For Cyber Security Month, Take Extra Care Not to Overshare

b2ap3_thumbnail_oversharing_400.jpgOctober is Cyber Security month. We want to bring attention to this very important issue affecting every person and organization connected to the Internet. When discussing cyber security, we often talk about computer viruses and malware, but these threats are only part of the cyber security equation. It’s just as important that you, your staff, and even your family, are mindful to not overshare information online that can compromise your organization’s security and personal identities.

The danger here comes from sharing personal information that a hacker, scammer, and even bullies and competitors can take advantage of. Generally speaking, the worst place for this to happen is over social media. It’s easy for people and employees to become too comfortable sharing personal details over their favorite social networks, which they would come to regret if this information were to fall into the wrong hands.

Here are some sharing best practices that you, your staff, and your kids need to be mindful of in order to prevent oversharing:

Your Staff
Whether they realize it or not, your staff represents your company in the online world as well as when they’re at work. Therefore, they need to be mindful of any information they post that can potentially make their place of employment look bad, and by de facto, cost them their job. For example, every employee is entitled to gossip about their workplace to some degree, but when workplace gossip and rumors find their way to social media for all to see, then they’ll have to face the consequences for what they post.

Another thing that your employees need to be mindful of is sharing company secrets online. You may think that your team is smart enough to avoid this blunder, but they may be surprised to learn that their social network could include someone connected to a competitor. Therefore, posting something seemingly harmless like bragging about a potential sale before the deal is inked, could lead to the loss of said sale by a competitor that’s monitoring your team’s online activity.

Your Teenagers
If you’ve got teenagers, then it’s likely that they’re active on social media, and that they’re using it in ways that you don’t quite understand. Young people aren’t so much in danger of divulging company secrets on their Facebook account, but they are susceptible to two particular dangers; cyberbullying and leaving behind an unsavory digital footprint.

When it comes to cyberbullying, you will want to teach your children to simply block people who would want to do them harm by contacting them and seeing their post. Every child needs to come to grips that “people can be cruel,” and every modern young person needs to learn how to practically apply this lesson in the online age. In addition to being involved with your kid’s online activities by monitoring what they’re up to, you’ll want to walk them through how to block, unfriend, and even report cyberbullies--as well as give them a swift kick in the butt if they are guilty of cyberbullying.

Teenagers and young adults will also want to be mindful of what they post online that can be publicly viewed. Today, employers and educational institutions are searching the social media accounts of applicants, looking for anything that may disqualify them. Therefore, if you have a career-minded young person in your life who is active on social media, be sure to monitor their digital footprint using these five tips from Net Nanny:

  1. Check their digital trail by searching for them on Google. View the results from a college or employer’s perspective and make sure it coincides with the application.
  2. Limit profile visibility to friends-only.
  3. Make sure profile photo is appropriate.
  4. Remove any past Facebook posts from public view.
  5. Take control of tagging (i.e. don’t allow friends to tag your teen because it is uncontrollable).

There are malicious entities all over the Internet that want to get their hands on your personal identity. If they’re able to hack into one of your online accounts or sell your personal information to the black market, then you will be in for a world of hurt. You can use the same tips in the previous example to safeguard your own digital footprint, but for your own protection, you’ll want to go one step further and be mindful of other-seemingly harmless details that a hacker will really, really appreciate. Details such as:

  • Your mother’s maiden name.
  • Your high school.
  • Where you got married and where you met your spouse.
  • Your favorite hobbies and sports teams.
  • The names of your pets and children.
  • Your home address (including pictures of your home).

What do all of these nuggets of information have in common? Many of these questions are used for your online accounts in order to verify your identity, should you ever forget your password. A hacker with your username and knowledge of all of these intimate details about your life may be able to easily hack into your account.

What Kind of Exploitable Target Are You? Take This Quiz to Find Out!
Be extra wary of “fun quizzes” on Facebook that try to coerce this information from you and your friends. They usually advertise themselves with a line like, “How well do you know your friend? Answer these 10 questions!” Nice try, hackers!

By being mindful about what details are posted online, you, your staff, and your family can protect themselves from many of the threats that exist there. Want to learn more? Check out For more tips on how to keep your information safe, subscribe to White Mountain IT Services’s blog and reach out to us at 603-889-0800.

Related Articles

  • Three Reasons VoIP is a Great Choice for Businesses If you’re trying to run your business without considering communication, you’re crippling your business unnecessarily. One of the ways that you can improve communications is by capitalizing on a modern phone system that uses the cloud. You might be surprised by how great a cloud-hosted VoIP solution...
  • What Could Possibly Be Wrong with Your Computer? Slow computers are one of the small annoyances in an office that can implicate a much larger issue is hidden. The frustration stems from not being able to get anything done, whether it’s because the computer isn’t responding to your commands or it’s so slow that you can’t accomplish anything notewor...
  • IoT Security is a Key Business Concern The Internet of Things is everywhere, which means that potential security risks are also everywhere. Your business needs to take the risks presented by the IoT into account and prepare accordingly. What are You Willing to Risk?When devising a policy for your company concerning the IoT, you need t...
  • Tip of the Week: Keyboard Shortcuts to Save You Time Even the simplest tasks in the office can eat up a surprising amount of time over the span of a year. For example, did you know that switching from your keyboard to your mouse can consume up to eight full work days every year? By taking advantage of keyboard shortcuts, you can cut down on the amount...
  • Tip of the Week: Awareness Is Important When Surfing the Web We all love the Internet. We all use it almost every day. For this week’s tip, we’ll review a few ways to help keep yourself from getting in trouble while browsing. Sacrificing Security for ConvenienceFor starters, most of the threats to be found online are of the sort that can be avoided somewha...
  • Google’s Making Changes to Chrome, and Not Everyone’s Happy Chrome 70 is yet another example of how divisive technology has the potential to be. On the one hand, a few of the changes have people excited about some clear benefits to security, but others worry that Chrome will no longer be as secure or as user-friendly. We’ll review some of the changes coming ...
With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network:...

- Onsite Service Coverage Area -

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH and then down into Boston. From Northern and Central Mass we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.



White Mountain IT Services
33 Main Street Suite 302
Nashua, New Hampshire 03064


 padlock1  Cyber Security Toolkit

cloud desktop2 Cloud Desktop Login

Open Positions