SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Social MediaSecurity
Del Belcher | Social Media Specialist
Jackson College
Del Belcher | Social Media Security
How secure
are you?
VOTE!
Del Belcher | Social Media Security
Social Media
Security
What is hacking?
Tips for protecting your social media
information
Strengthening your social media
defenses
Best practices
Action items
Security and privacy check
What we will cover
Del Belcher | Social Media Security
Hackers have
exposed:
 110 Million Americans (roughly half of the
nation’s adults) in the last 12 months alone
 9 out of 10 adults fee consumers of lost control
over how personal information is collected and
used by companies
 6 out of 10 American's “would like to do more”
to protect their personal information online
1
2
3
1. Pew Research
2. Ponemon Institute
3. Pew Research
Del Belcher | Social Media Security
HistoricSocial
Media Hacks
 Snapchat: 200,000 SnapchatAccounts were Breached – 2016
 Twitter: 33 million usernames and passwords leaked – 2016
 Netflix: credential leak – 2016
 Gmail: 42 Million leaked credentials - 2016
 Facebook: credential leak, - 2016 & 2013
 iCloud leak – Almost yearly!
 YikYak: hack – 2014
Del Belcher | Social Media Security
What is
Hacking?
Hacking Isn’t… Hacking Is…
 Vulnerability Scanner
 Brute-Force Attack
 Keystroke
 Virus,Worm,Trojan Horse
 SpoofingAttack (Phishing)
 Social Engineering
 Intimidation
 Helpfulness
 Name-Dropping
 Technical
Del Belcher | Social Media Security
How do I
identifyhacking
threats?
Think before you act
Too good to be true?
Require immediate action?
Do they need my personal
information?
Personal Info is like money.
It needs to be protected
Del Belcher | Social Media Security
How do I avoid
hacking threats?
Share with Care
What you post can last a lifetime
Be aware of what’s being shared
Own your online presence
Post only about others as you
would have them post about you
Social media is a car. It takes time to
learn. Discipline to stay safe.
Incredibly simple to mishandle.
Del Belcher | Social Media Security
ActionTips
Passwords
 A strong password is a sentence that is at least 12
characters long
 Something you love
 Easy to remember
 Sometimes you can use spaces
General Social Media Safety
Del Belcher | Social Media Security
ActionTips
Unique Account, Unique Passwords
 Having separate passwords for every account helps to
thwart cybercriminals.
 At the minimum, separate your work and personal
accounts.
 The more critical the account, the stronger the
password
General Social Media Safety
Del Belcher | Social Media Security
ActionTips
Write it Down
 Everyone can forget a password. Keep a list that’s
stored in a safe secure place AWAY from your
computer
 Password management services
General Social Media Safety
Del Belcher | Social Media Security
ActionTips
Two Step Authentication
 Two step verification or multifactor authentication
 Two factor authentication can use anything from a
text message, phone number, digital token,
biometric like your fingerprint, to provide
enhanced account security
General Social Media Safety
Del Belcher | Social Media Security
ActionTips
Remember me not
 Make sure the “remember me” function is not
enabled
 Delete your browsing history
 Log out
 Anyone can access public computers
 Close all browser tabs and log out
At work or in public
Del Belcher | Social Media Security
ActionTips
Connect with care
 Use secure websites:
 Https:// or shttp:// vs http://
 Get savvy about publicWi-Fi
 Public Wi-Fi isn’t necessarily secure.
 Limit the type of business you conduct over
public Wi-Fi
At work or in public
Del Belcher | Social Media Security
ActionTips
Secure your accounts
Make passwords long and strong
Unique account, unique password
Write it down. Keep it safe!
OwnYour Online Presence
Know what you show
When in doubt:THROW IT OUT!
Takeaways
Del Belcher | Social Media Security
Facebook
Robust security features
Facebook is the most widely used
social media platform on the plant
Facebook is the most/second most
visited website on the planet
You probably are not onTwitter,
Instagram, Reddit,Tumbler,
Snapchat andYikYak
Why just Facebook for this
workshop?
Del Belcher | Social Media Security
Facebook
Who can:
 See the pics of your kids?
 Share you info?
 See where you are right now?
 Collect, track, share your app usage info?
Every action you take on Facebook has privacy
implications
Why is Facebook security
important?
Del Belcher | Social Media Security
Facebook
Time to log in!Reviewing security settings

Weitere ähnliche Inhalte

Was ist angesagt?

