What it Means to Protect Yourself in the Virtual World
As we all have continued to integrate social media into our
everyday lives to connect, ‘plug-in’, and search for each other, we have made
ourselves vulnerable in ways that pose serious threats to more than our virtual
well-being. It is important that we understand the term over-share and what
this means when setting up, updating and continuing to use social networks. While
social networks have been a successful “way to connect online with the people
you know offline, you may end up sharing more — and with more strangers — than
you might realize.” (Pegoraro, 2014) It is important to
be aware of what you share, how you share and where you share it. For example, as
I am sure many of you have noticed, Facebook asks many questions about your
life and life events, while this may seem like intriguing information to share
with friends, it is important to understand that “you’re under no obligation to
provide most of it,” and probably should not. (Pegoraro, 2014)
Social Media in the Workplace
Many of us use social media as an outlet for expression but it
is important to properly gauge what content is appropriate to share, especially
if you are working for a government organization. It is imperative that even
your personal sites remain free of discriminatory, illegal, abusive and obscene
content. Understanding that all companies are prone to implementing different
policies for social media use, stay current on your company’s policies to avoid
any misunderstandings or violations. This helps to ensure that working
conditions are not affected and that you remain within the protected guidelines
of the National Labor Relations Act (NLRA). It is vital that you remember to keep
your emotion in check. As an employer it is better to “resolve work complaints
by speaking directly to co-workers or using the company’s open door policy
“than by posting complaints to a social media outlet.” (Stevens, 2012)
Six Factors You Need to Consider When Developing and Maintaining
Your Online Presence
Make all of accounts private—Only give people, you
absolutely know, the ability to view your account/site.
Keep in mind: The more people you add the more vulnerable
your are, not all people are who they may seem to be.
Do not provide too much information—This includes, middle
names, pet names, phone numbers, email addresses, and any information that
could be used to steal your identity.
Keep in mind: Once you post something on the
internet, it is there forever and you cannot ever get it back.
Location, Location, Location—You know where you are, but the
whole world doesn’t need to. While it may be fun to post where you are, just
realize that someone may be looking at your account and tracking your location.
Keep in mind: Your phone does not always ask you if
you want “allow location services,” meaning that even when you don’t realize
it, you are updating your location. Check your application settings to avoid
this.

Keep in mind: This can include pictures,
conversations, and posts that can contain indecent materials. Ask your friends
to respect your privacy.
Password protect—While remembering passwords may be a challenge
we all face from time to time, it is sometimes better to forget and reset than
have the same password for everything (including your bank information!) This
makes your account for vulnerable to hackers and can lead to potentially irreparable
damage.
Keep in mind: Do not use any information you might be
able to find on your social networks to create your password—pet names,
hobbies, etc. Make sure your password is complex!
Public places mean public spaces—Wi-Fi hotspots are great
for doing your ‘surfing’ on-the-go, but it is important to remember that while
you are uploading, someone may be downloading (your information.) Public
computers (i.e. school, work, library, etc.) are also a great way for people to
gather information about your identity. Beware of keyloggers and malware!
Keep in mind: That when you use public computers you
should disable the “remember me” feature for your passwords, if not you could
be granting access to your information to the next person if you forget to log
out.
Social media is a great tool for both business and pleasure
and if used appropriately can be an effective way to communicate with larger
audiences in smaller crowds. Utilizing social media is a near necessity if your
business is to succeed nowadays, which makes it even more important to protect
yourself and your business from people who might want to harm it.
References:
Pegoraro, R. (2014, January 6). You Better Watch
Out: How to Set Up Your Facebook the Secure Way. Retrieved from Yahoo!
Tech:
https://www.yahoo.com/tech/you-better-watch-out-how-to-set-up-your-facebook-70505754667.html
Stevens, A. (2012, June 20). NLRB’S General Counsel
Releases New Social Media Report Containing Much Needed Guidance on Lawful
Social Media Policies. Retrieved from Social Media Law Brief:
http://blogs.haynesboone.com/index.php/2012/06/firm/some/nlrbs-general-counsel-releases-new-social-media-report-containing-much-needed-guidance-on-lawful-social-media-policies/
Rhianna,
ReplyDeleteThis was an insightful post. Regarding privacy and security, I like your point about mobile hotspots being a "danger zone." It was only several years ago when I was at Starbucks and mistakenly surfed a site with some of my sensitive information on it. The result was someone hacked into my computer. I noticed suspicious activity and called the company I knew they were trying to hack on my computer. They were able to thwart any attempts to use my information illegally.
