SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Downloaden Sie, um offline zu lesen
© 2015 Quick Heal Technologies Ltd.
WEBINAR
How Much Should
You Reveal on
Social Media?
© 2015 Quick Heal Technologies Ltd.
We all love sharing stuff on social
media, especially Facebook -
funny pics, hilarious videos, witty
jokes and what not.
© 2015 Quick Heal Technologies Ltd.
But, do we know how much
should be shared and what
shouldn't be?
© 2015 Quick Heal Technologies Ltd.
In today’s webinar, we will
discuss:
# The type of information that should not be made
public.
# Consequences of sharing too much on social media.
# Tips on protecting your online privacy.
# How Quick Heal helps you use social media safely.
© 2015 Quick Heal Technologies Ltd.
Type of information that
should not be made public.
© 2015 Quick Heal Technologies Ltd.
Remember, we’re always
being watched on Social
Media.
© 2015 Quick Heal Technologies Ltd.
And among the people who
could be watching us are
Cyber Criminals.
© 2015 Quick Heal Technologies Ltd.
And that’s why, you should
never reveal this type of
information in public on social
media:
© 2015 Quick Heal Technologies Ltd.
1. Your home’s address.
© 2015 Quick Heal Technologies Ltd.
2. Your phone number.
© 2015 Quick Heal Technologies Ltd.
3. Your date of birth.
© 2015 Quick Heal Technologies Ltd.
4. Your vacation plans.
© 2015 Quick Heal Technologies Ltd.
5. Photos of all your
belongings.
© 2015 Quick Heal Technologies Ltd.
6. Information about your kids.
© 2015 Quick Heal Technologies Ltd.
7. Grudges about your work.
© 2015 Quick Heal Technologies Ltd.
8. Intimate or personal photos.
© 2015 Quick Heal Technologies Ltd.
9. Any financial information.
© 2015 Quick Heal Technologies Ltd.
Consequences of sharing too
much on social media.
© 2015 Quick Heal Technologies Ltd.
Sharing too much information
on social media has the
following risks:
© 2015 Quick Heal Technologies Ltd.
1. You could be exposing
yourself to online predators.
© 2015 Quick Heal Technologies Ltd.
2. You are more likely to
become a victim of identity
fraud.
© 2015 Quick Heal Technologies Ltd.
3. Home burglary while you
are out.
© 2015 Quick Heal Technologies Ltd.
4. Risk of being cyber bullied.
© 2015 Quick Heal Technologies Ltd.
5. You may fall prey to social
engineering schemes.
© 2015 Quick Heal Technologies Ltd.
6. Damaged reputation.
© 2015 Quick Heal Technologies Ltd.
Tips on protecting your privacy on
Social Media.
© 2015 Quick Heal Technologies Ltd.
You can protect your privacy
on Facebook by following
these tips:
© 2015 Quick Heal Technologies Ltd.
1. Control who can
see your timeline
posts on Facebook.
© 2015 Quick Heal Technologies Ltd.
2. Control who can
get in touch with
you via messages.
© 2015 Quick Heal Technologies Ltd.
3. Control the privacy of
the details in the ‘About’
section.
© 2015 Quick Heal Technologies Ltd.
4. Control who can find you on
Facebook using your email
address and telephone number.
© 2015 Quick Heal Technologies Ltd.
5. Know when your account is
accessed from an unknown
device.
© 2015 Quick Heal Technologies Ltd.
6. Some More Tips on Privacy:
# Encrypt your hard drive.
# Consider using Private Browsing.
# Always Log Out once done.
# Read Privacy Policies of sites you share
your information with.
# Avoid using public WiFi for logging into
sites.
© 2015 Quick Heal Technologies Ltd.
How Quick Heal helps you use
Social Media safely
© 2015 Quick Heal Technologies Ltd.
Quick Heal helps you stay safe
against online threats including
dangers on Social Media with
these security features:
© 2015 Quick Heal Technologies Ltd.
Helps restrict users (especially
children) from visiting potentially
dangerous social media sites like
dating sites, unmonitored chat
sites, etc.
Parental Control
© 2015 Quick Heal Technologies Ltd.
Automatically blocks websites that
are designed to steal user
information by using social media
scams.
Web Security
© 2015 Quick Heal Technologies Ltd.
Blocks emails designed to trick
users into revealing personal and
financial information.
Email Security
© 2015 Quick Heal Technologies Ltd.
Write to us at:
CorporateCommunications@quickheal.co.in
Follow us on:
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us:
Website: www.quickheal.com
Official Blog: blogs.quickheal.com
Got any queries regarding this
webinar?
© 2015 Quick Heal Technologies Ltd.
Thank You!
© 2015 Quick Heal Technologies Ltd.
References
http://blogs.quickheal.com/wp/how-much-should-you-reveal-on-facebook/
http://blogs.quickheal.com/wp/how-much-should-you-reveal-on-facebook-part-ii/
http://blogs.quickheal.com/wp/5-tips-to-make-your-facebook-account-hackproof-updated/
http://blogs.quickheal.com/wp/facebook-security-easy-tips-for-user-privacy/

