Tips and tricks for becoming a better social media consumer

Part IV - Surveying Social Media

University of Montana professor of Journalism Lee Banville said the engagement of malicious or false information is just a part of how social media works. Much like how a sensational newspaper would write a controversial headline to entice more readers, the grabbing of reactions is built in to get people to click on links or engage with a post.

"Everything is easy to share on social media apps. It's built around you easily sharing information that may provoke some kind of reaction, whether it's love, it makes me laugh, makes me angry." Banville said. "The problem is the platform is built and makes its money by getting you to react, not getting you to think."

Though most posts come from a person or company that is honest and stands behind their information, a small amount of social media accounts are based on hacking and making money off of some part of another user's personal data.

To navigate social media begins knowing the basics of how one's profile looks to the world. Whether a user knows it or not, the first five minutes of setting up a social media account will largely affect how others interact with it in the future.

Like public record accounts, social media presents a plethora of information for individuals to see. A public Facebook account can include one's full name, connected contact points like emails and phone numbers and more personal information. Become familiar with the privacy policies of the social media channels you use and customize your privacy settings to control who sees what. These terms of services might be a long read, but they really do say what information a company can receive from a user.

While social media at its most basic is simple communication with others, there are complexities to making sure your information is secured. 

Missoula County Sheriff Deputy Garret Van Hoose said it's important to protect a person's information from hackers looking to steal information to make money. He recommended making specific restrictions on an account, like a credit account. While a person can purchase identity theft protection from a company, there are other alternatives too. 

"You can freeze your credit and you can create a password protection on your credit report to where in order for someone to open up a new account, they have to give a password," Van Hoose said. "Just make sure that if you do that, it's something you're going to remember 10 years from now, because it could be a problem."

Some information about a person's identity is hard to conceal, however. For instance Van Hoose noted a person's place of address is usually public on a county auditor website. 

"It's hard to 100% protect because you have so many sources out there that are publicly available information, where people can just simply do a Google search,'' Van Hoose said. "If you have moderate Google skills, you can find a lot of information about a person."

The Small Business Chronicle reported that not only can hackers get this information from you, but they can send direct messages to friends or contacts on the app, which could spread malware from the original account. 

Being a smart consumer involves basic identity protection and the knowledge to not fall for phishing schemes to take that information. It also includes knowing what is appropriate to post online, whether that be a personal opinion or a picture of you and friends, as well as what is beneficial for your mental and relational health. 

Tips for keeping a smart online presence

1. Passwords. Use a strong password. The longer and character-diverse it is, the more secure it will be. If a person has multiple social media accounts, use a different password or variation for each of your social media accounts to keep information from being centralized.

2. Set up your security answers. This option is available for most social media sites. Make sure this information is not public knowledge, like an address or maiden name, as these can possibly be found in public databases.

3. Be selective with friend requests. If you don't know the person, don't accept their request. It could be a fake account, or an account that is simply looking to spam users with ads. Being intentional with who you follow also helps limit unhealthy comparisons.

4. Don't give out personal information to unknown accounts. Phishing accounts are often fake personal profiles created to message people in search of money, information or to communicate with people as a character the user falsified. These accounts sometimes appear realistic, having photos of a person with captions. Despite the legitimate look of these accounts, having a person you don't know message you is a red flag.

5. Click links with caution. Social media accounts are regularly hacked. Look out for language or content that does not sound like something your friend would post. These links could show up in a user's direct messaging, or be on a friend's public post.

6. Be careful about what you share. Don't reveal sensitive personal information like a home address, financial information or phone number. The more you post the easier it is to have your identity stolen. Employers and others will also use social media to learn more about you during the hiring process. Make sure privacy settings are set so what they see is the best representation of you.

7. Develop good social skills online. Know the context in which you are posting. Don't disclose too much about yourself too quickly. Ensure youth know it is okay to say no and when to reach out for help.

8. Safeguard against unhealthy relationships. Be aware of unhealthy comparisons you are making with people. Ask someone to meet through an online platform where you can see their face. If someone is reluctant to do that, it should be a red flag that this may not be a safe relationship.

9. Set limits. Be mindful of how much time you are spending on social media and how the content you are exposing yourself to is affecting you. Either set a timer or establish other cues that will help break the pattern of reinforcement.

10. Regulate Internet-connected devices used by young children. Keep them in common spaces, like family rooms and check in on the device to make sure they are not being contacted by unknown people.

11. Have intentional conversations about cyberbullying with youth. This helps open the door for youth to reach out and get the support they need despite the shame they may feel.

12. Protect your computer or phone by installing antivirus software to safeguard. Also ensure that your browser, operating system and software are kept up to date.

13. Log off. If using a public Internet source or a shared computer, remember to log off when you're done.

14. Do your own research. Misinformation is prevalent on many social media apps. Though community guidelines on most apps prevent the spreading of hateful or violent posts, many companies allow false claims as a part of protecting free speech. When clicking on a link, look to see what the website is, the company running it and who the author is too.

15. Avoid using social media with an "anonymous" mindset. Though users can disguise their identity on social media, Van Hoose said people can still see the words they say and know they come from an actual person. Be respectful and say what you would post online like you would as if you were talking to someone in-person.

Protecting oneself from hackers and misinformation is not perfect. Navigating through social media involves some risk of having personal information stolen or being attacked online. Despite that, social media can be a way to connect with others if risks are minimized by maintaining a smart online presence.

 

Reader Comments(0)