Don't Put All Your Social Media Eggs In One Basket

We’re all social animals and bound to the chains of social media, but, is this healthy? I would be called a hypocrite if I said I don’t love posting pictures on "Facebook" or "Instagram", or thought about jumping on to the latest and most viral "TikTok" trends; some of the more famous ones being the “#DontRushChallenge” or the “#Renegade” dance.

Don't Put All Your Social Media Eggs In One Basket

We can’t blame the whole world for wanting to follow trends, especially during the days of the COVID-19 pandemic. People are home, bored, and more likely to make some regrettable decisions of posting their entire lives online.

Posting some trip pictures, a dish you created, or a dance video, aren’t deemed as wrongful acts or a crime, but, it’s how you post it, where you post it and whether or not you’ve taken any security measures or precautions while carrying these activities out.

Don't Put All Your Social Media Eggs In One Social Media Basket

If you’re wondering what security measures would you even need to stay online? This article is for you. There’s so much that could go wrong online, in a matter of seconds, in-fact in a blink of an eye!

What could go wrong? It’s only one picture…

It’s only one picture…but with a million tags to it. Hashtags are important for gaining a little audience on social platforms, but not all of them can lead the right kind of audience to you. There are circumstances where certain tags are banned due to wrongful usage, but there are always ways to get around these tags, to reach a post you desire.

Secondly, by posting a picture, you might also add additional information like your location, the street name, the cafĂ© you’re currently at, the people you’re with etc. This is fine only if you take proper cybersecurity measures while posting. You need to be aware of the fact that if you post pictures publically, without privatizing it to only a few close friends, family or acquaintances, there are a whole bucket of strangers who’re also keeping track of everything you put online. They can easily track your whereabouts through your posts.

Oversharing personal information is a huge red light when it comes to cyber threats. They say that one should never post their entire personal lives online, and that’s absolutely true! Social media isn’t a playground for your personal affairs, it’ll only give cyber-attackers/hackers the opportunity to get to know more about your life, and use it to full advantage.

But…

I did it for the Gram! TikTok will get me fame!

Did you know that there are hundreds or thousands of Instagram, Facebook and Twitter accounts that get hacked in a year? So, keeping that in light, do you think it’s wise to put all of your personal life in an online platform?

It’s no secret that most teenagers are often victims of such events, and shared danced videos are the least of their problems. It’s a fact that the youth of our past and present generation have shared at least 2 or 3 personal pictures among their friend circles or strangers; with that number being the least. When your account gets hacked, all that you’ve posted online (publicly or privately) are at great risk!

Parents! If your kid is younger than 18, you have to be aware of what they get into when accessing social platforms. Yes, teenagers need their space, and need the freedom and trust to live freely among peer groups, but that’s not going to help them in the long run. Always make sure you give a thorough sweep of anything they put online, and the kinds of groups they’re visiting.

TikTok, Zoom, and Houseparty are also apps to watch out for!

Let’s take TikTok for example. It was created in 2016 for the people of China, and soon launched worldwide in 2017. It’s only been around for a couple of years and has already managed to grasp around 800 million users worldwide!!! But, did you also know that China is one of the many countries in the world that have the largest online surveillances?

Whatever you do on TikTok or a Chinese created app, China knows about it. They have hold of all your accounts, your information and whereabouts. There are so many apps in the industry that have millions of active users on a daily basis, but fail to see the dangers that apps like these can cause; especially since all your information is online.

The reality of it all!

There’s a saying, “Never put all your eggs in one basket”. This even applies to comments on certain posts. Let’s say you’ve gotten yourself into an online tiff on Facebook, and feel the urge to speak your mind in an agitated state. You should be aware that just because you feel a little safe behind your computer or phone screen, your darkest fears can be brought to real life! If you’re a person that has posted a lot of personal information online, like where you live or your favorite hotspots, you do know that information like this is all it takes to track you down?

