Data Privacy On Social Media
Data Privacy On Social Media
You can connect to people. Hundreds and thousands of people around the world.
You can share your photos, post your thoughts, and see what everyone is up to.
We usually get excited about using Facebook, Instagram, Twitter, and other social media
platforms. And we tend to share everything that's happening in our lives.
It’s pretty easy – and that’s the problem. Sometimes it’s a little too easy to share and post
information online.
Social media may seem like a harmless place. But once you log in, you have to watch out. It can
be a dangerous place.
Any online activity can affect your privacy, it can affect your safety, and your reputation.
Back in 2018, it was revealed that 50 million Facebook profiles were harvested for Cambridge
Analytica in major data breach. It was described that Donald Trump’s former adviser, Steve
Bannon, compiled user data to target American voters. And the figure soon changed to 87
million.
Facebook CEO Mark Zuckerberg said "Yes, he broke the policy, he broke people’s
expectations, but also, people chose to share that data with him."
Servers, where personal data is kept, are secure in many ways but can be
hacked. Many large companies faced cyber-attacks and the trend will continue
regardless of the Republic Act 10173, or the Data Privacy Act. No matter how
secure private data is, it can be stolen. Data protection is there, but it isn’t an
all-powerful measure capable of stopping everyone.
So, when it comes to data privacy on social media, the prime responsibility is
on us, not some CEO of some social media platform, nor the platform itself.
What information are you sharing when you use social media?
The kinds of information that you may be sharing on a social network includes:
Your profile. Most social networks allow users to create detailed online profiles and
connect with other users in some way. This may involve users sharing information
with other users, such as one’s gender, age, familial information, interests,
educational background and employment.
Your status. Most social networks also allow users to post status updates in order to
communicate with other users quickly. Though there may be privacy settings to
restrict access to status updates, these networks are frequently designed to
broadcast information quickly and publicly.
Your location. Many social networks are designed to broadcast your real-time
location, either as public information or as an update viewable to authorized
contacts. This might allow users to “check in” to a local event or business, or share
one’s location with contacts within their network.
Shared content. Many social networks encourage users to share content, such as
music, photographs, videos and links to other webpages.
All of this sharing reveals information about you, including contextual information you may
not even be aware of. By sharing this information online, you may be providing enough
information to allow advertisers to track you or hackers to take advantage of your online
identity. Therefore, it is important to be aware of the information that you are providing and
to be conscious of the choices you can make to protect your privacy.
Phishing Attempts
Phishing is one of the most common ways criminals attempt to gain access to
sensitive personal information. These messages trick people into sharing
sensitive data, including passwords, banking information, or credit card
details. Phishing attacks often pose as social media platforms.
Malware Sharing
Malware (malicious software) is designed to gain access to computers and the
data they contain. Once malware has infiltrated a user’s computer, it can be
used to steal sensitive information (spyware), extort money (ransomware), or
profit from forced advertising (adware). Social media platforms are an ideal
delivery system for malware distributors. Once an account has been
compromised (often by obtaining passwords through a phishing attack),
cybercriminals can take over that account to distribute malware to all of the
user’s friends or contacts.
Botnet Attacks
Social media bots are automated accounts that create posts or automatically
follow new people whenever a certain term is mentioned. A large group of
bots can form a network known as a botnet. Bots and botnets are prevalent on
social media and are used to steal data, send spam, and launch distributed
denial-of-service (DDoS) attacks that help cybercriminals gain access to
people’s devices and networks.
Data Scraping
It involves tracking people’s activities online and harvesting personal data and conversations from
social media, job websites and online forums. Usually, research companies are the harvesters, and
sell the compiled data to other companies. These, in turn, use these details to design targeted ad
campaigns for their products.
Identity theft
Cybercriminals use social media for identity theft. Our private social profiles contain a wealth of personal information,
which can be leveraged to open credit card accounts in your name or otherwise abuse your digital identity.
Now that we’ve learned how social media lacks privacy, how can we be safe and secure?
Most people skip over the privacy policy when joining a social network. However, users can
learn a lot of useful information by reviewing a privacy policy before signing up for service. A
social network’s privacy policy will explain how the social network will collect and use
information about people who visit the site. You wouldn’t just hand out your bank account
information, so why would you give away your privacy rights on social networking sites? Pay
particular attention to what information you are agreeing to share when you sign up for a social
media account. You may find that some of the terms are in the best interest of the platform, but
may not be the best for your privacy.
2. Use a strong password different from the passwords you use to access other sites.
People use multiple social accounts for various purposes. Nevertheless, if your password is weak, your account’s
security gets compromised. Also, if you are using the same password for different accounts, all your accounts can
get hacked by hackers.
Make sure to use a unique and strong password for every social account. Your password must include numbers,
words, upper and lowercase letters, and special characters. The stronger password you use, harder for a hacker to
crack your password. Change your password at least once a month. Try to keep different passwords for different
social media accounts. If you are having a problem to manage your passwords, you can use password managers.
3. Add two-factor authentication for every social account
If you are using two-factor authentication on your social accounts, it will add an extra layer of security to them. When
someone logs into your account from new location, device or browser; you will be sent a password that needs to be
entered for logging into your social account. This means that every time you log in, you’ll also need to enter a unique
code sent on your phone by the social media website. Many people think it's time-consuming, but if you are seriously
concerned about your privacy, you need to apply two-factor authentication on your each and every social account.
4. Setup security answers and update your privacy settings
All social media platforms give you the option to limit your audience. But many people are unaware of its importance.
It is necessary for every user to explore, try and overview those settings. You can also set up security questions on
your accounts. Instead of setting common questions like “What is your mother’s name?” or “Where are you from?”,
use questions that are hard for everyone to think about.
5. Consider creating a new email address to use only with our social media profile(s).
Provide the minimum amount of personal information necessary, or that you feel
comfortable providing.
Take a look at your social media profiles and try to keep them barren—the people who need to know your birth date,
email address and phone number already have them.
7. Use a VPN
If you want to keep your conversations, messages, and calls secure; you can use an encryption tool which is called
VPN. A VPN helps you to keep your communication encrypted and secure. All your information will be passed
through a secure tunnel between the websites and your VPN services provider.
16. Log off from your social media account when you no longer need to be connected.
- The last important and good practice is, always log off to your system when you are done with it.