20 Years of Facebook, but Trust in Social Media Remains Rock Bottom

February 2024 marks 20 years of Facebook's existence.
Despite the brand being well established worldwide and in our day to day lives, only 6% of people trust it and other social media companies with their personal data.
In a survey of 12,000 people across the globe, the Thales 2024 Digital Trust Index found that trust in social media companies is lowest in Japan and the UK. Brits are the most distrusting nation when it comes to social media companies, with 26% going as far as to say that they would not be happy to share any personal information with these companies.
Conversely, citizens in the US were the most trusting of social media companies.
In 2023 Meta was slapped with a €1.2bn fine by the Irish Data Protection Authority following an inquiry into its Facebook service.
Malik pointed out that people still use these platforms and almost resign themselves to the fact that this is just how things are and there's not much they can do about it.
Speaking to Infosecurity about the Thales report, Charles Howes, CEO at digital marketing firm Klatch, said these findings underscore an urgent need for a recalibration of priorities within the social media landscape.
He also highlighted that fostering collaboration with regulators, civil society, and academia is crucial.
It is also essential that social media providers not only offer tools that can help people better understand the options and control they have over their data, but to also make these functions easily available and understandable, Malik said.
Users should regularly review and adjust privacy settings on Facebook and other social media platforms to control who sees your posts, personal information, and profile details.
Thales found that the most trustworthy industries were found to be critical industries like banking, healthcare and government services.
Thales noted that these are highly regulated industries which handle highly sensitive data.
More than four in five expect some level of privacy rights from the companies they interact with online.
Smooth digital experiences are also non-negotiable and 80% of customers expect a digital onboarding experience.
The survey suggested that customers in Japan are the most impatient about their digital interactions, with 15% giving up on frustrating online experiences after less than 30 seconds.
The Thales report set out six recommendations where businesses can introduce certain controls in the process to maintain the balance between security and user experience.
Meta was approached for comment by Infosecurity Magazine but no response was received at the time of writing.


This Cyber News was published on www.infosecurity-magazine.com. Publication date: Fri, 09 Feb 2024 12:30:18 +0000


Cyber News related to 20 Years of Facebook, but Trust in Social Media Remains Rock Bottom

