SlideShare a Scribd company logo
1 of 20
Introduction
Everyone is a target


          Organized crime
           funds the
            attacks




Awareness is
the key
TIP #1
                 It was a dark and
Use a            stormy night

Passphras        becomes
e
                 ItwasaDark215andStormyNight




            Length    >    complexity
TIP #2
Keep up to date!
TIP #3
Use
protection
TIP #4
Recognize
phishing &
    scams
TIP #5

Use social
 networks
    safely
TIP #6


                       Remember
•   Employers           who else
•   Identity thieves     is there
•   Online predators
Don’t post
 inappropriate
   photos!
TIP #7


                                 Be
Is this really your friend..?    wary
                                 of
                                 others
TIP #8

Me on
the Web
TIP #9

Guard your
   personal
information

              Watch out for Facebook
              applications!
TIP #10
   Don’t
assume
 privacy
Don’t roll
   the dice
with online
    privacy

              Use privacy settings!
@benwoelk            @RIT_InfoSec
Bulletproofingyourcareeronline.com
Benwoelk.com

More Related Content

What's hot

Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital EtiquetteKATRUE01
 
How to find stories by newsgathering and monitoring the social web
How to find stories by newsgathering and monitoring the social webHow to find stories by newsgathering and monitoring the social web
How to find stories by newsgathering and monitoring the social webchimaMamdoh
 
Resist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyResist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyKit O'Connell
 
9 ways to protect yourself from hackers on
9 ways to protect yourself from hackers on9 ways to protect yourself from hackers on
9 ways to protect yourself from hackers onRamón Guerra
 
Take Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityTake Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityKit O'Connell
 
Not-so Passive Sonar - Red October
Not-so Passive Sonar - Red OctoberNot-so Passive Sonar - Red October
Not-so Passive Sonar - Red OctoberKurt Baumgartner
 
Three technologies that i learned
Three technologies that i learnedThree technologies that i learned
Three technologies that i learnedJcwjjc
 

What's hot (9)

Apps Marathon - Obscura
Apps Marathon - ObscuraApps Marathon - Obscura
Apps Marathon - Obscura
 
Digital Etiquette
Digital EtiquetteDigital Etiquette
Digital Etiquette
 
How to find stories by newsgathering and monitoring the social web
How to find stories by newsgathering and monitoring the social webHow to find stories by newsgathering and monitoring the social web
How to find stories by newsgathering and monitoring the social web
 
Resist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online PrivacyResist Doxing & Take Back Your Online Privacy
Resist Doxing & Take Back Your Online Privacy
 
9 ways to protect yourself from hackers on
9 ways to protect yourself from hackers on9 ways to protect yourself from hackers on
9 ways to protect yourself from hackers on
 
Take Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer SecurityTake Back Your Online Privacy: Simple Computer Security
Take Back Your Online Privacy: Simple Computer Security
 
Ty
TyTy
Ty
 
Not-so Passive Sonar - Red October
Not-so Passive Sonar - Red OctoberNot-so Passive Sonar - Red October
Not-so Passive Sonar - Red October
 
Three technologies that i learned
Three technologies that i learnedThree technologies that i learned
Three technologies that i learned
 

Viewers also liked

Carpe Opportunitas! - Seize the (Professional Development) Opportunity
Carpe Opportunitas! - Seize the (Professional Development) OpportunityCarpe Opportunitas! - Seize the (Professional Development) Opportunity
Carpe Opportunitas! - Seize the (Professional Development) OpportunityRoger Renteria
 
Carpe Opportunitas! - Seize the (Professional Development) Opportunity
Carpe Opportunitas! - Seize the (Professional Development) OpportunityCarpe Opportunitas! - Seize the (Professional Development) Opportunity
Carpe Opportunitas! - Seize the (Professional Development) OpportunityRoger Renteria
 
Strategic IA Careers: Skills and Knowledge for Success
Strategic IA Careers: Skills and Knowledge for SuccessStrategic IA Careers: Skills and Knowledge for Success
Strategic IA Careers: Skills and Knowledge for SuccessAndrea L. Ames
 
STC13: All you need is... Accessibility
STC13: All you need is... AccessibilitySTC13: All you need is... Accessibility
STC13: All you need is... AccessibilityKaren Mardahl
 
Documentation thrives in an agile methodology
Documentation thrives in an agile methodologyDocumentation thrives in an agile methodology
Documentation thrives in an agile methodologyJenna Moore
 
