Get Started Today!  217-475-0226

Technology Basics: Social Media

Technology Basics: Social Media

Social media is a big part of just about anyone’s online presence nowadays, whether it’s a personal profile or a business page filled with contact information. While the various uses for social media will differ depending on who’s actually using it, it’s not stretching the imagination to think of social media as an extension of either oneself or one’s business. With this, however, comes a need to understand the security ramifications of its reckless use, as well as how it can influence your organization’s reputation.

What is Social Media?
Social media is basically any service or product that allows you to interact with others in a social manner. Some of the most common examples include Facebook, Twitter, LinkedIn, and Instagram. These services are all able to keep people connected to one another, as well as help them communicate their thoughts. While most social networks are used by businesses every day, some are more geared just for businesses and professionals. LinkedIn is meant to help professionals find work and communicate with each other, as well as show a glimpse of someone’s work history and so much more.

However, for all its benefits, your social media still needs to be mindfully approached--especially in regard to security.

Security Issues Relating to Social Media
Social media has provided hackers with a relatively new method of attacking organizations just like yours. They will use the anonymity provided by the Internet to take on the role of someone who your organization might be familiar with, creating an account to steal information from someone on your staff. They then use the information provided to infiltrate your defenses. This makes it extremely important to have this discussion with your team before these kinds of attacks happen, as an after-the-fact slap on the wrist is hardly going to keep hackers from your network. You need to invest time and effort into training your team on how to identify fake accounts and malicious outreach attempts by these scammers.

Social Media as an Outreach Method
Some businesses have had great success using social media as an outreach method. They use it as an extension of themselves, directly interacting with consumers in ways that other methods can’t replicate. A great example of this is Verizon’s Twitter account. They have a special support Twitter that people can tweet at to receive mobile service support. You can use social media in a similar way, providing your customers with a way to receive feedback on your goods and services, as well as sharing with them all of the great initiatives that you’re working on.

How does your business use social media? Let us know in the comments, and be sure to subscribe to our blog.

These Technologies Are Built to Help Your Business
5 Business Communications Solutions
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Network Security Hackers Business Computing Software IT Support Malware User Tips Android Data Recovery Cybersecurity Email Data Google Data Backup Business Management Internet Computer Small Business Smartphone Backup Efficiency Innovation Ransomware Cloud Communications Managed IT Services Windows 10 Productivity Artificial Intelligence IT Services Business Technology Collaboration Hardware BDR Communication Phishing Cybercrime Cost Management Mobile Device Management IT Management Business Data Security Social Media Patch Management Outsourced IT App Two-factor Authentication Passwords Maintenance Blockchain Browser Encryption Mobile Device Network Access Control Gadgets Facebook Hard Drive Applications Managed IT Services Saving Money Microsoft Office Antivirus Update Money Search Spam Scam VPN Information Word Vendor Save Money Data Protection Internet of Things Alert Bitcoin Touchscreen Digital Operating System Social Engineering Conferencing Microsoft Cloud Computing Windows Law Enforcement Smartphones Automation Data loss Start Menu Hacking Tech Terms Apps Remote Monitoring Gmail Laptop Websites Project Management Server Office 365 Managed Service Data Breach Vulnerabilities Data Management SaaS Document Management Business Continuity Bandwidth Disaster Recovery Holiday Uninterrupted Power Supply Software License Google Drive Wireless Headphones Telephone Cryptocurrency Upload Google Docs Networking Legislation Freedom of Information Mobile Security Virus Printer Machine Learning VoIp Vulnerability Mouse Company Culture Unified Threat Management Unified Communications Cortana Worker Mobile Devices Big Data Accountants Budget Telephony Cleaning Social Network Audit HTML Trends Redundancy Business Cards Vendor Mangement Virtualization Monitoring Knowledge Upgrades News YouTube Paperless Office Network Management Samsung Mobility Travel DDoS Unified Threat Management Identity Theft Sports Printing eWaste Training History Information Technology VoIP Computers Customer Resource management Virtual Assistant Access Gamification Business Mangement Apple Management Fake News Settings Multi-factor Authentication Database Service Level Agreement Managed IT Username Desktop Chromebook Government Robot Equifax WiFi Comparison IBM Mobile Technology Nanotechnology Telephone System Automobile Computer Care Hosted Solutions Excel Running Cable Spyware Devices Solid State Drive Downtime Emails Computing Telephone Systems Administration Device security Tactics Going Green Google Calendar Best Practice SharePoint Tablet Software as a Service Backup and Disaster Recovery User Tip IT Support Legal Startup Content Managed Service Provider Wireless Specifications Corporate Profile Augmented Reality Time Management Electronic Medical Records Tip of the week Cabling Hard Drive Disposal Analytics Compliance Piracy Bluetooth Error Google Maps Consultant Microsoft Excel Employer-Employee Relationship Website Download Outlook Miscellaneous Disaster Unsupported Software Distributed Denial of Service How to Addiction Downloads Computing Infrastructure Password BYOD Emergency Television Virtual Reality Screen Reader Health IT email scam Regulations Regulation Proxy Server Windows 10 Quick Tips Marketing Managing Stress Office Multi-Factor Security CrashOverride Users Office Tips Twitter Printers

Latest Blog

You know just how essential your company’s IT is, but do you have any idea how your employees feel about the technology you provide them? In order to get the productivity your company needs out of your staff, meeting their computing needs becomes a fundamental requirement. T...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.