Weitere ähnliche Inhalte

Was ist angesagt?

Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?SwiftTech Solutions, Inc.
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2Monica Hamilton
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - nowSymantec
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentesterCláudio André
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentationredbackacademy
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber SecurityThrottleNet, Inc
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber securityAnnaVihersalo
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeEC-Council
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityviimsikool
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterJack
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?SwiftTech Solutions, Inc.
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 

Was ist angesagt? (20)

Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentester
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber security
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety Poster
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 

Ähnlich wie How much should you reveal on social media

5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.comjackpot201
 
341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdf341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdfHarkeemShaw1
 
Youthlink Scotland and Social Media
Youthlink Scotland and Social MediaYouthlink Scotland and Social Media
Youthlink Scotland and Social MediaCraig McGill
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for DummiesLiberteks
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Social media and security
Social media and securitySocial media and security
Social media and securityElvis Eromosele
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptxRACHANAB18
 
My Video Talk In U.A.E.
My Video Talk In U.A.E.My Video Talk In U.A.E.
My Video Talk In U.A.E.Noel
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Social Business Initiatives: Identification and Responsible Implementation wi...
Social Business Initiatives: Identification and Responsible Implementation wi...Social Business Initiatives: Identification and Responsible Implementation wi...
Social Business Initiatives: Identification and Responsible Implementation wi...Information Development World
 
Social media ppt
Social media pptSocial media ppt
Social media pptLeadMillion
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1Julian Ranger
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? TechGenie
 
Things Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You RealizingThings Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You RealizingKiwasoft Technologies
 

Ähnlich wie How much should you reveal on social media (20)

Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security TipsTop 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
 
5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com
 
20110805
2011080520110805
20110805
 
341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdf341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdf
 
Youthlink Scotland and Social Media
Youthlink Scotland and Social MediaYouthlink Scotland and Social Media
Youthlink Scotland and Social Media
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Social media and security
Social media and securitySocial media and security
Social media and security
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
 
My Video Talk In U.A.E.
My Video Talk In U.A.E.My Video Talk In U.A.E.
My Video Talk In U.A.E.
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Social Business Initiatives: Identification and Responsible Implementation wi...
Social Business Initiatives: Identification and Responsible Implementation wi...Social Business Initiatives: Identification and Responsible Implementation wi...
Social Business Initiatives: Identification and Responsible Implementation wi...
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Things Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You RealizingThings Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You Realizing
 
How lawyers use social media in 2014
How lawyers use social media in 2014How lawyers use social media in 2014
How lawyers use social media in 2014
 

Mehr von Quick Heal Technologies Ltd.

31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 

Mehr von Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Kürzlich hochgeladen

Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 

Kürzlich hochgeladen (20)

Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 

How much should you reveal on social media

  • 1. © 2015 Quick Heal Technologies Ltd. WEBINAR How Much Should You Reveal on Social Media?
  • 2. © 2015 Quick Heal Technologies Ltd. We all love sharing stuff on social media, especially Facebook - funny pics, hilarious videos, witty jokes and what not.
  • 3. © 2015 Quick Heal Technologies Ltd. But, do we know how much should be shared and what shouldn't be?
  • 4. © 2015 Quick Heal Technologies Ltd. In today’s webinar, we will discuss: # The type of information that should not be made public. # Consequences of sharing too much on social media. # Tips on protecting your online privacy. # How Quick Heal helps you use social media safely.
  • 5. © 2015 Quick Heal Technologies Ltd. Type of information that should not be made public.
  • 6. © 2015 Quick Heal Technologies Ltd. Remember, we’re always being watched on Social Media.
  • 7. © 2015 Quick Heal Technologies Ltd. And among the people who could be watching us are Cyber Criminals.
  • 8. © 2015 Quick Heal Technologies Ltd. And that’s why, you should never reveal this type of information in public on social media:
  • 9. © 2015 Quick Heal Technologies Ltd. 1. Your home’s address.
  • 10. © 2015 Quick Heal Technologies Ltd. 2. Your phone number.
  • 11. © 2015 Quick Heal Technologies Ltd. 3. Your date of birth.
  • 12. © 2015 Quick Heal Technologies Ltd. 4. Your vacation plans.
  • 13. © 2015 Quick Heal Technologies Ltd. 5. Photos of all your belongings.
  • 14. © 2015 Quick Heal Technologies Ltd. 6. Information about your kids.
  • 15. © 2015 Quick Heal Technologies Ltd. 7. Grudges about your work.
  • 16. © 2015 Quick Heal Technologies Ltd. 8. Intimate or personal photos.
  • 17. © 2015 Quick Heal Technologies Ltd. 9. Any financial information.
  • 18. © 2015 Quick Heal Technologies Ltd. Consequences of sharing too much on social media.
  • 19. © 2015 Quick Heal Technologies Ltd. Sharing too much information on social media has the following risks:
  • 20. © 2015 Quick Heal Technologies Ltd. 1. You could be exposing yourself to online predators.
  • 21. © 2015 Quick Heal Technologies Ltd. 2. You are more likely to become a victim of identity fraud.
  • 22. © 2015 Quick Heal Technologies Ltd. 3. Home burglary while you are out.
  • 23. © 2015 Quick Heal Technologies Ltd. 4. Risk of being cyber bullied.
  • 24. © 2015 Quick Heal Technologies Ltd. 5. You may fall prey to social engineering schemes.
  • 25. © 2015 Quick Heal Technologies Ltd. 6. Damaged reputation.
  • 26. © 2015 Quick Heal Technologies Ltd. Tips on protecting your privacy on Social Media.
  • 27. © 2015 Quick Heal Technologies Ltd. You can protect your privacy on Facebook by following these tips:
  • 28. © 2015 Quick Heal Technologies Ltd. 1. Control who can see your timeline posts on Facebook.
  • 29. © 2015 Quick Heal Technologies Ltd. 2. Control who can get in touch with you via messages.
  • 30. © 2015 Quick Heal Technologies Ltd. 3. Control the privacy of the details in the ‘About’ section.
  • 31. © 2015 Quick Heal Technologies Ltd. 4. Control who can find you on Facebook using your email address and telephone number.
  • 32. © 2015 Quick Heal Technologies Ltd. 5. Know when your account is accessed from an unknown device.
  • 33. © 2015 Quick Heal Technologies Ltd. 6. Some More Tips on Privacy: # Encrypt your hard drive. # Consider using Private Browsing. # Always Log Out once done. # Read Privacy Policies of sites you share your information with. # Avoid using public WiFi for logging into sites.
  • 34. © 2015 Quick Heal Technologies Ltd. How Quick Heal helps you use Social Media safely
  • 35. © 2015 Quick Heal Technologies Ltd. Quick Heal helps you stay safe against online threats including dangers on Social Media with these security features:
  • 36. © 2015 Quick Heal Technologies Ltd. Helps restrict users (especially children) from visiting potentially dangerous social media sites like dating sites, unmonitored chat sites, etc. Parental Control
  • 37. © 2015 Quick Heal Technologies Ltd. Automatically blocks websites that are designed to steal user information by using social media scams. Web Security
  • 38. © 2015 Quick Heal Technologies Ltd. Blocks emails designed to trick users into revealing personal and financial information. Email Security
  • 39. © 2015 Quick Heal Technologies Ltd. Write to us at: CorporateCommunications@quickheal.co.in Follow us on: Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us: Website: www.quickheal.com Official Blog: blogs.quickheal.com Got any queries regarding this webinar?
  • 40. © 2015 Quick Heal Technologies Ltd. Thank You!
  • 41. © 2015 Quick Heal Technologies Ltd. References http://blogs.quickheal.com/wp/how-much-should-you-reveal-on-facebook/ http://blogs.quickheal.com/wp/how-much-should-you-reveal-on-facebook-part-ii/ http://blogs.quickheal.com/wp/5-tips-to-make-your-facebook-account-hackproof-updated/ http://blogs.quickheal.com/wp/facebook-security-easy-tips-for-user-privacy/