Site icon OHSE

Social Media and Privacy Settings

image

Overview:

Social media platforms have become an integral part of our personal and professional lives, but they also pose significant risks to our privacy and security. This module focuses on how to protect your privacy on social media platforms by adjusting privacy settings, limiting data sharing, and recognizing the risks of oversharing personal information.


Learning Objectives:

By the end of this module, learners will:


6.1 The Risks of Oversharing on Social Media

While sharing updates, photos, and personal achievements on social media can be enjoyable, oversharing can expose you to various risks. Cybercriminals can use personal information shared online to carry out targeted attacks, identity theft, or social engineering scams.

Common Risks of Oversharing:

Tips to Avoid Oversharing:


6.2 Adjusting Privacy Settings on Social Media Platforms

Each social media platform offers privacy settings that allow you to control who can see your information, posts, and personal data. It’s essential to review and adjust these settings to protect your privacy.

Steps to Adjust Privacy Settings:


6.3 Protecting Your Identity on Social Media

Social media platforms often encourage users to share personal details, such as work history, education, and location. While this can be useful for networking, it also makes it easier for cybercriminals to gather information about you.

How to Protect Your Identity:


6.4 Recognizing Social Engineering on Social Media

Social engineering is a tactic where cybercriminals manipulate individuals into divulging confidential information by posing as trusted contacts or entities. Social media platforms are prime targets for social engineering attacks.

Examples of Social Engineering Attacks:

How to Avoid Social Engineering Attacks:


6.5 Managing Location Sharing on Social Media

Many social media platforms offer the ability to share your location when you post updates or photos. While this feature can be convenient, it also poses significant privacy and security risks.

Risks of Location Sharing:

How to Manage Location Sharing:


Key Takeaways:

Exit mobile version