SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Social MediaSecurity
Del Belcher | Social Media Specialist
Jackson College
Del Belcher | Social Media Security
How secure
are you?
VOTE!
Del Belcher | Social Media Security
Social Media
Security
What is hacking?
Tips for protecting your social media
information
Strengthening your social media
defenses
Best practices
Action items
Security and privacy check
What we will cover
Del Belcher | Social Media Security
Hackers have
exposed:
 110 Million Americans (roughly half of the
nation’s adults) in the last 12 months alone
 9 out of 10 adults fee consumers of lost control
over how personal information is collected and
used by companies
 6 out of 10 American's “would like to do more”
to protect their personal information online
1
2
3
1. Pew Research
2. Ponemon Institute
3. Pew Research
Del Belcher | Social Media Security
HistoricSocial
Media Hacks
 Snapchat: 200,000 SnapchatAccounts were Breached – 2016
 Twitter: 33 million usernames and passwords leaked – 2016
 Netflix: credential leak – 2016
 Gmail: 42 Million leaked credentials - 2016
 Facebook: credential leak, - 2016 & 2013
 iCloud leak – Almost yearly!
 YikYak: hack – 2014
Del Belcher | Social Media Security
What is
Hacking?
Hacking Isn’t… Hacking Is…
 Vulnerability Scanner
 Brute-Force Attack
 Keystroke
 Virus,Worm,Trojan Horse
 SpoofingAttack (Phishing)
 Social Engineering
 Intimidation
 Helpfulness
 Name-Dropping
 Technical
Del Belcher | Social Media Security
How do I
identifyhacking
threats?
Think before you act
Too good to be true?
Require immediate action?
Do they need my personal
information?
Personal Info is like money.
It needs to be protected
Del Belcher | Social Media Security
How do I avoid
hacking threats?
Share with Care
What you post can last a lifetime
Be aware of what’s being shared
Own your online presence
Post only about others as you
would have them post about you
Social media is a car. It takes time to
learn. Discipline to stay safe.
Incredibly simple to mishandle.
Del Belcher | Social Media Security
ActionTips
Passwords
 A strong password is a sentence that is at least 12
characters long
 Something you love
 Easy to remember
 Sometimes you can use spaces
General Social Media Safety
Del Belcher | Social Media Security
ActionTips
Unique Account, Unique Passwords
 Having separate passwords for every account helps to
thwart cybercriminals.
 At the minimum, separate your work and personal
accounts.
 The more critical the account, the stronger the
password
General Social Media Safety
Del Belcher | Social Media Security
ActionTips
Write it Down
 Everyone can forget a password. Keep a list that’s
stored in a safe secure place AWAY from your
computer
 Password management services
General Social Media Safety
Del Belcher | Social Media Security
ActionTips
Two Step Authentication
 Two step verification or multifactor authentication
 Two factor authentication can use anything from a
text message, phone number, digital token,
biometric like your fingerprint, to provide
enhanced account security
General Social Media Safety
Del Belcher | Social Media Security
ActionTips
Remember me not
 Make sure the “remember me” function is not
enabled
 Delete your browsing history
 Log out
 Anyone can access public computers
 Close all browser tabs and log out
At work or in public
Del Belcher | Social Media Security
ActionTips
Connect with care
 Use secure websites:
 Https:// or shttp:// vs http://
 Get savvy about publicWi-Fi
 Public Wi-Fi isn’t necessarily secure.
 Limit the type of business you conduct over
public Wi-Fi
At work or in public
Del Belcher | Social Media Security
ActionTips
Secure your accounts
Make passwords long and strong
Unique account, unique password
Write it down. Keep it safe!
OwnYour Online Presence
Know what you show
When in doubt:THROW IT OUT!
Takeaways
Del Belcher | Social Media Security
Facebook
Robust security features
Facebook is the most widely used
social media platform on the plant
Facebook is the most/second most
visited website on the planet
You probably are not onTwitter,
Instagram, Reddit,Tumbler,
Snapchat andYikYak
Why just Facebook for this
workshop?
Del Belcher | Social Media Security
Facebook
Who can:
 See the pics of your kids?
 Share you info?
 See where you are right now?
 Collect, track, share your app usage info?
Every action you take on Facebook has privacy
implications
Why is Facebook security
important?
Del Belcher | Social Media Security
Facebook
Time to log in!Reviewing security settings

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering OWASP Foundation
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentationBokangMalunga
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasuresJorge Sebastiao
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 

Was ist angesagt? (20)

Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Phishing
PhishingPhishing
Phishing
 
The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering The Art of Human Hacking : Social Engineering
The Art of Human Hacking : Social Engineering
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 