However, if you’re going to post…

Okay, so, it’s clear that a post alone nor the government can handle how an adult or teen uses the internet or social apps; unless they ban them altogether, but there are ways that you can moderately handle this situation on your own. Always remember that if you’re about to post something online, there are always consequences. So, to protect your online identity, and keep it from being the center of future cyber-threats, here are a few points you can look into:
  • Firstly, keep your accounts private. In that way only you can choose who can follow you or add you. This makes sure that no one that you would consider a threat can grab off information, pictures or videos from your profile without your consent.
  • Limit the amount of information you put online. Get one thing straight, even information on rants about a fight you had with a spouse or a friend can be used against you. No one online is going to actively care for you but yourself. They may come up with giving you tips and tricks on your situation, but that will not help you in the long run.
  • Make sure you don’t have one password for all accounts and definitely don’t make passwords that have your name, birthday or of your favorite aunt. The chances of hacking are very high when you use personal information as a password. And, since you’ve put your entire life online, it won’t be very difficult to guess your codes.
  • Speaking of passwords, always use two-factor authentication. This is just in case someone is attempting to hack into your profile. This will send a code to your phone number, asking whether it was you that was asking for a password change or whether it was you who logged in from another device. They’ll also send a code to your phone number just in case you actually are trying to change your passwords.
  • Kids/teens usually post just about anything for the likes. It’s different when you’re an adult, but the consequences when you’re a kid can be fatal. Make sure you don’t post anything too revealing or sexually explicit. This will most definitely attract the wrong crowd. And if ever your accounts do get hacked, let’s just say that the pictures or personal information you’ve posted online, will be used as leverage or blackmail.
  • As mentioned above, if you’re in the middle of an online war in the comment section, cool your mind, take a breather, think and reply. Never say anything out of the ordinary; especially to a stranger.

Conclusion

The online social world can be very exciting, but that’s all it is; “exciting”. No one said it’ll be safe. You have to take active responsibility of everything you do and post online. Social media is a temporary playground, but it most certainly can’t be erased. To avoid being a victim of cyber or in-person attacks, always consider keeping a low profile, strengthen your security measures, and never over share!

