Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Protecting Your Identity and Privacy on Social Media in 2024

Protecting Your Identity and Privacy on Social Media in 2024

Social media is constantly evolving, and if the big social networks had it their way, it would be the only place people go when they log onto the Internet. Whether you have strong feelings for or against social media, or perhaps you are indifferent, it’s important to understand how to protect yourself when using social media.

What are the Risks of Using Social Media?

For many, social media has replaced a lot of other types of media. Instead of going to news sites, some of us scroll through social media. Instead of reading blogs, we use social media. Communication and instant messaging? Social media. Entertainment? You get the idea. 

Some people spend a lot of time on Facebook, Twitter/X, Instagram, TikTok, and other social networks. There are countless benefits to using these platforms to communicate, share, and create content.

With all of this comes risk. Let’s take a look at some of the big risks that follow social media around:

  • Privacy issues and identity theft
  • Cyberbullying
  • Online and offline harassment
  • Exposure to inappropriate content and misinformation
  • Overuse and addiction
  • Mental health issues such as anxiety, depression, loneliness, and low self-esteem.

Many of us were the last generation to grow up without social media, and now we live in a world where there are adults who didn’t have a world without it. It’s really important that everyone has the tools and understanding to navigate this complicated paradigm. 

Social media isn’t inherently dangerous, but it comes with a lot of deep sinkholes and caveats that aren’t easy to solve. 

Let’s start with the easy stuff first—protecting your identity.

How to Protect Your Identity and Data on Social Media

Consider this step to be the technical safety lesson. It’s all about securing your social media accounts (and any other online account) to prevent data breaches.

If your social media accounts get hijacked, it’s extremely easy for a scammer to pretend they are you and attempt to scam your friends, family, and colleagues. For business owners and other professionals, there’s also a chance that your personal accounts are tied into your business pages, since that’s how some social networks like Facebook, Instagram, LinkedIn, and YouTube tend to work. If your personal account gets compromised, your business account could fall under that umbrella too.

Fortunately, the steps for securing your social media accounts is the same as virtually any other account.

Use Strong, Unique Passwords

You should never use the same password twice. Let’s say your Netflix password is the same as your Facebook password. If Netflix gets compromised (online entities are compromised all the time, often resulting in millions of usernames and passwords becoming publicized to cybercriminals) then the bad guys have access to your Facebook account and it’s just a matter of time before they get in and steal it from you.

Set Up Two-Factor Authentication

Often referred to as multi-factor authentication, 2FA, or MFA, this is where you are required to input a numerical code that’s either sent to your phone, email, or an authentication app in order to complete the sign-in process. This helps prove that you are who you say you are, as it’s less likely that a cybercriminal will have both your password AND access to your phone or email.

Review Your Security Settings

Most reputable platforms have an area where you can review your security settings to make sure your account is as locked down and secure as possible.

Facebook and Instagram: Log in and go here:
https://www.facebook.com/privacy/guide/security/
Then click the blue “Review your security settings” button.

Twitter/X: Log in and tap your profile picture, then Settings & Support, then tap Settings and privacy. Under Your account, make sure you have an active and up-to-date email address and phone number assigned to the account. Go back to Settings and privacy and tap Security and account access and review all of the options on that screen to ensure your account is secure and nothing you aren’t aware of has access to your account.

Google/Gmail/YouTube: Log in and go here:
https://myaccount.google.com/
Follow the prompts to Take a Privacy Checkup
Then, go here: https://myaccount.google.com/security-checkup
Review everything and ensure that 2-Step Verification is set up, and that accounts and services you aren’t aware of are not connected to your account (under Your third-party connections).

TikTok: From the app, tap the Profile icon on the bottom right, then swipe down to get to some settings, and click the Gear icon on the top right. That will take you to the Settings and privacy screen. Then tap Security & permissions and review all of the settings.

Most other online accounts like blogging platforms, video platforms, online games, and other communities should have similar options as these. Always be sure to check in every so often and review your security settings on these accounts.

Review Your Privacy Settings

Security settings control who or what has access to your account, and ensure that your account is safe and secure. Privacy settings control what information about you is shared out, and who can see it.

