301-571-5040    Get SUPPORT

Washington Works Blog

Social Media Users Should Consider Their Personal Information

Social Media Users Should Consider Their Personal Information

Social media has completely changed the dynamics of how people communicate with one another. While some users might only keep in touch with friends through it, others--including businesses and brands--use it to promote their products. In an age where a picture can appear on thousands of devices all over the world, privacy has become a major concern for anyone using social media.

Social media was built on the foundation of users sharing parts of themselves through the Internet, and in a world dominated by mobile devices, it’s not surprising that the majority of today’s computing is done through mobile platforms. One study found that in 2018, 69 percent of all American adults over 18-years-old used social media regularly over the subsequent year; this does not include YouTube as a social media platform. This number grows ever larger, particularly in regard to seniors. Nearly 40 percent of them use some form of social media--a number that has increased by about 200 percent since 2012.

Due to this increase, there is also a much larger group of individuals out there to steal money, information, and identities. Privacy concerns are prevalent in today’s social media environment, and users must be aware of how they are putting their data in harm’s way. Most people cite social media as a place where they can share their civil and political views, personal health information, learn scientific information, engage in job, familial, and society-related activities, and where they get most of their news.

Role of Privacy

As always, privacy will depend on how much an individual prioritizes the security of his or her personal information. If someone wants to keep a semblance of themselves private, they have to avoid placing that information in a public space like social media. As social media usage increases, the issue only grows larger. Add in the functionality that a lot of developers integrate into these websites and, before you know it, control over personal data is suddenly a problem.

Obviously, these platforms require you to give over some of your personal information to them in order to use the service, but when you begin to lose control over who has your data, and what data has been shared, negative situations can arise. A 2014 survey suggested that 91 percent of Americans have lost control over their data, and that advertisers and social media companies are taking more of their data than they even know.

Half of Americans know, and largely understand, the problems they face by having their information fall into the wrong hands. This leads them to be more proactive about securing their personal information. An issue everyone runs into, however, is that in order to use social media (or e-commerce for that matter), companies demand access to more personal information than necessary. By mining all this data, they then have carte blanche to do with it as they please, which can become a problem if that data is scraped by odious sources.

Why Stay on Social Media If They Are Stealing from You?

If you are at the beach and a professional lifeguard were to tell you that you need to get out of the water because there is a good chance you will be bitten by a shark, would you wade around in waist-deep water trying to spot the sharks? No chance. That’s why we scratch our heads when we see companies openly take our client’s personal information, the information they share, and their user histories to create a consumer profiles that will be sold for profit to advertisers. We constantly warn people to protect their personal information, and they consistently don’t.

We understand… maybe you use social media for marketing. Maybe you are one of the ones that are careful what they share with these sites. Maybe, you are comfortable with it and are one of the millions of people that trade their privacy for convenience. Whatever the reason is, if social media has become an important part of your life, you most likely have made some privacy concessions, knowingly-or-not, in order to use it.

Between social media and online commerce, more personally identifiable information is shared with corporations than you would ever knowingly share with your best friends. This speaks to just how oblivious the typical user is about their own personal information. People find value in social media. In fact, there are businesses that provide their staff with regular social media breaks as to not interrupt organizational productivity with social media. When you consider 30 percent of all online time is spent on social media (which only increases when people go mobile), you begin to understand that it carries value for hundreds of millions of people.

Are you concerned about your private information being tracked and shared by Internet-based services? Do you have a good idea about who has your personal information and where it is going? Leave your thoughts about this issue in the comments.

