247 Detectives

Please Call NOW 0845 520 4121 / 07017 411 007

Please Call NOW 0845 520 4121 / 07017 411 007

Content Area 1

1st Call Detectives Blog

Get the latest information & news from the industry...

Archive +

Tags

Archive by Date

How to stay safe and secure when using social media

Virtually everyone spends some time every day on one of the many social media sites that have sprung up in recent years, keeping in touch with friends and making new ones. Although checking out what others in your social circle are up to can be a fun way to pass the time, there are those out there in social networking land who would do you harm, and for some, trolling and stalking innocent victims are favourite hobbies.

So, while Facebook, LinkedIn, Twitter, Instagram, Snapchat and others are a great way to stay connected, it’s important to be careful just how much personal information you give others ready access to. Here are some top tips on how to stay safe when socialising and networking in cyberspace.

Security and privacy settings

All social networking profiles have a facility that enables you to set your security and privacy settings. It’s important that you learn how to do this as these settings are designed to keep you safe while you’re using the site. Through these settings you can control who sees your posts and if necessary, you can block undesirables from accessing your profile and sending you messages.

Post in haste, repent at leisure

Never be in too much of a hurry to post something online, whether that be a simple message or a picture. 

It is especially important to be careful what you put online if you use social media accounts for business and for job applications. These days, one of the routine things recruiters do is to Google someone who is applying for a job and many well-qualified candidates have been passed over because of what they’ve posted online.

In a nutshell, keep your personal accounts personal and have separate social networking accounts for your professional life. The easiest way to do this is to have multiple online pages within the different social media platforms so that you can keep your personal persona clearly separate from your business one.

Protect your personal information

Always be very careful about exactly how much of your personal information you divulge on your social networking profiles. Unscrupulous hackers could use this information to carry out identity theft, data access and even online stalking or cyber bullying.

When you have a large pool of virtual ‘friends’, you can also create different ‘groups’, based on mutual interests, fan clubs etc. Remember that these people may come from many different backgrounds and they may not all be well known to you personally. Use the tools provided in your profiles to manage what personal information you share with members of groups you are a member of.

Be careful what images you post

One of the joys of social networking sites is that they allow you to post photos and images to share with your friends. However, before posting a picture, ask yourself what impression of you this image will present to others, especially if all your pictures can be viewed by a general audience. Even seemingly innocent images could be spotted by a potential online stalker, landing you in a world of pain, especially if you have also divulged your personal phone number in your profile.

In a similar vein, always ask before posting a picture of a friend and be especially wary of posting pictures of friends’ children without first obtaining their permission to do so. If someone asks you to remove a post or picture from your social media account, always do so immediately.

Keep your accounts secure

The best way to protect your online presence against hackers and cybercriminals is to make sure that you have the most up-to-date security software, operating system and web browser installed on your computer.

Make sure that all the passwords you have set for your social media accounts are long, strong, and different for every account you hold. When choosing passwords, use symbols, numbers, and a combination of lower and upper case letters to make potential hackers’ lives as difficult as possible.

Be alert for suspicious activity

One of the most devious and popular methods used by hackers to compromise your machine and to gain access to your personal information is to use online advertising, tweets or posts embedded with malware or viruses. Most of these ‘Trojan horses’ contain links that activate the malware when you click on them, so consign anything like this to your trash bin immediately without opening it.

In conclusion

Social media sites can provide a great tool that you can use to keep in touch with friends and family all around the world. Stay safe online by bearing in mind the tips given above.

For more helpful information on cyber security and how to keep your personal data secure online, get in touch [https://www.1stcalldetectives.com/get-in-touch.php] with the helpful experts at 1st Call Detectives. We have a new encryption certificate for customer security and privacy, ensuring you of the important right to privacy.

Leave a comment
Areas & Postcodes We Cover
  • NW7, NW9, NW4, NW11, NW2, NW10, NW6, NW3, NW8, NW5, NW1, N20, N12, N3, N2, N10, N6, N8, N19, N7, N1, N5, N4, N16, N15, N17, N18, N11, N14, N21, N9, N13, N22 
  • E4, E17, E18, E5, E10, E11, E8, E9, E2, E1, E14, E3, E16, E6, E13, E15, E7, E12, SW6, SW10, SW5, SW7, SW3, SW1, SW14, SW13, SW15, SW20, SW19, SW18, SW17, SW16, SW12, SW2, SW9, SW8, SW11, SW4
  • EC4, EC1, EC2, EC3, SE1, SE11, SE17, SE16, SE5, SE15, SE14, SE8, SE24, SE22, SE4, SE21, SE23, SE26, SE20, SE25, SE19, SE6, SE12, SE9, SE18, SE2, SE28, SE7, SE10, SE3, SE13 
  • W1P W1M W1N W1R W1S W1T W1U W1V W1W W1X W1Y W1K W1J W1H W1A W1B W1C W1D W1F W1G W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14
     
  • © All rights reserved 2014 '1st Call Detectives'
  • /
  • Website designed & devloped by evokeu