{"id":4889,"date":"2022-11-16T16:24:57","date_gmt":"2022-11-16T16:24:57","guid":{"rendered":"https:\/\/cmitsolutions.com\/clear-lake\/?p=4889"},"modified":"2023-02-01T17:55:01","modified_gmt":"2023-02-01T23:55:01","slug":"how-to-protect-your-digital-identity","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/blog\/how-to-protect-your-digital-identity\/","title":{"rendered":"How to Protect Your Digital Identity"},"content":{"rendered":"<h2>Recent Twitter Changes Amplify the Need for Online Protection<\/h2>\n<p>Over the last two weeks, Twitter, one of the world\u2019s most popular social media applications, has changed rapidly. After billionaire Elon Musk bought Twitter for $44 billion, he fired top executives and laid off half of the company\u2019s 7,500 employees, announced a major drop in revenue, and scrambled to assuage skittish advertisers.<\/p>\n<p>But the rollout of a new Twitter Blue subscription service wreaked the most havoc. Offering the checkmark stamp of authenticity that many Twitter users covet for just $8 a month unleashed a flood of parody accounts and spoofed messages. Internal numbers revealed that 140,000 accounts had signed up for Twitter Blue in just two weeks\u2014with 20,000 of them impersonating celebrities, politicians, and popular brands.<\/p>\n<p>Some of these satirical posts were comedic, like a fake PepsiCo account tweeting about the superiority of Coca-Cola. But some ramifications extended far beyond the Twitterverse. A verified account impersonating pharmaceutical giant Eli Lilly sent a spoof tweet last week about making insulin free to all customers. The next day, the real Eli Lilly\u2019s stock price fell more than 5 percent, forcing Twitter to suspend the Twitter Blue service and roll out a gray \u201cofficial\u201d label for advertisers, news outlets, and large corporations.<\/p>\n<p>Still, the risk of blatant disinformation and confusion being spread on Twitter could undermine the app, which claims nearly 250 million active users. Online privacy and digital security experts say credibility and safety are on the line\u2014especially if hackers start impersonating law enforcement or public health agencies.<\/p>\n<p>What Can You Do to Protect Your Digital Identity? Some prominent Twitter users are leaving the platform, while others say they\u2019ll stay on to fight for better protection. In the meantime, the debacle provides some clear lessons on how to protect personal information and keep digital identities safe.<\/p>\n<p><strong>1. If you\u2019re going to maintain a personal account, make it private.<\/strong>\u00a0This option doesn\u2019t work for businesses and other public figures that need to stay visible on Twitter and other social media apps. If you\u2019re concerned about a spoofed business account, contact Twitter Support with a link or screenshot. If not, still consider changing your personal account to private (meaning you have to approve anyone before they can follow you) if you\u2019re worried about a lack of privacy.<\/p>\n<p>To do this on Twitter, visit \u201cPrivacy and safety,\u201d then \u201cAudience and tagging,\u201d then check \u201cProtect your tweets.\u201d Also, uncheck \u201cAdd location information to your tweets\u201d to toggle location sharing off and prevent spam accounts or bots from contacting you just based on your posts\u2019 point of origin. Take similar steps in other apps to better protect your information.<\/p>\n<p><strong>2. Limit the amount of data shared with social media apps.<\/strong>\u00a0Twitter, Facebook, Instagram, LinkedIn, and other apps generate most of their revenue through advertising. And advertisers pay for prominent spots on those platforms so they can reach the right users. That happens through data sharing\u2014your interests, search history, follows, and other activities are shared with Twitter, which then shares them with advertisers.<\/p>\n<p>You can limit this, however, by adjusting your privacy settings. In Twitter, click Settings on the left side of your feed, then click \u201cPrivacy and safety,\u201d then \u201cData sharing and personalization.\u201d There, you can opt out of \u201cPersonalized ads,\u201d turn off \u201cInferred identity,\u201d and un-check \u201cData sharing with business partners.\u201d Again, take similar steps in other apps to better protect your information.<\/p>\n<p><strong>3. Beware of direct messages from unknown users.<\/strong>\u00a0Spamming and phishing have always been common on Twitter and other social networks like Facebook and LinkedIn. Using profile information and details included in posts (if, of course, your posts aren\u2019t protected), hackers can personally appeal to you and ask for help signing an invoice, reviewing a document, or executing a wire transfer.<\/p>\n<p>But any attachments or links included in those messages will instead install malicious software on your computer or point you to illicit websites. Be particularly wary of emails that contain realistic details of your life or work but come from unfamiliar senders. These are banking on your curiosity getting the better of you.<\/p>\n<p><strong>4. Give your employees cybersecurity training to build awareness.<\/strong>\u00a0This kind of training might seem unnecessary, but instead, it can empower staff members at your company to identify fraud, ransomware, data breaches, and other issues. The tactical goal of such training is to make users stop, read, and think carefully before responding to or clicking on any links in an email, even when it looks legitimate.<\/p>\n<p>If you are asked to confirm private information via email or direct message, always obtain a second level of confirmation from the recipient by calling them or inquiring in person. If you\u2019re asked to provide account logins, security codes, usernames, or passwords, consider that a red flag.<\/p>\n<p><strong>5. Avoid public Wi-Fi networks if you can.<\/strong>\u00a0Unsecured Internet connections in coffee shops, libraries, and airports can put your information at risk\u2014especially if you\u2019re concerned about digital identity. If you must connect to Wi-Fi in a public place, use the personal hotspot feature on your phone, or browse the web using a virtual private network (VPN) that encrypts all the data in motion and at rest.<\/p>\n<p>Make sure you beef up the password protection of your home modem and Wi-Fi router, as well by replacing factory default passwords with custom, hard-to-crack credentials.<\/p>\n<p><strong>6. Back up all information\u2014on apps, laptops, desktops, and drives.<\/strong>\u00a0Twitter and other social media apps allow users to back up activity, media, and messages, usually by clicking \u201cSettings,\u201d then \u201cYour account,\u201d then \u201cDownload an archive of your data.\u201d<\/p>\n<p>But backups should go further than this, saving all information used by all users on all devices in a regular, redundant, remote, and reliable fashion. That includes both onsite backups to convenient network drives and offsite backups to cloud services that protect your information and your digital identity in case of a hack, breach, or natural disaster.<\/p>\n<p>At CMIT Solutions, we understand the risks and benefits of social media apps, and we\u2019re here to help with identity management, security training, and proactive protection for your business.<\/p>\n<p>We keep up with evolving cyberthreats and position our clients for continued success, no matter what social network or app you choose to use (or not use). If you need help enhancing your digital identity or understanding today\u2019s issues,\u00a0<a href=\"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/contact-us\/\">contact CMIT Solutions today<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent Twitter Changes Amplify the Need for Online Protection Over the last&#8230;<\/p>\n","protected":false},"author":77,"featured_media":4958,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"class_list":["post-4889","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-quick-tips"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/posts\/4889","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/comments?post=4889"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/posts\/4889\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/media\/4958"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/media?parent=4889"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/categories?post=4889"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/clearlake-tx-1106\/wp-json\/wp\/v2\/tags?post=4889"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}