croom new

S I M Technology Blog

Social Media Users Should Consider Their Personal Information

Social Media Users Should Consider Their Personal Information

Social media has completely changed the dynamics of how people communicate with one another. While some users might only keep in touch with friends through it, others--including businesses and brands--use it to promote their products. In an age where a picture can appear on thousands of devices all over the world, privacy has become a major concern for anyone using social media.

Social media was built on the foundation of users sharing parts of themselves through the Internet, and in a world dominated by mobile devices, it’s not surprising that the majority of today’s computing is done through mobile platforms. One study found that in 2018, 69 percent of all American adults over 18-years-old used social media regularly over the subsequent year; this does not include YouTube as a social media platform. This number grows ever larger, particularly in regard to seniors. Nearly 40 percent of them use some form of social media--a number that has increased by about 200 percent since 2012.

Due to this increase, there is also a much larger group of individuals out there to steal money, information, and identities. Privacy concerns are prevalent in today’s social media environment, and users must be aware of how they are putting their data in harm’s way. Most people cite social media as a place where they can share their civil and political views, personal health information, learn scientific information, engage in job, familial, and society-related activities, and where they get most of their news.

Role of Privacy

As always, privacy will depend on how much an individual prioritizes the security of his or her personal information. If someone wants to keep a semblance of themselves private, they have to avoid placing that information in a public space like social media. As social media usage increases, the issue only grows larger. Add in the functionality that a lot of developers integrate into these websites and, before you know it, control over personal data is suddenly a problem.

Obviously, these platforms require you to give over some of your personal information to them in order to use the service, but when you begin to lose control over who has your data, and what data has been shared, negative situations can arise. A 2014 survey suggested that 91 percent of Americans have lost control over their data, and that advertisers and social media companies are taking more of their data than they even know.

Half of Americans know, and largely understand, the problems they face by having their information fall into the wrong hands. This leads them to be more proactive about securing their personal information. An issue everyone runs into, however, is that in order to use social media (or e-commerce for that matter), companies demand access to more personal information than necessary. By mining all this data, they then have carte blanche to do with it as they please, which can become a problem if that data is scraped by odious sources.

Why Stay on Social Media If They Are Stealing from You?

If you are at the beach and a professional lifeguard were to tell you that you need to get out of the water because there is a good chance you will be bitten by a shark, would you wade around in waist-deep water trying to spot the sharks? No chance. That’s why we scratch our heads when we see companies openly take our client’s personal information, the information they share, and their user histories to create a consumer profiles that will be sold for profit to advertisers. We constantly warn people to protect their personal information, and they consistently don’t.

We understand… maybe you use social media for marketing. Maybe you are one of the ones that are careful what they share with these sites. Maybe, you are comfortable with it and are one of the millions of people that trade their privacy for convenience. Whatever the reason is, if social media has become an important part of your life, you most likely have made some privacy concessions, knowingly-or-not, in order to use it.

Between social media and online commerce, more personally identifiable information is shared with corporations than you would ever knowingly share with your best friends. This speaks to just how oblivious the typical user is about their own personal information. People find value in social media. In fact, there are businesses that provide their staff with regular social media breaks as to not interrupt organizational productivity with social media. When you consider 30 percent of all online time is spent on social media (which only increases when people go mobile), you begin to understand that it carries value for hundreds of millions of people.

Are you concerned about your private information being tracked and shared by Internet-based services? Do you have a good idea about who has your personal information and where it is going? Leave your thoughts about this issue in the comments.