No More Broken Links
No More Broken LinksNo More Broken Links
No More Broken LinksMark Baker
 
Flexible Content Requires Future-Ready Organizations
Flexible Content Requires Future-Ready OrganizationsFlexible Content Requires Future-Ready Organizations
Flexible Content Requires Future-Ready OrganizationsSara Wachter-Boettcher
 
Every page is page one baker
Every page is page one bakerEvery page is page one baker
Every page is page one bakerMark Baker
 
Label Editing: great things in small packages
Label Editing: great things in small packagesLabel Editing: great things in small packages
Label Editing: great things in small packagesLeah Guren
 
Extreme editing
Extreme editingExtreme editing
Extreme editingLeah Guren
 
Solving Problems Before They Happen
Solving Problems Before They HappenSolving Problems Before They Happen
Solving Problems Before They HappenAndrew Thomas
 
Redish stc summit 2013
Redish stc summit 2013Redish stc summit 2013
Redish stc summit 2013Ginny Redish
 
Content Life Cycle: A Strategic Compass STC Summit 2013
Content Life Cycle: A Strategic Compass STC Summit 2013Content Life Cycle: A Strategic Compass STC Summit 2013
Content Life Cycle: A Strategic Compass STC Summit 2013ClearPath, LLC
 
Embedded UA 101 - STC Summit 2013, Scott DeLoach, ClickStart
Embedded UA 101 - STC Summit 2013, Scott DeLoach, ClickStartEmbedded UA 101 - STC Summit 2013, Scott DeLoach, ClickStart
Embedded UA 101 - STC Summit 2013, Scott DeLoach, ClickStartScott DeLoach
 
Creating and cultivating community via chm
Creating and cultivating community via chmCreating and cultivating community via chm
Creating and cultivating community via chmEileen Palsson
 
Personality and Change Management
Personality and Change ManagementPersonality and Change Management
Personality and Change ManagementAndrea Wenger
 

Viewers also liked (20)

Carpe Opportunitas! - Seize the (Professional Development) Opportunity
Carpe Opportunitas! - Seize the (Professional Development) OpportunityCarpe Opportunitas! - Seize the (Professional Development) Opportunity
Carpe Opportunitas! - Seize the (Professional Development) Opportunity
 
Carpe Opportunitas! - Seize the (Professional Development) Opportunity
Carpe Opportunitas! - Seize the (Professional Development) OpportunityCarpe Opportunitas! - Seize the (Professional Development) Opportunity
Carpe Opportunitas! - Seize the (Professional Development) Opportunity
 
Strategic IA Careers: Skills and Knowledge for Success
Strategic IA Careers: Skills and Knowledge for SuccessStrategic IA Careers: Skills and Knowledge for Success
Strategic IA Careers: Skills and Knowledge for Success
 
STC13: All you need is... Accessibility
STC13: All you need is... AccessibilitySTC13: All you need is... Accessibility
STC13: All you need is... Accessibility
 
The Hairball of Content - Lightning Version
The Hairball of Content - Lightning VersionThe Hairball of Content - Lightning Version
The Hairball of Content - Lightning Version
 
Documentation thrives in an agile methodology
Documentation thrives in an agile methodologyDocumentation thrives in an agile methodology
Documentation thrives in an agile methodology
 
No More Broken Links
No More Broken LinksNo More Broken Links
No More Broken Links
 
Flexible Content Requires Future-Ready Organizations
Flexible Content Requires Future-Ready OrganizationsFlexible Content Requires Future-Ready Organizations
Flexible Content Requires Future-Ready Organizations
 
Every page is page one baker
Every page is page one bakerEvery page is page one baker
Every page is page one baker
 
Label Editing: great things in small packages
Label Editing: great things in small packagesLabel Editing: great things in small packages
Label Editing: great things in small packages
 
Embedded User Assistance Using DITA
Embedded User Assistance Using DITAEmbedded User Assistance Using DITA
Embedded User Assistance Using DITA
 
Extreme editing
Extreme editingExtreme editing
Extreme editing
 
Solving Problems Before They Happen
Solving Problems Before They HappenSolving Problems Before They Happen
Solving Problems Before They Happen
 
Redish stc summit 2013
Redish stc summit 2013Redish stc summit 2013
Redish stc summit 2013
 
