Unhealthy Social Media/Doomscrolling: Do You/Your Child Have a Problem?

Are you doom scrolling? Do you find yourself obsessively checking your feeds? Does the election have you pinned to an anxiety rating of 10? Are you logging into your social media accounts and wanting to go to battle with every idiot who posts a dumb meme counter to your beliefs? Are you only reading half of an article and then scrolling to the comments to see all the stupidity?  Well, if you are like most people, then you’re a mess, and it’s understandable.

Unhealthy Social Media/Doomscrolling: Do You/Your Child Have a Problem?

I’m not gonna get all sciency or judgy here, it’s pretty obvious, we weren’t really meant to have this much stimulation or information or constant contact. We weren’t meant to be this connected and we weren’t meant to be instantly “activated” from somebody 1000 miles away 24/7/365.

And if you’re having a problem, think about how distracted your kids are right now.

Schools across the United States are increasingly implementing bans on mobile phones to address concerns about student distraction and academic performance. As of 2022, over 75% of K-12 public schools prohibit non-academic cell phone use. This trend is gaining momentum, with several states recently passing laws to restrict or ban cell phones in classrooms altogether.

When you get a group of parents into a room, the topic of how often their children are on their phones often comes up. And while you are having that topic of discussion with those parents, half of them are on their phones not listening to you. It is inevitable, but the real question is: does your child have a problem with social media? Do you have a problem? Understandably, parents are concerned over how much screen time their children receive daily, and you need to know when you should be stepping in.

Below are a few indications that you or your child might have a social media problem and how you can take care of it sooner, rather than later:

They are Glued to Their Devices

Common Sense Media came out with a report that said teens spend an average of 7 hours and 22 minutes on their phones daily. Can you believe that? They spend as much time on their phones as they do at school every day! Pre-teens are no better because it has been reported that they spend an average of four hours and forty-four minutes daily on their devices.

On average, adults spend approximately 4 hours and 37 minutes on their smartphones each day. This usage translates to over one full day per week dedicated to phone activities.

The statistics vary slightly depending on the source, with some reports indicating that Americans may spend up to 5 hours and 24 minutes daily on their phones. Notably, younger generations, particularly Gen Z, report even higher usage, averaging around 6 hours and 5 minutes per day.

These numbers are intense, so parents notice that their children are attached to their devices. This is not good for children because it is too much time staring at a screen. However, social media did help many teens feel connected with other people throughout the pandemic. And while we may be beyond that, the habits all stuck.

Revise How Much Time They are On Their Screens

Even though research continues to come out about social media and its effects on teens and children, it is still known that too much of anything can be bad. Children with too much screen time can contribute to sleep deprivation, poor academics, and an unhealthy lifestyle. Additionally, their mental health can be severely impacted by being on social media because of bullying, sexual content, hate speech, and comparing themselves to others.

However, parents can see that this needs to change because children should not be glued to their phones for every waking minute of the day. This will cause a lot of anxiety and stress in a child but setting the right boundaries can help minimize the number of problems with social media addiction.

Make New Habits

1. Easy Steps First

When any new habit needs to be formed, it is best if the task is broken down into small steps. If we want the change to stick with the child, it needs to be small and fun because this will be enjoyable for them. Parents wishing to limit their child’s time on their phones should consider setting time limits to connect with their children through a fun activity.

An activity like art or baking can be a great way for you to connect with them on a personal level.

2. Device Curfews

A lot of supporting research shows how the blue light from devices can cause sleep issues for everyone. This will then have a larger effect on someone’s mental and physical health. Experts say that people should turn off their devices at least 15-30 minutes before bed to help them prevent any adverse effects of technology.

Parents should look into downloading software on everyone’s devices to turn off their screen time at a specific time in the evening. This will also make it feel less like a punishment for the child.

3. Mindful Media Usage

No parent should sweep in and make accusations about how their child is engaging with their social media. This is because we don’t know. Instead, speak with your child and ask them to think about what they are looking at consciously. Is it creative and engaging? Can they learn anything from this? Do they need to post something, or is it a thoughtful piece?

Having your children think critically about their social media is the best way to encourage them to be more mindful of their usage.

4. Educate Your Children

You can’t expect your children to understand why you want to limit their screen time if they do not know why it needs to be limited. Speak with your children and explain to them the balance they need with their social media and how it will benefit them in the long run. Teaching them that pairing it with physical activity, self-reflection, creating genuine life relationships, and more is how they will learn to keep these habits up for a long time.

5. Be a role Model

Delete all your social media apps. Seriously, you don’t need social media apps on your mobile phone. Wean yourself off social starting with your mobile phone. Keep in mind, you’ll still be able to access it via your laptop or desktop. But if the apps aren’t installed on your phone, then you at least have a fighting chance of breaking the addiction and showing your kids that it can be done.

