background preloader

30 Little-Known Features of Facebook, Twitter, and More

30 Little-Known Features of Facebook, Twitter, and More
When I first set foot in Disneyland, I race to the most famous rides first—Splash Mountain, the Matterhorn, Indiana Jones, all the biggest and best. Little do I know there are just as many hidden gems and overlooked attractions that I’ve likely missed in my sprint for the headliners. Social networks are a little like Disneyland in this regard. Which features of Facebook, Twitter, and the other major social networks have perhaps slipped under our noses? Read ahead to learn all 30 little-known features (and see which ones you might already know!). Get more clicks, followers, and engagement by sharing to social media sites at the right times! 5 Little-Known Facebook Features 1. Whenever you see a story that someone has shared in your news feed, you’ll find a “Save” option in the drop-down menu under the top, right corner. “Save” also shows up on pages. Where do all these saved posts and pages end up? Once you’ve saved a few, you’ll notice a new menu item in the left sidebar of your homepage.

default IT professionals are accustomed to thinking about the technical aspects of security. However, as this report has shown, the human element—the techniques that attackers use to trick typical users into helping them—has become just as important for attackers as the technical element, if not more so. By implementing effective technical safeguards, programs, and processes designed to defend against social engineering, you can help your users avoid being taken advantage of by attackers. You can even enlist them as some of your most valuable assets in the fight against security threats. Organizations Your network provides the underlying infrastructure in which your applications are deployed. Minimize and Monitor Your Attack Surface Limit the number of powerful user accounts in your organization and the level of access they have, because this will help limit the harm a successful social engineering attack can cause. Create a Social Engineering Incident Response Plan Software People

Related: