{"id":1709,"date":"2020-09-11T07:00:35","date_gmt":"2020-09-11T07:00:35","guid":{"rendered":"https:\/\/www.clickdo.co.uk\/internet-marketing\/?p=1709"},"modified":"2025-02-24T10:07:19","modified_gmt":"2025-02-24T10:07:19","slug":"privacy-on-social-networks","status":"publish","type":"post","link":"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/","title":{"rendered":"8 Tips to Protect Your Privacy on Social Networks"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#8_Key_Tips_to_help_keep_you_and_your_personal_information_safe\" >8 Key Tips to help keep you and your personal information safe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#Threats_on_Social_Networks\" >Threats on Social Networks<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#1_Phishing_Attacks\" >1. Phishing Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#2_Data_Mining\" >2. Data Mining<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#3_Malware_Attacks\" >3. Malware Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#4_Botnet_Attacks\" >4. Botnet Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#5_Fake_News\" >5. Fake News<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#6_Identity_Theft\" >6. Identity Theft<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#7_Cyber_Bullying\" >7. Cyber Bullying<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#How_to_Protect_Your_Privacy\" >How to Protect Your Privacy<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#1_Always_use_Strong_Passwords\" >1. Always use Strong Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#2_Avoid_Using_Public_Wi-Fi\" >2. Avoid Using Public Wi-Fi<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#3_Use_a_VPN\" >3. Use a VPN<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#4_Use_Antivirus_Protection\" >4. Use Antivirus Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#5_Update_Your_System_as_Required\" >5. Update Your System as Required<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#6_Be_Wary_of_Clicking_on_Links\" >6. Be Wary of Clicking on Links<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#7_Avoid_Adding_Strangers_to_Your_Network\" >7. Avoid Adding Strangers to Your Network<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/privacy-on-social-networks\/#8_Understand_Security_Settings\" >8. Understand Security Settings<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"subhead\"><span class=\"ez-toc-section\" id=\"8_Key_Tips_to_help_keep_you_and_your_personal_information_safe\"><\/span>8 Key Tips to help keep you and your personal information safe<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Social networks are a necessary engagement for most people today, unlike a few years ago when they were first introduced.<\/p>\n<p>They have evolved to become sources of education, employment, business <a href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/ultimate-content-marketing-for-saas\/\" target=\"_blank\" rel=\"noopener noreferrer\">marketing<\/a>, entertainment, news, and global friendships.<\/p>\n<p>Many people get into social networks without considering the implications their online presence can have on their privacy and security.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1718\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Key-tips-to-help-keep-you-and-your-personal-information-safe.jpg\" alt=\"Key tips to help keep you and your personal information safe\" width=\"645\" height=\"428\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Key-tips-to-help-keep-you-and-your-personal-information-safe.jpg 753w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Key-tips-to-help-keep-you-and-your-personal-information-safe-300x199.jpg 300w\" sizes=\"auto, (max-width: 645px) 100vw, 645px\" \/><\/h3>\n<h2><span class=\"ez-toc-section\" id=\"Threats_on_Social_Networks\"><\/span>Threats on Social Networks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Securing your privacy online involves identifying factors that can put your privacy at risk and find out how you can eliminate the risks and enjoy online activities without much worry.<\/p>\n<p>Here are some threats facing <a title=\"Automation Tools for Social Media Accounts\" href=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/social-media-automation-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\">social media<\/a> users today:<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1719\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Threats-on-Social-Networks.jpg\" alt=\"Threats on Social Networks\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Threats-on-Social-Networks.jpg 750w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Threats-on-Social-Networks-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h3>\n<h3><span class=\"ez-toc-section\" id=\"1_Phishing_Attacks\"><\/span>1. Phishing Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Phishing is one of the methods currently used by cybercriminals to solicit information from their targets. It involves pretending to be a genuine organization and contacting targeted people by phone or email to ask for personal details such as passwords or credit card information.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1720\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Phishing-Attacks.jpg\" alt=\"Phishing Attacks\" width=\"640\" height=\"480\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Phishing-Attacks.jpg 667w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Phishing-Attacks-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h3>\n<h3><span class=\"ez-toc-section\" id=\"2_Data_Mining\"><\/span>2. Data Mining<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_mining\" target=\"_blank\" rel=\"noopener noreferrer\">Data mining<\/a> refers to the process of collecting useful data from available information on various platforms. It is commonly used by marketing agencies to analyze behavioral patterns and possible future outcomes. While data mining is not a great concern, it raises ethical issues as the people whose information is mined are not contacted to give consent.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1721\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Data-Mining.jpg\" alt=\"Data Mining\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Data-Mining.jpg 750w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Data-Mining-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h3>\n<h3><span class=\"ez-toc-section\" id=\"3_Malware_Attacks\"><\/span>3. Malware Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Malware attacks have caused significant concerns among social network users as they can cause massive privacy breaches to their victims. Malware is software used by cybercriminals to disrupt the digital operations of a targeted individual. It can be spread by malicious advertisements, infected flash disks, apps, or even text messages.