Beyond that, delete any news feeds, or any other data aggregation tools that keep you plugged into current events. At least try it for a day and then for a couple days and then for a week and see how you’re doing. I think you will find your attention shifting towards things that matter a bit more like your family, activities, maybe even household projects you enjoy doing.

Conclusion

Helping children to manage their social media habits begins with you helping yourself. It is not impossible. Parents must remember to be open and honest with their children through communication and critical thinking, so their children will learn how to keep up with these habits for the rest of their lives.

Robert Siciliano CSP, CSI, CITRMS is a security expert and private investigator with 30+ years experience, #1 Best Selling Amazon author of 5 books, and the architect of the CSI Protection certification; a Cyber Social Identity and Personal Protection security awareness training program. He is a frequent speaker and media commentator, and CEO of Safr.Me and Head Trainer at ProtectNowLLC.com.

Hackers are Targeting LinkedIn with Phishing Scams – How to Protect Yourself

Retail, shipping, and tech companies are no longer the most common brands that hackers use to hide their attempts at phishing. These days, social media platforms are the main choice, and hackers are using sites like LinkedIn to dupe victims into giving them information. In fact, when we look at global phishing attacks during the first three months of 2022, more than half were from LinkedIn brands.

Phishing scams on LinkedIn generally revolve on stealing credentials, financial scams, espionage, and impersonations design to facilitate all of the above.

The research company, Check Point, released a report that shows LinkedIn and associated brands have been used 44% more by hackers when compared to the previous quarter, the final three months of 2021. At that point, these brands were used in only about 8% of all phishing attempts.

In this report, it shows that LinkedIn is the most targeted brand, but other brands, like WhatsApp, are also being used for these dastardly deeds. WhatsApp is in the top 10 of all brands being used for phishing scams, and it accounts for about 1 in 20 phishing attacks worldwide. Shipping companies, too, like DHL, are also popular options for hackers, too. The top five are LinkedIn, DHL, Google, Microsoft, and FedEx. WhatsApp, Amazon, Maersk, AliExpress, and Apple round out the top 10.

Detecting LinkedIn Phishing Scams and Fake Profiles 

It can be difficult to detect LinkedIn phishing scams because many of these emails look extremely convincing. So, how can you determine what is real and what is fake? Here are some tips:

  • Take a look at the information on the sender. It should come from an address from LinkedIn.com. However, even if it does, there is still a chance it is fake.
  • Look at the content – if it has a lot of misspellings, grammar issues, or typos, it is likely a scam.
  • If there is a link that you are asked to click, hover over it first to see where it’s leading. If it is not from a LinkedIn.com domain, do not click on it
  • If there is an attached file, don’t open it. This is a fake email. LinkedIn would never send a file, and if you open it, you could infect your computer.
  • In any case, if something looks strange or suspicious, do not click anything or open any files.

There also might be fake profiles on LinkedIn that are focused on phishing attempts. Here are some tips to help identify them.

  • Check the entire profile for anything weird or odd. Things like inconsistencies may stand out.
  • Take a look at the number of contacts the person has – if it is low, it could be a profile that is newly created just to fraud others.
  • Is there an easy way to see why the person contacted you? Like are you in the same industry?
  • Is the person trying to share a file with you? Don’t accept it, and don’t fall for any type of sense of urgency.

If you have any doubts, or you are curious about what is said in the message, if it’s that important to you, don’t hesitate to contact LinkedIn. Ask to speak to that person. The person who answers will confirm or deny that the individual in question works for the company, and if they are legitimate, they can confirm or deny if they sent the message. You can also report LinkedIn scams as well.

Remember, cybercriminals can easily compromise LinkedIn accounts that are legitimate, so it’s very important to confirm via another communication channel, like a phone, if you are getting strange LinkedIn messages.

Proactively, engage your team in phishing simulation training to make them aware of what to look out for. This type of security awareness training is a cost-effective form of risk management.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

It’s Fake News!!! How Social Media Has Turned into a Weapon

A lot of people just want to follow the crowd. You might not be one of them, but you have surely heard of some calling others “sheep” or cattle,” because they want to be led by another. I say it all the time, MOOOOOOOOOOOOOO! There isn’t anything inherently wrong with this on the surface. The problem arises, however, when the people doing the leading are doing it for personal gain and when the followers blindly follow because they want to be lead and/or because it’s convenient and/or because they are stupid. In this day and age, the most common way to do this is via social media.

social mediaCambridge Analytica actually did this to win elections and do other things. For instance, it was first used in first world countries, and then with Brexit. It was also used in the 2016 US presidential election.

Here’s how it can go down and how social influence can be used to change the minds and hearts of others:

Company or country leaders began to realize that they could use social media to influence people. They could manipulate facts and post information that is just not true, and people began to believe it supported by confusing data and just plain wrong. This is often accomplished by using clickbait headlines, viral memes, and videos just filled with lies and emotion.