COMMENTS


Name

25PP,2,3G,3,4G,4,Absinthe,5,Adobe Flash,3,Ads,14,Affiliate Marketing,8,AliExpress,1,Amazon,52,Amazon Phone,1,Amazon Tablet,7,AMD,5,Android,243,Android 10,2,Android 11,2,Android 6,3,Android 7,4,Android 8,9,Android 9,4,Android APK,36,Android Apps,113,Android Auto,3,Android Games,15,Android GApps,3,Android Gingerbread,2,Android Ice Cream Sandwich,8,Android Jelly Bean,21,Android KitKat,12,Android Lollipop,10,Android Marshmallow,3,Android N,5,Android Nougat‬,5,Android O,7,Android Oreo,8,Android P,2,Android PC Suites,1,Android Pie,3,Android Q,2,Android R,2,Android SDK,9,Android TV,10,Android USB Drivers,2,Android Wear,10,Angry Birds,6,Anti Virus,16,App Developer,23,Apple,677,Apple CarPlay,1,Apple Pay,1,Apple Store,17,Apple TV,96,Apple Watch,49,Apps,91,ARM,1,Asus,2,ATT,7,Baidu,1,Battery,2,Bill Gates,2,Bing,16,Bitcoin,8,Bittorrent,4,BlackBerry,11,BlackBerry App,3,Blockchain,3,Blogger,34,Blogs,53,Bluetooh,6,Business,307,BuySellAds,1,Call Center,6,Camera,7,Cars,10,CCTV,1,Certifications,14,China Mobile,3,Chrome,25,Chrome OS,6,ChromeBook,2,ChromeBox,2,Chromium,4,CISPA,1,Cloud,32,CMS,6,Communication,15,Computer,60,Cortana,1,Credit Cards,5,CRM,11,Cryptocurrency,8,Currency,8,Cyberbullying,3,Cydia,44,Cydia Apps,11,Cydia Tweaks,11,Debit Cards,4,Developers,37,Digital Camera,8,Digital Marketing,299,Digital Signage,2,Disqus,1,DMCA,1,Doodle,1,DOS,1,Downgrade,15,Dropbox,1,Drupal,3,Earn Money Online,46,EarPods,1,eCommerce,33,Electra,6,Electronic Arts,1,Emulator,4,Encryption,1,Entrepreneurs,68,eReader,4,eSignature,1,Ethereum,1,Evasi0n,16,eWallet,4,Facebook,130,Facebook Ads,11,Facebook Apps,19,Facebook Credits,4,Facebook Developers,3,Facebook Like,8,Facebook Marketing,12,Facebook Messenger,5,Facebook Pages,9,Facebook Photos,2,Facebook Stocks,2,FacePAD,1,FaceTime,2,FileSonic,2,Firefox Add-Ons,2,Firefox OS,2,Fitbit,1,Foursquare,1,FP,11,Framaroot,4,Free Stuff,27,Gadgets,174,Galaxy Nexus,2,Galaxy S-Voice,2,Game of Thrones,1,Games,52,Gaming Console,11,Gaming Laptops,10,GApps,2,GearBest,6,Gifts,6,Gmail,11,Google,247,Google +1,10,Google Ads,5,Google Adsense,3,Google Adwords,4,Google Analytics,1,Google Apps,11,Google Earth,2,Google Fit,2,Google Glass,8,Google IO Conference,4,Google Map,7,Google Music,2,Google Nexus,13,Google Nexus Player,1,Google Panda,1,Google Penguins,1,Google Play Edition,1,Google Play Store,16,Google Plus,17,Google Plus Pages,6,Google Search,37,Google TV,5,Google Voice,6,Google Wallet,1,Google+,16,Google+ App,1,Google+ Pages,6,Graphic Design,6,GreenPois0n,28,Groupon,6,GSM,3,Guest Posts,10,h3lix,2,Hack,84,Hackintosh,4,Hard Disk,13,Hard Drive,16,HDD,15,Headsets,4,HealthVault,1,Home Automation,14,Honor,1,Hootsuite,1,Hostgator,1,Hotspot Shield,1,HP,2,HTC,16,HTC One,6,HTML5,15,HTTPS,3,Huawei,4,Huawei Honor,3,Hyper-V,3,IBM,2,iCloud,25,iGoogle,2,iMac,10,Infographic,191,Instagram,10,Intel,7,Internet,319,Internet Explorer,18,Internet IPOs,1,Internet Marketing,112,Internet Protocols,4,iOS,414,iOS 10,21,iOS 11,28,iOS 12,23,iOS 13,17,iOS 14,4,iOS 4,1,iOS 5,17,iOS 5.0.1,5,iOS 5.1,9,iOS 5.1.1,12,iOS 5.2,1,iOS 5.2.1,1,iOS 6,73,iOS 6.0.1,13,iOS 6.0.2,5,iOS 6.1,21,iOS 6.1.1,3,iOS 6.1.2,4,iOS 6.1.3,7,iOS 6.1.4,4,iOS 6.1.5,2,iOS 6.1.6,2,iOS 7,59,iOS 7.0.1,2,iOS 7.0.2,2,iOS 7.0.3,1,iOS 7.0.4,2,iOS 7.0.5,1,iOS 7.0.6,5,iOS 7.1,25,iOS 