Archives - Social Media

Use a link scanner to check URLs before opening them

If you receive a link via email, DM or on social media, you can’t always be sure of the source or its actual destination. Bad actors will hide a malicious URL using various tricks, such as changing the displayed text to something seemingly safe or use a URL shortener so it’s indecipherable. Fortunately, you can […]

Review third-party apps with access to your social media

If you’ve ever signed into a website or another app with your Facebook account, then you’ve given a third-party access to some information from your profile. Not every third party can be trusted; always review the authorizations you’ve granted and cancel any that you’re uncertain about.

Block as much as you need on social media

Social networks are full of scams meant to collect your personal data by sending you to risky websites or seeking sensitive information. You should block any account you think might be trying to scam you – that way, you won’t see any of its posts.

Limit the personal information you post on social

Try not to post information that might make you vulnerable, such as your address or information about your schedule or routine. If your social connections post information about you, make sure the combined information is not more than you would be comfortable with strangers knowing. Also be considerate when posting information, including photos, about your […]

Take time to limit exposure of private information

Default options on certain websites may be chosen for ease, not for security. For instance, avoid allowing a website to remember your password. If your password is stored, your profile and any account information you have provided on that site is readily available if an attacker gains access to your computer. Additionally, evaluate your settings […]

Don’t respond to quizzes or polls on Facebook

Facebook quizzes might be a fun time at the moment, but they’re also a commonly exploited scam for cybercriminals. Hackers use these questionnaires as data gathering tools by asking you to provide personal or demographic information that helps them answer password hints. By first creating a fake account and using automation to gain followers, they […]