Category: Social Media

onlinesecure3Are you someone who runs a business and keeps a database of personal information for you customers or clients? Do you employ road warriors, tele-workers, contractors, suppliers and others to connect remotely into your database? Do you accept and recognize payments for your own matters and of your clients online?

If so, you, your business and your clients may be facing a daunting task to keep these information secure. The first thing that you can do as part of your tough task for security online, you must learn how to divide and conquer. A firewall, which is often conceived by many, is not meant for the internet and your network nowadays. This is because your staff or the entirety of your company stays active on social media. For more information regarding this post, go to the source.

Source: Naked Security

ReadingSocial Media doesn’t come with a rulebook so instead, mothers have come up with a manual that people in every age can use as a guide in navigating through social networking sites. According to the guide, in facebook, it is always commendable to observe politeness. Never start fights or join in with meaningless rants. And when you sign in to Twitter, one tip is to make friends and be sociable with others. One of the objectives of using twitter is to connect people, so being shy will do you no good. As for using Instagram, it is very important to filter your photos before deciding to post them to the world.

Source: USA Today


Facebook256The recent discovery of a Photo deleting bug roaming around Facebook has made users as well as its programmers worried about the system. The bug, which reportedly has been deleting photos and albums from Facebook effortlessly, all the hacker needs to do is to type the album ID and you could consider the pictures gone.

Recognized and reported by Laxman Muthiyah, Facebook has fixed the bug in as little as tow hours within two hours of the filed report and has given $12,000 dollars to the reporter as a reward for helping Facebook secure content and users.

Source: Deccan Chronicle

socialmediaHow much should an employer know about its employees? Should it reach the extent of allowing them to access the employees’ social media accounts?

State Rep. Charlie Davis of Webb, a lawmaker in the State of Missouri filed a bill to help employees protect their social media accounts from their employers. Once the law is reviewed and got to pass, no employees will be forced to give their employers their passwords and bosses cannot fire their subordinates who will refuse to provide their social media passwords – not unless they are under investigation. The law aims to protect the employees’ privacy.


CybersecurityCottonwood Heights, Utah – Just recently, a second threat at schools were found in the Canyons School District within the past couple of weeks. With that taking into place, law enforcement and school staff were put into action. Last Friday, one police officer saw a threat floating around on social media against Brighton High School.

In accordance with the incident, a parent named Tracey Tolley, received an email and a phone call. Spokesperson Jeff Haney of Canyons School District is looking forward to get past the rumor mill. For more information regarding this post, go to the source.

Source: Good4Utah

FacebookAs part of the National Cyber Security Awareness Month campaign, Facebook’s security experts released an infographic with tips that deals with securing logins and managing roles as well as mobile devices. Facebook, being one of the biggest social media network, has become one of the main targets of cyber criminals, scammers, hackers and identity thieves. Facebook understands that a breach into their platform would be such a big thing since it contains mostly personal information.

That’s why the company is encouraging their users to have a closer look into the infographic they have posted recently. This campaign is believed to continue along with cyber security awareness campaign. For more information on this post, go to the source.

Source: Marketing Land Sections

Today, social engineering is being used as one of the most effective tools or tactics to get into any firms database even if they have a state-of-the-art firewall and security system. No matter what businesses do to enhance their security online, social engineering still finds their way into bypassing any defense that they have to protect their database. With that in mind, you must be very careful in the things that you do online. According to IT experts, most security consultants can gain access to it whenever they do a penetration test, grabbing your company’s access cards and installing keystroke loggers. They generally find their way to your database. For more information regarding this post, go to the source.

Source: CSO Online

globe2If you think having an anti-virus or anti-malware installed on your computer completely eliminates your risk of compromising your personal information on social media sites, you’re wrong. Today, more people are committing the same mistakes on these sites like Facebook and Twitter. Since the potential traps on these sites are quite numerous, you should always be on the look out for the signups. More likely, the apps that you get from Facebook, you need to make sure that you keep only those that you’ve authorized, and remove the ones you didn’t. Want more out of this post? Go to the source.

Source: IT Pro Portal

Data And Social Media

socialmediaAny business that uses social media platforms could gain an advantage over their competitors if they would understand and engage with their audience well online. Now, many are wondering how they can establish frequency and style when it comes to a client-corporation interaction. According to IBM, analytics would work best for any entity or business. It’s a real world use of enormous data, defining how enterprises within the midmarket can extract certain values from any uncertain data. This typical study does highlight any phase that a big data goes through each time. To know more about this post, go to the source.

Source: CSO Online