Are you a Cautious contributor or an Online nudist?

A study conducted by Morar Consulting shows how consumers can be classified according to their approach to online privacy and security. There are three broad categories, containing one or two profiles each:

Reactive users

They are not online enthusiasts, but rather than be left out from the crowd, they adapt to the latest online trends. The Old school sharer uses social media once per day or less, he is fairly worried about cyber security and he is likely to repeat the same mistakes done in the past. The Cautious contributor limits the amount of personal information shared online because he doesn’t feel protected and he is willing to change behaviours following a threat.

Proactive users

They share everything happens in their life 24/7 and are willing to adapt to changes of the online environment. The Online nudist would share everything on social media, from social security number (73%) to credit card info (23%). He has already experienced identity theft but he is not concerned about that happens again. The Social savvy butterfly is aware of the downsides of online exposure, but rather than reducing his social media presence, he solves the problem through privacy settings personalization.

Realized users

They are aware of issues generated by social media and have taken action to avoid a repetition of the bad experience. The Digitally enlightened experienced a security problem in the past and wants more layers of security (he loves using password managers and two-factors authentication)

Can you recognize any of your colleagues?

With two-thirds of American adults using social networking sites, you should be able to identify some of the above profiles in your company. If they access their social media profile from a corporate computer, they can put the entire organisation at risk.

Social media, the hunting place for cyber criminals

Social media is the perfect ecosystem for social engineering and phishing attacks – they take advantage of natural instincts of greed, curiosity and naivety to obtain or access personal information. Have you ever seen a social media ads about upmarket smartphones given away to the first ten people who share the ads or leave contact details? Or the request to leave the email address to watch a video about a shark attacking a group of divers?

Learn how to stay secure

Being able to identify the bait reduces your chances to fall victim of malware, identity theft and be the guy who let cyber criminals free access to the organization’s system. If you wish to learn how to be alert and vigilant and avoid being a victim of phishing attacks, the Phishing Awareness Staff Awareness course is what you are looking for. Tell your HR manager about this course!