- Contact Us
- Request a Proposal
Feb 28, 2022 7:00:00 AM
Do you share your information online with people you are not familiar with? Sharing personal information on social media might resemble a personal conversation among friends, family, and coworkers. That's why it's so widely used and accessible when making connections. Cyber criminals, unfortunately, utilize social media to obtain personal information that they can exploit to steal identities, compromise profiles, or send highly targeted phishing emails.
1. Are you sharing too much?
When you share something on the internet, you relinquish control over how it can be utilized. After all, it's visible to anyone. Assume you're dining with friends or family in a restaurant. Maybe you're talking about an upcoming birthday, your vacation plans, or some interesting work news. Consider the possibility that a thief has been sitting at the table across from you the entire time, capturing every seemingly inconsequential comment. Is it possible that you've disclosed information that could be harmful to you or your company?
Cyber criminals frequently comb through social media profiles, stringing information together to target individuals and businesses. They also employ seemingly innocent quizzes or questionnaires to gather data without raising concerns.
Tip: No matter how many of your contacts have posted or tagged you in a quiz or poll, resist the urge to participate.
2. Check before you connect
Accepting a friend request from a scammer puts your personal information at danger. Your other connections may mistakenly believe the connection is someone you can trust, putting their data at risk as well. It's best not to accept a friend request until you're sure you know and trust the individual.
Scammers may attempt to interact with you by creating phony profiles that impersonate individuals you know. It could be a fraud if you receive a request from someone you're already connected to. Always double-check duplicate requests using your current connection. If someone's behavior appears suspect, remove them from your network right away.
Tip: If a stranger asks to connect
- Think about why they want to connect with you. Do you know each other or belong to the same professional groups?
- Request information from common acquaintances or conduct an online search to verify the person's identity.
3. What if my account is exposed?
Act quickly to reduce the risks to you, your connections, and your business. Change your password immediately and check other account settings for unexpected changes. Notify your social network provider and all connections using another communication method, such as email.
4. Next steps in protecting your data