Tag: identity theft

Social media marketing practices may be increasing identity theft risks

This type of advertising and promoting is growing in popularity, but it does come with drawbacks.

Businesses have been working hard to get the very most out of social media marketing in the hopes of being able to connect with customers and prospective clients without having to spend a large part of their overall advertising budget.

However, while this channel has opened up a world of opportunities, it is also coming with risks.

Among the risks that are now being associated with the use of social media marketing are data breaches and identity theft. For this reason, it is very important that businesses of all sizes pay attention to the way in which they are using the various networks such as Facebook, Twitter, Google+, LinkedIn, and others, and recognize what they could be inadvertently sharing if the wrong person were to make his or her way in.

Many of the largest social media marketing sites have already experienced events involving data breaches.

social media marketing -identity theft riskAmong the online and mobile security risks that are being associated with the use of social media for advertising and promoting purposes is the dreaded data breach. However, intellectual property theft is also becoming problematic and many companies overlook this particular threat. It is a good idea for businesses who are using this channel within their marketing strategy to identify the types of risks that they face so that proper preparations can be made.

In a recent story published by Merchants Information Solutions vice president, Mark Pribish, there were five risks that were underscored as being the most important to businesses using social media. These could be deliberate or entirely unintentional and included: making misleading or false claims, infringing on copyrights or trademarks, using intellectual property without permission, posting confidential information or trade secrets, or sharing customer or employee information in a way that could provide a cyber criminal the data they need for a data breach.

While most would agree that the threat of online and mobile security events is not enough to justify stopping the use of social media marketing, the consensus is that proper preparations can make all the difference in keeping data secure and avoiding legal struggles.

How to Keep Your Teen Safe Online

Steven Toporoff, who is one of The Federal Trade Commission’s attorneys, stated in a New York Times article that in 2012 more than 22,000 identity theft complaints to the Federal Trade Commission (FTC) concerned minors. Toporoff also added that child identity theft is a persistent problem. However, it is difficult to assess the magnitude of this problem because parents are usually unaware that anything is wrong until their child becomes a young adult.

A report conducted by Hart Research Associates shows that 51 percent of the teens surveyed are extremely concerned about someone stealing their identity using information they have posted online. Parents can learn how to protect their children from identity theft and what to do if their child’s identity is stolen at the FTC’s website.

Create Rules for Internet Use

  1. Your family’s attitude about Internet safety must be clear and concise. It should never waiver.
  2. Inform your teen which sites she can visit and which she cannot. She also needs to know what apps and social media sites are OK to use.
  3. Be sure to set privacy settings on her social media sites to monitor whom she is communicating with in her digital world.
  4. Regulate the amount of time she spends online by setting log off times.
  5. Protect her identity by locking her credit report.
  6. Use monitoring software like Spytech SpyAgent ($70), AVG Family Safety ($50/year) or Spectorsoft Spector Pro ($100) to deter negative behavior.
  7. Remind her to think before she posts because once she posts it, she cannot take it back.
  8. Have her set her social media privacy settings to “friends only.”
  9. Do not use location-based services online.
  10. Avoid providing optional information.

Technology is continually changing so you must be able to recognize the current trends and possible dangers. Identity theft prevention is possible but you need to know the warning signs for other online and mobile dangers, such as cyber-bullying, Teen Safety Onlinesexting and sexual solicitation. Your teen might be at risk if she:

  • obsesses over the Internet
  • gets angry when she is unable to get online
  • is secretive about her online activities
  • receives phone calls or gifts from strangers
  • engages in unhealthy relationships
  • withdraws from friends and loved ones
  • injures herself
  • seems depressed
  • starts abusing substances
  • shows signs of an eating disorder (binging and purging)

3 Extremely Popular but Dangerous Apps

1. Vine by Twitter: Popular with teens, this video sharing app allows users to make and share looping videos. The problem is that once your teen obtains this app she will be able to access videos that may contain sexually explicit content. Viewing videos is only a portion of the problem as your teen may decide to create and then share mature content of her own. Because Vine allows for finding users nearby, it is essentially a predator’s playground.

2. Tinder: This is a dating app that functions like a game. This app is about hooking up, and the age restriction is a mere 12 years old. Once the app is installed, it invites your teen to post a photo of herself. The app requests access to her location. Once completed, she can browse the profiles of people in her area to see if she likes anyone. If she does, she taps the green heart. If he likes her back, she will receive a notification and a chat feature opens up so they can communicate with one another.

This app has several red flags:

  • It accesses your teen’s location to help her find someone to meet up with in real life.
  • Anyone can like her, which can lead to temptation.
  • This app is the perfect tool for pedophiles and predators to find their victims.

3. Snapchat: This messaging service allows users to send photos with text to other Snapchat members. These photos and messages vanish within 10 seconds of receipt. However, if the recipient has downloaded Snap Hack, he can save any photo he receives through Snapchat to his camera roll. With Snap Hack, he can view and edit the photo any way he wishes.

Amy Sanborn

With three school-aged children, Amy knows a thing or two about parenting. She loves teaching her kids to appreciate the outdoors.

NOTE: Guest Posts do not reflect the opinion of Mobile Commerce Press nor do we endorse any products or technology.