Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Avoid Oversharing on Social Media

b2ap3_thumbnail_social_network_security_400.jpgSocial media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

 
  • Share with Caution: There are some pieces of information that really have no business on a social network, as they could be used to the benefit of identity thieves. One really obvious example is the unique-to-the-individual Social Security Number, but it isn’t totally wise to share your home address or phone number, either. Birthday information and other personal details should only be shared if the site offers private profiles - but even then, think twice and be sure to triple-check your privacy settings frequently, and only add those who you know personally. If all a thief needs to verify that they are you is your date of birth or your dog’s name, you might be opening yourself up.


A side note: Even if you trust your privacy settings and your list of contacts, never post your address and/or a post sharing your agenda until after the fact. Announcing that your home will be empty on social media for a given amount of time is inviting criminal activity into your residence.

  • Limit Employment Details Online: Sites like LinkedIn, while phenomenally helpful with professional networking, can also provide identity thieves with a blueprint of your life thus far to exploit. Unless actively seeking employment for a time, leave just enough to entice those who view your profile to contact you directly to seek more information. Take advantage of privacy settings on those sites as well.
  • Do an Online Audit: The online world is vast. Your information could be in more places than you think. Friends and contacts of yours could post information about your real-time whereabouts that others could exploit, or your information could exist outside of the real-time social media sphere, in cached browsers and the like. Do a quick search for yourself online and remove anything you can. Google Street View will reveal details about your life that can easily implicate your financial situation, a quick request through their “Report a Problem” feature will solve that with a blurred image, rather than your home and belongings.
  • Continue with a Social Audit: How well do you know all of your personal social media contacts? Would you welcome them into your home? Share intimate details about your life with them? Call them friends? If any of the corresponding answers are negative, these people probably don’t need access to your full account and information. Limit access to your info (with certain exceptions, if you must) or ideally remove people from your social media sphere.

Social media can be both a fun personal venture as well as a valuable professional networking resource, but like any other tool, it must be handled with care. For more information, tips, and best practices to apply to your social media habits, read more of our posts or call Total Tech Care at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Business Continuity Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Gadgets Saving Money Holiday Tech Term Social Media Chrome Virtualization Managed Service Automation Microsoft Office Managed IT Services Artificial Intelligence Facebook Cybercrime Operating System Computers BYOD Wi-Fi Mobile Device Management Networking IT Support Health Hacking Internet of Things Information Alert Telephone Systems Information Technology Managed Service Provider Remote Spam Covid-19 Office 365 Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR App History Application Password Money Encryption Human Resources Applications Big Data Data Breach Law Enforcement Remote Monitoring Mobile Computing How To Managed IT Office Tips Training Apps Data Storage Patch Management VPN Remote Computing Government Mobile Office Blockchain Paperless Office Private Cloud IT solutions Entertainment Website Budget Bring Your Own Device Data Management Infrastructure Wireless Work/Life Balance Voice over Internet Protocol Gmail Vulnerability Settings Windows 7 Word Google Drive Two-factor Authentication Servers Mouse HaaS Avoiding Downtime Flexibility Marketing Data Security WiFi Save Time Connectivity Remote Work Risk Management Employee/Employer Relationship Hacker USB RMM Cleaning The Internet of Things Lithium-ion battery Conferencing End of Support Physical Security Scam Education Firewall Data Protection Safety HIPAA Sports Redundancy Virtual Reality Apple Keyboard Vendor Management Social Vendor User Error Managed Services Meetings Software as a Service Display Telephone System Staff Machine Learning Update Robot Printer Excel Bluetooth Value Data storage Biometrics Hard Drive Automobile Google Docs Spam Blocking Virtual Desktop Electronic Medical Records Identity Theft DDoS Computing Infrastructure Hiring/Firing Computing IT Consultant Going Green SharePoint Augmented Reality Fraud Humor Battery Digital Signage Customer Service Shadow IT Remote Worker Legal Business Intelligence Environment Cryptocurrency Audit Fax Server Internet Exlporer Worker IT Management Procurement Botnet SaaS Comparison Net Neutrality PDF Workplace Strategy IT Plan Help Desk CES Printing Proactive IT Unsupported Software Network Congestion Virus Best Practice Business Technology Content Management eWaste Access Control YouTube Charger Unified Threat Management Managed Services Provider Black Market Computer Accessories Compliance Virtual Assistant Authentication Database OneNote Computer Care Current Events Remote Workers Document Management Telephony Wearable Technology Solid State Drive Retail Wireless Technology Samsung Hard Drives Processor How to Downtime Instant Messaging Skype Running Cable Security Cameras Files Computer Tips Digital Signature Managed IT Service OneDrive Biometric Security Data loss Chromecast Memory Warranty Virtual CIO Leadership Troubleshooting HVAC Peripheral Google Apps Outlook Start Menu Colocation Printer Server Uninterrupted Power Supply Digital Security Cameras Analysis Using Data Devices Copiers 5G Screen Mirroring Loyalty Administrator Monitor Books Enterprise Content Management Quick Tip Frequently Asked Questions Mobile Smartwatch Windows 10s Science MSP Ergonomics Accountants Thought Leadership Development Credit Cards OLED Cast Microchip Reputation webinar Streaming Media Emergency Password Management PCI DSS Password Manager Virtual Machine Tip of the week Content Professional Services Distributed Denial of Service Multi-Factor Security Employee Public Cloud Customer Relationship Management Tech Support Employer Employee Relationship 2FA Fiber Optics Twitter Messaging Cabling Techology Laptop Assessment Analyitcs Search Engine Customers Programming NIST Policy Business Mangement Hypervisor Windows Server 2008 Audiobook Tools Trending Dark mode Smart Tech Trend Micro Addiction SMS Amazon Default App Touchpad Television Consultant Procedure Recycling Saving Time Antivirus Politics Google Search Advertising Analytics Windows 8 Wiring dark theme Practices Shopping Cache AI Amazon Web Services IT Infrastructure IT service Public Computer Best Available Notifications Transportation Safe Mode FinTech Criminal Regulations Bing Hosted Computing Social Network WIndows 7 Computer Fan Rootkit Tablet GDPR Wireless Internet Online Shopping Investment Domains Relocation Workers Benefits File Sharing Employees Employee/Employer Relationships Inventory IaaS Specifications ISP FENG Maintenance Camera Windows 365 Wire Video Conferencing Evernote ROI Video Games IBM Bloatware Travel Shortcuts Smart Technology Sales Bitcoin Worker Commute Flash Personal Experience Millennials Cryptomining User PowerPoint Tablets Printers Point of Sale Windows Media Player Smart Office Supply Chain Management Wireless Charging Scalability Software Tips Supercomputer Entrepreneur Emails Monitoring Batteries Business Owner Sync Digitize Workforce Managing Stress Shortcut NarrowBand Virtual Private Network Windows 8.1 Cables Windows Server 2008 R2 Search Cost Management iPhone Netflix Social Networking Cameras Two Factor Authentication Customer relationships Nanotechnology IT Assessment Telecommuting Manufacturing Root Cause Analysis Project Management Email Best Practices Music Cortana HBO Knowledge

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code