Contact us today!

Network Solutions Unlimited Blog

Social Media Can Cause Security Concerns

Social Media Can Cause Security Concerns

Social media is a great tool that your business can use to communicate with clients and prospective customers, but in an age where you can expect your employees to have their own accounts, it can be devastating to overlook the security issues associated with it. Today, we’ll examine how you can protect your organization from its employees’ social media use.

Most social media sites require that you create an account to represent your business, but in order to do this, Facebook and LinkedIn require you to have a personal account prior to creating a business page. To this end, we’ll be providing tips on how to keep your personal accounts safe from other users, thereby protecting your business.

First, you’ll need to create a personal profile. Facebook doesn’t allow Pages to be created without having a personal profile. Once you have done this, you can use the blue bar at the top of the page to find the feature to Create a menu item. From these options, select Page. From here, select the Business or Brand option to fill in the requested information.

You can hide the personal information on your profile page by accessing the Settings via the drop-down arrow at the top-right of the window. From here, you can navigate to the Privacy sub-menu.

To lock down your account, set Who can see your future posts to Only me. You can also limit past posts.

Furthermore, you should take these actions.

  • Under the How People Find and Contact You area, you need to select Friends of Friends for Who can send you friend requests.
  • Set Who can see your friends list to Only Me.
  • It’s important that you set Who can look you up using the email address you provided to Friends and do the same for the option Who can look you up using the phone number you provided.
  • Uncheck the box on Do you want search engines outside of Facebook to link to your profile, too.
  • Next, you’ll want to click on the Timeline and Tagging option on your left. Change the option for Who can post on your timeline to Only me.

With all these settings configured in this way, only your Facebook friends will be able to see your account.

LinkedIn also requires you to make an account before creating an official business page. Once you have an account set up, you can create a business page by clicking on Create a Company Page + under the nine-dot menu and following the prompts given.

You can hide your LinkedIn profile by accessing Settings & Privacy. Under Privacy, you’ll see several options allowing you to customize the information that LinkedIn shares with others.

While social media can lend a considerable amount of visibility to your business, it shouldn’t come at the cost of security. For more tips on how to be as secure as possible with your business, subscribe to our blog.

How to Make Sure Your Messages are Secure
Tip of the Week: A Few of Chrome’s Native Capabili...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, March 20 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Operating System Commerce Government Display Social Media Hard Drive Computer Forensics Company Culture eWaste Smart Technology Wireless Transportation Webinar NFL Business Technology Communications Robot Automobile Users Law Enforcement Password Hackers Google Docs Virtual Assistant Solid State Drive Microsoft Word Paperless Office Data Breach Risk Management Smartphone Financial Tip of the Week Proactive Employer-Employee Relationship Windows Ink Break/Fix SMB Redundancy Utility Computing Adobe Encryption Wireless Technology Dark Web Antivirus Security Remote Monitoring Windows 10s Office Saving Money Comparison Access Control Windows 10 Device Security Phone System Virtualization IoT Keyboard Computing Infrastructure Productivity Wireless Internet Two Factor Authentication OneNote Disaster Recovery Connectivity Microsoft Employer Employee Relationship Legislation Touchpad Electronic Medical Records Server Project Management Vulnerability Work/Life Balance Humor Compliance Hacking Alert Security Cameras Saving Time End of Support Cloud Efficiency Email Business Computing Root Cause Analysis Upgrades File Storage Cast Websites Keyboard Shortcuts Printers Emergency Memory Data Security Congratulations IT Service IT solutions Sales IT Solutions Techology Battery User Tips BDR Wasting Time Virtual Private Network hacker Hiring/Firing Application Business Hosted Solution Update IT Support History Data Backup Blockchain Troubleshooting Miscellaneous Backup and Disaster Recovery Co-Managed Services HaaS Workplace Tips Remote Computing Maintenance Payment Cards CrashOverride PDF SaaS Charger FAQ Scam Identity Reputation Training Students Gamification Data Computing Information Router Books Identity Theft Analysis E-Commerce Content Filter Business Management Employee-Employer Relationship Avoiding Downtime Hyperlink Technology Computers Content Filtering Cybercrime Tech Support User Error App store Professional Services Bluetooth Sports Communication Automation WPA3 Word Internet Exlporer Human Resources Data Storage Worker Commute HBO Scalability Audiobook intranet Firewall Managed Service IT Services Smart Tech Search Quick Tips Backup Loyalty Machine Learning Google Maps Gadgets IT budget Analytics Workers Private Cloud Personal Information Twitter Chrome Managed IT Services Managing Stress Gmail Bring Your Own Device Projects Information Technology Tech Term Recovery Employee Unified Communications Samsung Sync Internet of Things Customer Devices Virtual Reality Microsoft Excel Business Owner Monitors VoIP Shadow IT IT Management How To Assessment Apps Social Engineering Licensing Alexa for Business Downtime Screen Mirroring Upgrade Touchscreen Health Telephone Systems Settings Data Loss Android Management File Sharing Telephone Wireless Charging The Internet of Things Nanotechnology Malware Public Cloud Public Computer Network Monitor Benefits Gifts Software as a Service Relocation Google Assistant Monitoring Wi-Fi Data storage Files Computer Fan Administration Managed IT Small Business Holiday Unified Threat Management Spam Chromecast Computer Budget Productivity Amazon Retail Best Practices Save Time Microsoft Office Cybersecurity Payroll Outsourced IT Two-factor Authentication Flexibility Applications Windows Internet Best Practice Travel Passwords Browser Computer Accessories Virus Outlook Office 365 How to IT Support VPN Collaboration Internet exploMicrosoft Mobile Security Managed IT Services Save Money Consultant Testing Document Management Mobile Device Management Content Google Spam Blocking Value Software Lifestyle Business Intelligence WannaCry App Patch Management Cost Management Computer Care Cortana Privacy USB Thank You Audit Vendor Management Identities Video Games WIndows Server 2008 Mobility Data Recovery Hard Disk Drive Politics Advertising Vendor Meetings Cloud Computing Ciminal Worker Proactive IT Camera Medical IT Cache Business Continuity Ransomware Legal Hybrid Cloud Network Security Office Tips Shortcut Education Emails Cleaning Financial Technology Specifications Google Drive Physical Security Bandwidth Streaming Media Regulation Admin Fraud Conferencing Data Privacy Augmented Reality Peripheral Mobile Smartphones Going Green Mobile Device Networking Windows 7 Facebook Innovation Rootkit Credit Cards Evernote Black Market HIPAA Storage iPhone Mobile Devices PowerPoint Unsupported Software WiFi Updates Marketing Instant Messaging Hard Drives Edge Remote Workers Artificial Intelligence Managed Service Provider Chromebook BYOD Hardware Managed IT Service Accessory Tablets Language Printing Wasting Money Apple Windows 10 Data Theft Experience MSP Big Data Laptop Data Protection Hosted Solutions Data Management Spyware Excel Entertainment Money Television Safety Phishing iOS Colocation