Andere mochten auch

Security and social media
Security and social mediaSecurity and social media
Security and social mediaJP Rains, MBA
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...SpareBank 1 Gruppen AS
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security ThreatsJesse Wilkins
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network SecurityBrian Honan
 

Andere mochten auch (6)

Security and social media
Security and social mediaSecurity and social media
Security and social media
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 

Ähnlich wie Social Media Security

Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxLaurieAnnFrazier
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalistsantoniokisembo
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfCIOWomenMagazine
 
CyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptxCyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptxneyoge6666
 
Social media pros & cons
Social media pros & consSocial media pros & cons
Social media pros & consAmira Galal
 

Ähnlich wie Social Media Security (20)

Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
Users guide
Users guideUsers guide
Users guide
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptxCyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptx
 
Social media pros & cons
Social media pros & consSocial media pros & cons
Social media pros & cons
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 

Mehr von Del Belcher

Social Media Etiquette
Social Media EtiquetteSocial Media Etiquette
Social Media EtiquetteDel Belcher
 
Social Media Strategy for Overwhelmed Marketers
Social Media Strategy for Overwhelmed MarketersSocial Media Strategy for Overwhelmed Marketers
Social Media Strategy for Overwhelmed MarketersDel Belcher
 
Paid Facebook Marketing
Paid Facebook MarketingPaid Facebook Marketing
Paid Facebook MarketingDel Belcher
 
First Class Social Media on an Economy Class Budget
First Class Social Media on an Economy Class BudgetFirst Class Social Media on an Economy Class Budget
First Class Social Media on an Economy Class BudgetDel Belcher
 
Paid Facebook: 105
Paid Facebook: 105Paid Facebook: 105
Paid Facebook: 105Del Belcher
 
Why Go to College?
Why Go to College?Why Go to College?
Why Go to College?Del Belcher
 
Engineering Certificate Social Media Images
Engineering Certificate Social Media ImagesEngineering Certificate Social Media Images
Engineering Certificate Social Media ImagesDel Belcher
 
Jackson College Shareable Social Media Content
Jackson College Shareable Social Media ContentJackson College Shareable Social Media Content
Jackson College Shareable Social Media ContentDel Belcher
 
HillsdaleBEclass4_16_15
HillsdaleBEclass4_16_15HillsdaleBEclass4_16_15
HillsdaleBEclass4_16_15Del Belcher
 
Social Media in Action for MOGA
Social Media in Action for MOGASocial Media in Action for MOGA
Social Media in Action for MOGADel Belcher
 
MOGAsocialmediaMUCC.pptx
MOGAsocialmediaMUCC.pptxMOGAsocialmediaMUCC.pptx
MOGAsocialmediaMUCC.pptxDel Belcher
 
3MUCC BOD Flyer Draft
3MUCC BOD Flyer Draft3MUCC BOD Flyer Draft
3MUCC BOD Flyer DraftDel Belcher
 

Mehr von Del Belcher (13)

Social Media Etiquette
Social Media EtiquetteSocial Media Etiquette
Social Media Etiquette
 
Social Media Strategy for Overwhelmed Marketers
Social Media Strategy for Overwhelmed MarketersSocial Media Strategy for Overwhelmed Marketers
Social Media Strategy for Overwhelmed Marketers
 
Paid Facebook Marketing
Paid Facebook MarketingPaid Facebook Marketing
Paid Facebook Marketing
 
First Class Social Media on an Economy Class Budget
First Class Social Media on an Economy Class BudgetFirst Class Social Media on an Economy Class Budget
First Class Social Media on an Economy Class Budget
 
Paid Facebook: 105
Paid Facebook: 105Paid Facebook: 105
Paid Facebook: 105
 
Why Go to College?
Why Go to College?Why Go to College?
Why Go to College?
 
Engineering Certificate Social Media Images
Engineering Certificate Social Media ImagesEngineering Certificate Social Media Images
Engineering Certificate Social Media Images
 
Jackson College Shareable Social Media Content
Jackson College Shareable Social Media ContentJackson College Shareable Social Media Content
Jackson College Shareable Social Media Content
 
#Status Update
#Status Update#Status Update
#Status Update
 
HillsdaleBEclass4_16_15
HillsdaleBEclass4_16_15HillsdaleBEclass4_16_15
HillsdaleBEclass4_16_15
 
Social Media in Action for MOGA
Social Media in Action for MOGASocial Media in Action for MOGA
Social Media in Action for MOGA
 
MOGAsocialmediaMUCC.pptx
MOGAsocialmediaMUCC.pptxMOGAsocialmediaMUCC.pptx
MOGAsocialmediaMUCC.pptx
 
3MUCC BOD Flyer Draft
3MUCC BOD Flyer Draft3MUCC BOD Flyer Draft
3MUCC BOD Flyer Draft
 

