Twitter's Controversial Algorithm Changes: What They Mean for Your BusinessTwitter Vs. Facebook: Which One Is Better for Promoting Your Brand?3 Free Twitter Tools PR Pros Can't Live WithoutSocially Stephanie: Social Media for the Automotive Industry
Get Schooled by YouTubers: Content and Business StrategyHow to Build Your Brand on YouTube and Reach New CustomersThanks to Google, YouTube Is Now a Viable Channel in Any Social Media StrategyHow to Maximize Your YouTube Views and Subscribers [INFOGRAPHIC]
Technology & Data
New IBM Study Reveals 3 Key Characteristics of the Most Successful CompaniesTalking Strategy and Data with Shannon Lee of Precision StrategiesHarnessing Mobile Users: The Power of Big Data in Social AppsMinority Report: Confronting Privacy Issues in Big Data Gathering
- Tech & Innovation
- marketing automation
- Social Tools
- Small Business
- Social Organization
Recap from the First-Ever Employee Advocacy SummitFormer IBM Senior Advisors Launch Brands Rising to Build Employee Advocacy ProgramsPerformance and Risk Management Through Social Media TrainingEmployee Advocacy Summit: Advocate Stories from the Field
- Customer Service
Join us September 15th in Atlanta for The Employee Advocacy Summit and learn how to unleash the power of your employees.
Post your event here and we'll share it with our community. If one of our members is featured, we'll promote as well on their profile.
- Marketplace & Webinars
The SMT Marketplace
Your resource for exclusive content and insights from Social Media Today, and opportunities to reach our community of professionals.
The Social Business Book Club brings you books, discussions, and insights from today's to business thought leaders.
Join interactive talks and and panel discussions with leading thinkers and practitioners on social media and networked business, or browse the catalogue of recorded sessions - all completely free.
Reach Social Media Today's community of marketing and communications professionals in an editor-approved context with a native advertising package.
3 Security Risks You’re Taking Every Day While Using Social Media
Posted on July 22nd 2014
Social media is everywhere these days. What started as an amusing online pastime is now one of the main ways in which people communicate with one another.
However, as should be expected with over 2 billion people using a service, with the increased popularity of social media has also come increased risks. In fact, most people do not know just how much of a risk they are facing on social media every day. Here are three of the most common.
1. Phishing and Baiting
These are the terms that are used to describe an array of different techniques that hackers use to gain your personal information online. They will bait you using seemingly legitimate links and messages, and attempt to get you to enter sensitive information. One of the most common forms of phishing right now is called “click-jacking,” wherein cybercriminals will disguise their corrupted link underneath a legitimate one, so that you mistakenly click on theirs.
Malvertising is another common problem, where malicious links will be disguised as seemingly legitimate advertisements.
2. Weak Security
Many of the most common social networks have come under fire in recent years for their lax cyber security. Big name sites such as Facebook and Linkedin have been compromised, losing the personal information of many users to cybercriminals. Furthermore, the recently discovered Heartbleed bug highlighted the weak nature of many of the biggest websites around, despite what you may have previously thought. If hackers can gain access to a friend’s account, they will use it to steal that information, impersonate them, and then trick others into giving theirs.
The third big problem that social media users face is one of the biggest problems that faces anyone in any walk of life: human error. The whole nature of social media is one that encourages people to share everything. And anyone who is even a casual user of social media can tell you that oversharing is a common occurrence. Cybercriminals will use this to their advantage, and it is often the root of problems such as fraud.