{"id":89,"date":"2015-10-23T11:17:49","date_gmt":"2015-10-23T15:17:49","guid":{"rendered":"http:\/\/blogs.uml.edu\/information-security\/?p=89"},"modified":"2015-10-23T11:21:35","modified_gmt":"2015-10-23T15:21:35","slug":"social-media-what-hackers-can-learn-about-you-in-less-than-30-minutes","status":"publish","type":"post","link":"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/23\/social-media-what-hackers-can-learn-about-you-in-less-than-30-minutes\/","title":{"rendered":"Social Media &#8211; What Hackers Can Learn About You in Less than 30 Minutes"},"content":{"rendered":"<p>Have you ever stopped to think how much information about yourself is freely available online? With over 2 billion active social media accounts today, hackers are shifting their focus to target social media users. In less than 30 minutes, nearly\u00a0anyone can learn your name, email address, location, past work experience, hobbies, and more just by looking at your profile. If hackers gain access to other information such as a credit card or social security number, they\u00a0can even apply for loans\u00a0and mortgages in your name.<\/p>\n<p>Here are some ways to protect your personal information and keep your online presence secure when using social media by visiting one of industry&#8217;s leading authority on security awareness.\u00a0\u00a0<a href=\"http:\/\/web.securityinnovation.com\/hubfs\/downloads\/Week3-NCSAM-Social-Media-Security.pdf?t=1444393698019&amp;t=1444393698019&amp;utm_campaign=NCSAM+2015&amp;utm_source=hs_email&amp;utm_medium=email&amp;utm_content=22757888&amp;_hsenc=p2ANqtz-9qxmDAvfPsdPE0j8-Xfu3p_UqIQgfxISsUNxx4YfrxMZuuvamiaGjSkrDt3QWwUQYGxVTEYh1gtFTLz4KbKRy25BvHxg&amp;_hsmi=22757888\" target=\"_blank\">What Hackers Can Learn From Social Media in Less than 30 Minutes<\/a>.\u00a0 (pdf viewer is required).<\/p>\n<p>Additional Resources:<\/p>\n<p><a href=\"https:\/\/www.staysafeonline.org\/stay-safe-online\/protect-your-personal-information\/social-networks\" target=\"_blank\">Stay Safe Online<\/a><br \/>\n<a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST06-003\">Staying Safe on Social Networking Sites<\/a><br \/>\n<a href=\"https:\/\/www.us-cert.gov\/ncas\/tips\/ST06-003\" target=\"_blank\">5 Tips for Social Media Security and Privacy<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever stopped to think how much information about yourself is freely available online? With over 2 billion active social media accounts today, hackers are shifting their focus to target social media users. In less than 30 minutes, nearly\u00a0anyone &hellip; <a href=\"https:\/\/blogs.uml.edu\/information-security\/2015\/10\/23\/social-media-what-hackers-can-learn-about-you-in-less-than-30-minutes\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":273,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3,1],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/89"}],"collection":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/users\/273"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/comments?post=89"}],"version-history":[{"count":2,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/89\/revisions"}],"predecessor-version":[{"id":91,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/posts\/89\/revisions\/91"}],"wp:attachment":[{"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/media?parent=89"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/categories?post=89"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uml.edu\/information-security\/wp-json\/wp\/v2\/tags?post=89"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}