9 Essential Social Media Cyber Security Tips For 2023

Date:

Share:

Jump To

As the digital landscape continues to evolve at a frankly frightening pace, social media has – for better or worse – become an integral part of daily life for billions of people worldwide. 

With the increased use of these platforms comes a heightened risk of cyber threats and attacks, which appear to be growing ever more complex as social media permeates just about every facet of our lives

In 2023, protecting one’s online presence is more important than ever. So, put that Instagram scrolling on pause, swipe left on that fella holding a freshly caught fish, and banish that incredibly niche rant to your Twitter drafts, for today IDEAL is the main character. Join us as we explore 9 essential social media cyber security tips to ensure that users stay safe. 

Strengthen Account Security With Two-Factor Authentication

Though Elon Musk caused something of a furore (and a danger to plenty of people’s security online) when he announced that Twitter would charge for two-factor authentication (2FA), the proposed move at least brought the importance of 2FA into the public consciousness.

Enabling 2FA on all of your social media accounts adds an extra layer of protection by requiring users to provide additional verification, such as a unique code sent to their mobile device. By enabling 2FA on social media accounts, individuals can significantly reduce the risk of unauthorised access. Though they perhaps can’t reduce the frustration felt at having to open up your SMS inbox just to have a cheeky little scroll after dinner.

Photo by Jep Gambardella: https://www.pexels.com/photo/concentrated-black-operator-surfing-laptop-7690086/

Create Strong, Unique Passwords For Each Account

By using a combination of upper and lowercase letters, numbers, and special characters, users should create strong, unique passwords for each social media account – if they can remember them of course. Consider using a password manager to securely store and generate passwords if you’re particularly forgetful, which beats scrawling down your passwords on a post-it note, for sure. 

Avoiding easily guessable phrases or personal information can help prevent cybercriminals from gaining access to multiple accounts through password reuse. 

Phishing attacks often rely on users clicking on malicious links or downloading harmful attachments. To avoid falling victim to such scams, it is essential to verify the legitimacy of any link or attachment before engaging with it. This can be done by hovering over the link to check the URL or conducting a quick external search to confirm the authenticity of the source.

Some common phishing attacks aimed at social media users include:

  • Direct messages (DM) with phishing links: Cybercriminals often send messages containing malicious links, either from compromised accounts or fake profiles. These links may appear to be interesting content, offers, or even security updates, but often lead to phishing websites designed to steal login credentials or personal information.
  • Fake friend requests: A common method used by cybercriminals involves creating fake profiles that imitate real people or entities, sending friend requests to targeted users, and subsequently sharing phishing links or eliciting personal details. If your secondary school crush suddenly gets in touch after decades of radio silence, exercise a little caution. 
  • Account verification scams: In these phishing attacks, scammers pose as social media platforms and send messages claiming that the user’s account requires verification. They typically provide a link and request users to enter their login credentials, which are then stolen by the cybercriminal. Often, an incentive will be offered, such as the much sought-after blue check. Be wary.
  • Social media quizzes and surveys: Cybercriminals often create seemingly harmless quizzes or surveys that request users to enter personal information or grant unnecessary permissions, in exchange for you finding out which Harry Potter character you are. This information can then be exploited for identity theft or other malicious purposes.
  • Malicious app requests: Sometimes, phishing attacks involve tricking users into installing fake or malicious apps that request excessive permissions, putting users’ data at risk.
  • Impersonation of popular brands or celebrities: Phishing attacks may involve impersonating popular brands, celebrities, or other figures with a large following, attempting to deceive users into following a malicious link or downloading a suspicious attachment. Rihanna probably hasn’t personally got in touch with her private photo album.
  • Fake prize promotions or contests: Scammers often create promotions or contests that promise attractive prizes, asking users to share personal information or click on phishing links as part of the entry process, only to exploit the collected data for malicious purposes. If it feels too good to be true, it probably is.
  • Donation or charity scams: In times of crisis, cybercriminals sometimes create fake donation pages or charity campaigns on social media, soliciting sensitive information under the guise of helping those in need. Rather than completely giving up on being philanthropic, just exercise extra scrutiny or donate only to charities registered with the official Charity Commission for England and Wales (CCEW), the Office of the Scottish Charity Regulator (OSCR), or the Charity Commission for Northern Ireland (CCNI).

