May 2, 2025
Trending News

Seven tips to keep data safe on social networks

  • April 13, 2022
  • 0

Phishing is one of the main risks when not paying attention to security on social networks (Photo: Pixabay) It is important to pay attention to safety. social media

Phishing is one of the main risks when not paying attention to security on social networks (Photo: Pixabay)

It is important to pay attention to safety. social media to prevent the information described here from being used by cyber-attackers.. Criminals can use the exposed data and other oversight to perform a social engineering attack, which consists of collecting data that will then be used, for example, for phishing or identity theft.

In these cases, a fake site or app is created that pretends to be a known platform, so the user enters their access information there.

Cybercriminals sometimes steal identity over the phone with information obtained on social networks and other platforms: companies, banks, etc. They act as agents and persuade the user to give them their passwords and other confidential data. excuse: from the need to update information to the promise of benefiting them.

Here are some tips for staying safe on social media shared by Fortinet security experts:

1. Enable multi-factor authentication

It is a security measure that adds a layer of security to their social media accounts, platforms, and VPN profiles. In these cases, in addition to entering the password, the system requires the inclusion of a token received by another additional authentication factor, such as an SMS, application, or physical key.

2. Use new and different passwords for each account

This is important so that if an account is compromised, the hacked information is not used to access all profiles linked to that data. It can be helpful to use a password manager to have secure and different passwords for each site.

It is important to use different passwords on different accounts (Stock Vector)

3. Update security settings on all platforms regularly

Here it is important to have the knowledge to adjust the configuration of the sites to ensure that everyone is as protected as possible. Platforms often add options to strengthen the security of their sandboxes.

4. Limit connections

“Be selective about the types of people and organizations you connect with on social media platforms. Carefully review each link and don’t agree with any that seem disingenuous or suspicious.

5. Review networks to identify potential risks

This is important learn about security threatsmay affect regularly used sites, so take necessary precautions or install security patches released by affected companies.

6. Verify the authenticity of accounts

Beware of accounts on social networks that claim to belong to a financial institution, bank or other company. Sometimes, it is false profiles that try to steal information or obtain important data in order to later perform some type of attack.. If in doubt, it is best to contact the alleged person by phone, by entering the official site (web page from a search engine) or by any other means.

Experts too warn about a method named catfishingwhere one person takes information and images of another to create a false identity on a social media platform. This cat fisherman they often use this fake ID to trick the targeted people into contacting them or doing some kind of online business.

It is important to read about security threats that may affect the sites you use regularly and to take the necessary precautions (EFE/Sascha Steinbach)

7. Learn about phishing techniques

Once again, being informed is essential in the task of preventing any kind of computer attack.

“In a phishing attack, usually via an email or online message, The cybercriminal entices the potential victim(s) by trying to convince them to click on a malicious link or open a malicious attachment.. If an attacker uses social networks to engage with their target, it will be easier to build the necessary trust for them to click on malicious links or enter sensitive private information into an online form.

They also explain that attackers sometimes resort to urgency or curiosity to persuade the victim to pass on confidential information.


Source: Info Bae

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version