We have seen the pros and cons of cyber media. Now we are going to see how to protect ourselves from the problems caused.
1.)Privacy and security settings exist for a reason: Learn about and use the privacy and security settings on social networks.
2.)Once posted, always posted: Protect your reputation on social networks. Think twice before posting pictures if you wouldn’t want your parents or future employers to see.
3.)Your online reputation can be a good thing: Recent research also found that recruiters respond to a strong, positive personal brand online. So show your smarts, thoughtfulness, and mastery of the environment.
4.)Keep personal info personal: Be cautious about how much personal information you provide on social networking sites. The more information you post, the easier it may be for a hacker or someone else to use that information to steal your identity, access your data, or commit other crimes such as stalking.
5.)Know and manage your friends: Social networks can be used for a variety of purposes. Use tools to manage the information you share with friends in different groups or even have multiple online pages. Use your personal profile to keep your real friends (the ones you know trust) more synched up with your daily life.
6.)Be honest if you’re uncomfortable: If a friend posts something about you that makes you uncomfortable or you think is inappropriate, let them know.
7.)Know what action to take: If someone is harassing or threatening you, remove them from your friends list, block them, and report them to the site administrator.
8.) Keep a clean machine: Having the latest security software, web browser, and operating system are the best defences against viruses, malware, and other online threats.
9.)Own your online presence: When applicable, set the privacy and security settings on websites to your comfort level for information sharing. It’s ok to limit how you share information.
10.)Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.
12.)When in doubt, throw it out: Links in email, tweets, posts, and online advertising are often the way cyber criminals compromise your computer. If it looks suspicious, even if you know the source, it’s best to delete or if appropriate, mark as junk email.