{"id":7756,"date":"2017-01-18T08:51:00","date_gmt":"2017-01-18T08:51:00","guid":{"rendered":"https:\/\/www.centsys.co.za\/social-media-and-security-what-are-the-risks\/"},"modified":"2017-01-18T08:51:00","modified_gmt":"2017-01-18T08:51:00","slug":"social-media-and-security-what-are-the-risks","status":"publish","type":"post","link":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/","title":{"rendered":"Social Media and Security: What are the Risks?"},"content":{"rendered":"<p><a style=\"clear: right; float: right; margin-bottom: 1em; margin-left: 1em;\" href=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Social-2Bmedia-2Bsecurity.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Social-2Bmedia-2Bsecurity-300x188.jpg\" width=\"400\" height=\"250\" border=\"0\" \/><\/a>Social networking sites such as <b>Facebook<\/b> and its great granddaddy<b> MySpace <\/b>have created a veritable microcosm of peer-to-peer interactions, marketing and entertainment. What started out as a simple means for people to reconnect with school friends and faraway family members has to some extent spawned an entirely new reality that is, in many respects, a far cry from the pre-social media days.<\/p>\n<p>This dramatic shift in our experience of social reality can be seen as an important part of the ongoing process of <b>globalisation,<\/b> the wave of digital \u201coneness\u201d sweeping the globe and leaving blurred \u2013 or even completely erased \u2013 cultural, socio-political and geographical lines in its wake.<\/p>\n<p><b>But where has this Brave New World left us from a personal security perspective?<\/b> What new challenges has the <b>Information Age<\/b> wrought, and what can we do to better safeguard ourselves and our loved ones against this new generation of tech-savvy criminals?<\/p>\n<p>Let\u2019s find out.<\/p>\n<p><b>Don\u2019t share your password<\/b><\/p>\n<p>As we mentioned earlier, social media has created a completely new world and, to all intents and purposes, your password is your key into that world. You wouldn\u2019t go around lending out the key to your home all willy-nilly, and your social media accounts\u2019 passwords should be treated with equal care and respect.<\/p>\n<p>Letting your password land up in the wrong hands can be absolutely ruinous; from having your <b>online reputation<\/b> tarnished to falling victim to fraud, ensure that the fidelity of your social media passwords remains intact. \u00a0Cyber-security experts also recommend using a<b> phrase<\/b> rather than a single word or thought as your social media password.<\/p>\n<p><b>Understand Facebook\u2019s security settings<\/b><\/p>\n<p>Those settings exist for a reason, and it\u2019s important that you and your family members are completely <i>au fait <\/i>with them.<\/p>\n<p>To access and configure Facebook\u2019s security settings, click on the little down arrow next to the lock icon, which can be found in the top right-hand corner of your screen:<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Capture-2B3.png\"><img decoding=\"async\" src=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Capture-2B3.png\" border=\"0\" \/><\/a><\/div>\n<p>This will produce a drop-down menu. Click on <i>Settings<\/i>:<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Capture-2B1.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Capture-2B1-191x300.png\" width=\"204\" height=\"320\" border=\"0\" \/><\/a><\/div>\n<p>You\u2019ll now be taken to Facebook\u2019s <i>General Settings<\/i> menu, with more options on the right-hand side. Click on <i>Security<\/i>:<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Capture-2B2.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Capture-2B2-300x164.png\" width=\"640\" height=\"348\" border=\"0\" \/><\/a><\/div>\n<p>From this screen, you\u2019ll be able to edit your security preferences and create a more secure social media environment.<\/p>\n<p><b>If you have kids, know what they\u2019re getting up to online<\/b><\/p>\n<p>For all its benefits, social media has sadly also become a rich hunting ground for predators who exploit the relative anonymity of cyberspace for their own nefarious purposes. We are not advocating spying on your kids, but we certainly encourage sitting down with them and having an open discussion about the dangers of social media. The more you educate them, the more you\u2019ll be able to allay your own feelings regarding these platforms. Empower your children to be better, more security-conscious social media users.<\/p>\n<p><b>Be wary of advertising your absence from home<\/b><\/p>\n<p>Though I have not yet been able to establish the validity of this report, there have been rumours doing the rounds regarding insurance firms overseas not paying out claims when it was discovered that the claimant had posted about his or her holiday on social media. While these claims have, in all likelihood, been greatly exaggerated, it is certainly wise not to be too specific about the dates during which one intends to be out of town. Social media wouldn\u2019t be social media without holidaymakers showing off their idyllic lifestyles, but we recommend that users <b>avoid posting specifics<\/b> that could leave things back home vulnerable.<\/p>\n<p><b>Don\u2019t publish your home address<\/b><\/p>\n<p>This one may seem patently obvious, but you don\u2019t want strangers knowing where you live.<\/p>\n<p><b>Use a secure protocol when accessing social media sites<\/b><\/p>\n<p>You may know the \u201c<b>https<\/b>\u201d prefix from accessing your online banking profile, but chances are you haven\u2019t given much thought to what it means. The \u201cs\u201d, as you\u2019ve probably guessed by now, stands for \u201c<b>secure<\/b>\u201d and the presence of this protocol essentially means that the website you are visiting has been given an extra security layer to help safeguard against malicious online behaviour such as phishing.<\/p>\n<p>The security protocol ensures that communication over the website is encrypted and that private information is kept, well, private. The majority of social media sites natively encrypt communication but, if you don\u2019t see \u201chttps\u201d in front of the URL, you can (and should) manually enter it.<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Capture.png\"><img decoding=\"async\" src=\"https:\/\/www.centsys.co.za\/\/wp-content\/uploads\/2017\/01\/Capture.png\" border=\"0\" \/><\/a><\/div>\n<p><b>Not all \u201cfriends\u201d are friendly<\/b><\/p>\n<p>We all receive friend requests every now and again from people we don\u2019t know and, in the majority of cases, it\u2019s a completely harmless gesture. Someone spots your profile under \u201cPeople you may know\u201d and decides to add you. No harm, no foul.<\/p>\n<p>But, just like in the corporeal world, there are those individuals who have intentions far more diabolic than merely \u201cliking\u201d pictures of your cat.<\/p>\n<p>According to the <b>National Cyber Security Alliance<\/b>\u2019s <a href=\"https:\/\/staysafeonline.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stay Safe Online<\/a> website, just because it\u2019s fun to create a large pool of friends \u201cdoesn\u2019t mean that all friends are created equal\u201d.