At a basic level, spreading this type of misinformation is called a confidence scam or confidence trick. When someone is confident in another person, they trust them. Trust is an inherent human trait required as an interdependent species. Without trust, we as a species would cease to exist. If women had no confidence in men and did not trust them, they would not allow themselves to be received. We wouldn’t be able to function unless we trust each other. The conman’s motivation is to influence the victim enough so that the victim is confident in the message. The conman wants to be trusted, of course, and when they are, well…it’s like shooting fish in a barrel.

Of course, the outcome of this is that the conman wants to divide and conquer, or even rule the people who fall for this manipulation. When we try to define “divide and conquer,” we can say it is the practice of maintaining control of victims by encouraging them to disagree amongst themselves. In other words, the conman can tell both sides, “don’t trust them, trust me.”

People used to share disinformation by speech. However, when the press came into play, decades and decades ago, in the form of leaflets and pamphlets, books, political cartoons, newspapers, and magazines. Now, it generally spreads via social media, which is great for the conmen, because they know it is spread like wildfire.

When we look at the word “disinformation,” we find that it comes from a Russian word, dezinformatsiya. Joseph Stalin actually started using the word in 1923 within the KGB’s “Special Disinformation Office.” At the time, the word was defined as “false information with the intention to deceive public opinion.”

Remember, disinformation is meant to confuse the target and instill fear by blurring the lines between what is fact and what is fiction. The purpose is to spread conspiracy theories that isolate targets from other viewpoints, which ultimately creates a cloud of paranoia and confusion.

Disinformation on social media is born as a lie, and it is a lie that you believe to be true…and you agree with it, like it, and then share it with friends. Once you take on this role, you are just as much a perpetrator and that of a victim of everyone else who falls for it.

The Five P’s of Persuasion

When it comes to persuading others, there are five “P’s” that you should keep in mind:

Persuasion

When you have a particular belief, or a persuasion, it means that you already have made up your mind about something. One example of this is political persuasion. You might be under the Republican persuasion or the Democrat persuasion. You can also define persuasion as the act of influencing someone else to change their mind or to do something that they might now do without influence.

Psychographics

The word “psychographics” is the study of people based on criteria including their attitudes and aspirations. This especially comes into play when looking at market research. Psychographics is often used to describe someone based on their psychological attributes and it can be applied to the study of personality, attitudes, values, interests, opinions, and lifestyles.

Psychological Operations (PSYOPS)

PSYOPS, or psychological operations, can be used to explain information and indicators to an audience in a way that it influences their reasoning, motives, and emotions. Ultimately, it can affect the behavior of entire governments or organizations as well as groups and individuals.

Psychological Warfare

This is the practice that some use during a war or during a time where war could be a danger. It is made up of propaganda, threats or other non-violent techniques. It may also apply in times of political unrest in order to intimidate, demoralize, or influence the thinking or behaviors of an enemy.

Propaganda

You can define propaganda by saying it is information that is not objective and used to either further an agenda or influence a target audience. This is generally done by only presenting facts that can encourage a particular perception or using language to create an emotional response, not a rational response, to particular information. There are a several different types of propaganda:

  • White propaganda is a type of propaganda that is put out on purpose by a transparent source and credited by the source. Basically, it is a valid opinion of someone or something. A good example of this is a political ad that is created to discredit an opponent. The conclusion of this ad would say, “My name is Candidate Name, and I approve this message.”
  • Grey propaganda is a type of propaganda where the information is not credited nor expressed, and the source of the propaganda is hidden. The information doesn’t have to be accurate or inaccurate, as it might be true, or it might be false. One example of this is a small company putting an ad out about a competitor claiming said competitor uses poor quality materials. The information might be true, but the creator of the add doesn’t want to be known as the one who released the ad.
  • Black propaganda is totally false information that is created to seem like it was created by the entity that it is intended to discredit. For instance, you might see a video or meme that looks like it comes from Black Lives Matter that shows a black man attacking a white man. Obviously, this is something that Black Lives Matter would not want people to see, but if the video says, “The video brought to you by Black Lives Matter,” and it is spread from one person to another on Facebook, ultimately, this discredits the organization.

Now that you have all of this information available, there is one question that you have to ask yourself: Are you someone who is area of the disinformation that you is out there, or are you a sheep? MOOOOOOOOOOOOOOOO!

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Use Facebook or YouTube if You Want to be a Criminal

When you start thinking about a cybercriminal, you probably imagine a sleezy looking person in a dark room wearing a black hoodie, right? They are likely browsing the dark web and maybe surrounded by empty high energy drinks. However, that’s not how most cybercriminals look. Most look just like a normal person, and they are hiding in plain sight.

