Your SlideShare is downloading. ×
5 Steps To Safe Social Networking
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

5 Steps To Safe Social Networking


Published on

By Grass Roots 2.0

By Grass Roots 2.0

Published in: Technology

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. 5 Simple Steps for Safe Social Networking I. Type The URL Yourself • When visiting websites that require a username and password (like Facebook, Twitter and your online back account) always type out the entire URL yourself. Don’t follow someone else’s link or a bookmark. Most phishing and hacking occur when criminals trick your computer’s bookmarks or webpage history into redirecting you to a phony site. Once you’re there and enter your login information, they have it and will use it. II. Limit The Number Administrators On Your Social Networking • Every person with Administrative privileges on your social networking accounts can put your pages at risk. If any of your Administrative accounts are compromised, Hackers will also have access to your campaign’s social networking groups and pages. III. Watch What You Download • 90% of PC infections (virus or spyware) occur because you opened the door and invited them in. Just like you would only allow a licensed and credible plumber into your house to fix your toilet, whenever something asks to be downloaded or installed on your PC, ask yourself, “Would I let these people in my house?” If the answer is no, don’t download the software. If you need the software or update, it will be available from a website or company you trust (Microsoft, Adobe, etc.). IV. Avoid Easy Targets - Use Web Browsers Wisely • Most phishing, hacking and viruses target the most common web browser, Microsoft Internet Explorer. By using other programs, most viruses can’t get in. GrassRoots 2.0 recommends Google Chrome and Mozilla FireFox which are available for free. V. Scan Your Computer For Viruses and Spyware Weekly • The longer these fun friends sit on you computer, the more trouble they will cause you. Often criminals trying to gain access to your social networking accounts use Spyware which monitors your movements. Scanning your PC weekly for these threats can dramatically reduce the risk of someone gaining access. Many versions of Windows come with anti-spyware tools or we recommend Lavasoft’s AdAware which is available for free. Bryan Bedera (775) 750.5223