APRIL 25, 2014
Your regular source of security updates from TrendLabsSM
In This Issue

Security Spotlight
Heartbroken by Heartbleed

Security for Home Users
Spring Cleaning on Social Media

Security for Business
Why You Need Application Control



Security for Home Users

Spring Cleaning on Social Media

Just because social networks reside on the Internet doesn’t mean you don’t need to declutter your accounts. In fact, that’s even more reason to do so because going online is going public.”



Nothing feels better than getting rid of all unnecessary clutter out of your life. Not only does this give you more time for fun activities but also gives you a clean slate and the feel of a fresh start.

You’ve probably started or maybe even finished cleaning your home. But there’s that part of your everyday life that needs cleaning, too—your social networks. Sure, it’s great to “be friends with” everyone you know on social networks but do you really stay in contact with all of them? Some pruning here and there may be a good idea to keep your digital life as neat as your home. Not to mention that it can add to your online security, too.

To help you get off to a good start, take a look at some tips below.

  • Cull your herd (of friends). The more friends you have, the merrier. But there’s also wisdom (and security) in paring down your list of friends to those you have a real connection with or implicitly trust. People you don’t really know or only know through second- or third-degree connections aren’t strictly friends. Make sure only your real friends see your entire profile and everything you post, especially if they’re personal. Doing this also helps you avoid malicious links or files supposed friends may send.

  • Minimize third party-app access. You most likely allow some apps direct access to your social media accounts. While this is convenient and fun, especially when it comes to gaming, it does add unnecessary access points that bad guys can take advantage of. Think of this as doing your friends a favor, too. They’d probably appreciate not getting unwanted gaming invitations and high-score-bragging notifications.

  • Toughen up passwords. An easy-to-remember password is also an easy one to crack. Use long and hard-to-memorize even hard-to-input passwords. Though you’ll be inconvenienced, cybercriminals will be, too. But if memorizing isn’t your thing, use a password manager like Trend Micro™ DirectPass™ to help you manage numerous accounts. It’ll help you make sure you don’t reuse passwords to prevent cybercriminals from hijacking all or many of your accounts just by cracking one of them open.

  • Take advantage of social networking sites’ privacy settings. Facebook and Twitter, for example, have features to make sure only your closest friends see your posts. That means no casual onlooker or cybercriminal can mine your account for personal information.

  • Don’t overshare. Oversharing is more common than you think. If you’ve ever revealed that you’re going out of town on vacation or complained of someone or something, you’re in danger of oversharing, as these posts can be used to attack you.

  • Never access via unsecured networks. Getting free Wi-Fi access is great but you run the risk of exposing all your online activities to anyone else on that same network. Keep in mind that sniffer apps can monitor and record unprotected data sent across a network, which can allow attackers to see what you’re up to or, worse, steal your personal data.

Just because social networks reside on the Internet doesn’t mean you don’t need to declutter your accounts. In fact, that’s even more reason to do so because going online is going public. For more information on living a better and safer digital life, take a look at “Spring Forward with Social Media.”

Copyright ©2014 Trend Micro Incorporated. All rights reserved. Trend Micro and the Trend Micro t-ball logo are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their respective owners. The information contained in this document is subject to change without prior notice.

www.trendmicro.com

  CONNECT WITH US ON: