Apply

Never Click and Tell

October 07, 2019
Submitted By: Gregory Freidline
Never Click and Tell

Keeping with the #NCSAM Theme of OWN IT. SECURE IT. PROTECT IT. we are bringing you some information about cyber-safety in social media to help you OWN IT. Attached to this UNote is a handout with additional information about protecting yourself on Social Media.

Keeping Social Networking and Privacy Settings Secure

Social networking sites like Facebook, LinkedIn, Instagram, or Snapchat or messaging platforms like Slack, WhatsApp, or Skype allow us to share personal updates while communicating with friends and co-workers across the globe. While these convenient technologies keep us connected, you could be putting yourself at risk for cyber attackers to watch and learn what you are doing.

Own your security. Here are a few tips to help you leverage these technologies safely and securely to stay protected:

Enable Privacy

Whenever you choose to post information about yourself online, it is good practice to assume any information you post could eventually become public. Avoid communicating sensitive or private details about yourself. It is also wise to avoid posting any images you wouldn?t want someone like your parent or employer to see.

When you register for a social networking site, your first step should be to enable and customize your privacy controls. While it may help, keep in mind that these controls can be confusing, they might change often, and they may not fully protect your information.

Don?t assume that once you?ve established these privacy settings that your account is fully protected. Having the most up-to-date security software, web browser, operating system and apps is the best defense against viruses, malware and other online cyber threats.

Anything you Post Could Be Used Against You

The more information you post about your personal life, the easier it is for a cyber-attacker to customize an attack against you. For example, if you post extensive information about your family, the hobbies you enjoy, or your upcoming vacation or work trip, a cyber-attacker could harvest all of those specific details and create a phishing email or phone call that specifically targets you.

If you were to post about your favorite pastime, such as baking, the cyber attacker could craft a phishing email with a special promotion for a new mixing bowl set. In this email, the attacker could include an attachment that has a 50% off coupon for your favorite baking supply brand. What you don't realize is that the attachment included in that email is actually infected. When you open the attachment to print it out, it silently infects your computer, giving the cyber attacker total control of your system. Keep this in mind when you get an email about a fantastic vacation similar to the one you just took, or a fantastic deal concerning one of your favorite hobbies. If it seems too good to be true, it probably is.

Be an Advocate

Be aware. Keep track of what your friends and coworkers within your network post about you. It isn't rude to ask them to be considerate of your privacy. If you feel as though something they post is inappropriate or that it shares too much information about yourself, kindly ask them to remove the content. You could also report it to the website's abuse department, if you'd prefer.

In return, practice the same level of consideration of what you post about your friends and coworkers on your social networking sites. It would be good practice to ask them if you have their permission to post a picture or share details you have of them.

Be Suspicious

Much like email phishing attacks, cyber attackers may attempt to trick you on your own social networking sites. A common attack method is when a cyber-attacker hacks into a friend's social networking account and pretends to be that friend online. They may send you an urgent request, such as being mugged or stranded while on vacation and needing money sent right away.

If you receive any odd or suspicious messages online from a friend, proceed with caution and be careful how you respond. Do not reply directly via their social media account, as you will be communicating directly with that cyber attacker. Instead, call your friend on the phone to confirm if he or she truly posted the message and needs your help.

Remember, you are free -- in fact encouraged! -- to share these materials with others, including your family, friends and neighbors.