They are organized, they function like any profitable business, they have hierarchies, employees and even a business plan.

Criminals can easily create Facebook groups or YouTube channels, and then they start participating in cybercrimes, which include buying and selling information from credit cards, spamming/phishing tools, or even accessing logins and passwords. Some of these groups have thousands of members.

This might not sound like a lot, but it is. You also have to consider the fact that Facebook as approximately 2 billion people logging into the site every month. With that amount of people, it can be difficult for the company to deal with this type of infiltration.

Facebook removes these cybercriminals, but it tells us that the mega corporation is having a difficult time keeping bad behavior at bay. This is a game of whack a mole. They keep popping up like mushrooms or weeds. These groups also includes share false information, hate speech, and incite violence. It also shows how this behavior is amplified by Facebook’s or YouTubes algorithms.

Finding these groups or channels is easy. All you have to do is search for “spam” or ‘CVV,” “dumps”, “skimming” or search a variety of “white supremacy” terms and then join. Once you join these groups, the algorithms come into play and suggest even more groups that are similar. The truth is, these sites  don’t have a good way to catch these criminals, and it relies on user reports to police the bad behavior.

Since this is the case, tech companies have a long way to go before it can stop relying on user reports. There is also the fact that oftentimes, these reports are not taken seriously, so even valid reports can fall through the cracks.

One example of this is with the terrorist attack in Christchurch, New Zealand in 2019. The gunman actually streamed the attacks on Facebook Live. Though Facebook took the video down, eventually, thousands of people were able to see it before it disappeared. Facebook claims that there were no reports of the video, which is why it took so long to take it down…though that is difficult to believe.

The one bright spot is that Facebook has admitted that there is an issue, and it understands that these groups were in violation of its own policies. The company also said that it knows that more vigilance is required and that it is working on investigating more criminal activities that are reported.

Written by Robert Siciliano, CEO of Credit Parent, Head of Training & Security Awareness Expert at Protect Now, #1 Best Selling Amazon author, Media Personality & Architect of CSI Protection Certification.

Boom! 14 Different Disasters Caused by Social Media

There are a number of ways that you or your small business could get caught up in a disaster on social media. Can you think of any? If not, that’s cool. Here are 14 that could be dangerous:social media

  1. A Horrific Reputation Online – Do you watch your company’s Facebook page? Do people post to it? Are you staff members posting? Even things that seem lighthearted at first, they could easily be taken in the wrong way by others.
  2. Racy Text or Images – If you or your employees are sharing racy text or images on their own social media pages, it could affect your business and your life. Though you cannot control what others are posting, you can absolutely educate them on how to use social media in an intelligent way. Generally, these things happen simply because of ignorance, but even something seemingly innocent could give your company or yourself a bad name.
  3. Fakers – You might not realize it, but there could be someone out there posing as your company or yourself. So, make sure to scope out the internet to see if anyone is using your company name or logo. There could even be fake websites out there. You can set up a Google Alert to notify you if your business name or personal name appears on the internet.
  4. Financial ID Theft – Though it might seem safe to post a picture of your new puppy on your company’s website, it could lead to a stolen identity. How? Well, if you post the photo, you will probably put the puppy’s name on it. A lot of people use the names of their pets as passwords or as answers to online security questions. Now, a scammer has one more piece of the puzzle that they can use to hack into your accounts.
  5. Photo GPS – When you post a photo to your social media account, make sure that the GPS is turned off. This way, a criminal cannot use it to locate you nor your employees. GPS is great, but it can also be dangerous.
  6. Vacations – Remind your staff about the dangers that can come when they post vacation information on their social media accounts. A burglar can easily use this information to find homes to break into. If they know, for example, that Sally in HR is on vacation, they know that she is not home, and now her house is a target.
  7. Corporate Snooping – There is also the possibility that a corporate snoop could set up a Facebook account, pose as a staff-member of a well-known company, and then pull in your real staff into a fake Facebook group. Then, they can feel free to talk about sensitive information that the criminal could then steal.
  8. Sex Offenders – Always know who you are chatting to online. Additionally, make sure to tell your kids or staff or staffs kids to be careful about talking with anyone new. This person could be a sex offender.
  9. Badmouthing – At some point, there will be a former or current employee who is disgruntled. They might feel like they were not terminated justly, or they might not like that they were passed over for a promotion. These are people who might try to get revenge by posting negative posts on your company social media pages.
  10. Bullying – Additionally, you might find that someone on your staff is a bully. Are they posting these types of bully messages on your social media? This could be bad for your business.
  11. Government Spying – Though it might sound crazy, there are instances where law enforcement agents can use social media to learn more about suspects in crimes.
  12. Fake Websites – You might also find that someone is setting up a fake website, and then pretending to be from your company. When a customer goes to your site, they could be giving them information about themselves, including their email address, account numbers, and phone numbers.
  13. Taking Over Accounts – Do you remember when the Associated Press and 60 Minutes had their Twitter accounts hacked? The AP account tweeted that President Obama was attacked. In response, the stock market tanked within minutes, causing people to lose millions of dollars because of a fake tweet.
  14. Liability – You can use the privacy settings on Facebook to hide certain posts, but that doesn’t mean they cannot be used in a future legal case. In fact, studies show that Facebook posts are used as evidence in 1 out of 5 cases of divorce.

