{"id":1374967,"date":"2023-07-04T12:51:04","date_gmt":"2023-07-04T12:51:04","guid":{"rendered":"https:\/\/www.collaboris.com\/?p=1374967"},"modified":"2023-08-03T12:22:02","modified_gmt":"2023-08-03T12:22:02","slug":"cybersecurity-best-practices-social-media-security","status":"publish","type":"post","link":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/","title":{"rendered":"Cybersecurity best practices : Social media security"},"content":{"rendered":"<h1>Cybersecurity best practices : Social media security<\/h1>\n<p><span><img decoding=\"async\" alt=\"image showing social media security\" data-id=\"1374972\" width=\"799\" data-init-width=\"2560\" height=\"283\" data-init-height=\"906\" title=\"social media security\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/social-media-security-narrow-scaled.jpg?_t=1688474969\" data-link-wrap=\"true\" data-width=\"799\" data-height=\"283\" style=\"aspect-ratio: auto 2560 \/ 906;\"><\/span><\/p>\n<p data-block-id=\"block-cd60d68d-de77-4174-a13d-98a56f358625\">Social media security refers to the measures taken to protect your personal information and keep it safe while using social media platforms like Facebook, Instagram, or Twitter. It involves things like setting strong passwords, being careful about what you share online. It also includes being aware of potential scams or hackers trying to access your accounts. By practicing good social media security, you can help ensure that your personal information stays private and protected.<\/p>\n<h2 data-block-id=\"block-b73b7c0a-f33c-4fb5-9674-0cd2cee882b8\" style=\"\">Risks associated with sharing personal information<\/h2>\n<p>Sharing personal information online can expose individuals to various risks. One of the main concerns is the potential for identity theft. This is where malicious actors can use the shared information to impersonate someone and carry out fraudulent activities. Additionally, personal information shared on social media platforms or public forums can be accessed by cybercriminals who may exploit it for phishing attempts or targeted scams. Moreover, sharing sensitive details like home addresses or travel plans can compromise personal safety and invite unwanted attention. It is crucial to exercise caution and be mindful of the risks involved when sharing personal information online.<\/p>\n<h2 data-block-id=\"block-a3963de1-a49f-4df8-a19f-e04c187d193a\" style=\"\">Social media privacy settings<\/h2>\n<p>Social media privacy settings are tools that help you control who can see your information and activities on social media platforms. These settings allow you to choose who can view your posts, photos, and personal details. By adjusting your privacy settings, you can decide if you want everyone, only your friends, or a select group of people to have access to your content. It&#8217;s important to regularly check and update your privacy settings to ensure that your information is only shared with the people you trust.<\/p>\n<p>  <span style=\"\"><img decoding=\"async\" alt=\"\" data-id=\"1375149\" width=\"196\" data-init-width=\"847\" height=\"276\" data-init-height=\"1196\" title=\"essential guide to cybersecurity ebook cropped\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/08\/essential-guide-to-cybersecurity-ebook-cropped.png?_t=1690979525\" data-link-wrap=\"true\" data-width=\"196\" data-height=\"276\" style=\"aspect-ratio: auto 847 \/ 1196;\" ml-d=\"0\" mt-d=\"0\" center-h-d=\"true\" ml-m=\"0\" mt-m=\"0\" ml-t=\"0\" mt-t=\"0\"><\/span><\/p>\n<h3 style=\"color: rgb(52, 52, 52) !important; --tcb-applied-color:#343434 !important;\">Get your free cybersecurity best practices guide<\/h3>\n<p style=\"\">This eBook contains all 10 posts in our cybersecurity series in one handy downloadable guide so you can read it at your leisure.<\/p>\n<p>__CONFIG_colors_palette__{&#8220;active_palette&#8221;:0,&#8221;config&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;name&#8221;:&#8221;Main Accent&#8221;,&#8221;parent&#8221;:-1}},&#8221;gradients&#8221;:[]},&#8221;palettes&#8221;:[{&#8220;name&#8221;:&#8221;Default Palette&#8221;,&#8221;value&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(0, 47, 64)&#8221;}},&#8221;gradients&#8221;:[]},&#8221;original&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(19, 114, 211)&#8221;,&#8221;hsl&#8221;:{&#8220;h&#8221;:210,&#8221;s&#8221;:0.83,&#8221;l&#8221;:0.45,&#8221;a&#8221;:1}}},&#8221;gradients&#8221;:[]}}]}__CONFIG_colors_palette__ <a href=\"https:\/\/www.collaboris.com\/cybersecurity-guide\/\" target=\"_blank\" rel=\"noopener\"><span style=\"\">    <\/span> <span style=\"\"><span data-tcb_hover_state_parent=\"\" style=\"\">Get y<span style=\"background-color: transparent;\"><\/span>our free eBook<\/span><\/span> <\/a>  <\/p>\n<h2 data-block-id=\"block-ef905b55-50b2-4bfc-af1c-882fbc4caed8\" style=\"\">Unknown Friend Requests<\/h2>\n<p>In today&#8217;s digital age, it is not uncommon to receive friend requests from individuals we do not know. While some of these requests may be harmless, it is important to exercise caution and consider the potential risks before accepting them. It is advisable to review the profile of the person sending the request, checking for any suspicious or red flag indicators. Additionally, it is always a good idea to limit the personal information shared on social media platforms and adjust privacy settings accordingly. By being vigilant and mindful of our online interactions, we can better protect ourselves from potential threats and maintain a safe and secure digital presence.