Before we dive in on how to manage privacy settings on social media, let’s talk about the easiest way to prevent oversharing online. Consider this a sort of unspoken Golden Rule of the Internet:

Don’t share stuff online that you wouldn’t want your grandmother, or a complete stranger, to see.

Yes, some social networks have pretty robust tools to allow you to control who can see what, but just as a general rule to make your life easier and a lot more secure, simply don’t put stuff on the Internet that you wouldn’t want the whole wide world to know.

How to Manage Your Privacy Settings on Most Social Media Sites

Facebook/Instagram: Log into Facebook and go here:
https://www.facebook.com/settings?tab=privacy
Facebook also has a step-by-step privacy checkup option here:
https://www.facebook.com/privacy/checkup/ 

Twitter/X: X doesn’t offer a lot in the way of privacy, and with constant shifts in what type of information is public and what isn’t, things will likely change as time goes on. If you want to lock down all of your tweets so only people you follow can see them, log in and tap your profile picture, then Settings & Support, then tap Settings and privacy, then Privacy and safety. Finally, tap on Audience and tagging. You can toggle Protect your posts, which will make it so only current followers and people you approve of in the future can see all of your posts, including past posts.

Tiktok: From the app, tap the Profile icon on the bottom right, then swipe down to get to some settings, and click the Gear icon on the top right. That will take you to the Settings and privacy screen. Then tap Privacy. From here you can determine what type of content and activity gets shared to others on the platform.

Don’t Share Your Location

Avoid posting and sharing information about your physical location on social media. That means posting your address, photos of the outside of your home, mail and documents that have your address, etc. 

It’s also a good idea to avoid posting about not being home. If you are on vacation, it means your home is empty and unguarded. If you go on vacation and want to post photos, save them for when you are back home!

This Just Scratches the Surface

There is a whole lot more to being safe online - what we’ve covered so far is just the technical side. We’re going to be talking about more ways to protect yourself and your loved ones in an upcoming blog post that will cover things like avoiding scams, misinformation, camera safety, and cultivating healthy social media habits.

How to Create Business Goals Designed for Success
Machine Learning Explained
 

Mobile? Grab this Article!

