Posts tagged "twitter privacy"

Some Simple Steps to Social Media Privacy

When was the last time you checked your privacy settings on your social media profiles? Being aware of the information you share is a critical step in securing your online identity. Below we’ve outlined some of the top social media sites and what you can do today to help keep your personal information safe.

FACEBOOK Social Media Privacy

Click the padlock icon in the upper right corner of Facebook, and run a Privacy
Checkup. This will walk you through three simple steps:

  • Who you share status updates with
  • A list of the apps that are connected to your Facebook page
  • How personal information from your profile is shared.

As a rule of thumb, we recommend your Facebook Privacy setting be set to “Friends Only” to avoid sharing your information with strangers. You can confirm that all of your future posts will be visible to “Friends Only” by reselecting the padlock and clicking “Who can see my stuff?” then select “What do other people see on my timeline” and review the differences between your public and friends only profile. Oh, and don’t post anything stupid!

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , ,

5th Day: Don’t Tell Facebook You Won’t Be Home for the Holidays

Holiday Security Tips: On the fifth day of Christmas, the experts gave to me, 5 Facebook fixes

In general, we share too much information on social media sites. During the holidays, we are positively intoxicated with the giving spirit! Without thinking, we share our holiday travel plans, click on seemingly charitable links or post pictures of a fun night out. And when you share with friends on Facebook, you are sharing with their friends and ultimately, most of the literate world. The problem is, some of those people aren’t really friends and only want to separate you from your holiday dollars.

Solution:  Apply these five fixes to ALL of your social sharing (not just Facebook)

  1. Customize your privacy settings. Sixty percent of social network users are unaware that their default privacy settings let others into most of their personal information. Facebook does a decent job of explaining how to lock your privacy down(https://www.facebook.com/help/privacy) but you must spend at least 90 minutes going over the settings to properly protect yourself.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , ,

Twitter Security Loophole Exposes Your Direct Messages

image-3351
Direct messages sent through Twitter can be easily exposed, thanks to a loophole in Twitter’s API, according to Gary-Adam Shannon at Search Engine Watch Reports. When a user logs into another site using their Twitter user name and password, the site can gain access to the private messages, says Shannon. He goes into technical detail, but essentially it’s just a small hack.

Shannon recommends you don’t ever log in to a site (other than Twitter.com, obviously) using your Twitter user name and password. Another writer at Search Engine Watch recommends that users erase their Direct Messages after viewing them.  There has been no comment from Twitter, but we hope they are looking into the issue now that the problem has been made public.

Read more…

Posted in Identity Theft Prevention, Online Privacy by Identity Theft Speaker .
Tags: , , , , , , , , , , ,

Privacy, Social Media, Technology and the Law

Picture 6Can the Law keep up with technology?

CNN has a new article that addresses this growing issue. Cases are continuing to pop up based on an offense or crime committed in cyberspace. Five years ago suing someone for allegedly slamming you on Twitter would have been unimaginable.  But just recently an apartment tenant is being sued for $50,000 in damages after she took to her twitter to complain about her living situation to another user.
Many legal experts are watching these cases carefully because they will lay the groundwork for these unaddressed areas of the law. They said that in this growing age of technology it takes almost 5 years to play catch up with current American law. Lawmakers are unable to predict the next big wave in technology and the legal issues that will follow. With such a severe gray area when it comes to Social Media and your Privacy, society must be able to balance accountability with free speech.

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,

Tweet Breach: 140 Characters of Destruction

tweet-breachLike a wounded, cornered Doberman, I was irrational and reactive.

My blog was down, non-existent. When you earn your keep by communicating ideas, like I do as a professional speaker, any threat to the distribution of those ideas raises the peach fuzz on the back of your neck. After days of being unable to reach my webmaster by office phone, cell phone, SMS text, instant message or email, I dialed up the pressure on him to respond. I turned to the powerful and influential world of social media…

I tweeted him. Publicly.

@johnswebguy Where in the name of Google Earth are you? Why won’t you contact me? [poetic license applied to save face]

Posted in Online Privacy by Identity Theft Speaker .
Tags: , , , , , ,