A recent case study from Ireland shows the vulnerability present in many mobile hotspots. "Murphy’s IT security firm, Smarttech.ie, selected 10 random hotels around Dublin, and analyzed their WiFi networks. What they found was unsettling. Murphy claims that even a novice hacker would be able to easily hack into these hotel networks and steal everything from email passwords and credit card numbers to social media passwords for any guests using the network" (Howe, 2014).
This reveals a very prevalent security threat to many personal users on social media that utilize mobile wireless spots across the world.
Have you ever been the victim of identity theft, or do you know of someone close to you that it has impacted?
References:
Howe, J. (2014, February 19). Ireland’s No. 1 Tech Site Warns About the Dangers of Public WiFi. Retrieved February 26, 2014, from PrivateWiFi website: https://www.privatewifi.com/ireland%E2%80%99s-no-1-tech-site-warns-about-the-dangers-of-public-wifi/
Hi Issac,
DeleteThank you for commenting on Rhiana blog. Privacy and security has become an increasingly important topic with the emergence of social media. We are putting information on these sites and trusting that they stay protected. As we have read during these weeks readings making accounts private, not providing too much information, not disclosing location are some of the things we can do to protect ourselves from identity theft and other things that can happen with the release of this data. Issac I too have been hacked a couple of times. Last week someone hacked into my twitter and started posting weird tweets on my site. Luckily this was caught by the twitter site as well as myself and my account was only compromised for only an hour.
Here is an interesting article that you can read that covers points on how to protect your identity:
http://www.npr.org/blogs/alltechconsidered/2012/08/10/158505688/simple-ways-to-avoid-being-hacked
After reviewing your article “ Murphy claims that even a novice hacker would be able to easily hack into hotel networks and steal everything from email passwords and credit card numbers to social media passwords for any guests using the network" (Howe, 2014). I have noticed how insecure these hot spots really are and try to prevent much activity through these hot spots as possible. While traveling I try to only complete tasks that are business related and that require immediate attention. Luckily I personally have not been impacted by identity theft per say but I have experienced getting hacked and it hasn’t been fun. I have had to change all my email passwords and social media platforms when this occurred. I have known people who have been hacked and it was a nightmare for them. My boss had his credit card info compromised and noticed being billed for 20k of airline tickets.
References:
Howe, J. (2014, February 19). Ireland’s No. 1 Tech Site Warns About the Dangers of Public WiFi. Retrieved February 26, 2014, from PrivateWiFi website: https://www.privatewifi.com/ireland%E2%80%99s-no-1-tech-site-warns-about-the-dangers-of-public-wifi/
Hey there Isaac,
DeleteI too, know what it feels like to have my information compromised. I was recently reading this article about how people are not only able to access your information via Wi-Fi connections, they are also able to put virus' into the network and infect any computer that decides to use the hot spot point. I have posted this article to one of our classmates blog pages but here is the link. I thought this article really shows just how vulnerable we are.
Here it is:
http://rt.com/news/chameleon-virus-wireless-threat-828/
HI Rhianna,
ReplyDeleteIt is so true that when asked about personal information we feel compiled to respond. So I loved the reminder that “you’re under no obligation to provide most of it,” and probably should not. (Pegoraro, 2014) That is so interesting because if we were asked on the streets to provide private information we would not do it yet online we feel a false sense of security.
Another item that came to mind after I completed the checklist was to never open links without checking the source of the links first. Viruses can send out e-mails using our contact lists and they normally include executables that collect information from your machine and than send it out. I felt victim to that once. I was waiting from an e-mail from a cousin and when he sent me a note I clicked on it just to find out that the e-mail had an executable that got planted on my machine. It took me 3 hours to clean my machine.. Similar question as Isaac's, have you ever experienced a virus in your computer or a machine crash due to a virus planted on your computer? Social media has made it easier for virus to travel. What actions do you recommend to avoid getting a virus?