Content Life Cycle: A Strategic Compass STC Summit 2013
Content Life Cycle: A Strategic Compass STC Summit 2013Content Life Cycle: A Strategic Compass STC Summit 2013
Content Life Cycle: A Strategic Compass STC Summit 2013
 
Global UX: A Journey
Global UX: A JourneyGlobal UX: A Journey
Global UX: A Journey
 
Embedded UA 101 - STC Summit 2013, Scott DeLoach, ClickStart
Embedded UA 101 - STC Summit 2013, Scott DeLoach, ClickStartEmbedded UA 101 - STC Summit 2013, Scott DeLoach, ClickStart
Embedded UA 101 - STC Summit 2013, Scott DeLoach, ClickStart
 
Creating and cultivating community via chm
Creating and cultivating community via chmCreating and cultivating community via chm
Creating and cultivating community via chm
 
Storytelling for UX Workshop
Storytelling for UX WorkshopStorytelling for UX Workshop
Storytelling for UX Workshop
 
Personality and Change Management
Personality and Change ManagementPersonality and Change Management
Personality and Change Management
 

Similar to Shockproofing Your Use of Social Media (professional development progression)

Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Internet safety
Internet safetyInternet safety
Internet safetykohlerj
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoTDirk Zittersteyn
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slidesEric Castro
 
Online privacy
Online privacyOnline privacy
Online privacyjo-jo23
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2guest0e1ade
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2guest0e1ade
 
Opsec for families
Opsec for familiesOpsec for families
Opsec for familiesLindy Kyzer
 

Similar to Shockproofing Your Use of Social Media (professional development progression) (11)

Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Internet security lessons for IoT
Internet security lessons for IoTInternet security lessons for IoT
Internet security lessons for IoT
 
Internet safety slides
Internet safety slidesInternet safety slides
Internet safety slides
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Presentationtech2
Presentationtech2Presentationtech2
Presentationtech2
 
Opsec for families
Opsec for familiesOpsec for families
Opsec for families
 

More from Ben Woelk, CISSP, CPTC

Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual WorkforceCreating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual WorkforceBen Woelk, CISSP, CPTC
 
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxCreating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxBen Woelk, CISSP, CPTC
 
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesSaying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesBen Woelk, CISSP, CPTC
 
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesBen Woelk, CISSP, CPTC
 
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security AwarenessWe're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security AwarenessBen Woelk, CISSP, CPTC
 
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessBen Woelk, CISSP, CPTC
 
Building a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBen Woelk, CISSP, CPTC
 
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipHarnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipBen Woelk, CISSP, CPTC
 
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18Ben Woelk, CISSP, CPTC
 
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityFollow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityBen Woelk, CISSP, CPTC
 
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and YourselfCollaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and YourselfBen Woelk, CISSP, CPTC
 
Digital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminarDigital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminarBen Woelk, CISSP, CPTC
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsBen Woelk, CISSP, CPTC
 

More from Ben Woelk, CISSP, CPTC (20)

Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual WorkforceCreating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce
 
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxCreating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
 
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesSaying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership Opportunities
 
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
 
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security AwarenessWe're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
 
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for Success
 
Building a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
 
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipHarnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted Leadership
 
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
 
Digital self defense 101 me rit
Digital self defense 101 me ritDigital self defense 101 me rit
Digital self defense 101 me rit
 
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityFollow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
 
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and YourselfCollaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and Yourself
 
An Introvert's Journey to Leadership
An Introvert's Journey to LeadershipAn Introvert's Journey to Leadership
An Introvert's Journey to Leadership
 
Digital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminarDigital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminar
 
Digital Self Defense at RIT
Digital Self Defense at RITDigital Self Defense at RIT
Digital Self Defense at RIT
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 
Succession Planning and Volunteering
Succession Planning and VolunteeringSuccession Planning and Volunteering
Succession Planning and Volunteering
 
Digital Self Defense
Digital Self DefenseDigital Self Defense
Digital Self Defense
 
A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14
 
A Techcomm Bestiary Spectrum14
A Techcomm Bestiary Spectrum14A Techcomm Bestiary Spectrum14
A Techcomm Bestiary Spectrum14
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Shockproofing Your Use of Social Media (professional development progression)

