In today’s cyber world, social networks are very commonly used by the public and business societies that form part of a global community made up of millions of users.

A social network is typically used by a group of people on the internet who want to communicate and share information. The most common social networks include Facebook, Twitter, Linkedin and Instagram and they are accessible through personal computers, laptops, tablets and smartphones. Although, the respective applications are simple to use, they should be used wisely to avoid personal information from being compromised.

Like any other account, a social network needs ‘protection’ to prevent perpetrators from hacking into the account. The first thing to do is to use a strong password or better still, a ‘pass phrase’.

If the social network offers two factor authentication, enable it. There are also ways how to determine whether an account is healthy and free from eavesdroppers. However, the first line of defence must be the account owner, as we will see later in the article.

Unsolicited requests

When it comes to choosing friends who can access your profile, it is important to make sure that you know whom you are tagging. Avoid accepting unsolicited requests from strangers or suspicious people. Remember that it has become a very common tendency to bloat social networks with fake profiles and in most cases, even the pictures used are fake. One way to confirm whether the picture being used is authentic is through an image search of the picture on Google. See the results, you will be surprised.

Be sceptical of any links that look unusual, such as a link coming from someone you have not spoken to for a long time

Strange behaviour

A common consequence of having a compromised account includes content being posted in the user’s wall without having the knowledge about it. This may get worse if contacts start receiving strange content from the user’s account. All social networks have their support sites, with one of the main support areas covering ‘inappropriate behaviour’.

If an account has been compromised, it should be reported together with the respective findings to the respective social network, while giving the details and all the necessary evidence. The social network will then investigate the report. One example of inappropriate behaviour is ‘bullying’. There are cases where social networks take immediate action and block the perpetrator’s account. Subsequently, the content used for bullying is removed.

Abusive words and texts

Abusive words should also be avoided on social networks. Others should be treated the same as you would want them to treat you. Remember that a social network is a powerful tool and what one posts will remain there on the wall for many years.

Malware infections

Social networks are another source through which malware can be spread. Therefore, it is crucial to be cautious when clicking on unknown links or downloading files through social media accounts.

Links and files on social networks can also include viruses and malware. Never click on links from people you don’t know and don’t download files sent to you through a social media platform.

Be sceptical of any links that look unusual, such as a link coming from someone you have not spoken to for a long time. Even someone you know could have an account hacked and used to spread malware.

Unsolicited connections

Users of social networks in public places should avoid connecting to unprotected Wi-Fi hot spots. These can be controlled by hackers. This applies to general Wi-Fi and for network usage from all devices.

Another risk of using unsolicited connections is that they could be coming from a computer that does not belong to you.

You do not have any information about the computer or about the security measures that are in place. Neither do you know if there is any monitoring software or spyware installed on the computer; or if it is infected with any computer viruses. Therefore, it is important to be vigilant.

Remember, that the first line of defence must be the account owner himself.

Raymond Azzopardi is senior team leader at the Malta Information Technology Agency.

Sign up to our free newsletters

Get the best updates straight to your inbox:
Please select at least one mailing list.

You can unsubscribe at any time by clicking the link in the footer of our emails. We use Mailchimp as our marketing platform. By subscribing, you acknowledge that your information will be transferred to Mailchimp for processing.