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 

Was ist angesagt? (20)

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Social engineering
Social engineering Social engineering
Social engineering
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Hacking
HackingHacking
Hacking
 
Secure password - CYBER SECURITY
Secure password - CYBER SECURITYSecure password - CYBER SECURITY
Secure password - CYBER SECURITY
 
Hacking
HackingHacking
Hacking
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Phishing
PhishingPhishing
Phishing
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Network security
Network securityNetwork security
Network security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 

Andere mochten auch

Andere mochten auch (6)

Security and social media
Security and social mediaSecurity and social media
Security and social media
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats20160317 ARMA Wyoming Social Media Security Threats
20160317 ARMA Wyoming Social Media Security Threats
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 

Ähnlich wie Social Media Security

Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 

Ähnlich wie Social Media Security (20)

Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
Users guide
Users guideUsers guide
Users guide
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Digital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptxDigital Literacy Fundamentals.pptx
Digital Literacy Fundamentals.pptx
 
Digital Security and safety for journalists
Digital Security and safety for journalistsDigital Security and safety for journalists
Digital Security and safety for journalists
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdfSafeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
Safeguarding Your Online Presence_ Social Media Cybersecurity Tips.pdf
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptxCyberFirst-Navigators-Lesson-1-presentation.pptx
CyberFirst-Navigators-Lesson-1-presentation.pptx
 
Social media pros & cons
Social media pros & consSocial media pros & cons
Social media pros & cons
 

Mehr von Del Belcher

HillsdaleBEclass4_16_15
HillsdaleBEclass4_16_15HillsdaleBEclass4_16_15
HillsdaleBEclass4_16_15
Del Belcher
 
MOGAsocialmediaMUCC.pptx
MOGAsocialmediaMUCC.pptxMOGAsocialmediaMUCC.pptx
MOGAsocialmediaMUCC.pptx
Del Belcher
 
3MUCC BOD Flyer Draft
3MUCC BOD Flyer Draft3MUCC BOD Flyer Draft
3MUCC BOD Flyer Draft
Del Belcher
 

Mehr von Del Belcher (13)

Social Media Etiquette
Social Media EtiquetteSocial Media Etiquette
Social Media Etiquette
 
Social Media Strategy for Overwhelmed Marketers
Social Media Strategy for Overwhelmed MarketersSocial Media Strategy for Overwhelmed Marketers
Social Media Strategy for Overwhelmed Marketers
 
Paid Facebook Marketing
Paid Facebook MarketingPaid Facebook Marketing
Paid Facebook Marketing
 
First Class Social Media on an Economy Class Budget
First Class Social Media on an Economy Class BudgetFirst Class Social Media on an Economy Class Budget
First Class Social Media on an Economy Class Budget
 
Paid Facebook: 105
Paid Facebook: 105Paid Facebook: 105
Paid Facebook: 105
 
Why Go to College?
Why Go to College?Why Go to College?
Why Go to College?
 
Engineering Certificate Social Media Images
Engineering Certificate Social Media ImagesEngineering Certificate Social Media Images
Engineering Certificate Social Media Images
 
Jackson College Shareable Social Media Content
Jackson College Shareable Social Media ContentJackson College Shareable Social Media Content
Jackson College Shareable Social Media Content
 
#Status Update
#Status Update#Status Update
#Status Update
 
HillsdaleBEclass4_16_15
HillsdaleBEclass4_16_15HillsdaleBEclass4_16_15
HillsdaleBEclass4_16_15
 
Social Media in Action for MOGA
Social Media in Action for MOGASocial Media in Action for MOGA
Social Media in Action for MOGA
 
MOGAsocialmediaMUCC.pptx
MOGAsocialmediaMUCC.pptxMOGAsocialmediaMUCC.pptx
MOGAsocialmediaMUCC.pptx
 
3MUCC BOD Flyer Draft
3MUCC BOD Flyer Draft3MUCC BOD Flyer Draft
3MUCC BOD Flyer Draft
 

Kürzlich hochgeladen

Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
Cara Menggugurkan Kandungan 087776558899
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
SocioCosmos
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
Cara Menggugurkan Kandungan 087776558899
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Heena Escort Service
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 

Kürzlich hochgeladen (20)

Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Content strategy : Content empire and cash in
Content strategy : Content empire and cash inContent strategy : Content empire and cash in
Content strategy : Content empire and cash in
 
Enhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content MarketingEnhancing Consumer Trust Through Strategic Content Marketing
Enhancing Consumer Trust Through Strategic Content Marketing
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Kayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsKayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Kayamkulam Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Madikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Madikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsMadikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Madikeri Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
JUAL PILL CYTOTEC PALOPO SULAWESI 087776558899 OBAT PENGGUGUR KANDUNGAN PALOP...
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
Meet Incall & Out Escort Service in D -9634446618 | #escort Service in GTB Na...
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsCoorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Coorg Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Sri Ganganagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Sri Ganganagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsSri Ganganagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Sri Ganganagar Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 
Jhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot GirlsJhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
Jhunjhunu Escorts 🥰 8617370543 Call Girls Offer VIP Hot Girls
 