Editor's Notes

  1. Hi, I’m Ben Woelk. I’m the Policy and Awareness Analyst in the RIT information Security Office. Part of my role is to build a culture of security awareness. Today we’re going to learn about Shockproofing Your Use of Social Media. In other words, how to stay safe online.
  2. Does anybody see anything wrong with this picture? Here’s the problem, Everyone is a Target. Identity theft is big business. It’s not done by hackers sitting in their basements. Well maybe some of the people committing identity theft are hackers in their basements, but they’re funded by organized crime.
  3. Here’s the big problem: You can’t rely on others to protect you. You need to learn to protect yourself. That’s what this presentation is all about—giving you ten tips to stay safe online.
  4. Tip #1: Use a Passphrase. We’ve all heard about passwords. I want you to start using passphrases. Passphrases are long, but easier to remember than a password. Length is more important than complexity. Throw in some numbers and capital letters and the phrase on the screen becomes ItwasaDark215andStormyNight. Easy to remember.
  5. You may want to use a Password Safe or Vault. Two good ones are Password Gorilla and LastPass, a browser plug in. The vault generates long complex passwords and stores them. You protect your password safe or vault with a long passphrase. When you visit a website, LastPass will supply the password you need to log in.
  6. Tip # 2: Stay up to date. Attackers exploit vulnerabilities in software. Software vendors release patches to address these vulnerabilities. We all know that we need to keep our operating systems up to date. You also need to keep your applications up to date. Make sure you’ve turned on auto update.
  7. Tip #3: Use Protection. No, there’s no such thing as an iCondom. However, one of the best ways to protect your computer is to use layers of security. Use anti-virus, a firewall, and anti-spyware. Mac users need antivirus and need to make sure your firewall is enabled. And don’t forget about your mobile devices. They’re starting to become more and more of a target.
  8. Tip #4: Recognize Phishing and scams. Many of you met Phishy at move in. Phishy is here to help raise our awareness about phishing. It’s pretty basic. Never respond to email requests for your password. (Or over the phone)
  9. You want to keep your private things private! Don’t post private things online, especially on social media. This poster was created by a student at RIT. Like it?
  10. Tip #5: Use Social Networks Safely. Don’t post information about where you live or where you’re going to be on Facebook or Twitter. Yes, it’s rare, but if you have an open profile on Facebook or you’re using FourSquare and tweeting your whereabouts publicly, you’re putting yourself at risk.
  11. Watch out for phishing on social networking sites. How many of you have a friend whose profile has been compromised because their password was hacked? Have you revealed enough information about yourself that someone could steal your identity? Can they figure out your mother’s maiden name?
  12. Tip #6: Remember who else is there. Employers will try to find out as much about you as they can online. They may try to access your social media profiles. There was a court case this month, where the court decided that what you post online is not protected. Think before you post about the image you’re portraying.
  13. Don’t post inappropriate photos. Untag inappropriate photos of you your friends post. Would you hire this guy? People WILL judge you by what you post online. Think before you post! Clean up your profiles now.
  14. Tip #7: Be wary of others. How do you know the person claiming to be 19 years old isn’t a 40 something who’s masquerading as someone else? How do you know he or she isn’t a wolf in sheep’s clothing? Be careful.
  15. Tip #8: Search for your name. Set up a Google Alert in Google Dashboard to let you know every day how your name is appearing online. You can set up a search for anything. So if there’s something you want to track online, set up the alert.
  16. Tip #9: Guard your personal information. Wouldn’t you like to have a guard dog like this protecting your information? Hmm. Maybe not. Protecting your personal information hasn’t been a big deal for you so far. It will be as you develop a credit history.
  17. Tip #10: Don’t assume privacy. In fact, assume that anything you post online is going to stay private. Think before you post about how information can be used. Do you want Facebook or anyone else tracking everything you do?
  18. Don’t roll the dice with online privacy! Use the privacy setting available in social media. If you hear that they’ve changed their privacy policy, go back and check your settings again. They have a habit of getting “unstuck.”
  19. Remember. You’re the first line of defense. You’re the one that will notice if things aren’t right. Maybe your computer is running slowly. Maybe you’re receiving strange communications from somewhere. Do something about it. Run a scan. Call the Help Desk.
  20. Finally, practice Digital Self Defense. Follow up on Facebook and Twitter. Like us on Facebook before the end of September and you’ll be entered in a drawing for a $100 Barnes and Noble gift card. Thanks for listening. I’m Ben Woelk and I hope you have a great time at RIT.