Relief After Grieve Over Facebook: Who is Safe?: A Letter to Metaverse

Facebook Hacker
The Facebook Hacker Has a Name and a Profile Picture

There is a discernible sigh of relief this holiday season. After all, indicators such as global and local restrictions point to an eased pandemic, and last holiday’s social anxiety is almost over.

This was not the appropriate time to lose a decades-old Facebook account. An account that is as old as Facebook and the mammoth that it is today, Metaverse.

If you have never had any of your online accounts hacked, sit back, relax, and listen. You are like me before the beginning of this holiday.

You have a sensible password, you run an updated antivirus on your device, you do not click on unfamiliar links, and you keep your password safe.

Then you log in to your Facebook account and you find the message notification indicating an unread message from your friend.

As an online entrepreneur, it is hard to ignore a message from one of your contacts. Apparently, the hacker knows this and lays in wait using your contact’s hacked account.

It turns out to be a merry Christmas message, to which you reply with a Christmas emoji. Before you browse off your friend is excited about you chatting and wants to send you free data bundles.

‘Just remind me of your phone number, I will send you the link, then you click yes.’

After that friendly little chat with your Facebook contact, your Facebook account automatically logs off. When you try to sign in again your password is no longer working.

Contacting Facebook admin does not result in an immediate help because your login details have been changed. You can no longer receive the password reset on your email or phone.

Someone has taken charge of your account and all your contacts become vulnerable. In a nutshell, Facebook no longer recognizes you.

Since Facebook is largely an artificial intelligence-based company, there is provision for this long story, you have to create another account, which I did. The grieving is in a huge loss and the vulnerability that comes with it.

To compound the matters, the lost Facebook account was an admin of a couple of group accounts. As we speak, the account has stopped working. Maybe, maybe Facebook or Metaverse or whatever has an ear.

As we speak, the account has stopped working. Maybe, maybe Facebook or Metaverse or whatever has an ear.

Duty of Care


5 Rules to Safe Internet Use at Home (for Business and Leisure)

Is there a universal approach to internet security at home? What are the security issues faced by home-based business enterprises?

Families, businesses, and governments approach internet use differently. There are, on one end, those who ban usage and, on the other end, there are the liberals. Then there are those in-between.

Hurwitz & Manne, 2018, observe that technological liberalism values reliance on a minimal set of autonomy-respecting rules to facilitate voluntary, welfare-enhancing transactions between individuals, and that; technological advance can enhance liberty, while also undermining the legal rules and institutions necessary for the efficient interactions in a liberal society.

So, that said, there is no universal approach to internet security issues. There are, however, some basic approaches to internet use that would safeguard your family and business.

Read the user manual

Internet products are packaged alongside their user manuals. The most common internet products you will make use of at home are browsers and apps. Browsers, like Google, Mozilla Firefox, Brave e.t.c., help you to surf the net. They can crawl the internet and deliver your internet search results.

Apps, or Software Applications, can be proprietary or generic. Internet merchants, to promote their products and services, use proprietary apps. We have proprietary social media apps, like Facebook, Twitter, LinkedIn e.t.c., and business apps like Amazon.

Generic apps like QuickBooks, Zoom, Dropbox, Microsoft Office 365, e.t.c., are available for use by anyone capable of harnessing them to suit their business.

Each app comes with a user manual that defines the terms of use and the necessary safeguards. Some have features to protect underage persons or to ensure safety when using them. In any case, be familiar with their usage recommendations by the developers.

Take advantage of internet tools

The Internet may [actually] refer to one of three things: 1) The computers and network that make up the Internet; 2) resources available from computers connected to the network; 3) tools used to retrieve the resources or communicate on the Internet, Bradshaw, et al (2006).

The scope of this article allows for only a couple of basics. Either, internet tools could be broadly categorized as free and open-source (FOSS), or closed (proprietary). Small businesses could harness FOSS to leapfrog using minimum resources.  

Be proactive in social media/ internet usage in-(the)-house

It is advisable to monitor what everyone is doing online to encourage responsible online habits. Most security lapses occur out of avoidable mistakes such as opening an anonymous email or link. Letting the other users know about security risks mitigation will help avoid hacking and associated privacy risks. In the case of minors who are using technology at home, you could make use of features available from vendors such as children protection By Google. Check the user manual when installing your apps. You could also suggest useful sites and social groups, which in-house users could benefit from to shield them from the temptation to join morally corrupt ones. The idea is to provide credible alternatives.

Mentor on the use of social media/ internet

Help your in-house users to learn the ropes of internet usage by providing leadership. A family WhatsApp group could help in interacting remotely and gauging the perceptions. This could provide a channel of sharing online experiences to help younger members explore the internet safely and productively.

Be on Look-out for Internet Addiction Disorder

According to Healthline, you may be experiencing an internet addiction if you spend long periods online for non-work-related activities, such as browsing the web or playing video games, and notice symptoms such as sudden changes in mood, intensive worry about what’s happening online when you’re not there, not being able to control how much time you’re spending online, increasing your time online to achieve a certain feeling or mood, withdrawal symptoms (irritability, physical aches, depression) when not reaching the desired amount of time online, and; continued online behavior and consumption despite conflict with loved ones or consequences at work or school.