How do I make my Social Media Profiles as Private as Possible?

Rsh Web Services
6 min readJun 15, 2021

We know that we need to watch what we share on the Social Media sites. But do we know how to control over what is actually shown to the public? Below are some tips you can use to improve your privacy on 5 of the most popular social networks: Instagram Facebook Twitter, Pinterest, Tumblr, YouTube, LinkedIn, TikTok

Your Social Media Accounts

Facebook Privacy Settings
Secure Your Twitter Profile
Instagram Pictures
Pinterest Privacy Settings

Tumblr Privacy Settings
YouTube Privacy Settings
LinkedIn Privacy Settings
TikTok Privacy Settings

Each time you post on social media, you might be revealing more than you think to a wider audience than you expected. Even Employers are looking at Social Media profiles of their potential employees in order to screen job applicants. A recent article at Money.com, Boss’s Snoop on Social Media Profiles found that 60% of employers check out the social media pages of job candidates. We listed some steps you can take in order to reduce your private information that is accessible online of the 3 most popular social networks

Concerns with Social Media Privacy

Recruiters try to retrieve social media information when vetting applicants Social profiling is the act of measuring a person based on their interaction and influence on social media platforms. Some estimates say that 43% of employers used information online in order to not hire someone and 40% use social media to screen candidates, including their social conduct. Although it can be important in some ways, it does show only one side of a multi-dimensional person. It assumes that if there is no social profile, or if you have a low social influence score, you are automatically less worthy as an employee

Do you take steps to prevent cyberstalking when you use social media? Cyberstalking may sound like just the electronic and modern form of traditional, face-to-face stalking. It can also include real-time and off line stalking. However, cyberstalking has a completely different set of victims. Traditional stalking is usually understood to affect women as victims. Cyberstalking, on the other hand, impacts nearly 40% of men. Also, traditional stalking is usually done by ex-partners or certain associates of the victim; a large part of cyberstalking is done now by complete strangers. The increase in cyberstalking is possibly due to the ease of information access. Cyber-stalkers can attain geo-location information that is automatically turned on for most smartphones. Not to mention the fact that we willingly share this information ourselves by geotagging every single picture we share on our social profiles

Government surveillance is also a threat to online privacy. Warrantless searches have been in and out of the news for some time. However, it wasn’t until the revelations by Edward Snowden that they gained front-page attention, and the focus zoomed in on the government’s standard of accessing users’ private information without a warrant. In the U.S. the courts determined back in 1967 Case known as Katz v. United States, well before the social media age that any person who willingly makes information public is not protected by the Fourth Amendment, and therefore requires no warrant. Even information that is meant to be kept private, such as information shared with a friend, is often interpreted as not being intended to be private as there is no guarantee that the recipient would keep that information private. The NSA is known to have worked with Facebook, Google and others through the Prism Program to monitor user information that included email content, search history, live chats and file transfers

Many companies collect visitor data and then sell it to others This is where the tracking comes in. Several websites set cookies to your device once you visit them. The cookie places information on your device to later identify a returning user. That is a problem, as some cookies can crawl and track you to other websites. Identifying your behavior patterns online. Also several online services you opt-in to use, track your activity while you use their services

Facebook and the majority of social media sites, are tracking and recording what you do, what you like, your comments and messages, your shares, and all other behavior. They then can sell this information to companies or as part of their advertising services, as it helps to sell products and services more easily and in a more targeted way

Privacy and Security on Social Media

We can still maintain some privacy on platforms where we share everything. Even if you are not concerned about the privacy threats mentioned here. You may not like the idea of potential employers being able to see your social media posts. Protecting your social media profile and staying active at the same time may sound quite troubling at first. But it all becomes super easy when you know what to look for and what to fix. We will help you with that

Phishing scams are very effective because they can be very deceptive. You’re emailed a message saying that your account has been hacked, and you need to click the link in order to restore your account. You click on it, enter your login information, and voila, you’ve been hacked! That was a fake email and a fake site, and you wouldn’t know until your private information gets stolen. In general, don’t click on links shared by people you don’t know

Unfortunately it is still true that the most popular password is still “password.” It’s important to have a strong password, But many people take the easy route. You DO NOT need to change your passwords regularly IF it is already a strong password. You should be using a combination of capital letters, numerals, letters and punctuation
See our blog on Creating a Strong Password
Also see Do not trust password strength meters

If you’ve set up your new strong and unique password, you should also enable two-factor authentication, or at least login verification. This feature adds an extra security layer by requiring one more authentication step after entering your password. When two-factor authentication is enabled, it sends a code to your phone which is needed to complete login from a new device. Login verification is similar, except that it’s not every time you log in. It’s only for when you log in from an unknown device that you’ll be prompted to enter a verification code

During your social media life, you have probably used some Risky third party apps. Check, whether you are still using all of those apps that you permitted access to view your account. We recommend you stop access to applications that are no longer in use, as well as suspicious applications that offer you to get “likes”, followers or view private accounts on Instagram. These are the ones to use your account in an improper way

We completely get it — tagging a location to your photos is really tempting, especially when it comes to your travel shots or a newly decorated house. However, geotagging puts you at risk, both material and cyber. Not only that your vacation photos is an open invitation to burglars, signaling that your house is left empty, geotags also add sensitive info to your online profile, disclosing your personal preferences through specific locations visited. For these reasons, specifically avoid tagging locations that you are frequently at, like your home or work

Ever login to your social media accounts from a public Wi-Fi. Remember that you are putting your account security at risk. Make sure to keep your privacy, use a VPN service like NordVPN, which will encrypt your Internet traffic and protect your personal information from hackers and identity thieves

Originally published at https://rshweb.com.

--

--

Rsh Web Services
0 Followers

From Personal, Professional & Business Websites. Our goal is to provide the highest quality Hosting Services. Over 20 years experience - We know a thing or two