7.1.1,6,iOS 7.1.2,6,iOS 8,60,iOS 8.0.1,5,iOS 8.0.2,5,iOS 8.1,12,iOS 8.1.1,2,iOS 8.1.2,1,iOS 8.1.3,1,iOS 8.2,6,iOS 8.3,5,iOS 8.4,10,iOS 8.4.1,4,iOS 9,33,iOS 9.0.1,1,iOS 9.0.2,1,iOS 9.1,6,iOS 9.2,2,iOS 9.2.1,2,iOS 9.3,3,iOS 9.3.1,2,iOS 9.3.2,4,iOS 9.3.3,4,iOS 9.3.4,2,iOS 9.3.5,2,iOS Apps,77,iOS Beta,19,iOS Games,14,IP,3,iPad,393,iPad 2,54,iPad 3,47,iPad 3G,1,iPad 4,9,iPad Air,3,iPad Apps,32,iPad Mini,29,iPad Mini 2,2,iPad Siri,4,iPadOS,18,iPhone,450,iPhone 3G,52,iPhone 3GS,6,iPhone 4,63,iPhone 4S,67,iPhone 5,33,iPhone 5C,4,iPhone 5S,14,iPhone 6,31,iPhone 6 Plus,9,iPhone 7,2,iPhone Apps,32,iPhone Siri,7,IPO,3,iPod,224,iPod 4G,2,iPod 5G,1,iPod Apps,18,iPod Classic,1,iPod Nano,7,iPod Shuffle,5,iPod Siri,5,iPod Touch,231,IPv4,1,IPv5,1,IPv6,1,iShower,1,iShower Speaker,1,IT,2,iTunes,194,Jailbreak,132,Jailbreak Tools,40,Jitterbug Touch,1,Joomla,5,Kaspersky,1,Keyboards,2,Keylogger,2,Kindle,9,Kindle Fire,3,Kingo,2,KingRoot,1,Laptop,65,Lasers,1,Launchers,3,Lava,1,LCD,2,Legal,5,Lenovo,2,Lenovo ThinkPad,1,LG,9,LiberiOS,2,Lightning Cables,1,Link Building,4,LinkedIn,4,Linux,13,Lockerz,1,Logitech,1,Lync Desk Phones,1,Mac,206,Mac Mini,4,Mac OS X,203,MacBook,5,MacBook Air,12,MacBook Pro,12,Macintosh,6,macOS,79,macOS 10.12,9,macOS 10.13,9,macOS 10.14,8,macOS 10.15,7,macOS 11,2,macOS Beta,4,macOS Big Sur,2,macOS Catalina,7,macOS High Sierra,9,macOS Mojave,8,macOS Server,3,macOS Sierra,9,Magento,1,Mambo,3,Maps,9,Mark Zuckerberg,2,Marketing,100,Marketplace,2,Meego,2,Megaupload,1,Meizu,1,Micromax,1,Microsoft,203,Microsoft Office,37,Microsoft SharePoint,1,Microsoft Surface,3,Microsoft Surface Pro,2,MIUI,3,Mobile,745,Mobile App Developers,22,Mobile Apps,189,Mobile Broadband,1,Mobile OS,30,Mortgage,1,Moto X,1,Motorola,6,Mouse,2,Movies,1,Mozilla Firefox,16,Music,10,MySpace,2,Nasdaq,1,Net Meeting,1,Nexus,7,NFC,1,Nikon,1,Nintendo,4,Nintendo 3DS,3,Nokia,31,Nokia Belle,2,Nokia Lumia,8,Nokia Normandy,1,Nokia Store,2,Nokia X,6,Notebook,1,Nuance,1,Office 2010,9,Office 2013,3,Office 2016,13,Office 365,9,Open Graph,1,Open Source,1,Opensn0w,1,Opera,6,Opera Mini,2,Operating System,76,Oppo,1,Oracle,2,Orkut,1,OS,47,OS X 10.10,65,OS X 10.10.1,6,OS X 10.10.2,9,OS X 10.10.3,10,OS X 10.10.4,6,OS X 10.10.5,4,OS X 10.11,25,OS X 10.11.1,3,OS X 10.11.2,2,OS X 10.11.3,2,OS X 10.11.4,2,OS X 10.11.5,3,OS X 10.11.6,2,OS X 10.8,2,OS X 10.9,37,OS X 10.9.1,2,OS X 10.9.2,5,OS X 10.9.3,12,OS X 10.9.4,7,OS X 10.9.5,5,OS X El Capitan,23,OS X Mavericks,40,OS X Mountain Lion,17,OS X SDK,9,OS X Server,48,OS X Server 3,5,OS X Server 4,15,OS X Server 5,9,OS X Yosemite,60,Outlook,11,Ovi,2,Ovi Store,1,P0sixspwn,1,P2P,1,PageRank,2,Pangu,11,Payments,11,Payoneer,1,PayPal,3,PDF,7,Personalization,1,PhotoBox,1,Photography,7,Picnik,1,Pinterest,2,PIPA,2,Piracy,3,PlayStation,6,PlayStation 4,4,Pocophone,2,Pod2g,2,Podcasts,1,Powerpoint,2,PP,2,Printers,8,Privacy,69,Programming,23,Projectors,3,PS4,4,PUBG,1,Python,1,QMobile,1,QMobile Noir,1,RAM,2,Redsn0w,23,Remote Access,6,Root Android,37,Rovio Mobile,4,S-Voice,2,Safari,37,Samsung,58,Samsung Galaxy,30,Schemer,1,Search Engine,68,Search Engine Marketing,62,Search Engine Results,43,Seas0nPass,2,Secure Socket Layer,3,Security,96,Selfie,1,SEM,53,SEO,108,SEO Tools,15,SERP,2,Server,10,Shopping,57,Signage,1,Sileo,1,SIM Card,2,Siri,12,SkyDrive,3,Skype,5,SlideShare,1,Small