20 Years of Facebook, but Trust in Social Media Remains Rock Bottom - February 2024 marks 20 years of Facebook's existence. Despite the brand being well established worldwide and in our day to day lives, only 6% of people trust it and other social media companies with their personal data. In a survey of 12,000 people ...
1 year ago Infosecurity-magazine.com
AI and the Evolution of Social Media - A decade ago, social media was celebrated for sparking democratic uprisings in the Arab world and beyond. In a 2022 survey, Americans blamed social media for the coarsening of our political discourse, the spread of misinformation, and the increase in ...
1 year ago Securityboulevard.com
Speaking Freely: Lynn Hamadallah - There's been a lot of censorship for example on social media, which I've experienced myself when posting content in support of Palestine. The argument put forward was that those cases represented instances of free speech rather than hate speech. You ...
1 year ago Eff.org
Best of 2023: Why is everyone getting hacked on Facebook? - Importantly, phishing relies on the victim trusting the scammer and taking an action - like clicking a link or sending bank account information - in order for the scammer to get what they want. It's not your imagination - social media scams really ...
1 year ago Securityboulevard.com
Zero Trust 2025 - Emerging Trends Every Security Leader Needs to Know - Forward-thinking organizations are embedding Zero Trust principles into broader business strategies rather than treating them as isolated security initiatives. Security leaders must champion this integrated approach to Zero Trust implementation to ...
2 months ago Cybersecuritynews.com
Schneier on Security - At the airport, I trusted ticket agents and maintenance engineers and everyone else who keeps airlines operating. We trust their intentions, and know that those intentions will inform their actions. We might not know someone personally, or know their ...
1 year ago Schneier.com
Zero Trust Security Framework: Implementing Trust in Business - The Zero Trust security framework is an effective approach to enhancing security by challenging traditional notions of trust. Zero Trust Security represents a significant shift in the cybersecurity approach, challenging the conventional concept of ...
1 year ago Securityzap.com
Zero-Trust Architecture in Modern Cybersecurity - Clearly, organizations need more robust cybersecurity protections in place, which is leading many to adopt a zero-trust architecture approach. Zero-trust flips conventional security on its head by shifting from an implicit trust model to one where ...
1 year ago Feeds.dzone.com
Social Engineering Attacks: Tactics and Prevention - Social engineering attacks have become a significant concern in today's digital landscape, posing serious risks to the security and sensitive information of individuals and organizations. By comprehending these tactics and implementing preventive ...
1 year ago Securityzap.com
Integrate Modern Strategies for Zero Trust with Identity & Access Management (IAM) - The implementation of Zero Trust in identity and access management requires careful consideration of several critical elements that work together to create a comprehensive security framework. Leaders who approach Zero Trust as a strategic business ...
2 months ago Cybersecuritynews.com
Protecting Your Digital Space: A Guide on How to Stay Cyber Safe on Social Media - In the age of digital inter-connectedness, social media has become an integral part of our daily lives, enabling us to connect, share, and communicate globally. As cyber threats continue to evolve, it's crucial to adopt proactive measures to ensure ...
1 year ago Cybersecurity-insiders.com
Social Engineering: The Art of Human Hacking - Social engineering exploits this vulnerability by manipulating human psychology and emotions to gain unauthorized access to systems and data. Rather than directly breaking cyber defenses, social engineering tactics exploit human vulnerabilities - ...
1 year ago Offsec.com
WEF 2024 Report: Cybersecurity at the forefront, zero trust seen as critical for trust rebuilding - The best place for the World Economic Forum to achieve its key theme this year of rebuilding trust is to start with cybersecurity, cyber defenses, and cyber-resilience. Their latest global cybersecurity outlook 2024 insight report delivers insights ...
1 year ago Venturebeat.com
Zero Trust Architecture - A Step-by-Step Guide for CISOs - With thoughtful leadership and strategic implementation, Zero Trust architecture can transform your organization’s security posture, providing protection that aligns with today’s distributed work environments and evolving threat ...
2 months ago Cybersecuritynews.com
How do I block Taylor Swift news from invading my Facebook timeline? - The short answer is that you can't block Taylor Swift from invading your Facebook line. Over the years, Facebook has tested features that allow users to mute certain words from appearing on a user's timeline Feed. In the old days, being able to ...
1 year ago Pandasecurity.com
Kids Online Safety Shouldn't Require Massive Online Censorship and Surveillance: 2023 Year in Review - Many of these bills would run roughshod over the rights of young people and adults in the process. There's also good news: so far, none of these dangerous bills have been passed at the federal level, or signed into law. That's thanks to a large ...
1 year ago Eff.org
Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red - Social engineering is effectively hacking human thought processes. Social engineering is a major factor in the overall process but is not directly part of repurposing electronic systems. A social engineer is usually classified as a hacker, and is ...
1 year ago Securityweek.com
Zero Trust Implementation - A CISO’s Essential Resource Guide - Enter Zero Trust: a security framework built on “never trust, always verify.” For Chief Information Security Officers (CISOs), implementing Zero Trust is not just a technical upgrade; it’s a strategic shift in how security is managed across the ...
1 month ago Cybersecuritynews.com
Implementing Zero Trust and Mitigating Risk: ISC2 Courses to Support Your Development - PRESS RELEASE. Zero trust security is a proactive and robust approach to cybersecurity that addresses modern threats by continuously verifying and monitoring all network activities. While its implementation can be complex and resource-intensive, the ...
11 months ago Darkreading.com
Supreme Court Backs Biden Social Media - US Supreme Court sides with Biden after Republican-led states challenged federal halt of misinformation posts on social media. The Supreme Court on Wednesday sided with the Biden administration in a dispute with Republican-led US states over how far ...
11 months ago Silicon.co.uk
Social Justice: a global perspective - Today, we commemorate World Day of Social Justice and honor those across the globe who stand for the equitable access to opportunities within societies where individuals' rights are recognized and protected. I have the distinct honor of leading the ...
1 year ago Feedpress.me
Exploring How Virtual Worlds Change Social Media Experiences - Humans have always desired to connect with one another, from the days of sending letters to the current age of social media. As technology has advanced, so have the ways we communicate. We are now seeing a shift in the way tech giants are embracing ...
2 years ago Hackread.com
Facebook and Instagram passwords were stored in plaintext, Meta fined | Malwarebytes - In 2019, a private security researcher reported finding a database with the names, phone numbers, and unique user IDs of over 267 million Facebook users. Ireland’s privacy watchdog Data Protection Commission (DPC) has fined Meta €91M ($101M) ...
8 months ago Malwarebytes.com
ACM will no longer cross sign certificates with Starfield Class 2 starting August 2024 - AWS Certificate Manager is a managed service that you can use to provision, manage, and deploy public and private TLS certificates for use with Elastic Load Balancing, Amazon CloudFront, Amazon API Gateway, and other integrated AWS services. Starting ...
11 months ago Aws.amazon.com
Facebook Introduces New Features: Top 20 Most Essential SEO-Optimized Long-Tail Keywords - Facebook recently unveiled several new features to its platform, designed to improve user experience and drive new levels of engagement. Among the new features are advanced personalization options, more powerful security tools, and improved ...
2 years ago Thehackernews.com