The issue of social media users' social media has become big, as cyber attacks for theft of personal data are becoming more and more frequent. Meanwhile, social media features and settings are constantly changing, and users, in order to protect their personal information, need to regularly check their account security settings. As social media are many and different, this process can be complicated.
For this reason, ESET gathered in the following guide, basic steps that if users follow, they will be able to easily control the security of their social media accounts.
Social Media Settings for accessing the account
Initially, it is advisable to activate dual agent authentication features, now available from most social media tools. Many social media also show a list of devices that connect to the account, which should be checked for suspicious moves, and you can also enable alerts if a new connection is made. Finally, check the applications that you have granted access to your account on a regular basis, removing those that you no longer use.
Social Media Visibility of content and posts
An important security feature is who you grant permission to see your posts. There are certain elements of the profile that is necessarily public, such as image or username. Most sites, however, will allow you to keep your other information protected, allowing you to choose which audience and to what extent your content is visible. Even if you have chosen visibility only for a limited audience, it is good to remember that you are on an online platform and you have to pay close attention to the content you upload.
Social Media Contact information and location
Social media offers many communication options among users, such as instant messaging, email, phone, and postal address, which even may not even need to be typed when GPS / geolocation is enabled. For greater security, you can limit the visibility of your contact information, who can look for you, and of course, disable GPS.
Social Media Send messages and comments
Some social networking sites allow you to narrow down who can send you a message or who can comment on your posts. You can do this by choosing or blocking groups or specific users.
Social Media Photo and video tags
If you want to be able to approve whether other users can tag you in photos or videos, you need to enable this option. Typically, someone can tag you without the need for approval by your side by default.
Social Activity Monitor and Ads
Most sites - and not just social networking sites - use your activity tracking features to run personalized ads. Some social media offers the ability to customize the way or time of watching or the ads that appear.
Social Media Notifications
Alerts you receive from social websites can tell you when something unexpected and unwanted happens. At the same time, however, they may endanger you as it is essentially a "wave" of private information sent through an unencrypted channel, so they may eventually fall into the wrong hands. To protect your information, you can edit the format and methods of receiving notifications, even selecting the encryption if offered.
Social Media Automatic play
Content "running" is automatically used by malware to perform malicious actions. Turning off "auto-play" you will need to click each time to view the videos posted by the users, but at least you will have avoided the possibility that you may experience unpleasant surprises.