<\/p>\n<h2 style=\"\">Other posts in this series:<\/h2>\n<p><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/essential-cybersecurity-guide\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Introduction to cyber security<\/a><\/p>\n<ol>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-password-management\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Password management<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-malware\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Malware<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Social engineering<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Phishing scams<\/a><\/li>\n<li>Social media security (this post)<\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Wi-Fi and network security<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Mobile device security<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Data protection and backup<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Safe web browsing<\/a><\/li>\n<li><a data-tcb_hover_state_parent=\"\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" style=\"outline: none;\" target=\"_blank\" rel=\"noopener\">Incident reporting<\/a><\/li>\n<\/ol>\n<h2 style=\"\">You may also like:<\/h2>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" title=\"Cybersecurity best practices : Incident reporting\" data-css=\"\">Cybersecurity best practices : Incident reporting<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Incident reportingThe security of systems and data is of utmost <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/#more-1375042\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" title=\"Cybersecurity best practices : Safe web browsing\" data-css=\"\">Cybersecurity best practices : Safe web browsing<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Safe Web BrowsingIn today&#8217;s digital age, it is crucial to <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/#more-1375032\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" title=\"Cybersecurity best practices : Data protection and back up\" data-css=\"\">Cybersecurity best practices : Data protection and back up<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Data protection and backupRegularly backing up important data and storing <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/#more-1375019\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" title=\"Cybersecurity best practices : Mobile device security\" data-css=\"\">Cybersecurity best practices : Mobile device security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Mobile device securityMobile devices pose various security risks that can <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/#more-1375003\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" title=\"Cybersecurity best practices : Wi-Fi and Network security\" data-css=\"\">Cybersecurity best practices : Wi-Fi and Network security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Wi-Fi and Network securityThe Risks of Unsecured Wi-Fi NetworksConnecting to <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/#more-1374983\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">July 4, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/&quot;,&quot;title&quot;:&quot;Cybersecurity best practices : Incident reporting&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" title=\"Cybersecurity best practices : Social media security\" data-css=\"\">Cybersecurity best practices : Social media security<\/a><\/span><\/h2>\n<p>Cybersecurity best practices : Social media securitySocial media security refers to the measures taken <a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#more-1374967\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity best practices : Social media security Social media security refers to the measures taken to protect your personal information and keep it safe while using social media platforms like Facebook, Instagram, or Twitter. It involves things like setting strong passwords, being careful about what you share online. It also includes being aware of potential [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-1374967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity best practices : Social media security<\/title>\n<meta name=\"description\" content=\"Social media security refers to measures taken to protect your personal information while using social media platforms like Facebook, Instagram, or Twitter.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity best practices : Social media security\" \/>\n<meta property=\"og:description\" content=\"Social media security refers to the measures taken to protect your personal information and keep it safe while using social media platforms like Facebook, Instagram, or Twitter. It involves things like setting strong passwords, being careful about what you share online, and being aware of potential scams or hackers trying to access your accounts. By practicing good social media security, you can help ensure that your personal information stays private and protected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Collaboris\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Collaboris\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-04T12:51:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-03T12:22:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/social-media-security-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Helen Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@helen.jones@collaboris.co.uk\" \/>\n<meta name=\"twitter:site\" content=\"@Collaboris\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Helen Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\"},\"author\":{\"name\":\"Helen Jones\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\"},\"headline\":\"Cybersecurity best practices : Social media security\",\"datePublished\":\"2023-07-04T12:51:04+00:00\",\"dateModified\":\"2023-08-03T12:22:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\"},\"wordCount\":644,\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"articleSection\":[\"Policy Management\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\",\"url\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\",\"name\":\"Cybersecurity best practices : Social media security\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"datePublished\":\"2023-07-04T12:51:04+00:00\",\"dateModified\":\"2023-08-03T12:22:02+00:00\",\"description\":\"Social media security refers to measures taken to protect your personal information while using social media platforms like Facebook, Instagram, or Twitter.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#primaryimage\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"width\":820,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.collaboris.