Contact us today!

FRS Pros Blog

Social Media Can Cause Security Concerns

Social Media Can Cause Security Concerns

Social media is a great tool that your business can use to communicate with clients and prospective customers, but in an age where you can expect your employees to have their own accounts, it can be devastating to overlook the security issues associated with it. Today, we’ll examine how you can protect your organization from its employees’ social media use.

Most social media sites require that you create an account to represent your business, but in order to do this, Facebook and LinkedIn require you to have a personal account prior to creating a business page. To this end, we’ll be providing tips on how to keep your personal accounts safe from other users, thereby protecting your business.

First, you’ll need to create a personal profile. Facebook doesn’t allow Pages to be created without having a personal profile. Once you have done this, you can use the blue bar at the top of the page to find the feature to Create a menu item. From these options, select Page. From here, select the Business or Brand option to fill in the requested information.

You can hide the personal information on your profile page by accessing the Settings via the drop-down arrow at the top-right of the window. From here, you can navigate to the Privacy sub-menu.

To lock down your account, set Who can see your future posts to Only me. You can also limit past posts.

Furthermore, you should take these actions.

  • Under the How People Find and Contact You area, you need to select Friends of Friends for Who can send you friend requests.
  • Set Who can see your friends list to Only Me.
  • It’s important that you set Who can look you up using the email address you provided to Friends and do the same for the option Who can look you up using the phone number you provided.
  • Uncheck the box on Do you want search engines outside of Facebook to link to your profile, too.
  • Next, you’ll want to click on the Timeline and Tagging option on your left. Change the option for Who can post on your timeline to Only me.

With all these settings configured in this way, only your Facebook friends will be able to see your account.

LinkedIn also requires you to make an account before creating an official business page. Once you have an account set up, you can create a business page by clicking on Create a Company Page + under the nine-dot menu and following the prompts given.

You can hide your LinkedIn profile by accessing Settings & Privacy. Under Privacy, you’ll see several options allowing you to customize the information that LinkedIn shares with others.

While social media can lend a considerable amount of visibility to your business, it shouldn’t come at the cost of security. For more tips on how to be as secure as possible with your business, subscribe to our blog.

How to Make Sure Your Messages are Secure
Tip of the Week: A Few of Chrome’s Native Capabili...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, May 21 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Business Computing Productivity Google Cloud User Tips Business Management Microsoft Tech Term Hackers Innovation Software Hardware Efficiency Mobile Devices Windows 10 Data Backup Browser Computer Hosted Solutions Malware Data Recovery Cybersecurity Smartphones Smartphone Office 365 IT Services Data Windows Apps Data Security Internet of Things Email Android IT Support Outsourced IT Backup Upgrade Communication Cybercrime Communications VoIP Operating System Network Disaster Recovery Workplace Tips Business Continuity Saving Money Mobile Device Management Vulnerability Business Server Money Alert Gadgets Phishing Law Enforcement Ransomware Small Business Users Information Applications Wireless Cloud Computing Spam Virtualization Chrome Microsoft Office Artificial Intelligence Collaboration Managed IT Services Best Practice Passwords Miscellaneous Automation IT Support Social Media Managed IT Services Employer-Employee Relationship Two-factor Authentication Save Money App Computers Google Drive Bring Your Own Device Holiday Networking Telephone Systems Word Tech Support OneNote Information Technology Managed Service Provider Managed IT Facebook Windows 10 Router Unsupported Software Health Blockchain WannaCry Quick Tips Printing Fraud Commerce Application Hosted Solution Mobile Security Avoiding Downtime Mobility Evernote Search Encryption Google Assistant Safety User Error Budget Proactive IT SaaS Wireless Technology Hybrid Cloud Cortana Data Management Risk Management Touchscreen Data Storage Conferencing Government WiFi Productivity Business Technology Mobile Device Sports Wi-Fi Patch Management Wireless Charging Robot Google Docs Project Management Audit Telephony Update Devices Data Protection Politics Meetings Password The Internet of Things Shortcut Data Breach VPN iPhone BDR IT Management Hacking Travel Cost Management Managed Service Excel Augmented Reality Gmail Access Control File Sharing Employee Telephone Apple Sales Proactive IT Solutions DDoS Projects Legal Tablets Maintenance Files Settings Security Cameras Storage Social Engineering Webinar Recovery Vendor OneDrive Antivirus Sync Disaster PowerPoint Admin Laptop Break/Fix FAQ Transportation Hyperlink Edge Consultant Battery Retail Websites Private Cloud Identity NFL eWaste Remote Monitoring Machine Learning Identities IT solutions Administrator Employee-Employer Relationship Voice over Internet Protocol Wireless Internet Saving Time Hacker Streaming Media Touchpad Medical IT Charger Lithium-ion battery Going Green Social Value Wasting Time Emergency Data Loss Ciminal Point of Sale Data Theft iOS WIndows Server 2008 Data Privacy Windows 7 Device Security Amazon Downtime Legislation Language Windows 10s HBO Access Entertainment Adobe Workers Gamification Keyboard Shortcuts Screen Mirroring Chromecast Humor Software as a Service 5G Identity Theft Sabotage Computer Care Nanotechnology Accessory Office Gifts Computing Hard Drive Display Windows Ink Unified Threat Management Virtual Assistant E-Commerce Comparison Solid State Drive Internet Exlporer Personal Information Testing Licensing Updates Memory Human Resources Emails Cast Bandwidth YouTube Vendor Management PC Outlook Root Cause Analysis Computer Forensics Peripheral Microsoft Excel IT budget Alexa for Business Payment Cards Scam Credit Cards App store Computer Fan Uninterrupted Power Supply Reputation Chromebook Co-Managed Services Google Maps Spyware Upgrades Education Specifications Virus Hard Disk Drive History Camera Microsoft Word Data storage Financial Payroll Marketing BYOD Employees Samsung Paperless Office Remote Computing Management Text Messaging Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits Phone System Cache Save Time Office tips Compliance Computer Accessories Training Monitors Smart Technology Printers Flexibility Music Advertising Television CrashOverride Instant Messaging Regulation Company Culture Thank You Scalability Analytics HaaS End of Support Keyboard Relocation Twitter Black Market Cleaning Automobile Congratulations Big Data Managing Stress USB Worker How To Books PDF Hiring/Firing Mobile Computing Video Games Experience Work/Life Balance es Virtual Reality