Protect Yourself on Social Media

Social Network

Social Network

Nowadays, people are very fond of using social media as a means to interact with others and also to develop the business. Social media websites have become a powerful suggestion. People already know the power of social media and its presence has built a strong community. However, social media has been misused for evil things. What is social media? How to protect your identity from criminals online?

Social Media

What is meant by social media? Social media is online media where people can participate and share them online. This can be done via the web or mobile, and interactive technologies.

Some forms of social media such as forums, blogs, microblogging, wikis, podcasts, video, social networking and social bookmarking. Here are some famous examples of social media:

1. Blog / microblog
Example: Twitter, Blogger, WordPress
2. Wiki
Example: Wikipedia
3. Forum
Example: Kaskus
4. Video
Example: Youtube
5. Photo
Examples: Flickr, Picasa
6. Social networking
Example: Facebook
7. Social bookmarking
Example: Digg, Delicious, Reddit
8. Virtual game worlds
Example: World of Warcraft
9. Social virtual worlds
Example: Second Life

Using Social Media alert
In all of these social media, you are obliged to register first. Each registrant will not be verified in advance that all data entered is correct or not. Many people make fake profiles as others, but with a nefarious purpose. In other words, social media has no accountability.

Then you’ll open yourself to the community from all over the world. Bad and dangerous thing that can happen is the data and your habits will be misused in cyberspace. What should I do to protect your social media accounts of criminals online?

The hijacker is misusing the identity of the damaging social media profile and reputation of others. Another way is to steal your identity by doing a little survey about you. It can even destroy a person’s professional career can be stressful and even other people.

Once the criminals managed to hijack your identity, they will try to fool your friends. Some cases, these criminals ask to send money from your friends on behalf of yourself. In fact, some threatening to destroy your reputation if not paid. They can make profits personally from your profile that has been hijacked.

Protect Yourself on Social Media
The easiest way to protect yourself is by knowing the social media habits of online criminals. Many Internet threats that occur in the online world. Here are some of their habits:

1. Plowing Email
The easiest way online criminals is to hijack your email address. Then they would log into the social media sites using your email and using the “Forgot Password” to get the password sent to your email.
Solution: Always secure your email. One of the simplest is always to replace routine email your password. Then if you start receiving email password change requests from social media websites, immediate alert and change the email on social media.
2. Investigate Your Life
Another frequently used way is to guess your password by investigating yourself or your activities. Many people put as much as possible, including personal matters in their profile. This opens up opportunities for criminals to gather information about you. It’s as simple as entering your spouse’s name, date of birth, place of birth and other interesting things from your profile as a basis for guessing the password.
Solution: Do not use things that are easy to guess a password. Use a combination that is difficult to guess for your password. The best way is to combine uppercase, lowercase and numbers in your password.
3. Spyware
An Internet criminals will usually send you an interesting program or send the link to download a good program. Even as though the email came from your own friends. But behind the program, there is a malicious program called a keylogger. This program will make everything you type is sent to the criminals. Easily they will know the user and password to log into the social media website.

Solution:

Do not click on any link that looks alien and sent to your email, let alone that seems interesting. Use antivirus and Internet security program that has been known to check the contents of emails or links. Enable the security features in your Internet browser and always use the latest Internet browser that is currently available free of charge.

Phishing

Usually the criminals they will send the junk email that contains a link or links to other websites that are similar and you will login to the website “email” is false, so the user and password will be saved hijackers. For example, they send false notifications to update your data and ask you to immediately login by clicking the link sent in email.
Solution: Do not click on any link that looks alien and sent to your email for example to update your data. The safest way is to always type the website address of the email provider like mail.yahoo.com or www.gmail.com directly in your browser address box. Then login with a normal manner on the website.

Another way to secure your identity on the Internet is as follows:

Use a combination that is difficult for a password, which is a combination of uppercase, lowercase and numbers.
Upon login, select https rather than http if there is an option to use https.
Do not click on suspicious links, even from his own friends who do not normally send a link.
If anyone sends a message to your account, always investigate the request.
If there are choices to make questions help to restore current account forgot password, use the questions and answers that are difficult for others to guess.
Avoid access to social media website on a computer that is not secure, especially in the cafe that reputation and lack of good security system.
Social media like Facebook, Twitter, Youtube, or a blog can be very rewarding. But always be wary, because the identity and your profile is to be protected. Avoid the others hijack your account in social media that will bring great harm to you.

Leave a Reply

Your email address will not be published. Required fields are marked *