Seven Ways That Social Media Sabotages Cyber Security

Social media websites have become one of the biggest fads to run through our society during the 21st century. The most interesting and slightly dangerous little known fact about social media is how little is known about the companies that sit behind them.  
 
By Christina Lee
 
Where does your data go? And how does having a social media webpage affect your cyber security? Although social media can do a lot for you as well, it also slyly takes a lot away.
 
Your data is being siphoned off in little chunks, even if you think you’ve done your utmost to make sure you are secure. However, this should not stave you off social media sites completely, but simply be a warning to be smart with how you use them and what information you give them. 

Here are seven ways that social media websites are slyly sabotaging your cybersecurity. 

1: Allowing for Identity Theft
 
Sharing too much personal information online can allow for identity thieves to have a field day with your data. Even sharing public pictures of your family members, your date of birth, or where you went to school or grew up can put your identity at risk. All that identity thieves need are a few important details, and you can find yourself in a world of trouble. 
 
2: Disgruntled Employees Damaging Business
 
This is a big one if you are a small business owner or operate any kind of business. Even if you don’t, you need to watch out that you don’t do it yourself. A few social media platforms are used to vent about things, and airing feelings online is never a good idea. You can get yourself into trouble by airing your feelings online, because everyone can see it! Social media is all about freedom of information, and sometimes its all too free. 
 
3: Allowing for Malware
 
Social media is a massive gateway for malware and hidden corruptive links. Malware can be found on social media in ads and links in bios. These can attach themselves to your computer, phone, or link themselves to your social media and ruin things for you online. 
 
4: Encouraging Catfishing 
 
Online interactions allow for much more than a connection with someone sans face to face activity. Building these interactions online with identity verification can lead to disappointment and heartbreak, but they can also allow for more sinister intentions such as identity hacking or the manipulation for personal data. 
 
5: Exposing yourself to Home Invasion Potential
 
If you leave your social media open and public to be viewed by just anybody, you allow yourself to be left vulnerable; more than just online. If potential thieves already know through social media or personal interaction where you live, it is a few short steps away to home invasion. Simply ‘checking in’ somewhere, or posting that you are going to be away for a few hours or days can give thieves the tip off needed to know they have free reign of the house and can break in. 
 
6: Leaving Accounts Unused
 
Even though using social media accounts can expose you to cyber attacks, not using an already active account can be dangerous too! If you are not careful, leaving an account untouched can let hackers break in to your account and start contacting your connections, post harmful things about you, or get the information they need to hack and steal your identity. 
 
7: Leaving your Phone Unprotected
 
Leaving your phone unprotected is an easy way to open yourself up to a cyber attack. If you potentially lose your phone or have it stolen, it could end up in the hands of someone who doesn’t have good intentions for it. Although this is a common occurrence, we can’t all protect our phones with encryption after encryption. The best thing to do is protect your phone, and all the subsequent data that is behind it, with a strong password.  
 
Although these seven tips are a stern word of warning to be careful on social media, it is not at all to say that social media is the devil incarnate. There are lots of great ways to use social media in safe and cyber secure ways, you just need to be careful with your personal data. 
 
Christina Lee is a social media strategist and youth mentor at Essay for sale
 
You Might Also Read: 
 
Social Media’s Effects On Mental Health:
 
« T-Mobile Customers Affected By Massive Breach
Webinar: Adapting detection and response strategies to the cloud »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Desec Security

Desec Security

Desec's training platform allows professionals around of the world to acquire knowledge and practical experience in Information Security.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Soffid

Soffid

Soffid provides full Single-Sign-On experience and full Identity and Access Management features by policy-based centralised orchestration of user identities.

United Network Technologies

United Network Technologies

United Network Technologies is a leading Managed Services Provider, distributor and developer of specialised cyber security components and technologies.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

ArmorX AI

ArmorX AI

ArmorX AI (formerly Kapalya) operates an encryption management platform designed to encrypt all data in transit and at rest on mobile end-points, corporate servers, and cloud servers.

Point Wild

Point Wild

Point Wild is a holding company that acquires, integrates and manages a diverse portfolio of best-in-class cybersecurity brands for consumers and enterprises.

Helix Tech Consulting

Helix Tech Consulting

Helix Tech have expertise in a wide range of technology areas, including IT strategy, infrastructure design, cybersecurity, disaster recovery, cloud, data centers, IT cost optimization, and more.