How to Adjust Your Business for Collaboration
Tip of the Week: Match Word to Your Style


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, April 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Productivity Privacy Malware Hackers Network Security Business Email Software Internet Hosted Solutions Tech Term IT Support Data Backup Data Data Recovery Computer User Tips Mobile Devices Google Efficiency Innovation Backup IT Services Ransomware Microsoft Managed IT Services Business Management Hardware Cloud Computing Small Business Outsourced IT Workplace Tips Productivity Managed Service Provider Collaboration Android Managed IT Services Paperless Office Smartphone Encryption Business Continuity Office 365 Upgrade Social Media Remote Monitoring Phishing Communication Windows 10 Server Save Money Browser Smartphones Windows 10 Communications Data Management Disaster Recovery Bandwidth Cybersecurity Holiday Government Employer-Employee Relationship VoIP Passwords Internet of Things Infrastructure Tip of the week Managed Service App Scam Information Antivirus Compliance Vulnerability Healthcare Saving Money IT Management BYOD Quick Tips Business Technology Unified Threat Management Wi-Fi Work/Life Balance Artificial Intelligence Document Management Chrome Facebook BDR Apps Automation Windows Risk Management How To Microsoft Office Mobile Device Customer Relationship Management Vendor Management Big Data Blockchain SaaS Hosted Solution Politics VPN Office Password Maintenance Analytics Word Two-factor Authentication File Sharing Money Chromebook Virtual Reality Applications Network Company Culture Machine Learning Alert Patch Management Router Health Identity Theft Point of Sale Website Telephone Systems Samsung Data loss G Suite Electronic Medical Records Gmail Physical Security Twitter Networking Computing Professional Services Regulations How To Private Cloud Computer Care IoT Storage Firewall Taxes Wireless Downtime Robot Management Mobile Device Management Data Security Training Recovery Server Management Social Settings Websites Virtual Private Network Proactive Access Control HIPAA Remote Computing Bring Your Own Device Mobile Security Meetings Tech Support Botnet Remote Monitoring and Management Employees Smart Technology Hacker Automobile Remote Workers Tablet Gadgets Budget Spyware Address Education Smart Tech WPA3 RMM Downloads IT Technicians ROI Monitors Gadget Distributed Denial of Service Zero-Day Threat Unified Threat Management Avoiding Downtime Staff Cortana Black Market Financial Utility Computing Features Crowdsourcing Database Geography Instant Messaging Language WiFi Internet Exlporer Emoji Comparison Users Managing Stress Help Desk Relocation Cleaning Connectivity Fleet Tracking Operating System Disaster Multi-Factor Security Heating/Cooling Travel Mirgation Notes Managed IT Service Modem Backup and Disaster Recovery User Error Time Management Supercomputer Procurement Customer Service Electronic Health Records Personal Information Voice over Internet Protocol High-Speed Internet Finance Computing Infrastructure GPS Value Monitoring Specifications Enterprise Content Management Bookmarks Permissions Update Asset Tracking Tech Terms Uninterrupted Power Supply Google Calendar Servers Motion Sickness PowerPoint YouTube Break Fix Cookies Legal MSP Human Error Printer Network Management Wearable Technology IT Budget Security Cameras Spam Cyberattacks Net Neutrality Development Authentication Office Tips Alerts Tracking USB Consulting Black Friday Managed IT Web Server Social Networking Unified Communications Favorites Error Fraud Star Wars OneNote Theft Legislation Chatbots Notifications Virtual Assistant Files Dark Web IT Consultant Nanotechnology Sports Permission IT Support Touchscreen Digital Payment IT Solutions Printing Enterprise Resource Planning Computer Repair Windows 7 Cables Authorization Google Drive Licensing Virtualization Dongle Managed Services Provider Corporate Profile Cyber Monday Outlook Cameras Motherboard Project Management Lenovo Staffing Cost Management Employee-Employer Relationship Augmented Reality Solid State Drive Mouse Statistics Identity Software as a Service Mobile Read Only Digital Microsoft Excel Mail Merge Screen Reader Search Test Cabling SharePoint Cybercrime Upgrades Processors Remote Worker Shortcut CCTV Wires VoIP Administrator Cooperation Techology Service Level Agreement IBM E-Commerce WannaCry Law Enforcement Wasting Time Vulnerabilities Conferencing Firefox Hotspot Superfish Assessment The Internet of Things Hard Disk Drive Bluetooth Webcam Printers Competition IP Address CrashOverride Regulation Miscellaneous Mobile Office Hiring/Firing Emergency Domains Fun Public Speaking Presentation Lithium-ion battery Hard Drives Wireless Technology 5G Transportation Safety Marketing