Improve online security by avoiding social media posts that undermine your data

We live in an age where we are constantly looking over our shoulders for malicious individuals who attempt to steal our private information. Online security has been under constant attack and data is being pulled from all possible sources. All with the aim of stealing your identity, your money or other forms of data treasure.

It can normally be assumed that it is the software and plugins that we download or the questionable websites that we visit that we have to fear the most. In many cases, this is true. However, sometimes a leak can also occur from some of the more common places you visit online every day. Some of these sources include social media.

Your social media accounts are full of personal information. Some of this information you offer openly in various profile fields covering your favorite foods, movies, and songs. Another way to extract this information is to use messages that seemingly innocently ask you for this information.

This last point is something that many don’t even understand. So the next time you come across a post on Facebook or any other network that asks you to participate in some sort of pun or “fill in the blank”, think about what they are asking. Often times, this is something you commonly use as a security question to recover an account somewhere (whether it’s another social network, or something more serious, like your bank accounts). Many times it will have something to do with your favorite movie or food. Some even ask you to fill in the blank with the name of your childhood friend. Are these variables starting to sound familiar to you?

So be careful what you fill in on your social profiles and be attentive to the messages you reply to. Your friends are probably not trying to phish your information. However, the account that started these chain posts may have nefarious intentions that you are unaware of. Even if they haven’t, any number of accounts involved can see this information, creating a vulnerability for the various accounts you have online.

This is another reason why users should consider using either 2FA (two-factor authentication) or MFA (multi-factor authentication) methods to secure accounts. Try not to rely on simple security questions that make someone guess the answer. Instead, consider using options like biometrics (fingerprints) or security keys, if a website or service offers support. This makes it much harder for someone to try and break into your accounts.

Source link

Previous Managing IT assets in a post-pandemic world
Next Securitize launches trading on the security token secondary market - Ledger Insights

No Comment

Leave a reply

Your email address will not be published. Required fields are marked *