How to Adjust Your Business for Collaboration
Tip of the Week: Match Word to Your Style
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, April 23 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Email Cloud Productivity Malware Internet Business Computing Data Hosted Solutions Business Hackers Tech Term Computer Network Security Software IT Services Cloud Computing Google Ransomware Microsoft Android Hardware Efficiency IT Support Mobile Devices Data Backup Backup Server Innovation Phishing Data Recovery Encryption User Tips Small Business Windows Browser Business Management Outsourced IT Data Management Smartphone Upgrade Artificial Intelligence Windows 10 Smartphones Vulnerability Workplace Tips Communication Alert Passwords Business Continuity Managed IT Services Internet of Things Cybersecurity App Collaboration Chrome Saving Money Remote Monitoring communications Managed IT Services Windows 10 Paperless Office Gmail Network IT Support Scam Tip of the week VoIP Facebook Antivirus Office 365 Government Holiday Employer-Employee Relationship Social Media Bandwidth IT Management Infrastructure Productivity Website Quick Tips Managed Service Customer Service Apple Disaster Recovery Maintenance Robot Bring Your Own Device Applications Money Save Money BDR Data storage Managed Service Provider Automation VPN Document Management BYOD Business Technology Risk Management Blockchain Analytics Storage Mobile Device Information Big Data Wi-Fi Settings Microsoft Office Healthcare Tablet Two-factor Authentication Patch Management HIPAA Unified Threat Management Office Tips Hosted Solution Computing Office Router Mobile Security Monitors Word Vendor Management Customer Relationship Management LiFi WiFi Social Users Networking Management Apps Access Control Compliance Machine Learning Data Security End of Support Content Filtering Administration Miscellaneous YouTube Virtual Reality Network Management Operating System Virtual Private Network Wireless Mouse Politics Telephone Systems Server Management Outlook SaaS Google Drive How To Firewall Unified Communications Data loss Downtime Spam Marketing VoIP User Error Display Twitter Finance Identity Uninterrupted Power Supply Deep Learning Break Fix Websites PowerPoint Cost Management Bookmarks Firefox Mobile Device Management Recovery Vulnerabilities Drones Bluetooth Black Friday Theft Smart Tech Electronic Health Records Digital Gadgets eWaste IT service Multi-Factor Security Human Error Consulting Alt Codes Windows 7 Licensing Avoiding Downtime Printer Remote Computing Authentication OneNote Legal Halloween Dark Web Professional Services Assessment Favorites Digital Payment Chromebook Development Laptop Cyber Monday Financial Connectivity Files Spyware Humor Cooperation Heating/Cooling Google Calendar Social Engineering Permission Modem Managed Services Provider IBM Typing Emergency Hotspot Electronic Medical Records Transportation Current Events Time Management Authorization Employee-Employer Relationship Solid State Drive Best Practice Scary Stories Microsoft Excel Wasting Time Internet Exlporer IT Technicians Cables Cabling Budget Smart Technology Security Cameras The Internet of Things Read Only Staff Company Culture File Sharing Google Maps Information Technology Servers Legislation Safety Test Cookies E-Commerce Computer Care Corporate Profile Cryptocurrency Buisness Language Automobile Going Green SharePoint Employees Regulations Remote Workers Hard Disk Drive Sports Database Hard Drive Techology Network Congestion Mirgation Wires Point of Sale IT solutions Managed IT Distributed Denial of Service ROI IoT Identity Theft CrashOverride Hacks Augmented Reality Managing Stress Education Comparison RMM Nanotechnology Features Training WannaCry Bitcoin Lenovo Computing Infrastructure Printing Virtual Desktop Touchscreen Downloads Writing Samsung Remote Monitoring and Management Social Networking G Suite Business Growth Mail Merge Permissions Private Cloud Voice over Internet Protocol Cache Unified Threat Management Computers Instant Messaging Chatbots Disaster Shortcut Managed IT Service Tech Support Notes Star Wars Help Desk Password Dark Data Wearable Technology Enterprise Content Management Google Wallet Running Cable Statistics Specifications Tech Terms Screen Reader Windows 8 Superfish Retail Zero-Day Threat Motherboard Monitoring Hacker Google Docs Address Fraud Net Neutrality Alerts Recycling Regulation Web Server Mobile Data IT Budget How To Gadget GPS Cybercrime Crowdsourcing IT Consultant Health Mobile Computing Cameras Botnet Meetings Tracking Cleaning Processors CCTV Physical Security Emoji Webcam Upgrades Students Personal Information Relocation Cortana 3D Printing Printers Teamwork Travel Work/Life Balance Virtualization Unsupported Software Supercomputer Shared resources Motion Sickness Law Enforcement Staffing Update Administrator Notifications Taxes Computer Repair Error

Latest Blog Entry

Modern businesses have a lot more room for flexibility than in the past, particularly in regard to meetings. With the inception of conferencing solutions, organizations have access to more dynamic tools to make the most of their meetings. Determining the best one for you, th...

Latest News

S I M Technology launches new website!

S I M Technology is proud to announce the launch of our new website at www.simtechny.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...