If you’re reading this blog right now, it likely means that
you also engage in activities on social media sites such as Facebook, Pinterest,
Twitter, Google+ and many more. With the
many security breaches that have occurred over the past few years, most
recently at Target, consumers need to be careful of the information they are
sharing while engaging on social media sites.
Social media security centers around personal account
settings, amount of information shared, secure connection, and passwords that
keep your account secure and information safe. Social media policies are the guidelines
set by individual social networking sites as well as by employers,
universities, and the government for expectations of conduct and behavior. The policy allows each site to reserve the
right to edit information and terminate users who violate the policy.
Below are a few key ingredients that effective social media
policies should have according to Bahadur, Inasi, and de Carvalho (2012).
• Managing internal and external hosted applications, including
monitoring and reporting tools and techniques and testing and auditing
• Enterprise-wide coordination
• Codes of conduct and acceptable use
• Roles and responsibilities for the Community Manager
• Education and training
• Policy management, reporting, and monitoring
Social Media Security and Privacy Checklist:
- Passwords: Never use the same password for multiple social media sites. Keep your passwords complex by using a mixture of letters and numbers.
- Location: Never post specific status updates that tell people where you are or that you will be away from home for an extended period of time. This could expose you to burglary, identity theft, and other security concerns. This also goes for location based applications that use GPS to post your location.
- Policy: Read both your employer’s social media policy as well as each site’s policy for the social media sites you are utilizing. Social media site policies can change at any time so be sure to check back often and adjust privacy settings as appropriate.
- Be respectful: Do not post anything “defamatory, obscene, abusive, racist, bullying, or offensive” (Department of Defense, n.d.). Basically, do not post anything that you would not want to be made public. Erik Qualman put this perfectly in that “what happens in Vegas stays on YouTube” (Qualman, 2013, pg. 36).
- Opinions: Keep in mind that your opinions on social media do not reflect official viewpoints of your employer and thus, should not be stated as such.
- Images: Do not use any copyrighted images or company logos. “Employees do not have the right to use company logos and protected marks for commercial purposes” (Halpern, 2012).
- Profile: Do not include detailed contact information, mailing address, email address, phone number, or specific interests as these could be used to steal your identity. When choosing a profile picture, do not choose a close-up of your face as emerging facial recognition software makes it easy for identity theft (Department of Defense, n.d.). Lastly, restrict profile access to only your friends.
- Friends: Be selective with whom you accept as friends on social networking sites. Reject names you do not recognize as they could be fake accounts used to obtain personal information from you.
- Information: Never give out unsolicited personal information.
- Applications: Be selective in which applications you choose to engage with and do not allow them to access your location information.
- Update virus software and be careful when clicking on links as they can lead to viruses.
Social media security at the Department of Defense may be the
most important security there is, as misuse could jeopardize the security of our
country. Though many of us do not work
for the government, we still need to be just as vigilant with our own social
media activities as it could expose our employer, families, or ourselves
to harmful crime. The Department of Defense Social Networking training module (found here) really
opened my eyes to the serious threats that can come from social media misuse
when not careful.
Social media security is a serious topic but let's lighten up the mood a bit with this humorous yet informative cartoon.
Heed these warnings carefully and proceed with caution as
you engage on social media!
References:
Bahadur, G., Inasi, J., & de Carvalho, A. (2012). Excerpted
from Securing the Clicks: Network
Security in the Age of Social Media. McGraw-Hill. Retrieved February 24,
2014 from http://resources.infosecinstitute.com/social-media-security/.
Department of Defense. (n.d.). Social Networking V1.0. United States of America Department of
Defense. Retrieved February 24, 2014 from http://iase.disa.mil/eta/sns_v1/sn/launchPage.htm.
Halpern, S. & Gardner, C.H. (2012). When is Your
Company’s Social Media Policy an Unfair Labor Practice? Recent NLRB Decisions
Offer Long-Awaited Guidance for Employers. The
National Law Review. Retrieved February 24, 2014 from http://www.natlawreview.com/article/when-your-company-s-social-media-policy-unfair-labor-practice-recent-nlrb-decisions-.
Qualman, E. (2013). Socialnomics.
New Jersey: John Wiley & Sons, Inc.