pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

What to do if Your Social Media Data is Leaked

Social media data breaches are escalating. Last month, a company called Risk Based Security discovered a breach that exposed 350,000 social media users.

Social networks are the biggest target these days and many users are affected each time. Only six attacks have caused 56% of all social media breaches.

Preparing for the Inevitable – Social Media Data Breaches Are on the Rise

If you follow the news, you may be aware of a lot of data leaks and breaches. The reasons these can happen can vary a lot, but many of them are the result of hacker’s attacks. Data leaks can have important consequences for the public, such as fraud and identity theft. The severity of these consequences depends on the place in which the leak happened and how sensitive is the information you stored there. While most social media platforms have certain privacy settings that you can manage, most of what you share with them is public. Also, most social media platforms clearly state in their terms of use that they can share and use your information. However, social media data can also be subjected to leaks. In March 2019, Facebook acknowledged a massive security breach in which it failed to properly protect user passwords.

First Steps

If you believe your personal information was leaked, start by running a background check on yourself. Visit https://checkpeople.com and run a search on your name. Pay attention to anything that’s out of the ordinary (for example, social media accounts that you have not created, or a home address that you don’t recognize).  The good thing about a simple online background check is that it will buy you valuable time (visit https://www.sterlingcheck.com/services/fingerprinting/ for more info). For example, Facebook took almost three months to notify its users about the security breach, a very long time in which other accounts could be hacked too.

Verify Other Accounts

Start by changing all your passwords, and check for any unusual activity (verify, for example, the “sent” folder on your email accounts). Immediately check your bank statements and look for any unrecognized purchase. Cybercriminals can start with very small amounts to avoid triggering alarms. If your bank offers the possibility, ask to get a message for every transaction. If you believe you are a victim of identity theft, it is important to report it. You can do it here.

Check your Mailbox

Missing mail is an important red flag, as is unrecognized mail. Are you suddenly getting a new bank statement? Have your utility bills disappeared? Follow through. Cancel any card or service that you did not order and notify providers about your concerns for identity theft.

Prevention is Key

Some education experts believe that cybersecurity training will become mandatory in middle school during the coming years. We all need to learn how to protect ourselves against cyber-attacks. A few things that you may do to keep your information safe are:

  1. Be mindful of what you share, and avoid personal details. You may think that sharing your pet’s name on social media is harmless, but data shows that pet names are one of the most commonly chosen security questions for online banking.
  2. Avoid using apps and services that use your social media credentials for logging in. Love that new face swap app? Read the tiny letters before using it. Some of these can store and even sell your information.
  3. Whenever possible, enable two-step authentication.
  4. Pay attention to your friend’s accounts. If you think that message is odd or weirdly worded, don’t click any links and notify them. The same goes for duplicate accounts.
  5. Use different passwords for each account, and make sure they are safe. You can find more information about secure passwords here.

If you allow your children to have social media accounts, it is very important to establish parental controls and monitor their interactions. Children are especially vulnerable to cyber threats, and it is very important to teach them how to keep their information safe. Remember that social media usage –and the internet in general– can pose important risks to children’s safety.

Remember that we all have a digital footprint and that it will remain attached to us for life. Be careful about sharing sensitive or important information via social media. While most networks invest a lot in security, most of what you share is still publicly visible. When you sign up to a social network (including dating sites), read all the information about how and where your information will be shared. Some of them give you the option to opt-out from certain lists that can put your information at risk. Use the internet responsibly, learn about cyber-security, and protect your right to privacy as much as you can.

Filed Under: Computer Security

Latest Articles

IT Security Rules for Small Business to Consider

IT Security is not just for big business. Small businesses are just as susceptible as their larger counter parts. In fact, there are times were they are more easily prayed upon by cyber criminals. Make sure your business is not prone to security failures by following these basic steps. Know Where … [Read More...]

Guide to SmartMedia cards, introduced as Solid State Floppy Disk Cards (SSFDC)

The SmartMedia memory card format was one of the earliest, introduced by Toshiba in 1995, when it was referred to as the Solid State Floppy Disk Card (SSFDC). It was launched shortly after the CompactFlash (CF) and of much the same size but a lot thinner, at 0.76mm rather … [Read More...]

Why Did No One Tell Drivers About This New Rule?

Do not pay your next car insurance bill until you read this… May - (2015): Your Current car insurance company doesn't want you to know this but as someone who loves to save money and someone who loves to share what they learn, I want you to know. The simple truth is car insurance rates are … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Digital Flat Panels

An important difference between CRT monitors and LCD panels is that the former require an analogue signal to produce a … [Read More...]

Outlook Express Backup

On the Tools menu, click Options. On the Maintenance tab, click Store Folder. Select the folder location and press CTRL+C to … [Read More...]

Search Engine Rankings for www.pctechguide.com

While the occasional favourable review can spur surges in visitor traffic, there's no denying the role played by Search Engines in achieving … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors