facebook account

Maintaining Facebook security can be challenging due to the complex nature of the company’s applications. It’s likely that you’ve logged into Facebook from various devices and apps, hence the necessity to frequently check these connections. Navigate to the Security tab on Facebook’s Settings page to view your active sessions and the associated browsers and apps. […]

Recognize how to spot a counterfeit social media account.

Numerous social media profiles are fabricated with the intent to gather information deceptively. To determine if a profile is deceptive, download the profile picture and perform a Google image search to check if it’s a stock image. If so, engaging with the profile poses a risk and should be avoided.

Phishing scams can come from anywhere

While email is perhaps the most common source of phishing attacks, they can come from practically anywhere. Text messages, social media, traditional mail and even phone calls may all follow the common phisher’s playbook by pretending to be a legitimate source asking for information. Remember: If you’re not sure, contact the alleged source directly with […]