Madgig Logo

Use these tips to stay safe on Facebook and Twitter

Never let your guard down when you’re on social media! Malicious hackers are becoming better at stealing your personal information, so keep these reminders and tips in mind to remain safe while you’re on platforms like Facebook and Twitter.

Lock screens exist for a reason

Always lock all your devices as soon as you stop using them. This way, you are safe from the simplest hack of all: someone opening a social media site on your browser while you’re still signed in.

In case you didn’t know, here’s how to lock your computer:

On Macs:

  • Press Ctrl+Command+Q.
  • Click the Apple logo on the top left corner of the screen, and click Lock screen.

On Windows devices:

  • Press Windows key+L.
  • If there are multiple users using the device, click the Start button on the bottom left corner of the screen, then select User > Lock.

Strong passwords aren’t out of fashion — yet

A six-digit passcode may be enough to secure your phone, but you’ll need something much more complicated for your social media account passwords. Create a password that you don’t use for any other account because with the regular occurrence of data breaches, hackers probably already have a long list of your favorite passwords from other websites and platforms.

It is best to use a password manager like 1Password, LastPass, or Dashlane. These allow you to generate, save, and retrieve complex passwords.

You can also enable multifactor authentication, which requires users to fulfill at least one more identity verification step after entering their username and password. The extra step or steps can be getting your fingerprint scanned or entering a one-time passcode on an authentication app. Even if hackers have your password, they won’t be able to log in without the additional authentication requirements.

Make use of social media features

Facebook can help you monitor who’s accessing your account and from where. On a Mac or Windows computer, click on the down arrow located at the upper right corner of your Newsfeed and select Settings and Privacy. Then click Settings > Security and Login to get more information.

Under the section Where You’re Logged In, you’ll see a list of the places and devices you’re logged into. If you don’t recognize a particular location or device, that means someone else has logged in as you and is likely doing things you do not approve of. You need to log them out forcibly (by clicking the ellipsis on the row indicating the malicious login and click Not you?) and then report the incident immediately.

Then, under Setting Up Extra Security, turn on Get alerts about unrecognized logins. Unfortunately, as of this writing, Twitter doesn’t have the same option. This makes implementing multifactor authentication even more necessary.

Hackers can also take over your Facebook and Twitter accounts through third-party services to which you’ve given access to your profiles, so make sure to double-check what you have approved. Here’s what you need to do:

  • Facebook: Go to Settings > Apps and Websites to view and manage third-party services that use Facebook to log you into the accounts you have with them.
  • Twitter: Go to Settings and Privacy > Apps to check and edit the list.

Lastly, check the permissions Facebook and Twitter have on your smartphone or tablet.

  • Android: Go to Settings > Apps > App permissions.
  • iOS: Go to Settings > Privacy to manage which service can access which parts of your phone (such as the camera and speaker).

Less personal info, fewer problems

These steps are just the beginning of what you should be doing. You should also limit the personal data you share on your social media accounts. Avoid oversharing.

By following these tips, you can significantly prevent Facebook and Twitter hacking.

Cybersecurity is a sprawling issue — and social media privacy is but one of the many things you need to stay on top of. For 24/7 support, call our team of experts today.

Published with permission from TechAdvisory.org. Source.

Cybersecurity tips for working remotely

Remote work policies have become a necessity not just because of the current coronavirus crisis, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves you and your company exposed to online scams and other cybersecurity threats. To defend your company and your remote workers, make sure to heed the following tips.

Fortify user accounts

When everyone is working remotely, user accounts must be properly secured. One way to achieve this is by setting at least 12-character long passwords with numbers and special characters mixed in to make them more difficult to guess. More importantly, these passwords must be unique to each account, to minimize the damage if hackers do manage to compromise one set of credentials. If you find it difficult to generate and remember login details for all your accounts, consider password managers like LastPass, Dashlane, and Keeper.

To further strengthen your accounts, however, you’ll also need to enable multifactor authentication (MFA). This adds another layer of identity verification — like fingerprint scans or one-time activation codes generated by SMS — to make it more difficult for cybercriminals to hijack your accounts.

Use a virtual private network (VPN)

VPNs are primarily known for circumventing geographic restrictions on location-specific websites and streaming services, but they’re also a crucial tool for remote workers. A reliable VPN creates secure connections between devices and networks by encrypting internet traffic. This hides web activity from prying eyes, protecting your employees’ online privacy, and mitigating the risk of hackers stealing company information.

Patch your software regularly

Although installing software updates can be a major nuisance, they cover critical weaknesses and protect your systems from the latest threats. Most apps now offer an automatic update feature so you don’t have to manually patch your software.

Another option for your business is patch management software. These track patches on employee devices and distribute the most recent updates on a company-wide scale.

Set up firewalls and antivirus software

Make sure to enable firewalls in your operating systems and hardware. These provide a strong layer of protection between your device and the internet, preventing malicious programs and other network threats from reaching your device. Your managed IT services provider (MSP) may also provide third-party firewalls in case your computers don’t have any built in by default.

In addition to firewalls, you’ll also want to implement antivirus software to detect and remove any malicious programs that do manage to find their way onto your device. Just remember to constantly update the software so it can effectively detect the newest malware.

Secure home routers

Home Wi-Fi routers are not as thoroughly secured as their business counterparts so take extra precautions to safeguard them. For starters, change your router password as soon as possible because hackers can easily break into them once they know the router model. You should also install the latest firmware updates to eliminate any security vulnerabilities.

Finally, check whether your router has Wi-Fi Protected Access 2 (WPA2) encryption settings to secure inbound and outbound traffic. If your router doesn’t have this setting, you’re overdue for an upgrade.

Back up your data

Important files must be backed up regularly in the cloud and your external hard drive. This way, you’ll always have a copy of your files in case of a major data loss incident like ransomware or a power outage.

Watch out for online scams

The biggest threat remote workers face is online scams. Phishing emails may entice you with free coronavirus test kits in exchange for personal information. Some cybercriminals may even masquerade as legitimate companies, CEOs, or friends to trick you into clicking on dangerous links and attachments.

To avoid these threats, you must be critical of everything you see online. Look for any suspicious links and attachments, grammatical errors in the email body, and misspelled email addresses. Plus, never give out sensitive information to an unsolicited email, text message, or phone call.

Working from home poses many cybersecurity challenges for businesses, but you don’t have to address them alone. If you need guidance with setting up firewalls, avoiding scams, and even enabling MFA, we can provide the IT support you need in this difficult time. Call us now.

Published with permission from TechAdvisory.org. Source.

Guide For Managed WiFi For Multi-Tenant Units

WIFI IS REVOLUTIONIZING HEALTHCARE!

Wireless Connections For The Near
Future Whitepaper

This field is for validation purposes and should be left unchanged.

Professional Services To Grow Your
Business Whitepaper

This field is for validation purposes and should be left unchanged.

Experience Guide Hybrid Workforce United

Embrace Change 4 Ways To Prepare For Whats Next

This field is for validation purposes and should be left unchanged.

Madgig Embrace Change a 4-step Plan

This field is for validation purposes and should be left unchanged.