Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

 
  • Share with Caution: There are some pieces of information that really have no business on a social network, as they could be used to the benefit of identity thieves. One really obvious example is the unique-to-the-individual Social Security Number, but it isn’t totally wise to share your home address or phone number, either. Birthday information and other personal details should only be shared if the site offers private profiles - but even then, think twice and be sure to triple-check your privacy settings frequently, and only add those who you know personally. If all a thief needs to verify that they are you is your date of birth or your dog’s name, you might be opening yourself up.


A side note: Even if you trust your privacy settings and your list of contacts, never post your address and/or a post sharing your agenda until after the fact. Announcing that your home will be empty on social media for a given amount of time is inviting criminal activity into your residence.

  • Limit Employment Details Online: Sites like LinkedIn, while phenomenally helpful with professional networking, can also provide identity thieves with a blueprint of your life thus far to exploit. Unless actively seeking employment for a time, leave just enough to entice those who view your profile to contact you directly to seek more information. Take advantage of privacy settings on those sites as well.
  • Do an Online Audit: The online world is vast. Your information could be in more places than you think. Friends and contacts of yours could post information about your real-time whereabouts that others could exploit, or your information could exist outside of the real-time social media sphere, in cached browsers and the like. Do a quick search for yourself online and remove anything you can. Google Street View will reveal details about your life that can easily implicate your financial situation, a quick request through their “Report a Problem” feature will solve that with a blurred image, rather than your home and belongings.
  • Continue with a Social Audit: How well do you know all of your personal social media contacts? Would you welcome them into your home? Share intimate details about your life with them? Call them friends? If any of the corresponding answers are negative, these people probably don’t need access to your full account and information. Limit access to your info (with certain exceptions, if you must) or ideally remove people from your social media sphere.

Social media can be both a fun personal venture as well as a valuable professional networking resource, but like any other tool, it must be handled with care. For more information, tips, and best practices to apply to your social media habits, read more of our posts or call Total Tech Care at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones IT Support Communication Business Continuity Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Virtualization Tech Term Gadgets Saving Money Holiday Social Media Chrome Managed IT Services Automation Microsoft Office Managed Service Computers Facebook Artificial Intelligence Cybercrime Operating System Internet of Things BYOD Wi-Fi Mobile Device Management Networking Health IT Support Hacking Telephone Systems Alert Information Technology Remote Managed Service Provider Covid-19 Information Spam Office 365 BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router Law Enforcement Mobile Computing App History Data Breach Application Password Money Human Resources Encryption Big Data Applications Remote Monitoring Data Storage Patch Management Private Cloud Office Tips Training Managed IT VPN Apps Blockchain Paperless Office Remote Computing How To Mobile Office Government Marketing WiFi Vulnerability Windows 7 IT solutions Word Wireless Entertainment Website Budget Servers Gmail Bring Your Own Device Data Management Work/Life Balance Settings Two-factor Authentication Data Security Mouse Google Drive HaaS Infrastructure Flexibility Voice over Internet Protocol Avoiding Downtime Conferencing Risk Management Hacker Scam Save Time The Internet of Things Data Protection USB Lithium-ion battery Vendor Management Cleaning Firewall Vendor End of Support Virtual Reality Physical Security Apple Managed Services Education Staff Software as a Service Display Telephone System Safety Machine Learning Social HIPAA Sports Redundancy Connectivity Remote Work User Error Keyboard Employee/Employer Relationship Meetings RMM Excel Robot Augmented Reality Biometrics Fraud Document Management Business Intelligence Virtual Desktop Remote Worker Printer Digital Signage Solid State Drive Wireless Technology Downtime Bluetooth Audit Worker How to DDoS IT Management Cryptocurrency Data storage Botnet SharePoint Procurement Automobile IT Plan Workplace Strategy Comparison Net Neutrality IT Consultant CES Help Desk Computing Infrastructure Unsupported Software Customer Service Printing Environment Going Green Humor Charger Content Management Business Technology Fax Server Access Control Compliance OneNote Computer Care Managed Services Provider Battery Current Events Shadow IT SaaS Virtual Assistant Telephony Authentication Database Legal Samsung Remote Workers Internet Exlporer Network Congestion eWaste Value Processor Update PDF Spam Blocking Electronic Medical Records Hard Drive Virus Google Docs Proactive IT Hiring/Firing Identity Theft Unified Threat Management Best Practice Wearable Technology Retail Computing Hard Drives Computer Accessories YouTube Black Market Instant Messaging Business Owner Running Cable Password Management PCI DSS Assessment Password Manager Virtual Machine Fiber Optics Memory Cameras Multi-Factor Security Employee NarrowBand Windows Server 2008 2FA Tools Search Engine Twitter Messaging Cabling Search iPhone NIST Policy Television Business Mangement Hypervisor Dark mode Smart Tech Trend Micro Trending Addiction SMS Amazon Default App Public Computer Recycling Saving Time Science Files Procedure Regulations Wiring dark theme Practices Shopping Printer Server Transportation Google Search Chromecast Computer Fan Cache AI Rootkit Amazon Web Services IT Infrastructure Criminal Bing Colocation Uninterrupted Power Supply Distributed Denial of Service Safe Mode FinTech Customer Relationship Management GDPR Workers Hosted Computing Social Network Analyitcs Benefits Monitor FENG Wireless Internet Programming Online Shopping Investment IBM Employee/Employer Relationships File Sharing Employees Flash Camera Windows 365 Inventory Smart Technology Specifications ISP Reputation Streaming Media Antivirus Wire Video Conferencing Evernote ROI Supercomputer Bitcoin Content Windows 8 Travel Shortcuts Tech Support Software Tips Sales Sync Printers Point of Sale IT service Emails Personal Millennials Cryptomining Techology Laptop Customers Smart Office Supply Chain Management Wireless Charging Consultant Batteries Audiobook Tablet Monitoring Virtual Private Network Windows 8.1 Domains Netflix Digitize Analytics Two Factor Authentication Workforce Touchpad Root Cause Analysis Cables Windows Server 2008 R2 Maintenance Best Available Knowledge Politics Music Advertising IaaS HBO Customer relationships Skype Project Management Email Best Practices WIndows 7 Nanotechnology IT Assessment Bloatware Telecommuting Manufacturing Notifications Data loss Cortana Leadership Digital Signature Managed IT Service Tablets Troubleshooting Security Cameras Outlook Computer Tips Start Menu Warranty Virtual CIO OneDrive Entrepreneur Biometric Security Relocation Screen Mirroring HVAC Peripheral Loyalty Google Apps Shortcut Analysis Using Data Books Frequently Asked Questions Digital Security Cameras Mobile Administrator User Windows 10s Devices Copiers Cost Management PowerPoint 5G Video Games Windows Media Player Worker Commute Cast Enterprise Content Management Quick Tip Social Networking webinar Accountants Experience Emergency Smartwatch Tip of the week MSP Ergonomics Professional Services Microchip Managing Stress Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Scalability

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code