Jeff Finucan, a librarian at Stauffer Library, just got his brand-new smartphone. Excited, he sets it up right away and starts syncing data from his old device.
As the transfer runs, Jeff wonders:
“Wow… how much of my life is on this phone? Emails, banking apps, social media, work accounts, photos, passwords….everything!â€
For the first time, Jeff realizes his phone is like a digital vault and if that vault is unlocked, anyone could walk right in.
Determined to protect his identity, Jeff takes action:
- Checks app perÑý¼§Ö±²¥s: Why does a flashlight app need access to his contacts and camera? He turns off unnecessary perÑý¼§Ö±²¥s for apps that don’t need them.
- Declutters his device: Deletes old apps he no longer uses and updates the ones he keeps for security patches.
- Secures his passwords: Moves all credentials and sensitive notes into an encrypted password manager, instead of storing them in plain text or in the Notes app.
- Disables auto-sync for sensitive accounts and reviews privacy settings on social media.
Now, Jeff feels in control. By cleaning up perÑý¼§Ö±²¥s, removing unused apps, and using encryption, he’s reduced his risk of data theft dramatically. One hour of effort = a safer digital life.
Key Takeaways:
- Review app perÑý¼§Ö±²¥s regularly - if an app doesn’t need access, deny it.
- Delete what you don’t use - old apps are often unpatched security risks.
- Use a password manager instead of storing passwords in your Notes app or browser.
- Keep your Operating System (OS) and apps updated - to prevent vulnerabilities.
Cybersecurity Risks of Social Media
Phishing messages are designed to trick you into giving up information by pretending to be from a trusted source. Phishing messages can come from people pretending to be your friends, respected companies or institutions, or just "friendly" strangers. Never share sensitive information or click on any links that seem suspicious — even if they’re from your friends.
Social engineering is the practice of obtaining confidential information through deception and trickery. In a social engineering attack, a cybercriminal contacts you by email or phone and may use facts that you have made public on your social media accounts (for example, where you live or work) to make their request seem legitimate. Their goal is to trick you into providing sensitive financial or personal information. Social engineering is a type of phishing that can be difficult to spot.
Social media sites receive so much private information about us such as the names of our friends and family members, how we spend our vacations, and even the contents of our direct messages. It’s important that you understand how social media sites are using your information and if they might be selling it to advertisers and other third parties.
Malware is malicious software and is code designed to infiltrate your device. Malware can spread on social media through links, often with catchy headlines. Once malware is in your device, it might send spam messages to your friends, steal your information, or harm your device. Always be careful when clicking links on social media.
How to Protect Your Personal Profiles
Use a Passphrase or Complex Password
Social media is all about sharing, so if your password is something you’ve shared on social media (like your pet’s name) it will be easy for a cybercriminal to guess. Make sure you use a unique passphrase or password for every social media account. Visit the for more information on creating a strong password.
Enable Multi-Factor Authentication (MFA)
Most social media sites offer multi-factor authentication (MFA). Always turn MFA on in your settings to keep your account secure.
Review Your Privacy Settings Often
Use the privacy and security settings on your social media sites to control who other people can see about you — the default settings likely provide strangers more access than you'd like.
Keep Private Information Private
Even if you’re careful, you can never know who’s on the other side of the screen. When you post on social media, avoid sharing:
-
Personal information like your phone number, email address, home address, work details, or your child's school
-
Informative pictures: Check the background of pictures before you post for any revealing info like street signs or license plates.
-
Geotagged photos: Most smartphones and digital cameras automatically attach the exact location where a photo was taken. Many social media sites don’t capture this information when you post a photo, but when they do, turn off the geotagging feature in your camera’s settings and remove geotags from older photos with photo editing software.
-
Exciting news: Vacation details, big purchases or events with your address can let criminals know there’s an opportunity to rob your home while you’re away.
-
Banking or financial information, including the name of your bank, credit or debit card numbers, and any other financial information.
Other Resources
This Week's Challenge
Test your knowledge with our online identity quiz. Note that you will be prompted to log in with your NetID and password. When you're ready, click the link below to begin the quiz.
This quiz will collect your name, Queen's email address, and NetID to notify winners of where and how to redeem their prize. Your data will not be shared with any other party or used for any other purpose.