Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Staying CyberSafe on Social Media
    Cyber Security Awareness Month Tip

    Staying CyberSafe on Social Media

    By Sabina PerezOctober 6, 20212 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Almost everyone you know has at least one social media account. It is critical to understand how to stay safe while you like, post, or interact with platforms such as Instagram, TikTok, LinkedIn, and Twitter. Users must be aware of what they put up on these sites, how much information they give out, and their security and privacy settings.

    Here are some tips on ways you can protect your information and social media accounts:

    1. Always make sure your devices are upgraded with the most recent release of security software, operating systems, and web browsers.
    2. Be cautious with how much information you post onto your accounts. Avoid posting addresses, phone numbers, and other identifying information. What you post can be used by cybercriminals to target you.
    3. Do not be afraid to report activity you find suspicious or harassing. Cyberbullying should not be overlooked and social media platforms should be informed if it is occurring on their site. 

    4. Double-check what you are sharing because after posting it, the “Delete” button might not be enough to take it off of others’ devices. People could have already viewed the post or saved it without your knowledge.


    5. Pay attention to your security and privacy settings. Make sure you set your account settings to a level of sharing you are comfortable with. This includes the public/private status of your account and location permissions (Geotagging).


    6. Only allow people you trust and know to follow your accounts. Be cautious of suspicious follow requests or direct messages. Accepting a malicious message or follower can lead you to become a victim of an internet scam or phishing attempt. 

    Source: CISA.gov

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Security Awareness
    Previous ArticleHow To Recognize An Internet Scam And What You Can Do To Protect Yourself
    Next Article Creating a Strong Password

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d