Business,286,Smart TV,4,Smart Watch,6,Smartphones,698,SMM,8,SMO,15,Sn0wbreeze,5,SnapChat,3,Social Media,115,Social Media Marketing,81,Social Media Optimization,59,Social Media Tools,11,Social Networking,174,Software,247,Sony,19,Sony Ericsson,5,Sony VAIO,1,Sony Xperia,3,SOPA,2,Speakers,3,Sprint,2,Spyware,2,SSD,15,SSL,2,Startups,139,Statistics,23,Stock,3,Stock Photography,3,Stock Photos,2,Storage,26,Store,34,Swift,10,Swype,1,Symbian,8,T-Mobile,4,Tablets,588,TaiG,5,TechGlobeX,3,TechGlobeX.net,1,Technology,229,Telephone,1,Television,8,Templates,3,TinyUmbrella,2,Tools,132,Torrent,3,Toshiba,2,Toshiba Satellite,1,TuneUp Utilities,1,TV,11,tvOS,42,Twitter,19,TypePad,3,Ubuntu,6,Ultrasn0w,1,Unlock,43,USB Debugging,2,uTorrent,4,Verizon,4,Video Marketing,9,Video Optimization,11,Videos,38,Vimeo,1,Virtualization,9,Virus,8,Visual Studio,3,Vlogging,3,Vlogs,3,Vodafone,2,Voice Call,18,VoIP,14,VPN,11,Walmart,2,watchOS,45,Wearables,14,Web,141,Web Browser,28,Web Browser Plugins,4,Web Design,31,Web Development,51,Web Domains,15,Web Hosting,30,Web Servers,17,Western Digital,1,WhatsApp,5,Whited00r,1,WiFi,3,WiFi Calling,1,WiFi Hotspots,3,Windows,165,Windows 10,20,Windows 10 Enterprise,2,Windows 10 Mobile,1,Windows 10 Pro,2,Windows 10 Server,3,Windows 7,33,Windows 8,48,Windows 8 Pro,3,Windows 8 RT,3,Windows 8.1,6,Windows 8.1 Enterprise,1,Windows 9,4,Windows Apps,4,Windows Live,3,Windows Live Essentials,5,Windows Live Messenger,6,Windows Media Center,1,Windows Mobile,19,Windows Phone,47,Windows Phone 10,1,Windows Phone 7,10,Windows Phone 7.5,5,Windows Phone 8,9,Windows Phone 8.1,1,Windows Phone Apps,1,Windows Phone Mango,3,Windows Phone SDK,1,Windows Server,6,Windows Server 2012,2,Windows Server 2016,2,Windows Server 2019,1,Windows Server 8,1,Windows Vista,5,Windows XP,6,Wireless,4,Wordpress,47,Wordpress Plugins,4,Wordpress Themes,6,WWDC,58,Xbox,6,Xbox 360,6,Xbox One,3,Xcode,81,Xiaomi,8,Yahoo,13,Yalu,3,YouTube,12,Zong,1,ZTE,1,Zune,2,Zynga,1,
ltr
item
TechGlobeX: Don't Put All Your Social Media Eggs In One Basket
Don't Put All Your Social Media Eggs In One Basket
https://1.bp.blogspot.com/-nHmu3wkRF0E/Xs0rBp_k7TI/AAAAAAAAQw8/gvz7hKewUFgH6iOIXtKqu3O2l3LbNlA_QCLcBGAsYHQ/s1600/Don%2527t%2BPut%2BAll%2BYour%2BSocial%2BMedia%2BEggs%2BIn%2BOne%2BBasket.jpg
https://1.bp.blogspot.com/-nHmu3wkRF0E/Xs0rBp_k7TI/AAAAAAAAQw8/gvz7hKewUFgH6iOIXtKqu3O2l3LbNlA_QCLcBGAsYHQ/s72-c/Don%2527t%2BPut%2BAll%2BYour%2BSocial%2BMedia%2BEggs%2BIn%2BOne%2BBasket.jpg
TechGlobeX
https://www.techglobex.net/2020/05/social-media-eggs-in-one-basket.html
https://www.techglobex.net/
https://www.techglobex.net/
https://www.techglobex.net/2020/05/social-media-eggs-in-one-basket.html
true
6015647009126982431
UTF-8
Loaded All Posts Not Found Any Posts VIEW ALL Read More Reply Cancel Reply Delete By Home PAGES POSTS View All RELATED ARTICLES: TOPIC ARCHIVE SEARCH ALL POSTS Not Found Any Post Match With Your Request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Just Now 1 Minute Ago $$1$$ minutes ago 1 Hour Ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago More Than 5 Weeks Ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share To A Social Network STEP 2: Click The Link On Your Social Network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content