Qr Code

Tag Cloud

Technology Security Business Computing Best Practices Productivity Business Cloud Network Security Tip of the Week Data Software Managed IT Services Hackers IT Support Data Recovery Data Backup IT Services Innovation Efficiency Disaster Recovery Backup Privacy Hosted Solutions communications VoIP Small Business Hardware Malware Computer Cybersecurity Saving Money Email Mobile Devices Internet Phishing Collaboration Outsourced IT Business Continuity Cloud Computing Workplace Strategy User Tips Business Management Quick Tips Upgrade Microsoft Users Ransomware BDR Automation Information Technology Productivity Workplace Tips Compliance Smartphones Training Internet of Things Gadgets Smartphone IT Support Server Communication Remote Passwords Artificial Intelligence Current Events Risk Management Wi-Fi Mobile Device Employee-Employer Relationship Social Media BYOD Mobile Device Management Managed Service Provider Network Managed IT Mobility Managed IT services Budget Android Spam Meetings AI Covid-19 Google Save Money Wireless Password Networking Printers Human Resources Microsoft Office Avoiding Downtime Document Management Office Printing Information Managed Service Windows 7 Remote Workers VPN Remote Computing Chrome History Hosted Solution Windows Router Instant Messaging Encryption Firewall Content Filtering Computers Data Management Cost Management Windows 10 Project Management MSP Tech Term Monitoring Virtual Private Network Help Desk Time Management Remote Work Video Conferencing Laptop Marketing Recovery Telephone Systems Government End of Support Facebook Hacker Personal Information Hard Drives Solid State Drive Virtualization Battery Automobile Telephony Big Data Two-factor Authentication Audit Employer-Employee Relationship Value Saving Time Data Breach Data Storage Data Security Mobile Software as a Service Conferencing Redundancy Maintenance Devices Proactive Computing Wireless Internet Hybrid Cloud Business Technology IT Service Machine Learning Paperless Office Backup and Disaster Recovery Voice over Internet Protocol Mobile Office Manufacturing Customer Relationship Management Printer Managed Services Mobile Computing Proactive IT Social Engineering Transportation Going Green Browser Miscellaneous Applications Private Cloud Operating System iPhone Health Money Administration Colocation Windows 10 Advertising PDF Apps Legal Wireless Technology Flexibility Update Cybercrime Black Market Shadow IT Disaster Education Application Save Time Work/Life Balance Office 365 Antivirus Holiday Entertainment HIPAA Phone System Analytics Electronic Medical Records Cleaning Hacking Smart Technology Vendor Management Samsung Company Culture App SaaS Upgrades Vulnerability The Internet of Things Dark Web Nanotechnology OneNote Business Intelligence Managed IT Service Data Protection Commerce Regulation Professional Services Travel Word Apple User Error Data Loss File Sharing Storage Lifestyle Evernote Workers Spyware intranet Blockchain IoT Analysis Chromebook Smart Tech Connectivity Streaming Media Content Filter Management Financial Technology Gamification Students Unified Communications Remote Monitoring Wasting Money Amazon Virtual Assistant Alexa for Business WPA3 File Storage Bandwidth Vendor Telephone Utility Computing Payroll SMB Downtime E-Commerce Payment Cards Break/Fix e-waste Employees Smartwatch Development Azure Active Directory Windows Server Cybersecurty Window 10 Online Storage Fiber Optics Windows Server 2008 Copiers Voiceover Internet Protocol Business Telephone Computer Repair Troubleshooting CRM Workstations Outsource IT PCI DSS Regulations Compliance Cost Remote Working Leadership Bitcoin Finance Infrastructure Videoconferencing Streaming Customer Service Copier Authentication Hiring/Firing RMM Windows 11 Cabling Going Paperless Inventory Management Employer/Employee Relationships Outsourcing How To Microsoft Outlook Files Regulations Paperless Solutions Microsoft 365 Strategy Consulting Decision Making Ergonomics Signage Customer Experience Physical Security Robot Google Drive Alert Law Enforcement Reputation Social Relocation Search Internet Exlporer Text Messaging Office Tips HaaS Video Games Scalability Humor How To Best Practice USB Virtual Reality Managing Stress Point of Sale Identity Theft Worker Commute Politics Experience Music Books Safety Emergency Worker Scam Computer Accessories Charger Computer Care Unsupported Software Television Business Strategy WiFi Unified Threat Management Consultant Touchscreen Emails Webinar IT solutions Windows 10s Hard Disk Drive iOS Computer Fan Root Cause Analysis Augmented Reality CrashOverride Settings Screen Mirroring Cast HBO IT Management IT Solutions WIndows Server 2008 Patch Management Outlook Shortcut Excel Sync Adobe Licensing Tablets NFL Windows Ink Google Maps Google Docs Microsoft Excel Sports Cortana Legislation Comparison Specifications Sales Retail Gifts Credit Cards FAQ Wireless Charging WannaCry Updates Microsoft Word eWaste Device Security Tech Support Fraud Edge Ciminal IT budget Identities Language Virus Websites Data Theft App store Mobile Security Identity Data Privacy Hard Drive Google Assistant Twitter Computer Forensics Gmail PowerPoint Memory Financial Bring Your Own Device Testing Camera Projects Display Co-Managed Services Hyperlink Wasting Time Accessory Peripheral Access Control Admin Keyboard Shortcuts Security Cameras Employee 5G Medical IT YouTube OneDrive Sabotage PC Server Maintenance Investment ROI Windows Server 2008 R2 Micrsosoft Digital Signage Processor Benchmarks Myths Threats Scams Managed Services Provider Facebook Privacy eCommerce Holidays Inventory Communitications Hosted Desktop Smart Devices Keyboard Net Neutrality Internet Service Provider Workstation Telework Audits Solutions Policy Procedure Organization Innovations Reviews Biometrics Computer Tips Work Windows 8.1 Voice Supply Chain Environment Workplace Strategies Print Management Healthcare SSD Remote Management Telephone System Print Database 2FA Virtual Desktop Proactive Management eSignature Cyberattack Cameras Digital Cameras Mixed Reality Displays Stories