ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

How to Be Safe on Facebook and Other Social Media

Updated on April 16, 2018
internet scam
internet scam

Facebook and twitter are among the popular social network sites that have over the years become a trendy means of communication, particularly among the youth. Most of these networks provide a quick interactive platform for people to keep in touch with friends and family, as well as meet new people and expand social circles. The purpose of social networking sites primarily is to allow users establish friendship, romantic relationships and business connections. Different networking sites offer different features, but majority allow the user to provide information about him or herself to varying degrees of detail.

As harmless as it may seem, posting too much personal detail on facebook and other social networks is a security threat.

It is difficult to understand why a total stranger would want to use your information to hurt you, but it can happen. On the other hand, it could be someone who wants to get back at you for something you did to them knowingly or unknowingly.

If you constantly update your status about what you do, who you are with or where you are, the fact is you are not alone. A report from digital crime indicates that 38% of users of social networking sites, post updates indicating where they will be for the weekend, vacation plans etc. Another 17% have been reported to post residential as well as work place addresses. This is the biggest source of vulnerability.

Tips to help you stay safe on Facebook

1.Be careful what you post about yourself. Limit the amount of personal information

2. Understand, utilize and frequently review security and privacy settings for each social network you join.

3. Avoid detailing your day to day activities on Facebook and other social media.

4. Avoid the use of location based services that automatically update your where about.

5. Do not post photos of your family members especially children.

6. Limit the number of social sites you sign up for. The more you join , the more vulnerable you are.

Is social media causing more loneliness among the youth?

See results

1. Be careful what you post about yourself. Limit the amount of personal information because not everyone is a genuine friend. You don’t have to accept every friend request. Remember criminals will use fake profiles to obtain information from you. Everything you post on the internet is permanent. Even if you delete your social network profile, criminals can print text or photos or save them on a computer.

2. Understand, utilize and frequently review security and privacy settings on facebook. Set your privacy settings so that only your self, or friends can see your profile and content.

3. Avoid revealing details about your day to day activities social media. You can never know who is watching. Minimize exposing places you visit frequently, or activities that you do as a routine. This will prevent criminals from tracking you down easily. Remember not everyone is a friend out there. Also avoid letting people know when you are not at home, or when you are alone at home.

4. Avoid the use of location based services that automatically update your where about online.

5. Do not post photos of your family members especially children. Child sacrifice is rampant especially in the developing world and such revelations can make the children vulnerable. Resist the temptation of posting photos of expensive household items because they attract buglers. Children and teenagers are more vulnerable to threats from social networking sites. Parents therefore should actively take the initiative to explain internet safety to their children in order to keep them safe.

social media site
social media site

How Criminals can use Facebook to get to You

When you have endured enough stress from work and therefore deserve a fun filled vacation, it is common that you will develop the desire to tell friends about it. Whether it is showing off or not, you decide to share the idea with your lovely friends on face book. So you update your status.

Jinja here I come. Am taking a week off with my family to enjoy the fresh breeze at the source of the Nile, starting this wweekend. Will keep you posted”.

In addition, your profile has details of your work place and home address. You have posted a lot of photos of you in your house, showing off your expensive home theater, a huge plasma screen and your trendy collection of shoes. You are very social and have about 4000 friends on facebook.

Unfortunately, one or two of these friends survive on burglary for a living. They take a good look at the pictures and the details on your profile, and plot for a visit. A week later, you arrive from your vacation to find your valuable items missing without a trace.

Posting photos and revealing personal information will make you vulnerable to buglers, stalkers, sexual predators, identity thieves and even kidnapers. This information is posted as an innocent way of opening up to attract friends and possibly find true love. But remember not everyone looking at your profile has honest intentions. There are many cases of violent crime reported all over the world, relating to the use of social media.

Talal Al-khatib an author for Discovery news reports an incident that occurred back in 2011. 28 year old Josh Tyree had arranged a date with 24 year old Tara bell, after a spell of interaction through one of the social networking sites. Instead of a romantic evening, Tyree was met by two others in addition to Bell. The others were Latasha ward, who served as a lookout, and Bo Guedea, who robbed Tyree at gun point and later shot him in the leg.

A post by Identity guard in 2010, shows Gordon Snow, assistant Director Federal Bureau of Investigation (FBI), outlining some of the serious cyber-crimes. One of the most eye catching cases is that of ‘Data mining’

He explains...

“Cyber thieves use data mining on social networking sites as a way to extract sensitive information about their victims. This can be done by criminal actors either on a large or small scale. For example, in a large scale data mining scheme, a cyber-criminal may send out a ‘getting to know you quiz’ to a large list of social networking site users. While the answers to these questions do not appear to be malicious on the surface, they often mimic the same questions that are asked by financial institutions or email account providers when an individual has forgotten their password. Thus an e-mail address and the answer to the quiz questions can provide the cyber-criminal with the tools to enter your bank account, or credit card in order to transfer money, or syphon your account. Small scale data mining may also be easy for cyber criminals if social networking users have not properly guarded their profile or access to sensitive information. Indeed some networking applications encourage users to post whether or not they are on vacation, simultaneously letting burglars know when nobody is at home”

Interaction on social media can be fun, but it's always wise to proceed with caution. The incidents mentioned above are a few of the numerous cases of cyber-crime linked with the use of social media.

It is important to remember that it can happen to you or someone you know at any time. You might have heard of such cases in your area and probably dismissed them as mere tales. You may also imagine that the victims of these incidents were too gullible and that you can’t be conned in similar style. But remember the more information you expose to the public, the more vulnerable you become

Should Children use social media?

See results


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)