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1722\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Malware-Attacks.jpg\" alt=\"Malware Attacks\" width=\"640\" height=\"442\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Malware-Attacks.jpg 726w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Malware-Attacks-300x207.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h3>\n<h3><span class=\"ez-toc-section\" id=\"4_Botnet_Attacks\"><\/span>4. Botnet Attacks<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A botnet refers to a group of malware-infected computers under the control of a cyber-criminal. These computers are used to perform undesirable activities like sending spam emails and theft of data. Botnets have advanced abilities to consist of millions of machines.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Fake_News\"><\/span>5. Fake News<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Many people rely on social networks to update them on the news happening all over the world.\u00a0 Cybercriminals understand the vast reach potential of social networks and are regularly posting fake news to dupe unsuspecting users. Fake news can be anything from job offers, false prize winnings, fake promotions amongst others<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1723\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Fake-News.jpg\" alt=\"Fake News\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Fake-News.jpg 750w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Fake-News-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h3>\n<h3><span class=\"ez-toc-section\" id=\"6_Identity_Theft\"><\/span>6. Identity Theft<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Imagine discovering a bounty on your head in the dailies for a purported criminal activity you know nothing about? \u00a0What about finding out that someone is using the identity of a loved one that passed on? This is how far some criminals can go to achieve their ambitions and protecting yourself from identity theft is crucial if you frequently use social networks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"7_Cyber_Bullying\"><\/span>7. Cyber Bullying<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Social networks provide avenues for laughter and interesting banter from all sorts of topics; politics, entertainment, business, beauty, and technology. However, the ugly side of social media manifests in <a href=\"https:\/\/education.clickdo.co.uk\/top-teacher-tips-for-cyberbullying-and-social-media-bullying\/\" target=\"_blank\" rel=\"noopener\">cyber bullying<\/a>, where social network users attack an individual&#8217;s personality, sometimes leading to ugly outcomes like suicide.<\/p>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1724\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Cyber-Bullying.jpg\" alt=\"Cyber Bullying\" width=\"640\" height=\"428\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Cyber-Bullying.jpg 750w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Cyber-Bullying-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h3>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Protect_Your_Privacy\"><\/span>How to Protect Your Privacy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Social networks users often have to share personal information to join the networks and converse with other users in their interactions. Protecting your privacy is a serious concern that should drive all your engagements on social media. Here are a few ways you can protect your personal information:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"1_Always_use_Strong_Passwords\"><\/span>1. Always use Strong Passwords<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A strong password can prevent fraudsters from accessing your account and retrieving private information.\u00a0 Common, easily guessable passwords like 123456, monkey or 11111 and other similar ones should be avoided. A strong password comprises a minimum of 8 words, mixed casing, letters and number combinations and inclusion of special characters such as #$%^. While strong passwords protect your accounts, email security protocols like <a href=\"https:\/\/powerdmarc.com\/dmarc-vs-dkim\/\" target=\"_blank\" rel=\"noopener\">DMARC and DKIM<\/a> help prevent attackers from impersonating trusted entities and tricking users into revealing their credentials.<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1725\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Always-use-Strong-Passwords.jpg\" alt=\"Always use Strong Passwords\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Always-use-Strong-Passwords.jpg 750w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Always-use-Strong-Passwords-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h4>\n<h3><span class=\"ez-toc-section\" id=\"2_Avoid_Using_Public_Wi-Fi\"><\/span>2. Avoid Using Public Wi-Fi<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>We all love freebies, especially on the go and most social networks cannot resist the temptation of free Wi-Fi. This type of internet connection is often unsecured, meaning hackers can intercept any information you share while logged in. There is also a risk of logging into a rogue connection set up by fraudsters, which mimics a genuine one.<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1726\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Avoid-Using-Public-Wi-Fi.jpg\" alt=\"Avoid Using Public Wi-Fi\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Avoid-Using-Public-Wi-Fi.jpg 750w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Avoid-Using-Public-Wi-Fi-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h4>\n<h3><span class=\"ez-toc-section\" id=\"3_Use_a_VPN\"><\/span>3. Use a VPN<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The term VPN means virtual private network and is arguably one of the most effective protection for users of social networks. A <a href=\"https:\/\/nordvpn.com\/servers\/uk\/\" target=\"_blank\" rel=\"noopener noreferrer\">VPN<\/a> \u00a0hides your IP address, enabling you to use social networks without traceability. They are useful if you use public networks as they hide important information like your browsing history, devices, IP address and location, which can jeopardize your privacy.