100. Be transparent while exercising caution.
Your subscribers will like it if you are transparent. They will feel connected with you. But you must limit how much information you withhold.
101. Only withhold the physical address or office address of the company itself.
You are not obliged nor is it safe to tell your subscribers your personal address or the personal address of your employees. Only tell them the address of the company itself.
102. Only withhold the company contact number, email, fax, etc.
Only the company contact information should be advertised. Those of the employees should not be disclosed to protect their privacy.
103. Avoid heated conversation.
Not only is it unprofessional, but it will not leave a good impression on your subscribers.
104. Keep a record of possibly threatening comments from users.
If a post includes threats or anything of the same degree, you should keep a record of it. A printscreen will do.
105. Never use a password that is easy to guess.
You do not know what hackers might do to your account. Make sure that your password is something that cannot be guessed.
106. Never withhold the email address that is used to register the social media account.
This may all be that a hacker needs to hack into a Facebook or a Twitter account. It should be kept private.
107. Use a registration email that is different from the company email.
A hacker will normally attempt to use the official company email thinking that it is used to open your company’s Facebook or Twitter account.
108. Never leave the account unattended in any computer.
109. Do not forget to uncheck the ‘Keep Me logged’ in button.
Some people forget to uncheck this box. As a result, their account gets hacked by the next person who will use the computer. Good thing if it is found by a good person.
110. Avoid logging in to public computers.
Even if you uncheck the Keep Me Logged in button, there still ways for hackers to get your username and password. A simple keylogger program will do the trick.
111. If you must login using a public computer or a public network, try using the onscreen QWERTY board when keying in the username and password.
Keylogger programs follow the keystrokes that you make. They cannot read passwords and usernames that are inputted using an onscreen qwerty keyboard. The downside is that people behind you will see which characters you clicked.
112. Change the password if you believe it has been compromised.
113. Remove arguments between users.
Sometimes, the dispute may not be between you and a user but amongst users themselves. Remove these as soon as possible. Block them if necessary.
114. Set a rules and conditions page.
Some people may not exactly follow. But if you ban them, they will not be able to say that they were not warned.