AskSileo Episode 3: How long should I spend setting up Facebook’s privacy and security settings?
If you haven’t spent at least 90 minutes with your child setting up their Facebook account, you can be pretty certain that they are not as protected as they should be. Here are the three most important security steps that will make your child much safer on social media:
If your child is old enough (if they are following the 13 and older rule, they are old enough) have them read through Facebook’s Data Use Policy, taking notes on what they learn. There is nothing like reading it for themselves to get them to care about what they are exposing to the world.
What are your questions? Let me know if the comments box below. Who knows, your question might appear next on AskSileo!
Undoubtedly, our kids face social pressure and pay a penalty if they decide to not be on Facebook. They are often accused of not being cool, feel left out of social events and updates that are no longer communicated in person and are looked at differently (out of touch) for choosing to not join the masses.
I want to hear about the social pressures your kids have faced! Share with us in the comments below.
I’m starting a new video series on my AskSileo YouTube channel to address common questions that parents have about their kid’s safety on Facebook and online privacy in general.
AskSileo Episode 1: Children’s Safety on Facebook and Social Networking (drawing from first-hand experience)
I get this question all of the time: Is my kid safe on Facebook? The answer to that questions depends on three basic factors:
The amount of time you have invested in helping your child set up their Facebook account. If you haven’t spent at least 90 minutes in the process, they are in no way safe. It takes at least 1.5 hours to wisely populate their profile, customize privacy and security settings and read through the Facebook Data Use Policy (notice that Facebook no longer refers to it as a privacy policy, because the reality is that you have almost no privacy on Facebook).
Cyber Thieves are officially out today to steal your credit card information or any other private personal information they can intercept as you shop online during Cyber Monday (and for the rest of the holiday season). In less that 60 seconds, you can know what they are up to and what to watch out for. Only 50 seconds left, so here they are (note: some of the “for more info” links will only become live over the next few weeks in our 12 Days of Christmas series, so please check back):
Be extremely careful when using free Wi-Fi hotspots to shop online, as you are being watched by data sniffers.
Only shop on secure, reputable websites that: A. You know via other means (the press; you shop at their store) B. Look for “https” in the URL, C. The website has a small padlock icon in the bottom right corner of your browser or the URL turns green, signaling a “safe” site.
South Carolina Governor Nikki Haley blamed an outdated Internal Revenue Service standard (see below) as a source of a massive data breach that exposed the SSNs of 3.8 million South Carolina taxpayers plus credit card and bank account data. The identity information, nearly 75 GB worth, was stolen from computers that belonged to the SC Department of Revenue.
The breach reveals some shocking realizations for the people of South Carolina, and the rest of us:
South Carolina is compliant with IRS rules, but the IRS DOES NOT REQUIRE THAT SSNs BE ENCRYPTED. In other words, the keys to your financial buying power (your credit profile via SSN) is protected in no material way by the IRS, and therefore by your state government.
Technology isn’t the only source of blame. As is the case in nearly every data breach I’m brought in to help clean up, a HUMAN DECISION is at the heart of the breach.
So I’m out to dinner with a professional speaker whose name I’ll drop so that you’ll be impressed. Larry Winget. Larry is the Pitbull of Personal Development and he’ll probably kill me for not putting a trademark after that title, because he owns it. If you have somebody in your life (kid, employee, boss) that doesn’t take responsibility for the life they lead and the work they’re supposed to do, Larry’s your man. Google his name and find out, or go to LarryWinget.com.
But back to my story. I treated Larry to dinner in Phoenix because I owe him a thousand meals for the coaching he gives me and we’re leaving the table when his wife (who is much nicer than Larry) asks if I’ve taken my credit card out of the folder. Nope. God I hate when that happens! Small oversight for someone who lives and breathes security and privacy. I left my card in the folder, on the table and was fully prepared to leave the restaurant!
Satisfaction with social-networking powerhouse Facebook has slumped, according to the latest survey from the American Customer Satisfaction Index — hitting a new record-low score in the social media category that placed it in the five lowest-scoring companies out of more than 230 surveyed. There are several immediate factors that undermine user trust:
Inconsistency. Facebook’s user interface changes constantly (think Timeline) and this inconsistency leaves users feeling like they don’t know what to expect next from the social media site. Consistency builds trust, but Mark Zuckerberg doesn’t seem to have much vision for consistency.
Lack of Transparency. The average user has very little comfort with or knowledge about how Facebook is collecting, analyzing, using and selling their personal data. While Facebook has a range of privacy and security settings, most users still don’t comprehend the enormity of the information that Facebook collects on them. This lack of transparency leaves users with a bad taste in their mouth, like they are being cleverly deceived for the sake of profit.
A hacking group known as D33Ds Company leaked about 453,000 hacked email addresses and passwords of Yahoo Voices users in order to send a “wake up call” about poor data security practices at Yahoo. The information posted online was NOT restricted to YahooMail login credentials, but included Gmail, Hotmail, Aol and Yahoo user information. In the past few weeks, there have been similar breaches at LinkedIn, eHarmony, Formspring, Nvidia, and AndroidForum. Whazzzup?
Corporations are clearly ignoring warnings that are now commonplace from privacy and security experts: protect your customer data or lose stock value, subscribers and ultimately, your brand reputation.
The average business will NOT take responsibility for preventing a similar breach of their data until AFTER THEY GET HIT. Which is why 95% of companies will hit the snooze button on the wake-up call.
SCAM ALERT! There is a Target texting scam going around. The text looks similar to the one in the picture to the left, and generally says you’ve won a $1,000 gift card if you simply click on the link and collect the money. When you click on the link, it takes you to a Target-looking site that a criminal has set up to collect your private information. The information is then used to steal your identity. In other cases, clicking on the link installs a small piece of malware that takes control of your phone and forwards your private information to the criminals.
Where do the criminals get my mobile phone number to text me in the first place?
They purchase it off of black-market sites on the internet
You give your mobile number away to enter contests, vote on reality shows, etc.
Get monthly strategies and tips for protecting yourself and your business delivered right to your Inbox. Signup now and you'll immediately receive John's 7 Survival Strategies for Starving Data Spies!