<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1727\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Use-a-VPN.jpg\" alt=\"Use a VPN\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Use-a-VPN.jpg 750w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Use-a-VPN-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h4>\n<h3><span class=\"ez-toc-section\" id=\"4_Use_Antivirus_Protection\"><\/span>4. Use Antivirus Protection<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>An antivirus is a useful cybersecurity tool when used and updated regularly. Antivirus software works by identifying viruses and known malware like spyware, worms, and Trojan Horses and isolating them from the rest of the files for the user\u2019s action. However, keep in mind that antiviruses will only offer protection against known threats.<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1728\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Use-Antivirus-Protection.jpg\" alt=\"Use Antivirus Protection\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Use-Antivirus-Protection.jpg 750w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Use-Antivirus-Protection-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h4>\n<h3><span class=\"ez-toc-section\" id=\"5_Update_Your_System_as_Required\"><\/span>5. Update Your System as Required<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Ignoring system update alerts is a common practice for many users of social networks. These users don&#8217;t understand that software updates contain necessary revisions that may fix discovered security lapses targeted by hackers.<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1729\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Update-Your-System-as-Required.jpg\" alt=\"Update Your System as Required\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Update-Your-System-as-Required.jpg 750w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Update-Your-System-as-Required-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h4>\n<h3><span class=\"ez-toc-section\" id=\"6_Be_Wary_of_Clicking_on_Links\"><\/span>6. Be Wary of Clicking on Links<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Many users of social networks click on links sent to their mailboxes or direct messages without much thought. Hackers use links to retrieve the information of unsuspecting recipients without raising suspicion easily. Beware of unsolicited emails, invalid website certificates, unencrypted sites, or strange URL characters before clicking any link.<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1730\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Be-Wary-of-Clicking-on-Links.jpg\" alt=\"Be Wary of Clicking on Links\" width=\"640\" height=\"360\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Be-Wary-of-Clicking-on-Links.jpg 889w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Be-Wary-of-Clicking-on-Links-300x169.jpg 300w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Be-Wary-of-Clicking-on-Links-768x432.jpg 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h4>\n<h3><span class=\"ez-toc-section\" id=\"7_Avoid_Adding_Strangers_to_Your_Network\"><\/span>7. Avoid Adding Strangers to Your Network<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>It is normal to receive friend requests from strangers on social networks. While the essence of social networking is enlarging your social circle, you should study the profiles of those sending you friendship or follower requests before adding them to your network. This will keep your data safe from cybercriminals targeting to gain from your friendship.<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1731\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Avoid-Adding-Strangers-to-Your-Network.jpg\" alt=\"Avoid Adding Strangers to Your Network\" width=\"640\" height=\"427\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Avoid-Adding-Strangers-to-Your-Network.jpg 751w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Avoid-Adding-Strangers-to-Your-Network-300x200.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/h4>\n<h3><span class=\"ez-toc-section\" id=\"8_Understand_Security_Settings\"><\/span>8. Understand Security Settings<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><a href=\"https:\/\/www.forbes.com\/sites\/christieterrill\/2017\/04\/28\/what-you-need-to-know-now-about-cybersecurity-and-social-media\/\" target=\"_blank\" rel=\"noopener noreferrer\">Social networks provide a range of security<\/a> setting to enhance the privacy of their users. These settings enable you to decide what to share with third parties and limit access to your profile information. Allowing everyone to access your information is an express leeway for hackers to retrieve your details easily.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-1732\" src=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Understand-Security-Settings.jpg\" alt=\"Understand Security Settings\" width=\"640\" height=\"481\" srcset=\"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Understand-Security-Settings.jpg 667w, https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-content\/uploads\/2020\/09\/Understand-Security-Settings-300x225.jpg 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>The general rule when using social networks is to be cautious at all times. It is difficult to imagine a life without social networks and while using them exposes us to risks, abandoning them is not viable either. These measures are a sure way to ensure you are steps ahead of hackers and your privacy is secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>8 Key Tips to help keep you and your personal information safe Social networks are a necessary engagement for most people today, unlike a few years ago when they were first introduced. They have evolved to become sources of education, employment, business marketing, entertainment, news, and global friendships. Many people get into social networks without [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1733,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[71,135],"tags":[8,128,127],"class_list":["post-1709","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-online-business","category-technology","tag-social-media","tag-social-networking","tag-social-networks"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/posts\/1709","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/comments?post=1709"}],"version-history":[{"count":12,"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/posts\/1709\/revisions"}],"predecessor-version":[{"id":5866,"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/posts\/1709\/revisions\/5866"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/media\/1733"}],"wp:attachment":[{"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/media?parent=1709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/categories?post=1709"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.clickdo.co.uk\/internet-marketing\/wp-json\/wp\/v2\/tags?post=1709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}