Social & Email Accounts Security is a crucial matter for all of us. It might be a matter of survival in some cases. Therefore, all of us must be extremely careful in securing them. In our modern world, hardly can you find somebody who doesn’t have any social or email account. We need them in plenty of our life aspects. For example, you can’t apply for anything, such as visas, new jobs or electronic services without having, at least, a valid email account. Besides, in many of the screening procedures, whether for recruitment or entry clearance to countries or other applications, mostly your social media accounts will be checked for verification purposes. This session explains the importance of social media, as well as shows you some practical tips, both short & long term, that help you maintain your social media & email accounts security. It’s presented to you in your channel (Management with Merits – Manage to Prosper) within the Vlogs’ Service. To know about all our services, kindly go here.
Importance of Social Media & Email Accounts Security
Social media & email accounts are not for personal and self usage only. They have become platforms, tools & methods for official & business uses as well. Therefore, securing them is a matter of saving and protecting official representation and sustaining businesses. For example, most famous social media websites, such as Facebook, Twitter & Instagram, offer the services of making official business pages. Besides, plenty of websites that offer hosting & domain provision services for new websites, such as Greengeeks.com where the hosting and domain for this website are provided, do have direct domain services (www.domain.com) and official email services with the direct domain (email@example.com). A good and practical example for all of that is our channel MANWIM (Management with Merits), which have business accounts on YouTube, Facebook & Instagram. Besides, the domain of its website, its email and its YouTube pages is the same (MANWIM). In addition, the URL of the website is secured with an SSL (Security Socket Layer). Therefore, it appears as a secured website, showing the green lock security symbol, on internet browsers with HTTPS (Hyper Text Transfer Protocol Secure), instead of HTTP only (Hyper Text Transfer Protocol). Finally, our Facebook & Instagram Pages are interconnected, and they both have the same ID (manwim2019). We would like here to utilize this chance to strongly encourage you to follow us and participate with us in all our pages and accounts, which can simply be done by clicking on our social media accounts symbols that appear at the top right hand corner and bottom of each page/post, as explained in our (Surpassing 1000 Subscribers at YouTube) post. This will ensure you are always updated with all our productions, as well as provide you with maximum benefits & value. On YouTube, you can subscribe, activate the notification’s bell and participate by likes, comment & share. On this website, you can register on the mails’ news list, add our RSS Feed, and participate via comments, messages and share. At Facebook & Instagram, you may like & follow us, as well as participate with reactions, likes, comments, messages & share. Finally, you can always send to us by using the (Contact Us) Form or mailing us directly to our official mail (firstname.lastname@example.org).
In addition to the above, most official entities, government officials, organizations, businesses and celebrities have official business social media & email accounts. To differentiate them from other accounts and make them authenticated, most of these pages are provided with verification badges, in the form of tick signals. It denotes that these pages are official and truly represent the entities, persons or figures that own them.
Consequences of Infringement of Social & Email Accounts Security
Hacking is part of cyber crime. Hackers get access to your accounts and thus fully control them. Although it’s totally forbidden to do so, cyber crime is getting more and more spreadable, especially hacking. A lot of personal, business and official accounts have got hacked, which have caused them severe problems. For example, about two weeks ago, the Instagram account of Mariam Nadem (@mariam_nadem), a celebrity and the 1st Yemeni fashion model, got hacked. Thus, the hackers deleted most of her pictures and the people that she made (Follow) for. Thus, she made a video by her Snap Chat Account (@mariam_nadem) to talk about this incident. She was crying and screaming with intense grief. The reason was that the loss of her pictures means the loss of her products that represent and position her brand and trademark. Also, the deletion of her (Follow) people denotes the loss of important people and entities that are strongly related to her business, such as offices and businesses of fashion, advertising agencies, intermediaries etc. Despite that the account was retrieved by a famous Saudi technician (Saad Al-Dawi) about a week ago, this infringement demonstrates how disastrous it is to get your social media & email accounts hacked. To prevent such incidents, we have provided 5 tips or tasks for maintaining social & email accounts security; The first 4 are short term, while the fifth (last one) is long term.
Five Tips for Social Media & Email Accounts Security
These five tips help you maintain your social media & email accounts security. Although they are not totally inclusive, they provide basic backbone for your online security. As stated before, the 1st four are short term, while the last one is long term.
First: Maintain Back up Copies
Although this point doesn’t prevent hacking or cyber crime, it provides relief, safety for important files, and continuity of business should your accounts get hacked. Therefore, its is strongly recommended to keep back up copies of any important files in a cloud service, such as Google Drive or Dropbox, and a hard device, such as an external hard disk. For example, our channel keeps all its associated (attached) presentations (PDF files) with the lessons of the channel’s 1st service (International English Management & Leadership Books). Besides, we do maintain back up copies for all our videos, as well as the whole website, in both the personal computer of the channel’s owner & content creator, as well as a dedicated external hard disk.
