Showing posts with label phishing. Show all posts
Showing posts with label phishing. Show all posts

Wednesday, February 26, 2014

Social Media Self-Defense: Not just a war-time activity

The U.S. Government throughout World War II used a variety of methods to persuade its citizens to rally behind the war effort (Olson, 1998).  One of the most popular catch phrases of that era still applies in today's landscape of social media and networking:

Essarge loose lips poster

The great many benefits reaped through the advent of new technologies that are bringing our world closer and closer together by the minute come with inherent risks.  Without care and attention, every user of social media puts at risk information that can be used and abused by others.  For that reason, social media security and social media policies must be vital elements of every effort to engage online, whether personal, professional or as an organization.

What do I mean by "Social Media Security" and "Social Media Policies"?

Let me give you my simple definitions of each of these:

  • Social media security is the state you achieve through the creation of habits that govern -- strictly in many cases -- what, when and how you engage with social media, what information you willingly provide and what other information you seek to protect.   Oh yes, you should also know that you never fully reach the "state" of security because the social media landscape is constantly changing and dangers, new and old, continue to surface and resurface.  But be vigilant, and as safe as possible.
  •  Social media policies are the doctrines, or codes, established by employers and other organizations that serve as guidelines for how those associated with the organization engage in social media engagement as that engagement relates to the practice of their professional responsibilities.

How can I keep my ship Afloat?

There are many, many ideas and tips available to help you surf social media with greater security.  Rather than write about some of the most often shared tips, I'd ask that you take a look at this fun little video from Toshiba.




Now that you have those basics in mind, let's get a little more granular:
  • We are what we Tweet...for all posterity:   Are you aware that the Library of Congress is archiving every Tweet emanating from a U.S.-based Twitter account?  In short, if you post it, consider it permanent.  
  • Secure your computer:  I'll also mention where the video above left off.  Make sure the machines you use have the latest and greatest software to protect you.  The Privacy Rights Clearinghouse gives some great information on firewalls, antivirus software and more.  
  • Use Bookmarks...or URL be sorry:  Don't go to your preferred social media services through email links or another website.  You could be entering your account name and password into a fake site where your personal information could be stolen. These types of phishing scams are everywhere.  Only use hyperlinks from sources you trust.  I hope you are growing more trustful of Liebling Realized, so I'll offer this hyperlink Information Security Buzz where you can read more about avoiding phishing scams.  
  • Take the time to add contacts:  Services like Facebook, Google+ and Klout are really persistent in asking you to link accounts so you can easily share contacts between services.  DON'T DO IT!  Once the sites have the information of your friends and peers, it falls under their terms of use, which could open up that network of contacts you've work so hard to develop to unsolicited marketing and promotions.  
  • Be mindful of location preferences:  GoogleMaps, OpenTable, FourSquare and other social
    media sites and applications can make use of the GPS location settings on your smartphone if you let them.  So, don't let them  (Thanks to John W. Tomac for the illustration below, which ties up my post pretty well).  You'll have to lose some of the conveniences these services provide for the sake of security, but it might be beneficial in the long run. 

Parting Shot

Are the benefits of social media and social networking vast for us personally and professionally?  Undoubtedly.  At the same time, an almost as vast set of risks can come into play.  Mitrano (2006) phrased this situation well, for me anyway: "New technologies alarm us for very real reasons but can and must be addressed in ways that do not crush innovation and fun" (p. 22). 

Hear, hear!  


References:
Mitrano, T. (Nov/Dec 2006). A wider world: Youth, privacy, and social networking technologies. EDUCAUSE Review, 41(6), pp. 18-28. Louisville, KY: EDUCAUSE.

Olson, T. (Feb 23 1998). Loose lips sink ships. Scholastic Update, 130(10), pp. 15-17. New York, NY: Scholastic, Inc.