Thank You and great job!!!!
Ana
Pegoraro, R. (2014, January 6). You Better Watch Out: How to Set Up Your Facebook the Secure Way. Retrieved from Yahoo! Tech: https://www.yahoo.com/tech/you-better-watch-out-how-to-set-up-your-facebook-70505754667.html
Ana,
DeleteI am definitely reluctant to give out any personal information due to the identity theft that has taken place over the last few years. As Pegoraro states “you’re under no obligation to provide most of it,” and probably should not. (Pegoraro, 2014). Online information is the worst as once it is leaked it gets sent out to multiple spammers who will clog your mailbox and make your life hell. Lot of spammers are sending out links with viruses that people are opening and this causes your computer to be infected.
I have also fell victim to this, as my contact list started receiving emails due to me clicking on a link. It took me days to have this one activity resolved. After reviewing this article from Techpublic, some ways to avoid viruses and spyware are, Install quality antivirus, install realtime anti spyware protection, keep anti malware applications current, perform daily scans, disable autorun,don’t click on email links or attachments … (Eckel, E). To read the complete list please goes to the following article:
http://www.techrepublic.com/blog/10-things/10-ways-to-avoid-viruses-and-spyware/
I would love to hear your feedback on if you follow any of these 10 steps to prevent viruses.
Reference:
Eckel, E. (2009, June 19). 10 ways to avoid viruses and spyware. TechRepublic. Retrieved March 1, 2014, from http://www.techrepublic.com/blog/10-things/10-ways-to-avoid-viruses-and-spyware/
Pegoraro, R. (2014, January 6). You Better Watch Out: How to Set Up Your Facebook the Secure Way. Retrieved from Yahoo! Tech: https://www.yahoo.com/tech/you-better-watch-out-how-to-set-up-your-facebook-70505754667.html
Thanks
Saurav
Ana,
DeleteThank you for your response and input! I myself am very (very!) hesitant when it comes to links and knowingly sharing my information online (or anywhere.) What I do to avoid a lot of the trouble that comes with surfing the web and clicking virus ridden links is:
1) Scan my computer twice a week. I have this on an automated schedule so I do not have to think about it.
2) I make sure my software is up to date. I check my anti-virus' site for any updates because hackers are always changing there codes.
3) I only use my computer for work/school related activities. I, unlike many people, do not feel the need to constantly be in front of my computer. If I am looking at articles I found on social media I more often use my phone to browse and when I am done I close the application (not just click out.)
Then again, I have had the horrible luxury of destroying two computers before I learned my lesson. Now, online security is extremely important to me. This week's discussion has showed me that I have much left to learn and that just as the world of marketing communications is always changing, so to is the world on network security.
Rhiana,
ReplyDeleteThank you for your initial post this week. Your post touched on a lot of different points in regards to the type of things to consider when developing and maintaining your online presence. Your layout was well done with pictures and the spacing was good and the readability of the blog is well done. In maintaining your online presence I believe making all your accounts private has its pros and cons. Obviously the pros are keeping information private and only viewable by people you know, which protects your security.
However there is a con to this as well. If you are trying to get discovered whether it be to find a job or to build some kind of professional relationship and get discovered this option will make it very difficult for you. Providing too much information is always a security concern. I always like to compare this to leaving your front door open. Birthdays, phone numbers and or any information that could be used to steal your identity is dangerous. Please review the article below and give me your thoughts on the different types of identity theft that took place.
Identity Theft Article:
http://www.huffingtonpost.com/tag/social-media-identity-theft
Location services are becoming a huge issue. One of our Team member Brianna Redline made great point to this on her blog. Giving away your location by using such platforms as foursquare is dangerous. Imagine someone reading your facebook knows exactly where you are and then decides to do something bad to you. The thought of that happening and you allowing that is very dangerous.
Great point on the fact that you are not alone in the world Retweets, tags and the ability to repost topics onto other timelines creates more issues regarding location.Lastly but not least password protection are key. Passwords must be complex and must be changed on a daily basis. They must be made in such a complex way that it is very difficult for hackers to tap into your account. Once your account has been hacked, you are prone to more attacks as well as your information being leaked across the internet.
Overall great job Rhiana. Please keeps the conversation going by reviewing the identity theft article and proving your take on how to prevent these types of actions from taking place. Put yourself in their shoes, what would you do?
Thanks,
Saurav
Hi Rhiana,
ReplyDeleteGreat post! I love your blog's layout and design as well. I like the bullet you included: 'Location, Location, Location'. you often hear the saying, "It's all about location" and that it is. Like you said, some people aren't even aware that their smart devices are leaking their exact GPS location. From 2007 to 2013 I had an iPhone. Last year I switched to a Samsung and one of the things that I like about the Samsung is that it has a top notification bar and just yesterday I was posting something to a social network and under my post it read, "Are you posting from Jersey City, NJ?". It was then that I noticed at the top notification bar that my phone's GPS had kicked on and I immediately turned that feature off.
I thought it was interesting that in the DoD module that the professor instructed us to go through talked about how the pictures that are taken with our smart phones have a geographical tag attached to them. To you and I this may mean nothing, but to a professional hacker this could mean a lot. You never know what people are capable of so it's always best to veer on the side of caution.
If you haven't had the opportunity to yet, I urge you to hop over to my blog and take a look at the video I included at the end. The video shows prankster Jake Vale approaching people that he found on Twitter that were close to his location using geotracking. He knew people's names, birthdates, the names of their dogs, etc. Needless to say most people were shocked and dumbfounded. http://dc4sm.blogspot.com
Rhiana,
ReplyDeleteI love you point that you are not alone in the world. Tagging can be a social users worst enemy, whether it come from a personal or professional standpoint. I have found myself relating back to personal branding during this week's conversation, more or less from a privacy issue rather than security.
For instance, if you take a 'sick' day from work, but your sister tags you at the mall with her, now (based on your own account settings) all of your network can see the post. If you are in a network where your boss is a part of, you now are exposed. This example shows how while the content is not your own, how damaging it could be for you to not know what is being said about you on social media.
From an organizational perspective, I encourage you to check out this blog: http://blog.kissmetrics.com/social-media-can-destroy/ where it discusses several instances of bad social media management, including tagging and personal branding.
Do you feel that adding tags, whether it be a person, location, photo etc. if a smart move for social media users? How could we educate those to understand the positive and negative effects of these features?
Hey Brianna,
DeleteThank you for posting! The link you posted was not only insightful but accurately portrayed what I see everyday in my social media feeds. It has become almost instinct to not only tag other people but tag yourself. I have caught a couple of my friends stepping on their own feet in the same way as you had mentioned.
I feel for a professional user, tagging can be helpful if it remains in a professional capacity but the same can be said for the use of social media overall. As far as educating social media users on the positive and negative effects of these features, teaching them about proper 'tagging' etiquette would be the first place to start. Placing limits on who could tag you on certain sites might also be a good deterrent of negative tagging similar to how Twitter's privacy feature does not allow people to retweet your comments. What are your thoughts?
Hey Damaris,
ReplyDeleteI visited your blog and must say the layout is very impressive. It catches the eye of readers and keeps them engaged in the content. While reading your post I did some research of my own and found that if you following these important steps your location will be more secure
Check your smartphone’s settings and change the geotagging capability.
Double check your privacy settings on all social media sites, including Flickr and Picasa.
Use geotag-specific Internet security software to help you manage your digital, multimedia life.
Inventory the photos you’ve already uploaded and take steps to de-tag them.
Prioritize these steps for children and teens.
To find out more please read the following article at:
http://www.webroot.com/us/en/home/resources/articles/mobile-security/mobile-tag-youre-it-are-geolocation-services-making-a-cybercase-out-of-you
References:
http://www.webroot.com/us/en/home/resources/articles/mobile-security/mobile-tag-youre-it-are-geolocation-services-making-a-cybercase-out-of-you