Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Social Media Can Cause Security Concerns

Social Media Can Cause Security Concerns

Social media is a great tool that your business can use to communicate with clients and prospective customers, but in an age where you can expect your employees to have their own accounts, it can be devastating to overlook the security issues associated with it. Today, we’ll examine how you can protect your organization from its employees’ social media use.

Most social media sites require that you create an account to represent your business, but in order to do this, Facebook and LinkedIn require you to have a personal account prior to creating a business page. To this end, we’ll be providing tips on how to keep your personal accounts safe from other users, thereby protecting your business.

Facebook
First, you’ll need to create a personal profile. Facebook doesn’t allow Pages to be created without having a personal profile. Once you have done this, you can use the blue bar at the top of the page to find the feature to Create a menu item. From these options, select Page. From here, select the Business or Brand option to fill in the requested information.

You can hide the personal information on your profile page by accessing the Settings via the drop-down arrow at the top-right of the window. From here, you can navigate to the Privacy sub-menu.

To lock down your account, set Who can see your future posts to Only me. You can also limit past posts.

Furthermore, you should take these actions.

  • Under the How People Find and Contact You area, you need to select Friends of Friends for Who can send you friend requests.
  • Set Who can see your friends list to Only Me.
  • It’s important that you set Who can look you up using the email address you provided to Friends and do the same for the option Who can look you up using the phone number you provided.
  • Uncheck the box on Do you want search engines outside of Facebook to link to your profile, too.
  • Next, you’ll want to click on the Timeline and Tagging option on your left. Change the option for Who can post on your timeline to Only me.

With all these settings configured in this way, only your Facebook friends will be able to see your account.

LinkedIn
LinkedIn also requires you to make an account before creating an official business page. Once you have an account set up, you can create a business page by clicking on Create a Company Page + under the nine-dot menu and following the prompts given.

You can hide your LinkedIn profile by accessing Settings & Privacy. Under Privacy, you’ll see several options allowing you to customize the information that LinkedIn shares with others.

While social media can lend a considerable amount of visibility to your business, it shouldn’t come at the cost of security. For more tips on how to be as secure as possible with your business, subscribe to our blog.

How to Make Sure Your Messages are Secure
Tip of the Week: A Few of Chrome’s Native Capabili...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, March 22 2019

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Computing Google Cloud User Tips Business Management Productivity Tech Term Hackers Software Microsoft Hardware Computer Malware Hosted Solutions Mobile Devices Data Backup Browser Cybersecurity Efficiency Windows 10 Smartphone Windows Innovation IT Services Email Smartphones Outsourced IT Internet of Things Android Data Recovery Data Security Office 365 Upgrade Apps Cybercrime Data IT Support VoIP Operating System Backup Business Continuity Communication Alert Server Law Enforcement Disaster Recovery Ransomware Communications Mobile Device Management Vulnerability Small Business Saving Money Business Phishing Money Virtualization Managed IT Services Passwords Miscellaneous IT Support Social Media Workplace Tips Gadgets Best Practice Information Cloud Computing Spam Users Employer-Employee Relationship Applications Chrome Collaboration Network Microsoft Office Artificial Intelligence Information Technology Managed Service Provider Managed IT Managed IT Services Telephone Systems Unsupported Software Tech Support Blockchain App Two-factor Authentication Facebook Bring Your Own Device Automation Router Google Drive Windows 10 Networking OneNote Save Money Holiday Computers Risk Management Business Technology Audit Budget Google Docs Project Management Government Data Protection Patch Management Wireless Charging Meetings Wireless Technology Devices Wi-Fi Robot Data Management Update IT Management Data Breach Cost Management Politics The Internet of Things Augmented Reality Shortcut Productivity Commerce VPN iPhone WannaCry Sports Travel Managed Service Excel Access Control BDR Fraud Health Mobile Security Password Quick Tips Proactive IT Evernote SaaS User Error Hosted Solution Google Assistant Application Avoiding Downtime Mobility Hybrid Cloud Touchscreen Data Storage Hacking Search Encryption WiFi Cortana Safety Gmail Mobile Device Conferencing Word Unified Threat Management Recovery Legislation Language Going Green Social Emergency Disaster Adobe Workers Touchpad Gamification Keyboard Shortcuts Software as a Service Solid State Drive Accessory Point of Sale Virtual Assistant E-Commerce Emails Cast Entertainment Gifts Computing Hard Drive Display Root Cause Analysis Windows Ink Memory Human Resources Upgrades Identity Theft Administrator Comparison Testing Computer Fan Licensing Updates Humor Streaming Media Microsoft Excel IT budget Bandwidth Hard Disk Drive Lithium-ion battery Outlook Computer Forensics Peripheral Personal Information Alexa for Business Payment Cards Marketing BYOD Credit Cards App store Chromebook Co-Managed Services Google Maps Spyware Financial Payroll Vendor Management Access Specifications Virus Camera Microsoft Word Scam Chromecast File Sharing Reputation IT Solutions Management Apple History Employee Webinar Telephony Data storage Printing Telephone Security Cameras Consultant Samsung Internet Exlporer Sales Proactive Remote Computing Projects Tablets Maintenance Storage Social Engineering Vendor Sync PowerPoint Admin Remote Monitoring Edge Wireless Break/Fix IT solutions Legal Uninterrupted Power Supply FAQ Settings Hyperlink Machine Learning Antivirus Retail Websites Identity NFL eWaste Identities Transportation Employee-Employer Relationship iOS WIndows Server 2008 Laptop Wireless Internet Saving Time Data Loss Ciminal Private Cloud Medical IT Windows 10s HBO Charger Value Wasting Time Amazon Downtime Screen Mirroring DDoS Data Theft Data Privacy Windows 7 Computer Care Nanotechnology Hacker Files Device Security Scalability Analytics Twitter HaaS End of Support Keyboard Relocation Black Market Cleaning Big Data Automobile Office Thank You Managing Stress USB Worker How To Books es PDF Cache Mobile Computing Video Games Experience Congratulations Education Hiring/Firing Work/Life Balance Training Monitors Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Text Messaging Compliance Phone System Television CrashOverride Benefits Printers Company Culture Save Time Computer Accessories Office tips Regulation Flexibility Music Advertising Battery Smart Technology Instant Messaging