pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

What to do if Your Social Media Data is Leaked

Social media data breaches are escalating. Last month, a company called Risk Based Security discovered a breach that exposed 350,000 social media users.

Social networks are the biggest target these days and many users are affected each time. Only six attacks have caused 56% of all social media breaches.

Preparing for the Inevitable – Social Media Data Breaches Are on the Rise

If you follow the news, you may be aware of a lot of data leaks and breaches. The reasons these can happen can vary a lot, but many of them are the result of hacker’s attacks. Data leaks can have important consequences for the public, such as fraud and identity theft. The severity of these consequences depends on the place in which the leak happened and how sensitive is the information you stored there. While most social media platforms have certain privacy settings that you can manage, most of what you share with them is public. Also, most social media platforms clearly state in their terms of use that they can share and use your information. However, social media data can also be subjected to leaks. In March 2019, Facebook acknowledged a massive security breach in which it failed to properly protect user passwords.

First Steps

If you believe your personal information was leaked, start by running a background check on yourself. Visit https://checkpeople.com and run a search on your name. Pay attention to anything that’s out of the ordinary (for example, social media accounts that you have not created, or a home address that you don’t recognize).  The good thing about a simple online background check is that it will buy you valuable time (visit https://www.sterlingcheck.com/services/fingerprinting/ for more info). For example, Facebook took almost three months to notify its users about the security breach, a very long time in which other accounts could be hacked too.

Verify Other Accounts

Start by changing all your passwords, and check for any unusual activity (verify, for example, the “sent” folder on your email accounts). Immediately check your bank statements and look for any unrecognized purchase. Cybercriminals can start with very small amounts to avoid triggering alarms. If your bank offers the possibility, ask to get a message for every transaction. If you believe you are a victim of identity theft, it is important to report it. You can do it here.

Check your Mailbox

Missing mail is an important red flag, as is unrecognized mail. Are you suddenly getting a new bank statement? Have your utility bills disappeared? Follow through. Cancel any card or service that you did not order and notify providers about your concerns for identity theft.

Prevention is Key

Some education experts believe that cybersecurity training will become mandatory in middle school during the coming years. We all need to learn how to protect ourselves against cyber-attacks. A few things that you may do to keep your information safe are:

  1. Be mindful of what you share, and avoid personal details. You may think that sharing your pet’s name on social media is harmless, but data shows that pet names are one of the most commonly chosen security questions for online banking.
  2. Avoid using apps and services that use your social media credentials for logging in. Love that new face swap app? Read the tiny letters before using it. Some of these can store and even sell your information.
  3. Whenever possible, enable two-step authentication.
  4. Pay attention to your friend’s accounts. If you think that message is odd or weirdly worded, don’t click any links and notify them. The same goes for duplicate accounts.
  5. Use different passwords for each account, and make sure they are safe. You can find more information about secure passwords here.

If you allow your children to have social media accounts, it is very important to establish parental controls and monitor their interactions. Children are especially vulnerable to cyber threats, and it is very important to teach them how to keep their information safe. Remember that social media usage –and the internet in general– can pose important risks to children’s safety.

Remember that we all have a digital footprint and that it will remain attached to us for life. Be careful about sharing sensitive or important information via social media. While most networks invest a lot in security, most of what you share is still publicly visible. When you sign up to a social network (including dating sites), read all the information about how and where your information will be shared. Some of them give you the option to opt-out from certain lists that can put your information at risk. Use the internet responsibly, learn about cyber-security, and protect your right to privacy as much as you can.

Filed Under: Computer Security

Latest Articles

Creating Color

Creating colour accurately on paper has been one of the major areas of research in colour printing. Like monitors, printers closely position different amounts of key primary colours which, from a distance, merge to form any colour; this … [Read More...]

How to Use System Restore

What Is System Restore and Why You Should Use It Watch the video or just read the written guide [jwplayer config=player file=http://www.pctechguide.com/videos/system-restore-pctg.mp4 image=http://www.pctechguide.com/videos/system-restore-video.jpg] System Restore takes snapshots of your … [Read More...]

How to watch any online show from anywhere in the world

In these strange times, watching shows online is more important than ever. In March, a study found that Internet usage had increased 70% since the beginning of the pandemic. The demand for online streaming services rose even higher. Experts in the health and psychology fields have been pointing … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

WHAT IS CLOUD COMPUTING AND WHAT ARE ITS MAIN BENEFITS?

Users are Increasingly using cloud computing to store their information, which is replacing local storage. The business digitization process goes … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

DVD Multi-Writers

In 2001, the DVD Forum approved the first DVD Multi specification - covering all currently developed formats approved by the … [Read More...]

M-JPEG

JPEG is a well-known standard for compressing stills. Unlike MPEG, M-JPEG compresses and stores every frame rather than … [Read More...]

Object Oriented Programming 5

To illustrate putting together an object oriented (OO) class hierarchy design, let's take a look at a simple maze game. We'll be creating an OO … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors