Social Media Activities That Put You at Risk

., start learning from this page to earn points towards a Starbucks gift card!*
Hi, I'm Josh, the founder of SmartSocial.com.
Keep reading, and soon you'll get a chance to share your thoughts and earn points for a reward!
Social Media Activities That Put You at Risk

., start learning from this page to earn points!*
Hello, I'm Josh, the founder of SmartSocial.com.
Don't leave this page until you fill out our feedback form that will appear after you learn from the resources...

Logging into social media apps and websites on different devices such as school computers or friend’s phones and oversharing on social media can increase your risk of being hacked or exposed to inappropriate content. Additionally, social media posts can seem harmless, but every little bit of information you share online can be a hint for hackers to breach your privacy and uncover your passwords.
We asked 10 experts to share their tips for students to be smart about using technology, social media, friend’s devices, and more.
3. Catfish accounts exist to trick users into sharing information
Katherine Brown, Founder & Marketing Director, Spyic

Using secure internet connections and practicing safe browsing are two basic practices students should adopt. Pop-up ads should be ignored and not clicked upon unless they are on trusted websites. Files should also only be downloaded from safe and trusted sites. Students should maintain up-to-date anti-virus systems and create strong passwords for their accounts (and use a password manager with the strongest password they can remember).
Live locations or check-ins, home addresses, financial information, and names of family members are examples of information that students should NEVER post online. Such personal information makes it easier for persons with intent to cause harm or stalkers to locate you.
Catfish accounts run by people masquerading as someone else are often used to engage social media users and trick them into sharing information. This is often done by engaging a user and gaining their trust first. Phishing is also used to obtain personal information. Pop-up ads and online shopping from unsecured sites or pages that require personal information is also a deceitful ploy.
Certain browsers store usernames and passwords to accounts logged onto, and the gadget owner can later go to their browser and access your credentials. Forgetting to log out of your account can also grant someone else access to your account while keyloggers may also be used to record personal information keyed in. These are examples of risks faced when logging onto your accounts on somebody else's devices.
5. Don’t connect to public Wi-Fi connections, use your data plan
Steven Emerson, Technical Expert, Mobile Biponi

As much as possible, don't connect to public Wi-Fi. Once you connect to public Wi-Fi, all of your information will be vulnerable to hackers. This includes birthdays, social security numbers, insurance policy numbers, and even bank details. Hence, as much as possible, use your own mobile data so you won't be vulnerable to attacks.
Be careful when joining social media platforms too. There was a social media platform that gained popularity recently that is known to put users' information at risk. Users did not mind this because they are more concerned about the amount of money they can earn on the site. Photo aging apps and others that become popular out of fun can also be dangerous. They will be able to steal your photo, edit it the way they want to, and share it with whomever they want because you used their app.
Basically, to be safe online, always think before you click.
6. Sensitive and personal information can be in the background of photos
Mega Jewell, MEGA
A few major safety risks when using social media that are often the most overlooked:
• Don’t share your boarding pass photo. Time and time again people share photos of their boarding passes with codes that can potentially reveal their personal information, not to mention their current location and future destination. Many people also write how long they’ll be gone, notifying that there’s an unoccupied house back home
• Work from home selfies. These can be more dangerous than we think. What’s on your desk right now? Bills? Bank statements? Our phone cameras are way too sophisticated now and people can see sensitive information by zooming in or in the background that gives away sensitive information or something else personal
• Check-ins are fun but can have some serious risks to them. Predators have been known to follow people who have checked in to a location. If you must check in, consider doing so when you are leaving
7. Never trust any platform’s security system or policy
Michael Carrida
There are many ways to practice safety habits online. Most people do not realize there are simple ways hackers can gain access to your device. Hiding general information, such as name, address, phone number, and emails isn't enough. By uploading files, for example, images can already put you at risk of getting hacked. Regardless of countless measures to protect your account, you're still vulnerable to hackers. When hackers do gain access to your device, all of your information inside will be at risk. It can be done by obtaining your device's IP address through images you shared on social media.
Tools like remote access can make hacker's jobs easier once they have your IP address. Do not upload images without removing their properties and personal information. It's more secure to keep your entire profile private from strangers. Ignore social media friend requests from someone you've never met personally. Remind yourself of your complete unawareness of their true intention.
When logging into your account to a different device you can become a victim of keylogging. Keylogging records every word you type, including your passwords and usernames. Credentials you left behind on the keylogging database can be used to infiltrate your account. To protect yourself from this, avoid using a stranger's device to log in to your credentials. Try to think of other options as much as you can when prompted upon by emergencies.
Still, the best way to protect yourself from hackers is by not relying on a platform's security system.
8. Trust your instincts when it comes to strangers on the internet
Felix Maberly, Social Media and Marketing Manager at Tiger Supplies

First, students have to understand that there are billions of people accessing the internet daily. Think carefully before sharing pictures or videos on the internet, even when you think it's private because nothing on the internet is entirely private.
Don't share your info with people you don't know. Trust your instincts; if someone approaches you on the internet making you feel uncomfortable or in danger, cut short your communication with them immediately and inform your parents or your guardian.
It's not safe to meet someone you just met online, even if you've communicated with them for a long time since they may not be who they say they are. If you want to meet someone you met online, meet in a public place and let a trusted adult accompany you.
9. Don't log in on a device not owned by you
Josh Wright, CEO, CellPhoneDeal

One of the risks you face when logging onto a device that is not your own is that your information could end up in the wrong hands. Even if the person whose device it is, is your friend, you don’t know for certain how they use that device and whether it has been breached or not.
In addition, you don’t know if, after you’ve logged into the device, they’ll even remember to remove your information to keep it safe from potential breaches. There are so many factors that can come into play when logging onto devices that aren’t your own. You don’t have control of what happens to that device before or after you’ve used it to log into your accounts, so it’s best just to avoid doing so.
Conclusion
Social media is not all negative, but unfortunately, with how public the internet is these days, the less personal information shared online, the better. Consider running your post by a friend or trusted adult before posting it to see if there’s any sensitive information they can interpret from it. Be leery of public Wi-Fi networks and public computers.
Become a member or log in to learn more on this topic
Join Our Next Live Parent Q&A Events (Bring Your Kids!)
Become a Very Informed Parent (VIP) to get our social media suggestions in your email every Tuesday & Thursday.


Hello, I'm Josh, the founder of SmartSocial.com. Protect your family by taking my 1 minute quiz
This quiz will help you understand how safe your family is

Schools & Districts: Partner with us to protect your community online
Our remote presentations (and website) teach over a million parents and students each year how to be safe so they can shine online. We teach students how their accounts can be used to create a portfolio of positive accomplishments that impress colleges and employers.

Join Our Smart Social Podcast
each week on iTunes
With over 500 episodes, Josh Ochs interviews psychologists, therapists, counselors, teachers, and parents while showing you how to navigate social media to someday shine online.
Listen on: