IFTTT

6 IFTTT Recipes to Save You Time and Increase Effectiveness

As you know, social media management can eat up a big chunk of your business day even when you are mindful of your time.  So when there are tools available to help save you time, why wouldn’t you use them?

Here are 6 IFTTT recipes that will save time and increase your effectiveness on social media. They are very easy to set-up. (For more information on IFTTT see this article: IFTTT –Possibly My Favorite New Toy)

Images

When you post an image on Instagram, you can hit the Twitter share button to send it to Twitter. Doing it from the app causes it to appear as a link on Twitter and not an image. A better way to do this is to use the following recipe that allows the image to appear as native on Twitter.  True images get more engagement.

 

Because some folks are noticing that some of their Instagram images are disappearing and some social media accounts are being hacked, it’s a good idea to keep a back-up of your Instagram images. If you use Dropbox, you can use this recipe to automatically save any image that you post to Instagram into your Dropbox. (Find that recipe here.)

 

Automated Twitter List Building

Frankly, I think Twitter lists are a necessary evil.  They are time-consuming but necessary in order to quiet a lot of the noise on Twitter.  Here are 3 automated ways to build your lists.

The first is to build a Twitter list from a specific hashtag.  So for instance, let’s say that you are a participant in a weekly chat. You could use that hashtag (ex. #BufferChat) to build a list of all its participants.  You could also build a list of those attending a certain event by utilizing the event hashtag to build it.  (You can use this recipe more than once and you can find it here.)

 

 

 

 

You could also build a list of people whose tweets you have favorited.  When I find someone that I want to remember but don’t have time right at that moment to add them to a particular list, I just favorite one of their tweets. This adds them to the “Tweets I’ve Favorited” list so that I can go back later and place them into a more suitable list. (Here’s the recipe for this action.)

Another way to create a Twitter list is by adding users who @mention you.  If they have taken the time to mention you, you’ll want to keep them on your radar as a possible connection or conversation. (You’ll find this one here.)

IFTTT t @mention.PNG

Curating Content

Pocket is a great place to store articles to read later or to share with your audience.  This recipe will send the articles that you favorite on Pocket straight to Buffer to be sent to your social media platforms at an optimal time.  This is a huge time-saver! (There is a Chrome extension for Pocket so that whenever you find an article of interest on the web, you can save it in your Pocket. If you use Feedly to curate your content, you can send to Pocket from there, as well.) Here’s the recipe to do this.

 

These are my favorites for use on social media. Do you have any favs of your own?  I’d love to hear about them.

 

Are You Protecting Your Social Media Investments From Hackers?

Late last week the Instagram account of Base Body Babes was hacked and 765 carefully captioned images disappeared before their very eyes. The new “owner” of the account changed their name, deleted their images and began posting their own images with a kidnapped audience of 559,000 followers. They are not the only victims of hijacked Instagram accounts.

Fitness expert, Chalene Johnson had her Instagram account with over 400.000 followers hacked, as well. They were also in control of her Twitter account and literally began taunting her on it and telling her that they were now in contol. (There is much more to her story but the FBI is currently involved so much of it is not being shared yet.)

This is not just happening to those with large follower and fan bases. It is happening to small business owners, as well. These so-called “social engineers” are hacking accounts and extorting fees from the owners of accounts in exchange for transfer of ownership back to the original owner. They feel that small businesses will pay the fees and won’t go to the police. They also feel that small business owners don’t know enough about technology to be able to fix the problem themselves.  All these social engineers need is just ONE password to get into your e-mail account in order to be able to attack ALL your social media accounts.  You may feel confident about being secure because you think that you have a pretty safe and not likely-to-be-guessed password but that’s where you’re wrong. They’re not guessing passwords; they’re guessing answers to your security questions. They are able to guess these answers by watching your social media sites!

This is a crime that has reached epidemic proportions. Facebook reports that over 600,000 accounts are compromised EVERY day.  47% of Americans have had their personal information compromised.

Protecting your personal information is incredibly important but in this article, I’m only referring to your social media investments. How long and how much work has it taken you to grow your accounts? How much content do you have stored on your accounts (think about all those images on Instagram and/or Pinterest)? How many connections are made available to you by having these accounts and what would you do if they suddenly disappeared (This is one reason why having an e-mail list is so important)?

No one can be completely safe but there are things you can do to protect your investment. These items will take you some time to set up but they are worth the effort and time expenditure and may help to prevent the loss of years of work.

1. Update your software on ALL devices: your PC, your blog plug-ins, your tablet, your laptops, your Kindle or similar devices, your smart phones, etc.  Don’t forget to update the outdated devices that you have lying around to use as spares.

Adobe Flash is a very important one to consider. But do NOT update when the pop-up appears – it may be a scam and that may be exactly how you become vulnerable.  Go to their website to update and set up auto-updates.

“Update all of your apps! While some updates are improvements, most of the updates are security patches. Be sure to update as soon as available.

Update all of your apps! Most app updates are security patches and can help to thwart hackers.

CLICK TO TWEET

2. Get a password manager and install it on all devices.

A password manager is like an online wallet for your valuable information. Create a strong initial password for this one and you must remember your password to this application because it is not stored.

According to Wikipedia “Password managers usually store passwords encrypted, requiring the user to create a master password; a single, ideally very strong password which grants the user access to their entire password database. Some password managers store passwords on the user’s computer, whereas others store data in the cloud. While the core functionality of a password manager is to securely store large collections of passwords, many provide additional features such as form filling and password generation.”

Password managers also have browser extensions for FireFox, Chrome and Safari.

DISABLE the auto-fill for passwords. Use your password manager’s browser extension instead.

Some to consider are LastPass1Password, KeepPass, and Roboform

*After you install your password manager, update all your passwords with unique passwords generated by your app.  Also, update your security questions with more unique passwords generated by your app because real answers to security questions increase your chances of being hacked!

3. If you have an iPhone 6 or above, set up the Apple fingerprint!  (Android will be adding this feature soon.)

4. Do not choose the “log in with your Facebook account” or “log in as Twitter” options. Be sure to log in using your password manager.

5. Take a look at your e-mail service. Is it as safe as it could be?  Perhaps Hotmail (is that even around anymore) or Yahoo are not the safest options. Gmail has 2 factor authentication so it is more reliable.

6. Check your cloud storage (iCloud, Dropbox, Evernote, etc.)  Cloud storage sites have an increasing number of hacks.

Enable 2-step authentication for these – require a code in addition to your password.

7. Phone – Turn off the apps you don’t need.

Apps are great but they are security risks. Delete the ones that you don’t need. (I am SO guilty of keeping too many apps on my phone. Deleting the unused ones has become a priority.)

8. Facebook and Twitter – sign up for 2-factor authentification.  (The one drawback for this is that if you ever change your phone number, it’s a hassle to have it changed, but probably less of a hassle than the things that would have to be done after a cyber hack.)

Instagram is very susceptible to being hacked so be sure to use your password manager when signing in.

9. Set up an IFTTT recipe to have your Instagram images automatically sent and saved in your Dropbox. You can find that here  You could also use Instaport to save all your Instagram images to your hard drive.

10. Check your Facebook privacy settings and determine what is the most amount of privacy you could opt for without damaging your social engagement and reach.

11. Consider using SocialSafe to back up your social media date. At $27.99 per year for 20 accounts, it’s extremely inexpensive and easy to manage.

12.  Messaging – Use a messaging service that supports encryption such as iMessage for Apple or What’s App for iOs, Android, Blackberry and Windows phone.

*Did you know?

On Apple: blue bubbles = iMessage which is encrypted and secure

                   green bubbles = SMS text which is not secure

I hope that you’ll take this threat to your social media investment seriously and begin to put some, if not all, of these precautions in place.  And if you have any other suggestions as to ways that we can all protect our online selves better, I’d love to hear.

*For further information, check out Chalene Johnson’s podcast series on how she was hacked and what she has learned.  iTunes: Chalene Johnson: Build Your Tribe – episodes from June 9, 12, 15, 17 and 19 of 2015.