Marc:
Welcome back to another edition of Byte sized Security, your source
2
:
for byte sized cybersecurity lessons.
3
:
I'm Mark David, and with me
today to discuss social media,
4
:
safety is expert Nia Jordan.
5
:
Our profiles contain a wealth of
personal information, making social
6
:
platforms a goldmine for cybercriminals.
7
:
Nia joins me to share best practices
for tweaking your privacy settings,
8
:
securing accounts, avoiding scams,
and building connections safely.
9
:
Whether you're on Facebook, Instagram,
LinkedIn, or Twitter, or X, as it's
10
:
called now, you'll walk away with tangible
actions to enhance your protection.
11
:
Let's dive in.
12
:
Nia, great to have you on the show.
13
:
Can you start by giving an overview
of key social media security risks
14
:
and how criminals exploit them?
15
:
Nia: Glad to join you, Mark.
16
:
Social platforms contain a huge trove
of personal data, photos, contacts,
17
:
and posts that criminals covet.
18
:
LAC's default privacy settings
allow scraping public info.
19
:
Weak account security enables
hacked profiles for financial fraud.
20
:
Clicking scams spreads malware, and fake
connections facilitate social engineering.
21
:
Staying vigilant defends against these.
22
:
Marc: Let's start with privacy settings.
23
:
What configuration changes do
you recommend to limit exposure?
24
:
Nia: The key is locking down who
can view your content, especially
25
:
for profiles public by default
like Facebook and Twitter.
26
:
I suggest enabling the strictest
audience options for posts, photos,
27
:
contacts, and biographical info.
28
:
Remove anything you wouldn't
want strangers accessing.
29
:
Limit visibility of past
posts if possible, and opt
30
:
out of data gathering for ads.
31
:
Restricting access protects you.
32
:
What
33
:
Marc: security advice do you
have for locking down social
34
:
media accounts themselves?
35
:
Nia: Make sure you set strong,
unique passwords for each profile,
36
:
and enable two factor authentication
using an authenticator app for account
37
:
recovery if passwords are lost.
38
:
Remove any saved browser
passwords for automatic logins.
39
:
Be cautious of third party apps
requesting access to accounts.
40
:
And know how to report impersonation
profiles or hacked accounts to platforms.
41
:
Treat social accounts like your email.
42
:
Crucial to securely control.
43
:
Marc: Scams are also a major
threat on social platforms.
44
:
How can users avoid risks like
fake prizes or malware links?
45
:
Nia: The biggest scam indicators
are too good to be true offers,
46
:
high pressure urgency, or requests
for financial information.
47
:
Social platforms themselves
will never message you to share
48
:
private data or transfer money.
49
:
Be skeptical of prize messages and
job offers directing you off site.
50
:
Delete messages demanding
money transfers immediately.
51
:
And never click links promising celebrity
photos, game cheats, free events,
52
:
and the like which spread malware.
53
:
Savvy browsing defends against tricks.
54
:
Marc: What about the connections
we make on social platforms?
55
:
Any risks when linking profiles
between sites or accepting friend
56
:
Nia: requests?
57
:
I'm cautious about linking
social media accounts under one
58
:
identity, which expands access.
59
:
Never link accounts via third
party apps, which can scrape data.
60
:
Vet connections against your real
relationships before accepting
61
:
requests to avoid social engineering.
62
:
Ask contacts directly if you're
uncertain of a request's validity.
63
:
On LinkedIn especially, check
work connections against
64
:
profiles of actual colleagues.
65
:
Impersonation is common, so verify before
66
:
Marc: connecting.
67
:
For parents and educators listening, are
there particular safeguards you recommend
68
:
implementing for children on social media?
69
:
Absolutely.
70
:
Nia: Set profiles to private
and disable location tagging
71
:
to limit exposure among kids.
72
:
Remind them to only approve
connections from people they
73
:
actually know in real life.
74
:
Install protections like Bark or
Circle to monitor concerning activity
75
:
and cyberbullying across platforms.
76
:
Have open conversations about
limiting oversharing and the
77
:
permanence of content posted online.
78
:
And set clear guidelines for healthy usage
habits and enforcing periodic breaks.
79
:
Ongoing involved guidance keeps kids safe.
80
:
Marc: Final words of wisdom for
our listeners looking to boost
81
:
their social media security?
82
:
Nia: Just remember that diligent
awareness, smart privacy habits,
83
:
and genuine connections go a
long way in enhancing safety.
84
:
Apply the same precautions on social
media that you would in the physical
85
:
world when interacting with strangers.
86
:
Your vigilance remains
the ultimate protection.
87
:
Marc: Outstanding tips, Nia.
88
:
Thank you for sharing your
social media security insights.
89
:
Thank you for having me, Mark.
90
:
That wraps up this edition of
Byte sized Security focused on
91
:
defending your social media presence.
92
:
Lock down settings, secure accounts,
avoid scams, and vet connections.
93
:
Stay safe out there on social platforms
by being informed and vigilant.
94
:
For more cybersecurity lessons, keep
listening to Byte sized Security.
95
:
See you next time.