Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

Social Media Can Cause Security Concerns

Social Media Can Cause Security Concerns

Social media is a great tool that your business can use to communicate with clients and prospective customers, but in an age where you can expect your employees to have their own accounts, it can be devastating to overlook the security issues associated with it. Today, we’ll examine how you can protect your organization from its employees’ social media use.

Most social media sites require that you create an account to represent your business, but in order to do this, Facebook and LinkedIn require you to have a personal account prior to creating a business page. To this end, we’ll be providing tips on how to keep your personal accounts safe from other users, thereby protecting your business.

Facebook
First, you’ll need to create a personal profile. Facebook doesn’t allow Pages to be created without having a personal profile. Once you have done this, you can use the blue bar at the top of the page to find the feature to Create a menu item. From these options, select Page. From here, select the Business or Brand option to fill in the requested information.

You can hide the personal information on your profile page by accessing the Settings via the drop-down arrow at the top-right of the window. From here, you can navigate to the Privacy sub-menu.

To lock down your account, set Who can see your future posts to Only me. You can also limit past posts.

Furthermore, you should take these actions.

  • Under the How People Find and Contact You area, you need to select Friends of Friends for Who can send you friend requests.
  • Set Who can see your friends list to Only Me.
  • It’s important that you set Who can look you up using the email address you provided to Friends and do the same for the option Who can look you up using the phone number you provided.
  • Uncheck the box on Do you want search engines outside of Facebook to link to your profile, too.
  • Next, you’ll want to click on the Timeline and Tagging option on your left. Change the option for Who can post on your timeline to Only me.

With all these settings configured in this way, only your Facebook friends will be able to see your account.

LinkedIn
LinkedIn also requires you to make an account before creating an official business page. Once you have an account set up, you can create a business page by clicking on Create a Company Page + under the nine-dot menu and following the prompts given.

You can hide your LinkedIn profile by accessing Settings & Privacy. Under Privacy, you’ll see several options allowing you to customize the information that LinkedIn shares with others.

While social media can lend a considerable amount of visibility to your business, it shouldn’t come at the cost of security. For more tips on how to be as secure as possible with your business, subscribe to our blog.

How to Make Sure Your Messages are Secure
Tip of the Week: A Few of Chrome’s Native Capabili...

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Business Computing Productivity Privacy Internet User Tips Hackers Google Software Microsoft Business Management Cloud Computer Hardware Tech Term Innovation Efficiency Data Mobile Devices Data Backup Malware Hosted Solutions Smartphones Browser Windows 10 Data Recovery Smartphone Office 365 Cybersecurity IT Services Internet of Things Email Gadgets Android Communication Backup Windows Upgrade Business Workplace Tips Small Business Data Security Apps IT Support Outsourced IT Communications Cybercrime Disaster Recovery VoIP Mobile Device Management Business Continuity Ransomware Network Phishing Operating System Server Money Artificial Intelligence Cloud Computing Alert Vulnerability Law Enforcement Users Saving Money OneNote Employer-Employee Relationship Information Wireless Chrome Managed IT Services Best Practice Blockchain Managed IT Services IT Support Spam Automation Passwords Miscellaneous Social Media Collaboration Virtualization Facebook Microsoft Office Health Managed Service Applications Holiday Bring Your Own Device Google Drive Managed Service Provider Managed IT Telephone Systems BYOD Unsupported Software Tech Support App Password Two-factor Authentication Information Technology Hacking Windows 10 Data Storage Save Money Networking Computers Word Router Data Management Mobile Security Devices Hosted Solution Risk Management Search Avoiding Downtime Mobility Google Assistant IT Management Productivity Data Breach Cost Management Sports Hybrid Cloud Augmented Reality Wi-Fi WannaCry Travel Commerce Telephony File Sharing Update Excel Government Politics Shortcut Windows 7 Fraud Business Technology BDR Robot Proactive IT Evernote SaaS User Error Hard Drive Display Gmail The Internet of Things Touchscreen Cortana VPN iPhone WiFi Data Loss Mobile Device Application Conferencing Encryption Access Control Audit Budget Safety Printing Google Docs Project Management Quick Tips Data Protection Wireless Technology Patch Management Wireless Charging Meetings Firewall Security Cameras Gifts Computing Settings Root Cause Analysis Instant Messaging Administrator Hacker Projects Windows Ink Emails Cast Lithium-ion battery PowerPoint Admin Comparison Computer Fan Streaming Media Emergency Vendor OneDrive Licensing Updates Upgrades Mobile Office Hyperlink Microsoft Excel Transportation IT budget Hard Disk Drive Break/Fix Outlook Laptop Smartwatch Point of Sale Marketing Processor Entertainment Machine Learning Credit Cards App store Access Identity Google Maps Spyware Private Cloud Identity Theft Wireless Internet Saving Time Specifications Virus Chromecast Employee-Employer Relationship Voice over Internet Protocol Microsoft Word Development Office Value Wasting Time Going Green Social IT Solutions Medical IT Touchpad Server Maintenance Webinar Benchmarks Amazon Downtime Internet Exlporer Data Privacy Apple Vendor Management Gamification Keyboard Shortcuts Sales Proactive Tablets Maintenance Consultant Micrsosoft Uninterrupted Power Supply Scam Accessory Storage Social Engineering Software as a Service 5G Sync Humor Remote Monitoring Investment Edge IT solutions Virtual Assistant E-Commerce FAQ Sabotage Education Samsung Memory Human Resources Retail Websites Testing NFL eWaste Personal Information Business Intelligence Computer Forensics Peripheral Identities iOS WIndows Server 2008 Bandwidth YouTube ROI Ciminal Reputation Windows 10s HBO Legal Files Alexa for Business Payment Cards Charger PC DDoS Chromebook Co-Managed Services Disaster Antivirus Financial Payroll Data storage Data Theft Computer Care Nanotechnology Recovery Camera Device Security History Screen Mirroring Digital Signage Management Legislation Remote Computing Language Employees Adobe Workers Unified Threat Management Windows Server 2008 R2 Telephone Solid State Drive Employee Paperless Office Battery Scalability Analytics Compliance Office tips Thank You Advertising Keyboard Printers Black Market Cleaning Automobile Big Data Regulation es Cache Congratulations Managing Stress End of Support Training Monitors USB Worker HaaS Twitter Relocation How To Books Video Games Experience Television CrashOverride Hiring/Firing Work/Life Balance Company Culture Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Phone System PDF Benefits Save Time Mobile Computing Computer Accessories Flexibility Music Text Messaging Smart Technology