<\/p>\n<p>The website recommends \u201c[using] tools to manage the information you share with friends in different groups or even [having] multiple page. If you\u2019re trying to create a public persona as a blogger or expert, create an open profile or \u2018fan\u2019 page that encourages broad participation and limits personal information\u201d.<\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Social networking sites such as Facebook and its great granddaddy MySpace have created a veritable microcosm of peer-to-peer interactions, marketing and entertainment. What started out as a simple means for people to reconnect with school friends and faraway family members has to some extent spawned an entirely new reality that is, in many respects, a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":7872,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_joinchat":[],"footnotes":""},"categories":[50,172,178,206,218,222,243],"tags":[],"class_list":["post-7756","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-centurion-systems","category-online-security","category-personal-security","category-security","category-social-media","category-stay-safe-online","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Social Media and Security: What are the Risks? - Centurion Systems French<\/title>\r\n<meta name=\"description\" content=\"Where has this Brave New World left us from a personal security perspective? Let&#039;s take a closer look at social media and your security\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Social Media and Security: What are the Risks? - Centurion Systems French\" \/>\r\n<meta property=\"og:description\" content=\"Where has this Brave New World left us from a personal security perspective? Let&#039;s take a closer look at social media and your security\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Centurion Systems French\" \/>\r\n<meta property=\"article:published_time\" content=\"2017-01-18T08:51:00+00:00\" \/>\r\n<meta name=\"author\" content=\"Eddie\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eddie\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/\"},\"author\":{\"name\":\"Eddie\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"headline\":\"Social Media and Security: What are the Risks?\",\"datePublished\":\"2017-01-18T08:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/\"},\"wordCount\":896,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"centurion systems\",\"online security\",\"personal security\",\"security\",\"social media\",\"stay safe online\",\"Uncategorized\"],\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/\",\"name\":\"Social Media and Security: What are the Risks? - Centurion Systems French\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2017-01-18T08:51:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\"},\"description\":\"Where has this Brave New World left us from a personal security perspective? Let's take a closer look at social media and your security\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/#breadcrumb\"},\"inLanguage\":\"en-ZA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/social-media-and-security-what-are-the-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Media and Security: What are the Risks?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/\",\"name\":\"Centurion Systems French\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-ZA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/#\\\/schema\\\/person\\\/c355edff49bbe36c125a1888a740b883\",\"name\":\"Eddie\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-ZA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g\",\"caption\":\"Eddie\"},\"sameAs\":[\"http:\\\/\\\/www.centsys.com\\\/fr\"],\"url\":\"https:\\\/\\\/www.centsys.com\\\/fr\\\/author\\\/eddie\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Media and Security: What are the Risks? - Centurion Systems French","description":"Where has this Brave New World left us from a personal security perspective? Let's take a closer look at social media and your security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/","og_locale":"en_US","og_type":"article","og_title":"Social Media and Security: What are the Risks? - Centurion Systems French","og_description":"Where has this Brave New World left us from a personal security perspective? Let's take a closer look at social media and your security","og_url":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/","og_site_name":"Centurion Systems French","article_published_time":"2017-01-18T08:51:00+00:00","author":"Eddie","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eddie","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/#article","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/"},"author":{"name":"Eddie","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"headline":"Social Media and Security: What are the Risks?","datePublished":"2017-01-18T08:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/"},"wordCount":896,"commentCount":0,"image":{"@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/#primaryimage"},"thumbnailUrl":"","articleSection":["centurion systems","online security","personal security","security","social media","stay safe online","Uncategorized"],"inLanguage":"en-ZA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/","url":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/","name":"Social Media and Security: What are the Risks? - Centurion Systems French","isPartOf":{"@id":"https:\/\/www.centsys.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/#primaryimage"},"image":{"@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/#primaryimage"},"thumbnailUrl":"","datePublished":"2017-01-18T08:51:00+00:00","author":{"@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883"},"description":"Where has this Brave New World left us from a personal security perspective? Let's take a closer look at social media and your security","breadcrumb":{"@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.centsys.com\/fr\/social-media-and-security-what-are-the-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.centsys.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Social Media and Security: What are the Risks?"}]},{"@type":"WebSite","@id":"https:\/\/www.centsys.com\/fr\/#website","url":"https:\/\/www.centsys.com\/fr\/","name":"Centurion Systems French","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.centsys.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Person","@id":"https:\/\/www.centsys.com\/fr\/#\/schema\/person\/c355edff49bbe36c125a1888a740b883","name":"Eddie","image":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b90eb89503dcfa752b0858d62f9fcb623a33c76ccbd8f326fe3afee6ce2a912?s=96&d=mm&r=g","caption":"Eddie"},"sameAs":["http:\/\/www.centsys.com\/fr"],"url":"https:\/\/www.centsys.com\/fr\/author\/eddie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/7756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/comments?post=7756"}],"version-history":[{"count":0,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/posts\/7756\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/media?parent=7756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/categories?post=7756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.centsys.com\/fr\/wp-json\/wp\/v2\/tags?post=7756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}