This page has been automatically translated. Please refer to the page in French if needed.
The Question of the Week
How to improve your social media security?
Publié le null - Directorate for Legal and Administrative Information (Prime Minister)
The question:
Service-public's response:
The connection
- Protect access to your accounts and regularly check connections
To ensure that no one can use your account without your knowledge or identity, protect your access by using different and sufficiently robust passwords. If the service offers it, also enable dual authentication. Most social networks offer features that allow you to see active logins or sessions on your account from the different devices you use. Check this information regularly. If you detect an unknown session or connection or you are no longer using, disconnect there. At the least doubt, change your password. - Check your privacy settings
The visibility settings of your personal information (phone number, email address...) and your publications are often set by default and your data can be shared with all the subscribers of the social network. It's usually possible to limit this visibility by setting up your account to keep control of what other users see about your information and activities. Check these privacy settings regularly, as they can be changed without your knowledge. - Avoid computers and public Wi-Fi networks
Using an open-access computer or a public WiFi network is risky because they can be trapped or controlled by a cybercriminal. You can have your password stolen and your account hacked. Avoid entering sensitive or personal information about any hardware or network that is not yours, if possible. If you are forced to do so, remember to log out of your account after use to prevent someone from accessing it after you. - Consciously use authentication with your social network account on other sites
To connect to it, some websites offer you to use your social network account. This feature may seem convenient because it avoids creating an additional account and password, but it means that you are providing the social network with information about what you are doing on the relevant site, and that you may be giving them access rights to your social network account. If it were hacked, the cybercriminal could automatically access all the sites by impersonating you. Also, before using this feature, be aware of the risks and carefully check the authorizations you issue.
Publications
- Master your publications
Do not share personal or sensitive information that could be used to harm you. Even in a small circle, your posts can escape you and be redistributed or interpreted beyond what you envisioned. - Be careful who you're talking to
Unbeknownst to them, your friends or contacts can send you or share malicious content, especially if they've had their account hacked. Also, never send money to someone without verifying their identity beforehand, never send intimate photos or videos to virtual contacts who could take advantage of it to blackmail you, beware of contests, unexpected winnings, or bargains that can hide scams (phishing). - Use discernment with published information
Some unverified information may be partially or completely false, sometimes deliberately. With the power of social media, they can have serious consequences for the people they affect. Therefore, before you consider or relay information, try to verify its veracity.
And also
- Monitor third-party applications
Some apps offer to interact with your social network account. They ask for permissions that must be carefully examined because they can access your personal information, contacts, publications, private messages... Settle them only from official sites or app stores, otherwise you may give access to your account to a virus-infected program. If they seem too intrusive in the authorizations they request, don't settle them. Consider uninstalling or revoking the rights if you no longer use them. - Delete your account if you no longer use it
To prevent your information from being recovered by third parties or your account being used without your knowledge, including to steal your identity, delete it if you no longer use it.
Additional topics
National Commission for Informatics and Freedoms (Cnil)
Ministry of Education
Ministry of the Interior
Agenda
Activités des séniors
Du 30 sept. au 6 oct. 2024
Publié le 01 octobre 2024
Écoles, collèges et lycées
À partir du 11 oct. 2024
Publié le 26 septembre 2024
Impôts locaux
À partir du 15 oct. 2024
Publié le 20 septembre 2024