HomeNewsCommentariesDisplay

What’s your social thumbprint?

Just as you would lock the front door of your home or secure your wallet, social media users should aim to lockup and secure their online personal information and do regular checkups of their social thumbprint. (U.S. Air Force graphic/Staff Sgt. Jessica Hines)

Just as you would lock the front door of your home or secure your wallet, social media users should aim to lockup and secure their online personal information and do regular checkups of their social thumbprint. (U.S. Air Force graphic/Staff Sgt. Jessica Hines)

RAMSTEIN AIR BASE, Germany (AFNS) -- We've all done it; in a vain sense of curiosity to see if our social presence has made any kind of impact on the world. Just admit it - you've Googled yourself.

Since entering the golden age of social media, it seems that now it's not hard to gather a handful of information on just about anyone, even ourselves.

But isn't that the point? It's why we blast pictures of high school graduations, trips to Europe, and all our favorite music and movie "Likes" on our profiles. We want to be heard and seen, we want to share our accomplishments and victories and find support when life gets hard.

Social media has allowed us to network and reach across the barriers of time and space to share our story, build partnerships and connect with people from around the world we may never have had the chance to.

It's not hard to get caught up in the exchange of information and let our guard down, especially when we believe our information is safe. Generally, the information we share is harmless.

We start to run into trouble when the information we share across various social networks is strung together like pieces of a puzzle, creating a larger snapshot of our lives than we realize. When coupled with public records and open-source content, the information we share online can create vulnerabilities in our personal and professional lives.

But, where do we draw the line? When does information sharing become too much of a good thing?

Just as you would lock the front door of your home or secure your wallet, social media users should aim to lockup and secure their online personal information and do regular checkups of their social thumbprint.

This should include Googling yourself to not just see how awesome and popular you are, but to see what information is readily available or associated with your name. From there, you can take the necessary steps to protect or remove potentially revealing information.

Another important social checkup habit people should practice is digging into a website's privacy and security settings. All social media sites require users to accept and Privacy Act agreements and terms of use guidelines. Unfortunately, nearly everyone accepts these terms without every reading what they agreed to. This is probably one of the biggest culprits of overexposing personal information.

The agreements between social networking sites and users are designed to help keep personal information safe. However, it's our responsibility to ensure we use them to their fullest potential and not blindly accept new security settings without checking to see if our information is still secure.

The below list includes some additional best practices for keeping your social thumbprint safe and secure:

1. Think before you post: A good rule of thumb is if you wouldn't say it in front of your boss or grandmother, then you probably shouldn't say it online. Remember, the Internet is permanent with a long memory of our actions. Even if you delete something, someone else may have already seen, copied and shared the information. When in doubt, keep it to yourself.

2. Be selective, be e-selective: Having a thousand-plus friends might look cool, but isn't realistic. It's important to scrutinize who you add as a "friend" and ensure that you actually know them. Don't be fooled by fake profiles and marketing schemes.

3. Geo-tag this: While you may have disabled location settings within a specific app or website, be sure to check the privacy settings within your smartphone, tablet and personal computer. You may be broadcasting your location without realizing it.

4. Log on, log off: It's easy to keep login information stored in a browser for faster access and simply "X-out" once done; however, this practice makes it easy for someone to follow behind and gain access to your account.

5. Once forgotten, twice exposed: With each new networking site or app, our information quickly becomes duplicated across multiple platforms; however, just because you moved on, doesn't mean your information did. Keep note of what sites you still use and delete old accounts you don't use such as an old dating profile, registry or blog.

6. The guessing game: How easy would it be for someone to guess your password or answer your security questions? Compare these passwords and questions against your profile and ensure you're not unintentionally giving away the answers. It may be easy to remember your favorite football team or superhero as a password, but how easy would it be to get that information on your personal profile and gain access to your account?

7. Cookie monsters: Internet cookies work to tag and track computers and user behavior. This information is used by marketers to target specific groups of people and tailor advertising. It's important to only allow cookies from trusted sites and regularly clear your browser and machine using a cookie cleaner.

8. Go phish: Online confidence scams, otherwise known as phishing, is a way for hackers or companies to gain access to personal and sensitive information such as usernames, passwords and credit card numbers. This is done through what seems to be legitimate online communications such as games, chatrooms, online payments, Wi-Fi hotspots, news links and more. The best way to avoid becoming a victim of phishing scams it to closely scrutinize the source of information, and never disclose personal information such as credit card numbers, passwords or addresses over the internet without double checking the security of the website. Again, when in doubt, keep it to yourself.

9. All the world's a stage: It may seem harmless to keep our personal social media pages open for public viewing, however, by leaving the virtual door open to the whole world we leave ourselves vulnerable to unwanted attention. Take control of your default privacy settings and limit the viewing power of your audience to a personal VIP list.

10. The buck starts and stops with you: Ultimately, you control what information is available about you. Don't give online scammers, predators or hackers a free ticket to your personal information. Take control, take action and help keep the Internet a safe place to socialize.