Social Media Security

  • 1. Social MediaSecurity Del Belcher | Social Media Specialist Jackson College
  • 2. Del Belcher | Social Media Security How secure are you? VOTE!
  • 3. Del Belcher | Social Media Security Social Media Security What is hacking? Tips for protecting your social media information Strengthening your social media defenses Best practices Action items Security and privacy check What we will cover
  • 4. Del Belcher | Social Media Security Hackers have exposed:  110 Million Americans (roughly half of the nation’s adults) in the last 12 months alone  9 out of 10 adults fee consumers of lost control over how personal information is collected and used by companies  6 out of 10 American's “would like to do more” to protect their personal information online 1 2 3 1. Pew Research 2. Ponemon Institute 3. Pew Research
  • 5. Del Belcher | Social Media Security HistoricSocial Media Hacks  Snapchat: 200,000 SnapchatAccounts were Breached – 2016  Twitter: 33 million usernames and passwords leaked – 2016  Netflix: credential leak – 2016  Gmail: 42 Million leaked credentials - 2016  Facebook: credential leak, - 2016 & 2013  iCloud leak – Almost yearly!  YikYak: hack – 2014
  • 6. Del Belcher | Social Media Security What is Hacking? Hacking Isn’t… Hacking Is…  Vulnerability Scanner  Brute-Force Attack  Keystroke  Virus,Worm,Trojan Horse  SpoofingAttack (Phishing)  Social Engineering  Intimidation  Helpfulness  Name-Dropping  Technical
  • 7. Del Belcher | Social Media Security How do I identifyhacking threats? Think before you act Too good to be true? Require immediate action? Do they need my personal information? Personal Info is like money. It needs to be protected
  • 8. Del Belcher | Social Media Security How do I avoid hacking threats? Share with Care What you post can last a lifetime Be aware of what’s being shared Own your online presence Post only about others as you would have them post about you Social media is a car. It takes time to learn. Discipline to stay safe. Incredibly simple to mishandle.
  • 9. Del Belcher | Social Media Security ActionTips Passwords  A strong password is a sentence that is at least 12 characters long  Something you love  Easy to remember  Sometimes you can use spaces General Social Media Safety
  • 10. Del Belcher | Social Media Security ActionTips Unique Account, Unique Passwords  Having separate passwords for every account helps to thwart cybercriminals.  At the minimum, separate your work and personal accounts.  The more critical the account, the stronger the password General Social Media Safety
  • 11. Del Belcher | Social Media Security ActionTips Write it Down  Everyone can forget a password. Keep a list that’s stored in a safe secure place AWAY from your computer  Password management services General Social Media Safety
  • 12. Del Belcher | Social Media Security ActionTips Two Step Authentication  Two step verification or multifactor authentication  Two factor authentication can use anything from a text message, phone number, digital token, biometric like your fingerprint, to provide enhanced account security General Social Media Safety
  • 13. Del Belcher | Social Media Security ActionTips Remember me not  Make sure the “remember me” function is not enabled  Delete your browsing history  Log out  Anyone can access public computers  Close all browser tabs and log out At work or in public
  • 14. Del Belcher | Social Media Security ActionTips Connect with care  Use secure websites:  Https:// or shttp:// vs http://  Get savvy about publicWi-Fi  Public Wi-Fi isn’t necessarily secure.  Limit the type of business you conduct over public Wi-Fi At work or in public
  • 15. Del Belcher | Social Media Security ActionTips Secure your accounts Make passwords long and strong Unique account, unique password Write it down. Keep it safe! OwnYour Online Presence Know what you show When in doubt:THROW IT OUT! Takeaways
  • 16. Del Belcher | Social Media Security Facebook Robust security features Facebook is the most widely used social media platform on the plant Facebook is the most/second most visited website on the planet You probably are not onTwitter, Instagram, Reddit,Tumbler, Snapchat andYikYak Why just Facebook for this workshop?
  • 17. Del Belcher | Social Media Security Facebook Who can:  See the pics of your kids?  Share you info?  See where you are right now?  Collect, track, share your app usage info? Every action you take on Facebook has privacy implications Why is Facebook security important?
  • 18. Del Belcher | Social Media Security Facebook Time to log in!Reviewing security settings