What should you takeaway here? It is that there is no such thing as a social media account that it totally private. Someone who has bad intentions or even a post that isn’t meant to be malicious could ruin your or your company’s reputation.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity and Personal Protection security awareness training program.

Disinformation i.e. FAKE NEWS: How the Weaponization of Social Media Has You Conned

This post takes a hard and honest look at whats happening right now. You either “get it” or you are a victim of whats going on. Victims who read this will trash it and deny the reality of what they read. Denial is warm and comfortable. The truth is cold and can hurt. And nobody likes to admit they are wrong, ever. So I expect plenty of haters.

“People are much like cattle or sheep; they just want to be led.”

The author of that controversial and maybe offensive quote is the author of this article. Maybe YOU aren’t like cattle or sheep, but most are. The problem with this sentiment is that some cowpokes and herders may use evil methods to lead their herd for their personal gain. In the digital age, this is done most effectively via disinformation weaponized with social media.

Here’s How It’s Done: 

Cambridge Analytica, on behalf of its clients, scientifically weaponized social media using disinformation to win elections. It was first tested in third world countries and then with Brexit and most recently to win the United States presidential election. Here’s a breakdown of what is believed to be the basis of how it used social influence to change hearts and minds.

Company leaders understood that the weaponization of social media is “the act of manipulating facts by spreading disinformation for propaganda”. This act is accomplished by;

  • a coordinated effort using viral memes,
  • emotionally charged videos,
  • and clickbait headlines.

Confidence Trick

Fundamentally, disinformation is a confidence trick or scam. The motivation of a conman is to influence their mark enough to gain the confidence of the victim. The conman wants to be trusted. Once the conman has the trust of their target, it’s like taking candy from a baby.

Divide and Conquer via Disinformation

The desired outcome of disinformation by its author is to divide and conquer or rule the persons who are manipulated by it. The Oxford definition of “divide and conquer” is the policy of “maintaining control over one’s subordinates or subjects by encouraging dissent between them”. In other words, from the perspective and motivation of the conman, “don’t trust them, trust me.”

I REPEAT: 

The desired outcome of disinformation by its author is to divide and conquer or rule the persons who are manipulated by it. The Oxford definition of “divide and conquer” is the policy of “maintaining control over one’s subordinates or subjects by encouraging dissent between them”. In other words, from the perspective and motivation of the conman, “don’t trust them, trust me.”

Can you see exactly how Divide and Conquer and don’t trust them, trust me is being played out every single day in our current political climate with the impeachment hearings? The administrations own cabinet, the people and professionals hired to do the job they are doing, are being deposed and are publicly confirming what was said in the call. The administration is saying don’t trust them, trust me. Thats pure Disinformation.

Disinformation i.e. Dezinformatsiya

Disinformation, fundamentally, is lying. Disinformation used to be spread by the spoken word only.  But with the invention of the printed word and the press, disinformation was spread using pamphlets, leaflets, books, magazines, political cartoons, and in planted clandestine newspaper articles. Agents of influence, political spies, and journalists can all be used to spread disinformation. Digitally, social media spreads disinformation like the proverbial wildfire.

The birth of the word “disinformation” comes from the Russian word (dez-inform-ahhT-see-ahh) dezinformatsiya. Joseph Stalin coined the term in 1923 derived from the title of the KGB black propaganda “special disinformation office” department. Disinformation was formally defined in the Great Soviet Encyclopedia in 1952 as “false information with the intention to deceive public opinion”.

Disinformation is meant to instill fear and confuse its intended target by blurring the lines between fact and fiction. Disinformation’s primary purpose is to spread conspiracy theories that isolate readers and viewers from alternative viewpoints to create a cloud of confusion and paranoia.

Disinformation in Mainstream Media

Can you see where in our culture, right now, which leg or legs of our media might isolate readers and viewers from alternative viewpoints to create a cloud of confusion and paranoia? If you can’t, then you are a victim of Disinformation. You are being led. You are sheep.

When you see disinformation, which is born a lie that you believe to be the truth, and you agree with it and then support it by liking it and sharing it, you are then a victim of it and a perpetrator of the confidence crime that the disinformation is.