For more information on ways to stay informed on social media, visit: http://www.defense.gov/socialmedia/education-and-training.aspx/

Engage

Facebook Twitter
DYK: Aircraft have lifespans! Like humans, they require check-ups in the form of maintenance inspections to prolong their ability to fly. These "checks" prevent in-flight system failures which ultimately protects aircrew and passengers. Learn more from the 86th Maintenance Squadron at Ramstein Air Base, Germany on what it takes to correct issues so aircraft can stay airborne.
WATCH: United States Air Force pilots talk about the importance of Exercise Saber Strike 18 as they refuel over the Baltic Sea on June 18, 2018. Saber Strike 18 is a long-standing training exercise designed to enhance interoperability between the U.S. and our allies. The training focused on improving land and air operational capabilities between the U.S. and our NATO allies. (U.S. Air National Guard video by: Master Sgt. Wolfram M. Stumpf)
Check out some shots from yesterday's All-Star Armed Services Classic Championship softball game in Washington, D.C. This event, part of MLB’s All-Star Week, pays tribute to the men and women of the Armed Forces. Washington Nationals U.S. Army
Air Force and U.S. Army coed softball teams render military honors during the playing of the National Anthem during the All-Star Armed Services Classic Championship softball game, Washington, D.C., July 13, 2018. This event, part of MLB’s All-Star Week, pays tribute to the men and women of the Armed Forces. Washington Nationals
Great way to lead by example!
The United States Air Force is facing a pilot shortage. To help solve the challenge, the Aircrew Crisis Task Force was recently created to provide strategic direction and actionable recommendations to senior leaders on how to solve the aircrew manning crisis. FULL STORY: https://go.usa.gov/xUb3z
Your United States Air Force news: ✓ A B-52 crew assists in a search and rescue operation off the coast of Guam ✓ An Afghan pilot class graduates in the Czech Republic ✓ The Air Force is using innovative approaches to training pilots to make the process faster and more efficient
Now that’s how weathermen work! Air Force Reserve Hurricane Hunters fly weather reconnaissance missions into Tropical Storm Chris and Tropical Storm Beryl. http://www.af.mil/News/Article-Display/Article/1569944/hurricane-hunters-fly-tropical-storms-beryl-chris/
The F-22 Raptor's combination of stealth, supercruise, maneuverability, and integrated avionics, coupled with improved supportability, represents an exponential leap in warfighting capabilities. The F-22 cannot be matched by any known or projected fighter aircraft. Maintaining these aircraft can involve a bit of a learning curve. Airmen at KadenaAirBase use past technology to help learn how to work with the undefeated Raptor. FULL STORY: http://www.kadena.af.mil/News/Article-Display/Article/1567295/hard-to-raptor-head-around/
Help us out! Can you caption this photo?
The B-52 Stratofortress has sniper pods that provide improved long-range target detection/identification and continuous stabilize surveillance for all missions, including close air support of ground forces. Air Force Global Strike Command crew members on a B-52 were able to spot a historic Pacific Island style canoe so that the U.S. Coast Guard could rescue the six passengers!
For the past 60 years, the Defense Advanced Research Projects Agency, or DARPA, has continually helped us maintain a technological edge against our advarsaries. Together with the Air Force Research Laboratory - AFRL, a fusion of ideas is leading to newly highlighted innovations.
SOUND ON! Celebrate freedom with the sound of freedom! Happy Independence Day!
#DYK: The 1st Aero Squadron was the first tactical aviation unit to participate in American military action.… https://t.co/FPijKQVfHp
RT @GenDaveGoldfein: An open letter & invitation to Col "Ned Stark:" Join my team & help us re-exam our officer promotion system -- as lead…
RT @AFWERX: AFWERX is using Ideascale to offer USAF Airmen the opportunity to submit their innovative idea for the Air Force. Join the netw…
#Airman uses data from the #MQ9Reaper to give firefighters near-real-time information as they confront fires in… https://t.co/tX2TSbYrSg
#Airmen from 105th Airlift Wing learn impact of their mission as this #Airman shares her harrowing tale of survival… https://t.co/40kBNQOz3d
Maj. Onier Alejandro-Villarreal & Capt. Rodney McIntyre, 927th Aeromedical Staging Squadron medical techs, operate… https://t.co/YsMHOL2vV7
Only in the #AirForceFamily! The chances of being your sibling's replacement at a deployed location are slim to non… https://t.co/JRED65irZS
RT @AETCommand: “The squadron is the beating heart of the @usairforce; our most essential team,” - Chief of Staff of the Air Force @GenDave
.@MacDill_AFB #Airmen prove that in an emergency a wing commander can turn to augmentees for additional support.… https://t.co/Pgal3TEP3p
RT @DeptofDefense: Prepared for all situations in all conditions. @AKNationalGuard #airmen with the 212th Rescue Squadron at @JBER_Officia
Happy Monday! Let's get this week off to a great start w/ #AirForce #WIP! https://t.co/rlP3y4NQ9k https://t.co/OlzebNB1lQ
After toggling with the idea of joining the #military for years, she promised herself to stop waiting for life to f… https://t.co/7Gt22iqNlD
It's #NationalAviationDay & new aviation opportunities are here! We're partnering with @CivilAirPatrol to groom tom… https://t.co/Fe9b4jlmGw
These supply #Airmen work 24/7 to ensure there is no break in the mission @RAFMildenhall because #NKAWTGhttps://t.co/biE2BPXVe1
Every #Airman has their reason for serving. Read on as these #Airmen explain what putting on the uniform everyday m… https://t.co/ubeDmY1liq
For the first time in the 63-year history of Operation Deep Freeze, #Airmen from the 304th Expeditionary Airlift Sq… https://t.co/CdeyI4HjHT
#DYK, the #MedalofHonor is the highest award for bravery that can be awarded to members of the United States Armed… https://t.co/qei2LbbD1I
.@388fw’s 4th Fighter Squadron became the first operational unit to fire the F-35A’s the #aircraft’s 25mm cannon on… https://t.co/J7hbXrCSCv
#DYK: The @22ARW is the host unit of McConnell AFB! Its mission is to conduct air refueling & airlift operations su… https://t.co/12bR9cwIuG