Second: Don’t Open Malicious Mails
It is actually (YOU) who gives access to hackers to take over your account. This usually happens by opening and interacting with malicious mails sent by hackers. These people tend to trick you by using official disguise. For example, they pretend to be official entities, such as Facebook, Instagram, Paypal etc, and then ask you to cooperate with them. This happened with Mariam Nadem, when her account was hacked by means of a malicious mail sent to her, which claimed to be an official mail from Instagram.
Besides, hackers may pretend to be government officials, famous organizations, recruitment & employment agencies, visa consulates, banks etc. They might offer you decent services, such as granting travel visas or employment, or huge amounts of money or financial claims. Always remember that there are no free lunches. Thus, don’t believe such claims or open such mails. The below email, which I (the Channel’s Owner & Content Creator) have personally received in my Hotmail Account, demonstrates this.
Third: Never Click on Malicious Links
Usually, such links are provided in the malicious mails. In all cases, it’s always safe to STOP if you are in doubt. Never click on any malicious links that you are not sure of. Better Safe and Sorry. For example, Mariam’s account was hacked because she thought that the malicious mail she received was official from Instagram. Therefore, she clicked on the (Verification) link on the bottom of that mail. Right now, you might come up with this key question: How can you identify such mails and differentiate between them and official emails?
In fact, there are two prominent features that help you do that. First, these mails don’t have official domains, such as facebook.com/instagram.com/paypal.com/etc. They either use personal domains (like gmail or hotmail.com) or unusual domains for you. The second feature is that they don’t address you by your official name like your first name or surname. Instead, they use general titles like Sir/Madam, or other titles like Facebook/Instagram User etc. Finally, such mails might use well-written language or provide elegant sender names or addresses. Never be fooled by such fake practices. Both sample mails above provide examples of all of these characteristics and features.
Fourth: Protect & Keep Your Log-in Details:
After Mariam Nadem clicked on the malicious link in the spam mail, she was asked to provide her username, password & email. Unfortunately, she did that and, as a result, the account was hacked. Never give your personal details or information, especially your log in credentials to any party or platform. Only use the official & authorized platforms to get access to your accounts.
Fifth (Long Term): Build a Secure Management Information System (MIS) Framework:
The previous four points were only short term to maintain social & email accounts security. However, in the long term, you need a more sustainable framework. Therefore, we have used here the Management Information System (MIS) Model, which is presented and used by one of the channel’s future books (Management Information System 2014). The book simply conceptualizes MIS as a solution for business problems with three primary perspectives: Management, Organization & Technology. This solution consists of managerial & organizational measures and practices, that are built on technology platforms, to enhance businesses and improve their effectiveness.
Therefore, we can modify this model to fit with social media & email accounts security. In terms of business problems, which can also be personal or social problems, we have cyber security infringement and hacking risks. Therefore, a security MIS has to be built in with its three perspectives of Management, Organization and Technology (the implementation platform). In terms of Management, we need to have security plans and policies for our social accounts & emails, depending on their value and usage. Next, in terms of Organization, strong security culture and awareness have to be built, especially in dealing with fraudulent and malicious mails and links. Finally, in Technology, the managerial and organizational measures should be properly implement in the form of technological practices and techniques, such as the ones explained in the previous four points. Other points include using strong and unique passwords, not one password for multiple accounts. Also, dual authentication is a recommended practice where you get access to your accounts by two authentication methods, such as a password and a code sent to your verified mobile. For instance, the channel uses this technique in its Google (YouTube) Account, as well as its Facebook & Instagram Pages. These combined three perspectives will result in an effective security MIS solution to our business/personal/social problems. It will maintain safety and protection of our accounts, prevents cyber crime and combat hacking. This MIS security solution definitely will enhance our business, personal & social life by providing us with peace of mind and reservation of precious time and resources.
Final Thoughts in Social & Email Accounts Security
As I stated before, these tasks and practices are not exhaustive. there are plenty of tasks and steps to be done to secure social & email accounts. Besides, the amount of security required depends on the value of the account and its usage. Therefore, official governmental and business accounts require higher amount of security and needs professional security systems & personnel. On the other hand, purely personal accounts can be secured by prudent personal efforts and awareness. Therefore, the instructions and models here provide only the back bone for managing social accounts’ security.
That was our session for today guys. Thank you so much for watching & following. Next session, we will start with the fourth and last book in our English Managerial and Leadership Books Service, in the 1st Year Program, which is (Organizations: Behavior, Structure & Processes 2012) Book. It will take us three months to finish it, which are June, July and Aug this year. Please note that we have introduced this book before in a previous session.
Please support the channel strongly so we can continue our glorious mission. Our production is every Thursday. Please subscribe to the channel at YouTube and activate the notifications bell there. Please stay with us, follow us, participate with us, and widely share the channel and all its electronic contact platforms.