Limit The Amount Of Personal Information Shared Online

The more personal information shared on social media, the easier it becomes for cybercriminals to target individuals. Users should be mindful of the information they post – particularly regarding their location – and consider adjusting privacy settings to limit who can view their content.

Read: How to keep your home safe during summer holidays

Regularly Update Software And Applications

As the Virtual CISOs at Littlefish CISO tell us, outdated software and applications can leave devices particularly vulnerable to cyberattacks. Ensuring that all devices are updated with the latest security patches and app versions can help protect against potential threats. Consider turning on ‘automatic updates’ on your device’s settings for all of your apps – this will cover Instagram, TikTok and the rest.

Be Wary Of Public Wi-Fi Networks

Public Wi-Fi networks can be a breeding ground for cybercriminals looking to intercept data. When using social media on public networks, individuals should consider using a virtual private network (VPN) to encrypt their data and keep it safe from prying eyes. This is particularly crucial for travellers, when public networks are more commonly used and some of the usual caution is thrown to the wind in favour of a spontaneous spirit and sense of frivolity.

Regularly Monitor Account Activity

Regularly checking social media accounts for suspicious activity can help users identify potential breaches early on. If any unauthorised access or unusual behaviour is detected, individuals should take immediate action to secure their accounts and report the incident to the platform.

Backup Important Data

In the event of a cyberattack or account compromise, having a backup of important data can save users from losing valuable information. Regularly backing up data, such as photos and messages, can help ensure that personal content remains safe and accessible even if an account is compromised.

Some of the most secure places to back-up your photos include:

  • Google Photos: Offers free unlimited storage for high-quality photos and easy access across devices.
  • iCloud: Seamless integration with Apple devices, 5GB free storage, and upgradable storage plans.
  • Amazon Photos: For Amazon Prime members, unlimited photo storage and 5GB for video storage; easy access via Amazon app or website.
  • BT Cloud: BT customers receive free cloud storage ranging from 10GB to 1,000GB; accessible online and via an app.
  • Dropbox: Popular cloud storage service with a well-designed app; 2GB free storage, upgradable with various plans.
  • Microsoft OneDrive: Works well with Windows devices, 5GB free storage, upgradable with Office 365 subscription.
  • pCloud: Offers up to 10GB free storage, user-friendly, encrypted service, and upgradable plans available.

Regularly Update Your Privacy Settings

Social media platforms frequently update their privacy settings, which can sometimes result in changes to your default preferences. Make a habit of reviewing your privacy settings on a regular basis to ensure that your personal information remains protected. Adjust your settings to limit the visibility of your posts and personal details to only those you trust.

The Bottom Line

By implementing these essential social media cyber security measures, users can enjoy the benefits of connecting with others online while safeguarding their digital presence. As technology continues to advance, staying vigilant and proactive in protecting one’s online identity will remain a top priority for years to come.

Latest From Us

Like That? You'll Love This...

Everybody's clicking on

Just Published...

The Ideal Alternative Wedding: Quirky Swaps For Wedding Day Traditions

Weddings are a celebration of love, unity, and the beginning of a new chapter. While traditional weddings have their charm, more couples are seeking to infuse their big day with personal touches that reflect their...

Getting More Prebiotics In Your Diet: The Unsung Heroes Of Gut Health

Do you want a happy microbiome? If the answer isn’t yes, you probably haven’t read about probiotics and their potential benefits for gut health. These live bacteria, found in foods like yoghurt and fermented vegetables,...

5 Refreshing Coffee Drinks To Enjoy At Home This Summer

As the summer heat shows some signs of finally emerging, there's nothing quite like the prospect of a refreshing coffee drink to keep you cool and invigorated. Whether you're lounging by the pool, hosting a...

All Our latest content...