Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

 
  • Share with Caution: There are some pieces of information that really have no business on a social network, as they could be used to the benefit of identity thieves. One really obvious example is the unique-to-the-individual Social Security Number, but it isn’t totally wise to share your home address or phone number, either. Birthday information and other personal details should only be shared if the site offers private profiles - but even then, think twice and be sure to triple-check your privacy settings frequently, and only add those who you know personally. If all a thief needs to verify that they are you is your date of birth or your dog’s name, you might be opening yourself up.


A side note: Even if you trust your privacy settings and your list of contacts, never post your address and/or a post sharing your agenda until after the fact. Announcing that your home will be empty on social media for a given amount of time is inviting criminal activity into your residence.

  • Limit Employment Details Online: Sites like LinkedIn, while phenomenally helpful with professional networking, can also provide identity thieves with a blueprint of your life thus far to exploit. Unless actively seeking employment for a time, leave just enough to entice those who view your profile to contact you directly to seek more information. Take advantage of privacy settings on those sites as well.
  • Do an Online Audit: The online world is vast. Your information could be in more places than you think. Friends and contacts of yours could post information about your real-time whereabouts that others could exploit, or your information could exist outside of the real-time social media sphere, in cached browsers and the like. Do a quick search for yourself online and remove anything you can. Google Street View will reveal details about your life that can easily implicate your financial situation, a quick request through their “Report a Problem” feature will solve that with a blurred image, rather than your home and belongings.
  • Continue with a Social Audit: How well do you know all of your personal social media contacts? Would you welcome them into your home? Share intimate details about your life with them? Call them friends? If any of the corresponding answers are negative, these people probably don’t need access to your full account and information. Limit access to your info (with certain exceptions, if you must) or ideally remove people from your social media sphere.

Social media can be both a fun personal venture as well as a valuable professional networking resource, but like any other tool, it must be handled with care. For more information, tips, and best practices to apply to your social media habits, read more of our posts or call Total Tech Care at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Virtualization Gadgets Saving Money Holiday Tech Term Social Media Chrome Managed Service Automation Microsoft Office Managed IT Services Computers Artificial Intelligence Facebook Operating System Cybercrime Wi-Fi BYOD Mobile Device Management Networking IT Support Hacking Health Internet of Things Alert Remote Spam Information Office 365 Telephone Systems Covid-19 Managed Service Provider Information Technology Bandwidth Router Social Engineering Mobility Recovery Employer-Employee Relationship BDR Mobile Computing Remote Monitoring Application Password Money Encryption App History Applications Big Data Data Breach Law Enforcement Human Resources Remote Computing Blockchain Managed IT Mobile Office Paperless Office How To Apps Office Tips Training Data Storage Patch Management VPN Government Private Cloud Marketing WiFi Mouse HaaS IT solutions Data Security Entertainment Website Bring Your Own Device Data Management Budget Work/Life Balance Infrastructure Voice over Internet Protocol Wireless Google Drive Vulnerability Gmail Windows 7 Word Settings Avoiding Downtime Servers Flexibility Two-factor Authentication Apple Save Time Social User Error Telephone System Staff Software as a Service Cleaning USB Meetings Machine Learning Vendor Connectivity Remote Work Managed Services Display End of Support Risk Management Hacker Physical Security Education Safety The Internet of Things Employee/Employer Relationship Conferencing HIPAA Lithium-ion battery Sports RMM Redundancy Scam Keyboard Data Protection Firewall Vendor Management Virtual Reality Solid State Drive Charger Wireless Technology Business Technology Content Management Procurement How to Downtime Compliance Workplace Strategy Access Control Network Congestion Net Neutrality OneNote Computer Care eWaste Virtual Assistant Printer Help Desk Current Events Data storage Authentication Bluetooth Printing Telephony Automobile Samsung Computing Infrastructure Managed Services Provider Value Going Green Wearable Technology Retail Update Hard Drives Database Spam Blocking Electronic Medical Records IT Consultant Instant Messaging Robot Excel Remote Workers Google Docs Battery Hiring/Firing Shadow IT Identity Theft Humor Biometrics Virtual Desktop Processor Legal Internet Exlporer DDoS Hard Drive Augmented Reality PDF SharePoint Fraud Business Intelligence Remote Worker Computing Audit Worker Proactive IT Customer Service IT Management Cryptocurrency Best Practice Environment YouTube Botnet Fax Server IT Plan Virus Black Market Comparison Digital Signage Unified Threat Management SaaS CES Unsupported Software Computer Accessories Document Management IT Infrastructure Wire AI Evernote IaaS FinTech Maintenance Travel Software Tips Cameras Bing Supercomputer Emails Files Printers Social Network Millennials Sync Bloatware Wireless Charging Investment Chromecast Smart Office Employees Employee/Employer Relationships Tablets Netflix Colocation Two Factor Authentication Virtual Private Network Uninterrupted Power Supply Windows 365 Workforce Entrepreneur ISP Cables ROI Root Cause Analysis Video Conferencing Music Sales Shortcut Bitcoin HBO Printer Server Shortcuts Knowledge Monitor Project Management Point of Sale Nanotechnology Personal Telecommuting Skype Cost Management Cryptomining Supply Chain Management Cortana Social Networking Data loss Reputation Troubleshooting Streaming Media Monitoring Digital Signature Batteries Outlook Leadership Content Warranty Tech Support Windows 8.1 Digitize Start Menu Google Apps Windows Server 2008 R2 Screen Mirroring Techology Loyalty Laptop HVAC Running Cable Customers Books Customer relationships Analysis Frequently Asked Questions Memory Manufacturing Audiobook Windows 10s Administrator Email Best Practices Devices IT Assessment Mobile Cast Touchpad Enterprise Content Management Emergency MSP Computer Tips Accountants Managed IT Service Tip of the week Security Cameras webinar Biometric Security Politics Public Cloud Advertising Employer Employee Relationship Microchip Virtual CIO Thought Leadership OneDrive Credit Cards Professional Services Peripheral Password Manager Consultant Science Assessment Password Management Notifications Digital Security Cameras Using Data Multi-Factor Security Windows Server 2008 Analytics 5G Search Engine Twitter Copiers Tools Distributed Denial of Service Quick Tip Business Mangement Best Available Customer Relationship Management Television NIST Relocation Ergonomics Smart Tech WIndows 7 Trending Analyitcs Smartwatch Programming OLED Addiction Development Amazon PCI DSS Recycling Virtual Machine Video Games Public Computer Transportation Wiring 2FA Practices Fiber Optics Regulations Employee Worker Commute Cabling Experience Computer Fan Rootkit Cache Antivirus Messaging Amazon Web Services Policy Criminal Hypervisor Windows 8 Scalability Safe Mode Benefits GDPR Dark mode Hosted Computing User IT service Trend Micro PowerPoint Business Owner Workers Windows Media Player Default App FENG NarrowBand Wireless Internet SMS Online Shopping Procedure Saving Time Tablet Search IBM File Sharing iPhone Smart Technology Camera dark theme Inventory Managing Stress Domains Shopping Specifications Flash Google Search

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code