Infinity Insights Infinity Dental Web
  • Infinity Dental Web
  • About Us
  • Portfolio & Case Studies
  • Websites
  • Ask for a Quote
  • Blog

Social Media for Dentists

Be Cyberaware: Social Media Hacks for Avoiding Hackers

Date: October 14, 2015
Category:
  • Social Media for Dentists
Author: Heather
Every three minutes, at least 720 new cybersecurity threats emerge.

Every three minutes, at least 720 new cybersecurity threats emerge.

T-Mobile. Rutgers University. China. It’s hard to remember a time when cybersecurity wasn’t a fixture in the headlines. Online attacks at popular retailers, data leaks, and far-reaching computer viruses have left consumers wondering just how safe their private information really is.

In addition to being National Dental Hygiene month and Breast Cancer Awareness month, October is National Cybersecurity Awareness Month, a public awareness campaign designed to raise awareness about cybersecurity and increasing the resiliency of the nation in the event of a cyber-incident. Each week features information and activities focused on a cybersecurity awareness theme including work place cybersafety, connectivity, and the Internet of things.

Staying cyberaware on social media

Be cyberaware. Stop. Think. Connect.

Be cyberaware. Stop. Think. Connect.

As of January 2014, 74 percent of online adults and 95 percent of teens use social networking sites. In a world where we’re connected 24/7, it’s never been more important to be aware of potential threats. Week three’s theme, Connected Communities and Families: Staying Protected While We Are Always Connected, reminds us that while our social networks are connecting us to our fourth grade teacher, they’re also connecting us to potential hackers.

Here are a few tricks I use to avoid cyberattacks on social networks:

Lock it down.

I check my email, scroll my Facebook newsfeed, post amazing photos with witty captions on Instagram, pay my cell phone bill, check my Walmart receipts for price matches, balance my checkbook, and about a thousand other super personal activities on my phone. I’ve also lost my phone…several times. Yep, it’s disturbing to think about all that personal information in the hands of my phone’s eventual finder.

Lesson? I always password protect my phone. Are there times that it’s slightly annoying that I have to unlock my phone to read my Mom’s fourteenth text of the day? Yes. It is better than an unauthorized user posting to a client Facebook account? Absolutely. Of course, instead of entering a pin, I could always use my fingerprint or one of those nifty patterns if I was so inclined.

Log out.

Staying logged in to social media accounts certainly facilitates faster Snapchats and shaves off precious seconds when you’re trying to live-tweet an event. Of course, this also means a fun-loving spouse or friend has access to your account to post a silly message on your behalf—one of my sorority sisters and her hubby post super cheesy messages from each others accounts about once a month.

But, what if someone more nefarious is posting on your behalf? When the wrong person has access to your unlocked laptop, smartphone, or tablet they have unbridled access to your social media networks.

Think before you click.

I recently received a Facebook friend request from a friend’s Mom. I’m already friends with her, but though maybe she’d accidently deleted me. Upon accepting her invite, she immediately Facebook chat messaged me about a grant she’d just received for Facebook users having trouble paying their bills. She also encouraged me to apply—because if they’re giving out free money, why not? Turns out a hacker had spoofed her account—creating a replica account with her publicly available personal information and photos. PS, this is a good argument for keeping your profile private as well.

Phishing attacks can use email, instant messenger programs, or social posts to direct potential victims to a malicious website on which they request the recipient’s personal information, account login, or credit card number.

They are, at first glance, hard to distinguish from those of a reputable company. Phishing messages are carefully crafted, but often claim there’s a problem that can be easily solved by verifying your personal information, or that you’re a winner of a fictitious contest and you must provide bank information to claim your prize.

Take two.

Whenever possible, opt to use two-factor authentication when logging into an account. Two-factor authentication requires two independent authentication factors. One example is inputting a second code sent to your phone after entering your password. Services such as Gmail, Apple, and Microsoft accounts, Facebook, Twitter, Amazon, and LinkedIn offer this option.

Perfect your password.

Your password is the first and often, only, barrier between an unauthorized user and sensitive information—so make it good.

So what makes a password strong? First, it should have at least eight characters—the more, the better —that are a combination of letters, numbers, and symbols, if allowed. Try not to use the same letters or numbers consecutively. Passwords are typically case sensitive, so use both uppercase and lowercase letters. Avoid using words found in the dictionary, your name, or company name.

A passphrase is typically more secure than a password. You can easily remember a passphrase using a mnemonic device. Finally, don’t recycle passwords. Use a unique password for each social media network and account.

Forgot my password.

So now that you’ve got super strong passwords, chances are you’ll forget one or two—a password manager can help organize your passwords. If resetting your password is as easy as emailing yourself a link, you might be at risk—especially if someone has physical access to your unlocked devices on which you continue to stay logged in to apps (see numbers one and two).

(Go ahead, say password one more time.)

Social networks often offer more advanced methods for restoring the password on a hacked account—e.g., Facebook’s Trusted Contacts feature.

Unlink unused apps.

I just did an audit of my Facebook and Twitter accounts. I had granted permission to access these social accounts to no less than 44 third-party apps. I can honestly say I’ve used all of these in the past 30 days, but if I hadn’t, they’d be gone.

Third-party apps can serve as a backdoor for hackers. If you’re not using an app, unlink it.

It’s a big, online world out there. Stay cybersafe kids.