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity best practices : Social media security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.collaboris.com\/#website\",\"url\":\"https:\/\/www.collaboris.com\/\",\"name\":\"Collaboris\",\"description\":\"We make compliance simple\",\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"alternateName\":\"DocRead\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.collaboris.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.collaboris.com\/#organization\",\"name\":\"Collaboris\",\"alternateName\":\"DocRead\",\"url\":\"https:\/\/www.collaboris.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"width\":150,\"height\":40,\"caption\":\"Collaboris\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Collaboris\/\",\"https:\/\/x.com\/Collaboris\",\"https:\/\/www.linkedin.com\/company\/collaboris\"],\"description\":\"Collaboris is a Software company that created a policy management tool called DocRead.\",\"email\":\"info@collaboris.com\",\"telephone\":\"02079935140\",\"legalName\":\"Collaboris Ltd\",\"foundingDate\":\"2007-12-03\",\"vatID\":\"GB928895360\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\",\"name\":\"Helen Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"caption\":\"Helen Jones\"},\"sameAs\":[\"https:\/\/x.com\/helen.jones@collaboris.co.uk\"],\"url\":\"https:\/\/www.collaboris.com\/author\/helen-jones\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity best practices : Social media security","description":"Social media security refers to measures taken to protect your personal information while using social media platforms like Facebook, Instagram, or Twitter.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity best practices : Social media security","og_description":"Social media security refers to the measures taken to protect your personal information and keep it safe while using social media platforms like Facebook, Instagram, or Twitter. It involves things like setting strong passwords, being careful about what you share online, and being aware of potential scams or hackers trying to access your accounts. By practicing good social media security, you can help ensure that your personal information stays private and protected.","og_url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/","og_site_name":"Collaboris","article_publisher":"https:\/\/www.facebook.com\/Collaboris\/","article_published_time":"2023-07-04T12:51:04+00:00","article_modified_time":"2023-08-03T12:22:02+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/social-media-security-scaled.jpg","type":"image\/jpeg"}],"author":"Helen Jones","twitter_card":"summary_large_image","twitter_creator":"@helen.jones@collaboris.co.uk","twitter_site":"@Collaboris","twitter_misc":{"Written by":"Helen Jones","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#article","isPartOf":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/"},"author":{"name":"Helen Jones","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef"},"headline":"Cybersecurity best practices : Social media security","datePublished":"2023-07-04T12:51:04+00:00","dateModified":"2023-08-03T12:22:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/"},"wordCount":644,"publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","articleSection":["Policy Management"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/","url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/","name":"Cybersecurity best practices : Social media security","isPartOf":{"@id":"https:\/\/www.collaboris.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#primaryimage"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","datePublished":"2023-07-04T12:51:04+00:00","dateModified":"2023-08-03T12:22:02+00:00","description":"Social media security refers to measures taken to protect your personal information while using social media platforms like Facebook, Instagram, or Twitter.","breadcrumb":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#primaryimage","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","width":820,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.collaboris.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity best practices : Social media security"}]},{"@type":"WebSite","@id":"https:\/\/www.collaboris.com\/#website","url":"https:\/\/www.collaboris.com\/","name":"Collaboris","description":"We make compliance simple","publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"alternateName":"DocRead","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.collaboris.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.collaboris.com\/#organization","name":"Collaboris","alternateName":"DocRead","url":"https:\/\/www.collaboris.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","width":150,"height":40,"caption":"Collaboris"},"image":{"@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Collaboris\/","https:\/\/x.com\/Collaboris","https:\/\/www.linkedin.com\/company\/collaboris"],"description":"Collaboris is a Software company that created a policy management tool called DocRead.","email":"info@collaboris.com","telephone":"02079935140","legalName":"Collaboris Ltd","foundingDate":"2007-12-03","vatID":"GB928895360","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef","name":"Helen Jones","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","caption":"Helen Jones"},"sameAs":["https:\/\/x.com\/helen.jones@collaboris.co.uk"],"url":"https:\/\/www.collaboris.com\/author\/helen-jones\/"}]}},"modified_by":"Helen Jones","_links":{"self":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/comments?post=1374967"}],"version-history":[{"count":16,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374967\/revisions"}],"predecessor-version":[{"id":1375197,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374967\/revisions\/1375197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media?parent=1374967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/categories?post=1374967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/tags?post=1374967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}