The 5 P’s of Persuasion

Heres how minds are manipulated;

Persuasion

When you are of a particular belief…or persuasion…it means that you have already made up your mind. An example of this is of the Republican persuasion or the Democratic persuasion. Another definition of persuasion is the act of influencing another person to change their mind or to do something they might not do without your influence.

Psychographics

This is the study of people based on their aspirations, attitudes, and other criteria. It is especially the case in market research. The study of psychographics is a methodology that is used to describe a person based on their psychological attributes. The method has been applied to studying values, attitudes, personality, opinions, lifestyles, and interests.

Psychological Operations (PSYOPS)

Psychological operations, or PSYOPS, are used to convey certain pieces of indicators and information to an audience to influence their motives, objective reasoning, and emotions. It can ultimately affect the behavior of organizations, governments, individuals, and groups.

Psychological Warfare

The act of psychological warfare is the planned use of threats, propaganda, or other non-combat techniques during the danger of war or even during a war. It can also apply to any time of political unrest to demoralize, intimidate, or influence the behavior or thinking of the enemy.

Propaganda

Propaganda is defined as information that has no objectivity and is used to influence a specific audience or to further an agenda. This is often done by presenting selective facts to encourage a particular perception or synthesis, or by using loaded language to create an emotional instead of a rational response to the given information.

Propaganda Comes in Many Flavors.

White propaganda is information that is purposefully put out by a known transparent source and credited by its origin. The information intends to express a valid option of its author. An example would be a political ad put out by the “Jane Smith” political campaign designed to discredit her opponent and at the conclusion the video stating “Brought to you by the campaign to elect Jane Smith.”

Grey Propaganda is when the source of information is not expressed nor credited, and the identity of the source is concealed. The information shown does not have to be inaccurate as it could be true or false. An example might be a local small business putting out an ad about a competitor revealing the competitor uses inferior materials. This information may be correct, but the author, to avoid backlash, doesn’t want to admit they placed the ad.

Black propaganda is false information that is designed to look like it was created by those it is intended to discredit. For example, a meme or video that might appear to come from the Black Lives Matter network that may express images or video sanctioning black people attacking white people. Obviously, it is not in the best interests of a movement designed to accelerate civil rights to put out media of this kind. But if it says in the video “Brought to you by Black Lives Matter” and its spread via social media, it will inevitably spread disinformation to discredit the group.

Are You Sheep? 

The questions then are; Are you aware of what is disinformation? Or are you sheep? Don’t shoot the messenger please. I’m only trying to shine a light on the fraud that you might be a victim of.

ROBERT SICILIANO CSP, is a #1 Best Selling Amazon author, CEO of CreditParent.com, the architect of the CSI Protection certification; a Cyber Social and Identity Protection security awareness training program.

Youth Suicide on the Rise…is Social Media to Blame?

A startling new study shows that youth suicide is on the rise, and it has risen in dramatic fashion.

Data from the National Poison Data System shows that there were more than 1.6 million cases of kids from 10 to 24-years old attempting suicide by poison during the time between 2000 and 2018. A shocking 70 percent of these attempts were done by females. There was also a huge spike in the rate of attempts at suicide among those aged 10 to 15.

When we look at the individual years from 2000 to 2018, we can see that suicide rates were fairly steady…up until 2011. However, from 2011 and beyond, there has been a huge increase. In some cases, it is as much as 300 percent. So, we have to look at reasons for this.

During that time, there were several societal changes, which certainly could impact these numbers, specifically social media and smartphones becoming something that youth are using every day. There are several studies that can correlate this theory. In simple terms, these studies show an increase in suicide among youth aged 12 to 17 and an increase in social media screen time. However, this was no correlation between the two when looking at suicide rates among adults.

This author personally knows, or sadly knew many who have committed suicide and they range in ages from 10 years into adulthood. All had one thing in common, and insatiable appetite for social media use. There is article after article that links social media use with depression. When many of us are on social media, our inclination is to compare ourselves to others. A quote that rings true is “Comparison is the thief of joy” which is so sadly true.

This study does not totally nor unequivocally establish that social media use causes suicide, of course, but there is certainly a clear connection. When you are looking at more than a million kids who are at risk of suicide, it is important that parents understand this. Everyone has a tough time in their teen years, which parents understand, but what they don’t understand is being a teenager and totally connected to their peers via digital devices 24/7 with many of their peers being MEAN to them!  Doctors, who are supposed to help, don’t understand the digital aspect of this, either.

The findings of these studies are also in line with other research on suicide, which is the second leading cause of death for people from age 10 to 24. A tween or teen will full unfettered access to a smartphone and social media is the equivalent of handing them the keys to the car prior to knowing how to drive or even giving them a loaded gun.

A separate study as reported by HuffPo shows a great correlation to all of this, too. In this study, which looked at emergency room records, it was noted that suicide attempts as well as suicidal thoughts doubled from 2005 to 2017. More than 40 percent of these were for children from 5 to 12-years old.

