Archives - Social Media


Know how to identify a fake social media profile

Many social media accounts are fake and designed to harvest data through deceit. One way to see if a profile is fraudulent is by downloading its profile picture and then doing a quick Google image search to see if it’s actually a stock photo. If it is, the profile is risky to engage with and […]

Don’t geotag your Instagram or Facebook posts

Adding a geotag to a social media update is a nice way to enrich the post, but it comes with some risk. Someone viewing your feed might assume – correctly – that you aren’t home and try to break in. Moreover, sharing your location can expose you to certain types of targeted advertising. Err on […]

Be wary of third-party applications on social platforms

Third-party applications may provide entertainment or functionality, but use caution when deciding which applications to enable. Avoid applications that seem suspicious, and modify your settings to limit the amount of information the applications can access.

Don’t post photos of your boarding passes to social media

If you’re flying somewhere, you might feel compelled to post a photo or video of your boarding passes to a social network like Instagram. It’s a risky move, though, as strangers can use the information contained in its various codes to change your contact information with the airline or even alter your reservation. Handle your […]

Social Media Protection Tips to Keep You Safe Online

Early 2019 marks the fifteenth anniversary of Facebook’s launch. Since the winter of 2004, social media has come a long way, becoming deeply ingrained in the live of billions of people worldwide. According to the Pew Research Center, 73 percent of Americans used YouTube in 2018 and 68 percent were on Facebook. Even smaller network […]

What is a social engineering attack?

In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an individual or organization computer system. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that identity. However, by asking questions, he […]