Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

 
  • Share with Caution: There are some pieces of information that really have no business on a social network, as they could be used to the benefit of identity thieves. One really obvious example is the unique-to-the-individual Social Security Number, but it isn’t totally wise to share your home address or phone number, either. Birthday information and other personal details should only be shared if the site offers private profiles - but even then, think twice and be sure to triple-check your privacy settings frequently, and only add those who you know personally. If all a thief needs to verify that they are you is your date of birth or your dog’s name, you might be opening yourself up.


A side note: Even if you trust your privacy settings and your list of contacts, never post your address and/or a post sharing your agenda until after the fact. Announcing that your home will be empty on social media for a given amount of time is inviting criminal activity into your residence.

  • Limit Employment Details Online: Sites like LinkedIn, while phenomenally helpful with professional networking, can also provide identity thieves with a blueprint of your life thus far to exploit. Unless actively seeking employment for a time, leave just enough to entice those who view your profile to contact you directly to seek more information. Take advantage of privacy settings on those sites as well.
  • Do an Online Audit: The online world is vast. Your information could be in more places than you think. Friends and contacts of yours could post information about your real-time whereabouts that others could exploit, or your information could exist outside of the real-time social media sphere, in cached browsers and the like. Do a quick search for yourself online and remove anything you can. Google Street View will reveal details about your life that can easily implicate your financial situation, a quick request through their “Report a Problem” feature will solve that with a blurred image, rather than your home and belongings.
  • Continue with a Social Audit: How well do you know all of your personal social media contacts? Would you welcome them into your home? Share intimate details about your life with them? Call them friends? If any of the corresponding answers are negative, these people probably don’t need access to your full account and information. Limit access to your info (with certain exceptions, if you must) or ideally remove people from your social media sphere.

Social media can be both a fun personal venture as well as a valuable professional networking resource, but like any other tool, it must be handled with care. For more information, tips, and best practices to apply to your social media habits, read more of our posts or call Total Tech Care at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication IT Support Business Continuity Smartphones Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Upgrade Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Save Money Cloud Computing Passwords Windows 10 Virtualization Tech Term Social Media Saving Money Holiday Gadgets Chrome Automation Managed IT Services Microsoft Office Managed Service Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Health Networking IT Support Internet of Things Hacking Wi-Fi Information Technology Remote Managed Service Provider Spam Alert Covid-19 Information Office 365 Telephone Systems Employer-Employee Relationship Recovery Router Bandwidth BDR Social Engineering Mobility App History Mobile Computing Encryption Applications Data Breach Application Human Resources Law Enforcement Big Data Remote Monitoring Password Money Office Tips Data Storage Patch Management Training VPN Government Remote Computing Blockchain Private Cloud Paperless Office Mobile Office How To Managed IT Apps Marketing Wireless Vulnerability WiFi Windows 7 IT solutions Word Entertainment Website Gmail Google Drive Budget Settings Servers Two-factor Authentication Avoiding Downtime Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Flexibility Conferencing End of Support The Internet of Things Education Lithium-ion battery Physical Security Scam Safety Data Protection HIPAA Sports USB Redundancy Firewall Keyboard Vendor Management Virtual Reality Apple Vendor Social Managed Services Telephone System Staff Software as a Service Display Save Time User Error Machine Learning Meetings Connectivity Remote Work Employee/Employer Relationship Cleaning RMM Risk Management Hacker Battery Augmented Reality Shadow IT Fraud DDoS Legal Business Intelligence Remote Worker Digital Signage SharePoint Printer Audit Internet Exlporer Worker Bluetooth IT Management Cryptocurrency Customer Service Botnet PDF Procurement Environment IT Plan Workplace Strategy Comparison Net Neutrality Fax Server Proactive IT IT Consultant CES Help Desk Unsupported Software Printing Best Practice SaaS Humor YouTube Charger Black Market Content Management Business Technology Access Control Compliance OneNote Computer Care Managed Services Provider Current Events Network Congestion Virtual Assistant Document Management Telephony Authentication Database eWaste Solid State Drive Wireless Technology Samsung How to Downtime Remote Workers Value Processor Data storage Update Automobile Spam Blocking Electronic Medical Records Wearable Technology Hard Drive Retail Hard Drives Google Docs Virus Instant Messaging Robot Excel Computing Infrastructure Hiring/Firing Identity Theft Going Green Unified Threat Management Computing Computer Accessories Biometrics Virtual Desktop Laptop Assessment Password Manager Virtual Machine Techology Password Management PCI DSS Windows Server 2008 2FA Customers Fiber Optics Multi-Factor Security Employee Cameras Audiobook Tools Search Engine Science Twitter Messaging Cabling Touchpad Television Business Mangement Hypervisor NIST Policy Dark mode Smart Tech Trend Micro Trending Customer Relationship Management Politics Advertising Addiction SMS Amazon Default App Distributed Denial of Service Public Computer Recycling Saving Time Analyitcs Procedure Regulations Wiring dark theme Practices Shopping Notifications Transportation Google Search Printer Server Programming Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Criminal Bing Safe Mode FinTech GDPR Relocation Workers Hosted Computing Social Network Benefits Antivirus Windows 8 FENG Wireless Internet Online Shopping Investment IBM Employee/Employer Relationships IT service Video Games File Sharing Employees Worker Commute Flash Camera Windows 365 Inventory Smart Technology Specifications ISP Experience Tablet Wire Video Conferencing Evernote ROI Supercomputer Bitcoin Travel Shortcuts Domains Scalability Software Tips Sales Business Owner Sync Printers Point of Sale Emails Personal Millennials Cryptomining IaaS Maintenance Smart Office Supply Chain Management NarrowBand Wireless Charging Batteries Consultant Bloatware Search Monitoring Analytics Virtual Private Network Windows 8.1 iPhone Netflix Digitize Two Factor Authentication Workforce Tablets Root Cause Analysis Cables Windows Server 2008 R2 HBO Customer relationships Knowledge Music Best Available Entrepreneur Skype Project Management Email Best Practices Files Nanotechnology IT Assessment Telecommuting Manufacturing WIndows 7 Chromecast Cortana Shortcut Data loss Outlook Computer Tips Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Cost Management Social Networking Start Menu Warranty Virtual CIO Colocation OneDrive Uninterrupted Power Supply Biometric Security Loyalty Google Apps Screen Mirroring HVAC Peripheral Frequently Asked Questions Digital Security Cameras Monitor Analysis Using Data Books PowerPoint Mobile Administrator Windows Media Player Windows 10s Devices Copiers 5G User Running Cable Memory Cast Enterprise Content Management Quick Tip Tip of the week MSP Ergonomics Reputation webinar Accountants Streaming Media Emergency Smartwatch Content Professional Services Microchip Public Cloud Thought Leadership Development Tech Support Employer Employee Relationship Credit Cards OLED Managing Stress

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code