All of these studies also show that parents are pretty clueless about this. In fact, research shows that about 50 percent of parents who have children who have considered suicide are totally in the dark about it.

Something has got to be done about this, of course, before it gets out of (actually it already is) control. Support and awareness about mental health is certainly a step in the right direction, but parents also must be aware of the great increase of suicide and attempted suicide rates among teens and realize that their child is just at risk of this as any other children. Parents can also do things like limiting their children’s access to medications in the home. It is also important for parents to learn the warning signs and understand that even young kids, who are not yet teenagers, can still have thoughts of suicide. Talking to your kids about it is always a good idea. Taking their phone away is a better idea. Adults too. Stop the madness!

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video

Protect Your Company with This Social Media Security Advice

Social media is an excellent tool for small businesses, yet, the use of social media by small business staff can definitely put the company in danger. Many small business owners and managers don’t realize this.

Recently, I was talking to employees of a credit union about what to do in a robbery. Before this presentation, police officers had staged a robbery in the same credit union. The fake robbery was so real, some of the tellers were brought to tears, thinking they were really getting robbed.

After they were filled in on what was happening, everyone on the team discussed it. One of the most telling moments is when one of the tellers shared her story. During the mock robbery, one of the “robbers” handed a teller a note. It said this: “Your husband works at Pine Street Motors. We kidnapped him this morning. He is being held at another location. If you hit the alarm and notify police, he’s going to be killed.”

How did the bad guys know that her husband worked at Pine Street Motors? They simply looked online. They found the name of the bank, and then found out that the teller was listed as working at the bank on social media. Her social media account was connected to her husband’s, and his account said that he worked at Pine Street Motors.

Yes, it was that easy.

Here are some tips for social media that you might want to share with your staff:

Don’t Tell the Internet Where You Work

Tell employees that it’s not a good idea to share too many details about their work on social media pages. Though you can’t stop them from adding their employer on Facebook, you can tell them how this information can be used against them and the company. Make sure that they understand that this information could backfire and harm everyone involved.

Teach Your Staff How to Use Privacy Settings

You should also teach staff how to manage their social media privacy settings. Ideally, they should have maximum protection on every account. The default settings are lacking, and those put them at risk for hacking. You should also tell them that even the highest settings that social media sites have won’t keep everyone out. However, this level of protection is better than nothing.

Create a Workplace Policy for Social Media Use

Set up a policy in your workplace for social media use. Make sure this policy covers what employees associated with your company can say and what is totally prohibited.

Stop Banning the Use of Social Media in the Office

The moment you ban the use of social media at work, that’s the moment that someone will sneak around and do it anyway. This, of course, leads to dangerous things, as they can try getting around the firewall and other things that make your network vulnerable.

Train Your IT Team

Finally, make sure that your IT team is up to date on the latest ways to combat online-security issues. These teams must also know about the security risks that your business faces due to social media.

Additionally, the policy for employee social media use should be examined and updated quite regularly, and make sure to enforce it, too. Invest in anti-virus protection and make sure that all operating systems and browsers are always kept up to date when updates become available.

Robert Siciliano personal security and identity theft expert and speaker is the author of Identity Theft Privacy: Security Protection and Fraud Prevention: Your Guide to Protecting Yourself from Identity Theft and Computer Fraud. See him knock’em dead in this Security Awareness Training video.

14 Social Media Disasters Ready to Strike

There are many ways that you or a small business could get caught up in a social media disaster. Can you think of any off the top of your head? If you are like most of us, probably not. Here are 14 ways that you could be in danger:

