We live in an age where privacy seems to slip away as more technologies enter our lives. Inappropriate use of personal data is something that has become a matter of great concern these days.
– Advertisement –
The marketplace has emerged where public shaming is a commodity and shame is an industry. Nowadays money is made on clicks. The more shame, the more clicks and the more the advertising revenue. In this context, there is a dilemma of choosing between privacy and user convenience.
We see many challenges related to privacy, security, data management, accessibility, social inclusion, governance and other information security issues with the use of technology in daily life. There are a few risks arising due to the use of social media tools and technologies, where there is a possibility of losing something of value (i.e. information, reputation, or goodwill)
Approach to risk
‘US groom’ dupes techie of Rs 21.70 lakh in Hyderabad
Hyderabad: MLRIT gets AI and Machine Learning lab
Social activist found dead at home in Hyderabad
click here for more Hyderabad News
* Identify the Risk – Identifying social media threats in terms of vulnerabilities and how they could hamper achieving an objective. (a)Loss of reputation (b) Loss of confidential information, (c) Legal and regulatory violations (c) Social Engineering Crimes (d) Loss of intellectual property.
* Assessing the risk – Assessing the possibilities and consequences of the risk i.e. how it can impact the organisation/individual (a) Economically (b) Technically (c) Politically (d) Socially.
Inversion thinking is the process of asking questions the opposite way.
Instead of thinking about what kind of bus… https://t.co/NJzyYwmLzK
— Masculine Growth 🇬🇷
Thu Jun 03 16:10:00 +0000 2021
* Mitigating the risk – Create a social media risk management governance (a) Select the right listening tools (b) Identify the people responsible for monitoring (c) Identify and engage your emergency contacts (d) Agree on what to monitor for and which channels to monitor (e) Understand legal, regulatory and ethical requirements. (f) Create your severity framework and its classification. (g) Define your incident logging process and protocols. (h) Define best practices based on past experiences. (h) Formulate a feedback loop to help remedy essential causes.
Important setups on social media channels
(a) Approval’s – “Settings” →“Security Settings” >“Login Approvals” >“Get Started.”(b) Trusted Contacts – “Settings” >“Security Settings” >“Trusted Contacts” >“Choose Trusted Contacts.”(c) Review Login History – “Settings” >“Security Settings” >“Where you’re Logged In.”(d) Login Notification – “Settings” >“Login Notification” >“E-mail” and/or “Text.”(e) Third Party Apps – “Settings” >“Security Settings” >“Apps” >“Edit” >“Disable Platforms.”(f) Off Page Activity – “Settings” >“Your Facebook Information” > “Off-page Activity”
(a) Push Notification – “Settings” >“Security and Privacy Settings” >“Send login verification requests to my phone”> when prompted, click “Okay >send me a message”> Click “Yes” on the verification message.(b) Revoke third-party apps – “Settings” >“Apps” >you will be provided with a list of apps that have access to your account >“Revoke Access.”(c) Two-factor authentication- “Settings” >“Security”>“Two-Step Authentication.”(d) Disconnect third-party applications -“Settings”>“Security” >“Connection Applications” >click on any unwanted applications that you want to remove >“Remove App Connection.”
(a) Location Privileges – Settings > Privacy > Location Services > Instagram > Never.(b) Limit Posts – Settings > Privacy > Switch on the Private Account toggle.(c) Less Personal Advs. – Settings > Ads > Data About Your Activity From Partners > Switch the toggles off for all accounts listed.(e) Two factor authentication – Security > Two-Factor Authentication > Get Started.(f) Who Can Message You – Settings > Privacy > Messages > List the contacts(g) Stop Syncing Your Contacts – Settings > Account > Contacts Syncing > Switch the toggle off.
Tips to safeguard your social media
* Block cookies, configure privacy settings to control information sharing* Limit personal information shared on social media* Browse in incognito or private mode* Use a Virtual Private Network (VPN) if required* Use website and router ad-blocks.* Use message applications with end-to-end encryption.* Use a complex password with a capital letter and special characters.* Set up two-factor authentication and secure cloud.* Be careful where you click – watch out for phishing.* Surf websites using only HTTPS:// (Padlock Symbol).* Disable location while browsing the Internet.* Expand short links to prevent malicious attacks.* Use end-to-end encryption messengers.* Never share sensitive information i.e. financial, login credentials, etc online.* Only connect with people that you know and trust in real life.* Consent should be treated the same way for all offline and online interactions.
Stay Tuned to Cyber Talk column for more on internet ethics and digital wellness brought to you by Anil Rachamalla, End Now Foundation, www.endnowfoundation.org