Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

New Study: Risky Behavior Common on Social Media Sites

Although more than 80 percent of the respondents to a new survey conducted by the Ponemon Institute expressed concern about the security of social media, more than half of these same individuals admitted they do not take any steps to actively protect themselves.Dangers of Social Media and Privacy

Although more than 80 percent of the respondents to a new survey conducted by the Ponemon Institute expressed concern about the security of social media, more than half of these same individuals admitted they do not take any steps to actively protect themselves.Dangers of Social Media and Privacy

The survey, sponsored by ProtectMyID.com, also revealed that individuals who have been victims of identity theft are just as likely to be lax in securing their personal information online as those who haven’t. In fact, survey results from identity theft victims and non-victims are virtually identical.

Other key findings:

• Approximately 65 percent of users do not use high privacy or security settings on their social media sites.

• More than 90 percent do not review Websites’ privacy policies before using them.

• Approximately 40 percent share their physical home address on social media.

All of these practices increase users’ vulnerability to identity theft.

Corporate Exposure

The risks involved may not be limited to the individual user. According to a Robert Half survey conducted in October, 2009, 46 percent of corporations permit some use of social networks during the workday. Nineteen percent permit use for business purposes only, but 27 permit at least some personal use.

Advertisement. Scroll to continue reading.

“The risks of identity theft through social media are not limited to personal damages, as professional and corporate data can also be compromised as a result of such breaches,” said Jennifer Leuer, general manager of survey sponsor ProtectMyID.com. “Oftentimes, through social engineering, an individual’s personal data is used to access secure corporate databases, and this can be the same type of information which is shared regularly across social media pages and profiles.”

The reason users expose themselves to obvious risks seems to lie in an “it won’t happen to me” mentality. Although most survey respondents expressed concern about online security and privacy, nearly 90 percent did not feel that identity theft was a likely risk from using social media sites. In fact, over 40 percent said they would continue to use a site even if they knew it did not adequately protect their privacy or security.

Safe Social Networking at Home and within the Enterprise

According to ProtectMyID.com, users who want to protect themselves and their companies must:

• Thoroughly review the privacy policy of any social networking site before using it.

• Avoid passwords that can be easily cracked. These include passwords with common information such as the user’s home town or a pet’s name.

• Always log off when away from their computer – or use a secure screen saver.

• Use antivirus software and keep it updated to foil keystroke loggers and other malware commonly used for identity theft.

• Avoid using wireless networks that are not secure.

 

Related Content:

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Phishing

The easiest way for a cyber-attacker to gain access to sensitive data is by compromising an end user’s identity and credentials. Things get even...

Fraud & Identity Theft

Famed hacker Kevin Mitnick has died after a battle with pancreatic cancer.  At the time of his death, he was Chief Hacking Officer at...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...