5 parts of a secure social media policy

by | Dec 28, 2012 | Security

Security_Dec22_ASocial media has become incredibly popular, and users have come to expect that businesses have a presence on different services. If they don’t, they could be missing out on valuable ways to connect with their customers, current or otherwise. While social platforms are useful, there are some associated security issues that businesses should address through usage policies.

Here are five things you should integrate in a social media policy to ensure social media is conducted in a secure manner.

  • Log in using HTTPS – HTTPS is a type of transfer protocol that ensures the data is transferred in a more secure manner between networks. Many websites like Facebook, Google, etc. support HTTPS, and you should ensure that you use it. To use HTTPS, you simply put an S at the end of the usual http address in the URL bar of your browser. I.e., https://facebook.com will open a more secure version of Facebook. By using HTTPS you can eliminate Man-in-the-Middle attacks and other similar types of phishing.
  • Don’t share personal information – This might seem like a no-brainer to some, but there are still users out there who love to share their personal information. It’s important to remember that social media is all about being social. Most information you share can be viewed by others. The last thing you want is a hacker getting a hold of all of your contact info, etc. It’s a good idea to limit your contact information and never give it out over social media.
  • Update privacy settings – Social media sites, and the companies who run them, love to tinker with security settings on a fairly regular basis. This has led to a number of users being caught unaware of their security settings. It’s a good idea to ensure that all of your profile information is private.
  • Watch what you click on – Take a look at any service and you’ll notice that the vast majority of content contains links. This is where hackers are starting to target, by placing malicious software connected to links, or hijacking accounts and sending links to users to get them to click on them. Tactics like these need to be highlighted, and you should tell your employees not to click on any suspicious links. If they receive links from friends that seem uncharacteristic, it’s a good idea to not click on them.
  • If you don’t know them, they aren’t your friend – Yes, social media is about connecting with people. However, when it comes to personal accounts, you should encourage your employees to be judicious in who they connect with. In general, if they don’t know the person who has just tried to add them to their network then it’s advisable not to do so.

The five tips above are just a few things you should include in a social media use policy in the office. It’s important to have a solid policy if you want to ensure that your network and data remain safe from potential threats from social media. Looking to learn more about safety and security of your networks? Contact us, we may be able to help.

Published with permission from TechAdvisory.org. Source.

Related Posts

What is a Network Security Assessment?

What is a Network Security Assessment?

A network security assessment is a vital process that reveals the secrets of evaluating and strengthening your network defenses. In today's interconnected world, where cyber threats lurk around every corner, understanding the concept and purpose of a network security...

Preventing Phishing Attacks with Managed IT Services

Preventing Phishing Attacks with Managed IT Services

Phishing attacks have risen recently as many businesses store sensitive data online. Studies show that three billion phishing emails get sent daily. One of the best ways of preventing phishing attacks is by investing in managed IT services, and you’ll see how....

Cybersecurity Best Practices of 2022

Cybersecurity Best Practices of 2022

Cybersecurity threats are becoming increasingly popular as businesses digitalize their operations, calling for cybersecurity best practices. According to Identity Theft Resource Center’s data breach report, data breaches increased from 1,108 in 2020 to 1,603 data...

FIND OUT WHAT YOUR BUSINESS SHOULD EXPECT TO PAY
FOR HOUSTON TECH SUPPORT

Give us a call and discover how great local IT services and computer support can be!