Often, we wish to share information on social media in hopes of bringing joy to others or celebrating exciting events!  Who wouldn’t?  Unfortunately, when you share some information, it can be used against you.

Don’t be a victim of oversharing by using the following information:

Identity Theft

  • Information posted online could potentially be used to steal your identity. Don’t unnecessarily share information used with “challenge question” answers.

Social Engineering

  • You may refrain from posting personal information on social networks, however, your profile data alone could potentially be used in social engineering schemes. Limit what is shared.
  • This can also be used to compromise your work accounts.

Real-world Threats

  • Posting about upcoming trips or vacations my open you up to threats like stalking, home burglary or even abduction. We suggest sharing photos and travel activity after you’ve returned.
  • Location sharing in general paints a picture of your regular activities and habits, letting people know when and where you might (or might not) be at any given time. If you consider yourself as a “high profile” individual, we recommend disabling all location services for social media.

Damaged Reputation

  • Information posted about partying, drinking, drug use or any other questionable activities could be seen by employers, recruiters, hiring managers, landlords or others. Additionally, it can also be used to damage your employer’s reputation.

Phishing, Spear Phishing, Vishing & Whaling

  • Information posted online could be used to add credibility to phishing emails or phone calls by referencing personal or company information. This has been used heavily by criminals to make money transfers and other account fraud.

Tipping Off Competitors

  • Sharing undisclosed details about projects or products could be used by competitors and harm the business. If you are working on sensitive information or new products, be careful to not disclose harmful information.
  • Sharing trademarks or Servicemarks before they are registered can lead to the competition buying these before you do.

If you have any additional questions or concerns, don’t hesitate to reach out.

 

Patrick Kelley, CTO

patrick.kelley@criticalpathsecurity.com

Critical Path Security

770-224-6482