social-media-privacy-security

  1. A Terrible Online Reputation – Do you keep a watchful eye on you or your business’ Facebook page? Are people posting to it? Are your staff? Even things that seem good-natured at first can be taken the wrong way by friends or potential customers.
  2. Racy Images or Text – If you or your employees are sharing racy text or images on social media, it could negatively affect your life or business. Though you definitely can’t control what they are posting, you can certainly educate them on the smart use of social media. Typically, these things happen because someone is ignorant about it, not feeling malicious. Even something as innocent as sharing a scantily clad photo of themselves while at work or play could give you or your company a bad name.
  3. Imposters – You might be surprised, but there could be someone out there posing as you or your business. So, make sure to patrol the internet to see if anyone is using your company’s logo or name. This even includes phony websites. Set up a Google Alert to notify you if your name or your business name appears online.
  4. Financial Identity Theft – It might seem harmless to post a photo of your employee’s puppy on your company website, but it could lead to financial identity theft. How? Well, if you post the photo, you surely would post the name of the cute little guy, and many people use their pet’s names as their passwords or answers to security questions. With that name, now identity thieves could have one more piece of the pie that they will use to hack into a financial account. Post pics of puppies all day long, just don’t use their names.
  5. Photo Geo Tracking – When you post photos, make sure that the GPS technology is off. This way, criminals can’t use it to find you or your employees addresses. Yes, GPS technology can save lives, but it can also ruin them.
  6. Robberies at Home – Make sure to educate your family or staff about the dangers associated with posting business or vacation travel information on social media. Burglars often use social media as a way to find a good house to break into. If they know Bob in accounting is out of the office and on vacation, they also know that he is likely not home, making his house a target.
  7. Corporate Snoops – It’s also possible that a spy could set up a page on Facebook, post as an employee of a well-known company or other branch, and then attract your real employees to a fake group. This way, he knows that they could give him sensitive information about your business, as they see him as trustworthy.
  8. Sex Offenders – Know who you are talking to online. Also, make sure to tell your staff to be careful when communicating with someone new. This person could be a sex offender, or worse.
  9. Attack of the Badmouth – At some point or another, you will get a disgruntled employee. Perhaps this person believes that they were unjustly terminated, or maybe they still even work for you. Employees who believe they have been “picked on” might try to get revenge by posting a bad review or blog about your company.
  10. Bullies – You might also find that one of your friends or employees is a bully. Are they posting bullying comments on your social media sites? If so, it could be bad for business.
  11. Government Spies – Even if it seems outlandish, many reports say that there are certainly law enforcement agents of the U.S. government that use social media to learn more about criminal suspects.
  12. Fake Sites – Someone could set up a fake site and pretend that they are from your business. When customers go to that site, they unknowingly give information about themselves, such as account numbers, email addresses, and phone numbers. Now, the bad guys have access to this information.
  13. Account Takeovers – You might remember when the show 60 Minutes, the Associated Press and others had their Twitter account hacked. The AP tweet that got out, claimed that then President Obama had been attacked at the White House. The stock market dropped significantly causing billions in losses as a result. If it can happen to the AP, it can certainly happen to you.
  14. Liability – Though you can use Facebook’s privacy settings to hide posts, that doesn’t mean that they can’t be used in some type of legal case. And studies show that Facebook is being used as evidence in 1 out of 5 divorce cases.

What is the takeaway here? It’s that there is no such thing as a fully private Facebook page just because you might have all of the privacy tools in use. A person with bad intentions, or your own ill conceived posts or a skilled hacker can still get in and ruin your good earned reputation.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video.

Protect Your Company with This Social Media Security Advice

Social media is an excellent tool for small businesses, yet, the use of social media by small business staff can definitely put the company in danger. Many small business owners and managers don’t realize this.

Recently, I was talking to employees of a credit union about what to do in a robbery. Before this presentation, police officers had staged a robbery in the same credit union. The fake robbery was so real, some of the tellers were brought to tears, thinking they were really getting robbed.

After they were filled in on what was happening, everyone on the team discussed it. One of the most telling moments is when one of the tellers shared her story. During the mock robbery, one of the “robbers” handed a teller a note. It said this: “Your husband works at Pine Street Motors. We kidnapped him this morning. He is being held at another location. If you hit the alarm and notify police, he’s going to be killed.”

How did the bad guys know that her husband worked at Pine Street Motors? They simply looked online. They found the name of the bank, and then found out that the teller was listed as working at the bank on social media. Her social media account was connected to her husband’s, and his account said that he worked at Pine Street Motors.

Yes, it was that easy.

Here are some tips for social media that you might want to share with your staff:

Don’t Tell the Internet Where You Work

Tell employees that it’s not a good idea to share too many details about their work on social media pages. Though you can’t stop them from adding their employer on Facebook, you can tell them how this information can be used against them and the company. Make sure that they understand that this information could backfire and harm everyone involved.

Teach Your Staff How to Use Privacy Settings

You should also teach staff how to manage their social media privacy settings. Ideally, they should have maximum protection on every account. The default settings are lacking, and those put them at risk for hacking. You should also tell them that even the highest settings that social media sites have won’t keep everyone out. However, this level of protection is better than nothing.

Create a Workplace Policy for Social Media Use

Set up a policy in your workplace for social media use. Make sure this policy covers what employees associated with your company can say and what is totally prohibited.

Stop Banning the Use of Social Media in the Office

The moment you ban the use of social media at work, that’s the moment that someone will sneak around and do it anyway. This, of course, leads to dangerous things, as they can try getting around the firewall and other things that make your network vulnerable.

Train Your IT Team

 Finally, make sure that your IT team is up to date on the latest ways to combat online-security issues. These teams must also know about the security risks that your business faces due to social media.

Additionally, the policy for employee social media use should be examined and updated quite regularly, and make sure to enforce it, too. Invest in anti-virus protection and make sure that all operating systems and browsers are always kept up to date when updates become available.