(Visited 191 times, 1 visits today)

Tags: advertising, app, connect, cyber awareness, cyber security, cyberaware, cyberaware month, cybersecurity, cybersecurity awareness month, dental social media, dental social media blogs, dentists, Facebook, Instagram, Internet, internet of things, IOT, LinkedIn, marketing, online, online safety, post, privacy, protect, share with care, smartphone, social, Social Media, Social Media for Dentists, stop, technology, think, Twitter, Web

Leave a Reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Review Bug Causes Google Reviews to Disappear
  • The Value of Social Media for a Dental Practice
  • ADA Compliance Standards – How to Avoid a Lawsuit
  • What More Can I Do? Social Media and Your Marketing Plan
  • CallRail vs. Kall8
  • Search Trends in 2020
  • Virtual Consult App
  • Search Engine Journal – Don’t You Know This?

Search

Categories

  • Client News (98)
  • Company News (104)
  • Designs (14)
  • Feature Client (4)
  • Local Search (34)
  • Marketing (59)
  • Meet the Team (14)
  • Mobile Websites (13)
  • Regulations (2)
  • Reputation Management (19)
  • SEO (85)
  • Social Media for Dentists (83)
  • Tech Trends (45)
  • Uncategorized (6)
  • Video (8)
  • Website Design (2)

Archives

  • November 2022 (1)
  • January 2022 (1)
  • April 2021 (1)
  • December 2020 (1)
  • November 2020 (1)
  • September 2020 (1)
  • August 2020 (2)
  • July 2020 (1)
  • June 2020 (1)
  • May 2020 (6)
  • April 2020 (5)
  • March 2020 (3)
  • December 2019 (2)
  • October 2019 (2)
  • September 2019 (1)
  • July 2019 (1)
  • June 2019 (1)
  • May 2019 (1)
  • April 2019 (2)
  • March 2019 (1)
  • January 2019 (1)
  • October 2018 (1)
  • September 2018 (3)
  • August 2018 (3)
  • July 2018 (1)
  • May 2018 (1)
  • April 2018 (2)
  • March 2018 (3)
  • February 2018 (1)
  • January 2018 (1)
  • August 2017 (1)
  • July 2017 (1)
  • June 2017 (2)
  • May 2017 (2)
  • April 2017 (1)
  • January 2017 (2)
  • December 2016 (3)
  • November 2016 (1)
  • October 2016 (1)
  • August 2016 (1)
  • July 2016 (4)
  • June 2016 (2)
  • May 2016 (3)
  • April 2016 (1)
  • March 2016 (4)
  • February 2016 (5)
  • January 2016 (4)
  • December 2015 (7)
  • November 2015 (7)
  • October 2015 (6)
  • September 2015 (5)
  • August 2015 (4)
  • July 2015 (4)
  • June 2015 (10)
  • May 2015 (2)
  • April 2015 (1)
  • March 2015 (1)
  • February 2015 (4)
  • January 2015 (1)
  • December 2014 (5)
  • November 2014 (2)
  • October 2014 (6)
  • September 2014 (7)
  • August 2014 (2)
  • July 2014 (8)
  • June 2014 (5)
  • May 2014 (7)
  • April 2014 (4)
  • March 2014 (3)
  • February 2014 (3)
  • January 2014 (7)
  • December 2013 (6)
  • November 2013 (6)
  • October 2013 (6)
  • September 2013 (4)
  • August 2013 (5)
  • July 2013 (5)
  • June 2013 (7)
  • May 2013 (6)
  • April 2013 (4)
  • March 2013 (6)
  • February 2013 (9)
  • January 2013 (7)
  • December 2012 (11)
  • November 2012 (8)
  • October 2012 (5)
  • September 2012 (5)
  • August 2012 (7)
  • July 2012 (4)
  • June 2012 (6)
  • May 2012 (3)
  • April 2012 (5)
  • March 2012 (4)
  • February 2012 (5)
  • January 2012 (5)
  • December 2011 (5)
  • November 2011 (4)
  • October 2011 (4)
  • September 2011 (1)
  • August 2011 (6)
  • July 2011 (5)
  • June 2011 (6)
  • May 2011 (8)
  • April 2011 (9)
  • March 2011 (7)
  • February 2011 (8)
  • January 2011 (8)
  • December 2010 (9)
  • November 2010 (9)
  • October 2010 (9)
  • September 2010 (7)
  • August 2010 (10)
  • July 2010 (8)
  • June 2010 (5)
  • May 2010 (1)
  • April 2010 (4)
  • March 2010 (2)
  • February 2010 (1)
  • November 2009 (2)
  • October 2009 (7)

Tags

advertising American Dental Association Content Management System Websites content marketing cosmetic dentist COVID-19 dental marketing Dental SEO dental social media Dental Website Design Dental Websites Dentist dentists Facebook Facebook marketing general dentist general dentistry Google+ Google Business Listings Google places Google Reviews Google Universal Search Great Dental Websites Infinity Dental Web Instagram Internet Internet Marketing LinkedIn local search marketing Mobile Websites online reviews Pinterest post SEO social Social Media Social Media for Dentists social network technology Twitter Web Yelp Yelp Reviews YouTube Channel
Infinity Dental Web Logo Icon

And now ...
let us grow your practice

BBB Accredited Business badge American Academy of Cosmetic Dentistry Corporate Member badge

© 2009-2023 Infinity Dental Web Inc. IDW logo All rights reserved | Privacy Policy

Email address