Story image

Belong to the ‘selfie’ generation? You are probably oversharing

05 Feb 2016

Found a new girlfriend or boyfriend? Share. Had a blast on vacation? Share. Cooked a tasty dinner? Share. Got a new passport? Share. Share. Share. Is this routine familiar to you? If so, be very careful: you might well be oversharing.

This kind of behaviour is typical of young people who have grown up with computers, proliferating technology and emerging social networks. Thanks to their urge to share every detail of their lives, they’ve been dubbed the ‘Selfie’ or ‘Me, Me, Me’ generation.

However, many of them don’t realise that giving away too much information online can have serious consequences. According to a Microsoft poll from 2013, financial damage as a result of reputational harm worldwide has reached as much as $1.4 billion. If professional reputation is considered, the numbers were even higher, amounting to $4.6 billion.

It is important to note that a big part of these losses were made possible only thanks to users who, willingly or unwittingly, shared sensitive information online such as their date of birth, phone number, exact address or the name of their dog, which was coincidentally also the password for about half their online accounts.

Such data leaks can easily lead to trouble, ranging from personalised phishing emails or loss of social network account access to identity theft and extortion by cybercriminals. But don’t worry: as the calendar says, it’s Data Privacy Day and we’ve got you covered.

Here are a few tips to help you limit your oversharing routine:

Start by reviewing your privacy settings for your existing social network accounts. Be sure that the things you share only reach the eyes of those intended. If you are not sure, create separate groups for close friends, friends, colleagues and acquaintances. Be as selective and strict as possible.

Don’t share your location with the whole world. Social networks often geotag users, but do you really want everyone to know where you currently hang out, or that you just left for vacation and won’t be home for the next two weeks? For your own sake, turn off this feature and delete the saved history of location information.

Go through all the groups you have joined in the past. Some of these might be (in the social network sense) ancient, and equally so their settings. If they are still public and open to everyone, be especially careful what you post, as the contents can be read or seen by basically anyone. Other options are to quit the group or contact the founder and ask him/her to change the settings.

Apply a higher level of self-censorship. Before you post any comment, or upload a photo or video to our profile, imagine showing it to your grandma or a stranger in the street. Would you be comfortable with that? If not, it’s probably best to keep it to yourself.

Treat every photo or video as a police investigator would.Check all the possible details it could give away and be sure it does not reveal sensitive data. Good examples of this are photos of you in front of your new car (displaying the license plate), next to the ‘secret’ stash of your spare house keys or, heaven forbid, showing your new passport. All of those places and things can disclose information that can result in harm, if they get into the wrong hands.

Signing up for a new online service or website? Read through the privacy policy of the provider first, to better understand how the company handles your sensitive information. If you are not satisfied, don’t sign up. Also, be honest with yourself – do you really need yet another online account?

Never send sensitive data, such as credit card details, passwords, phone numbers or identification numbers, via messenger apps or by email. If you absolutely have to send such information, at least encrypt it. While it might sound obvious, also don’t post or display them in any public online space.

To keep all your data safe, create strong passwords and change them frequently. Unless you are using two- or multi-factor authentication, it is the only thing standing between your data and malicious actors and their sticky hands. If it’s too much for you to remember all those codes, use a reliable password manager.

Article by Ondrej Kubovič, Welivesecurity.com

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
WatchGuard announces A/NZ partners awards
Four Australian companies were named partner award winners at the WatchGuard conference in Vietnam.
Telstra’s 2019 cybersecurity report
Cybersecurity remains a top business priority as the estimated number of undetected security breaches grows.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Why cybersecurity remains a top business priority
One in two Australian businesses estimated that they will receive fines for being in breach of new legislation.