Social Media Icons
How to Use Social Media for Good
Safely Creating a Positive Presence Online
cyberHACC is the Office of Information Services & Technology monthly information security newsletter. Each month our newsletter will feature a topic relevant to the security of your data, devices, as well as covering best practices related to the handling of information.

Social Media Reflects You

Social media has become a central part of the lives of most people, and taking advantage of its benefits requires understanding its risks.

We have all heard about the evils of social media. Fortunately, there is another side to social media, and with a little savvy you can harness its potential for good. You just need to make sure to steer clear of the pitfalls and work on safely curating a positive online presence.

Our social networks tell a story about us. You want to make sure that the story your social media tells about you is a good one. As articulated in a blog from the Digital Marketing Institute: "Sharing online allows you to craft an online persona that reflects your personal values and professional skills. Even if you only use social media occasionally, the content you create, share, or react to feeds into this public narrative. How you conduct yourself online is now just as important as your behavior offline."

  • Keep it clean and positive. Be entirely sure about what you're posting. Make sure to post content that you feel positively reflects you, your creativity, your values, and your skills. Remember that future employers may look at your social media accounts before hiring you. Questionable content can leave a bad impression; this can include pictures, videos, or even opinions that make you seem unprofessional or mean and may end up damaging your reputation.

    Always think before you post or share negative or inappropriate content. Use the 24-hour rule before posting, allowing yourself 24 hours before posting any content that may be questionable to give yourself time to reflect on whether it is a good idea.

  • Oversharing and geotagging. Never click and tell. It can seem like everyone posts personal information on social media all the time, including where they are and where they live. As noted on the DHS.gov site: "What many people don't realize is that these seemingly random details are all criminals need to know to target you, your loved ones, and even your physical belongings --online and in the real world. Avoid posting names, phone numbers, addresses, school and work locations, and other sensitive information (whether it's in the text or in the photo you took). Disable geotagging, which allows anyone to see where you are --and where you aren't-- at any given time."

    If you really want to post that picture of your friends at brunch, consider following the concept of #latergram and post your content at a later time than when it actually happened. It is a win-win. You get to share your experience and at the same time still maintain the privacy of your location in real time.

  • Own your online presence. Set the privacy and security settings on websites and apps to your comfort level for information sharing. Each device, application or browser you use will have different features to limit how and with whom you share information.
  • Don't rely on privacy settings. You have a private social media account so you can post anything you want? Nope. Privacy settings make it harder to see your full account, but it's not impossible. Also, there is always the chance that one of the people with access to your private account could screenshot and share the content.

    Make sure to keep your social media apps up to date and check the privacy settings frequently. Under no circumstances should you rely on privacy settings to shield inappropriate content. If there is any question that the content is inappropriate, don't post it.

  • Make sure you're professional. Keep it classy! Every post is a reflection of you. Your social media accounts allow you to put your best foot forward or stumble if you aren't careful. A positive social media presence can help create both personal and professional opportunities. Promote your personal brand or what you want people to think of you. And, your high school English teacher was correct—proper spelling and grammar are always a plus.
  • Control your content. Claim your identity on social media. Set up social media accounts and keep the profiles current. You don't have to join every platform; a few key ones will do. You can also look into apps that will cross post the content to all of your social media accounts, freeing up some of your valuable time. Use your accounts to engage professionally and personally in a positive way.

    Your social media accounts should tell the story of you that you want employers and others to see. Google your own name on a regular basis to make sure that that information out there is accurate. If you find incorrect information online, request that the website update it or take it down.

If you follow these few simple recommendations, you are on your way to safely building a positive online reputation. Using social media positively doesn't mean you can't have fun and use it to express yourself; however, you want to ensure that you're okay with anyone seeing everything you post. Once you post something online, it's out there forever.
Additional Resources:

An email has been sent to all employees asking them to participate in cybersecurity training on the topic of phishing attacks. Thanks to AIG (HACC's cybersecurity insurance provider) and their partnership with TechGuard Security®, we can offer this short training module to increase everyone’s cybersecurity awareness.

The email will come from cybersecurity=hacc.edu@inspiredlms.com and will contain instructions on how to access the training.

Please note the course only takes approximately 10-12 minutes on average.
  • Make sure you have a stable internet connection to prevent timeout problems with saving your progress.
  • You will know you have completed the training when you get the screen that instructs you to click 'X' to close the course window.
  • Upon successful completion, you will receive another email with your Certificate of Completion for the training.

Watch for more tips each month to raise your
Cybersecurity I.Q. and help keep HACC’s data safe!
Information provided by the Awareness and Training Working Group of the EDUCAUSE Higher Education Information Security Council (HEISC).
HACC, Central Pennsylvania's Community College
Office of Information Services & Technology
One HACC Drive, Harrisburg, PA 17110

Copyright © 2019 HACC, All rights reserved.