Kürzlich hochgeladen

The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch17mos052
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfAlexander Sirach
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsSocioCosmos
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesNetqom Solutions
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170Komal Khan
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书saphesg8
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxReaper61
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!andrekr997
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project17mos052
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
Music Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptxMusic Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptxjenrobinson12
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT17mos052
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...jicagig173
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhidelhiescort
 

Kürzlich hochgeladen (19)

The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing Services
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
 
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptx
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
Music Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptxMusic Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptx
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
 

Social Media Security

  • 1. Social MediaSecurity Del Belcher | Social Media Specialist Jackson College
  • 2. Del Belcher | Social Media Security How secure are you? VOTE!
  • 3. Del Belcher | Social Media Security Social Media Security What is hacking? Tips for protecting your social media information Strengthening your social media defenses Best practices Action items Security and privacy check What we will cover
  • 4. Del Belcher | Social Media Security Hackers have exposed:  110 Million Americans (roughly half of the nation’s adults) in the last 12 months alone  9 out of 10 adults fee consumers of lost control over how personal information is collected and used by companies  6 out of 10 American's “would like to do more” to protect their personal information online 1 2 3 1. Pew Research 2. Ponemon Institute 3. Pew Research
  • 5. Del Belcher | Social Media Security HistoricSocial Media Hacks  Snapchat: 200,000 SnapchatAccounts were Breached – 2016  Twitter: 33 million usernames and passwords leaked – 2016  Netflix: credential leak – 2016  Gmail: 42 Million leaked credentials - 2016  Facebook: credential leak, - 2016 & 2013  iCloud leak – Almost yearly!  YikYak: hack – 2014
  • 6. Del Belcher | Social Media Security What is Hacking? Hacking Isn’t… Hacking Is…  Vulnerability Scanner  Brute-Force Attack  Keystroke  Virus,Worm,Trojan Horse  SpoofingAttack (Phishing)  Social Engineering  Intimidation  Helpfulness  Name-Dropping  Technical
  • 7. Del Belcher | Social Media Security How do I identifyhacking threats? Think before you act Too good to be true? Require immediate action? Do they need my personal information? Personal Info is like money. It needs to be protected
  • 8. Del Belcher | Social Media Security How do I avoid hacking threats? Share with Care What you post can last a lifetime Be aware of what’s being shared Own your online presence Post only about others as you would have them post about you Social media is a car. It takes time to learn. Discipline to stay safe. Incredibly simple to mishandle.
  • 9. Del Belcher | Social Media Security ActionTips Passwords  A strong password is a sentence that is at least 12 characters long  Something you love  Easy to remember  Sometimes you can use spaces General Social Media Safety
  • 10. Del Belcher | Social Media Security ActionTips Unique Account, Unique Passwords  Having separate passwords for every account helps to thwart cybercriminals.  At the minimum, separate your work and personal accounts.  The more critical the account, the stronger the password General Social Media Safety
  • 11. Del Belcher | Social Media Security ActionTips Write it Down  Everyone can forget a password. Keep a list that’s stored in a safe secure place AWAY from your computer  Password management services General Social Media Safety
  • 12. Del Belcher | Social Media Security ActionTips Two Step Authentication  Two step verification or multifactor authentication  Two factor authentication can use anything from a text message, phone number, digital token, biometric like your fingerprint, to provide enhanced account security General Social Media Safety
  • 13. Del Belcher | Social Media Security ActionTips Remember me not  Make sure the “remember me” function is not enabled  Delete your browsing history  Log out  Anyone can access public computers  Close all browser tabs and log out At work or in public
  • 14. Del Belcher | Social Media Security ActionTips Connect with care  Use secure websites:  Https:// or shttp:// vs http://  Get savvy about publicWi-Fi  Public Wi-Fi isn’t necessarily secure.  Limit the type of business you conduct over public Wi-Fi At work or in public
  • 15. Del Belcher | Social Media Security ActionTips Secure your accounts Make passwords long and strong Unique account, unique password Write it down. Keep it safe! OwnYour Online Presence Know what you show When in doubt:THROW IT OUT! Takeaways
  • 16. Del Belcher | Social Media Security Facebook Robust security features Facebook is the most widely used social media platform on the plant Facebook is the most/second most visited website on the planet You probably are not onTwitter, Instagram, Reddit,Tumbler, Snapchat andYikYak Why just Facebook for this workshop?
  • 17. Del Belcher | Social Media Security Facebook Who can:  See the pics of your kids?  Share you info?  See where you are right now?  Collect, track, share your app usage info? Every action you take on Facebook has privacy implications Why is Facebook security important?
  • 18. Del Belcher | Social Media Security Facebook Time to log in!Reviewing security settings