SlideShare a Scribd company logo
1 of 20
Download to read offline
Ten Tips to Shockproof Your
    Use of Social Media
                 Ben Woelk
        Policy and Awareness Analyst
      Rochester Institute of Technology
            ben.woelk@gmail.com
                 @benwoelk
Introduction
 • Everyone is a target
 • Organized crime funds the attacks




                                       2
Avert Labs Malware Research




                                                                                                     3
Retrieved July 24, 2009 from:
http://www.avertlabs.com/research/blog/index.php/2009/07/22/malware-is-their-businessand-business-is-good/
Tip # 1 Strong Passwords/
Passphrases
 • Length more important than complexity

 It was a dark and stormy night

          becomes

 ItwasaDark215andStormyNight

                                           4
Password Safes




                 5
Tip # 2 Keep up to date!
 • Operating Systems
 • Applications




                           6
Tip #3 Use Security Software
 Layers of Security
 • Anti-Virus Protection
 • Firewall
 • Anti-Spyware Protection
 Don’t overlook mobile devices!




                                  7
Tip #4 Recognize Phishing/Scams




                             8
Phishing Tips




                9
Tip #5 Use Social Networks Safely
Don’t:
• Post personal information
• Post schedules or whereabouts
• Post inappropriate photos




http://www.sileo.com/facebook-status-update-leads-to-robbery/
                                                                10
Phishing on Social Network Sites




                                                                            11
 http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf
Tip #6 Remember Who Else is There

 • Who else uses social networking?
   – Employers
   – Identity Thieves
   – Online Predators
 • Facebook Stalker
  (http://www.youtube.com/watch?v=wCh9bmg0zGg)




                                                 12
What You Post Can Be Used To…
 • Make judgments
   about your character
 • Impersonate you to
   financial institutions
 • Monitor what you do
   and where you go




                            13
Tip #7 Be wary of others
 Is this really your
 friend?
 • Just because it’s your
   friend’s account does
   not mean that it’s your
   friend!




                             14
Tip #8 Search for your name
 • Do a vanity search
 • Set up a Google Alert




                              15
Tip #9 Guard Your Personal
Information!
 • Watch out for
   Facebook
   Applications!!
   – A 2008 study found
     that 90.7% of apps
     had access to
     private user data
     (only 9.3% actually
     used the data)


                             16
Tip #10: Don’t Assume Privacy
 • Do you care if Facebook captures where
   you’ve been?




                                            17
Use Privacy Settings
 • Default settings are set to sharing information

 • Adjust Facebook privacy settings to help
   protect your identity

 • Show "limited friends" a cut-down version of
   your profile

 • Disable options,
   then open them one by one


http://www.sophos.com/security/best-practice/facebook.html
The First Line of Defense
  Stay alert—you will be the first to know if
    something goes wrong
    – Are you receiving odd communications from
      someone?
    – Is your computer sounding strange or slower
      than normal?
Practice Digital Self Defense




 • Infosec Communicator blog
 • @benwoelk
 • @RIT_Infosec                 20

More Related Content

What's hot

Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
Ty122987
 

What's hot (17)

Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Security tips
Security tips Security tips
Security tips
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
Internet Safety for Kids and Parents
Internet Safety for Kids and Parents Internet Safety for Kids and Parents
Internet Safety for Kids and Parents
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
BugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed AdamBugBounty Roadmap with Mohammed Adam
BugBounty Roadmap with Mohammed Adam
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Internet security
Internet securityInternet security
Internet security
 
[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students[PPT] Webinar on Cyber Safety Training for Young Students
[PPT] Webinar on Cyber Safety Training for Young Students
 
1
11
1
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 

Similar to Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011

Similar to Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011 (20)

Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips to Shockproof Your Use of Social Media 2012
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
Social Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewSocial Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's View
 
Smart social networking
Smart social networkingSmart social networking
Smart social networking
 
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
 
Unit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safetyUnit+two+ +cyber+ethics+and+online+safety
Unit+two+ +cyber+ethics+and+online+safety
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the web
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
12990739.ppt
12990739.ppt12990739.ppt
12990739.ppt
 
Riverview
RiverviewRiverview
Riverview
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Phish training final
Phish training finalPhish training final
Phish training final
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
ch07-Security.pptx
ch07-Security.pptxch07-Security.pptx
ch07-Security.pptx
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 

More from Ben Woelk, CISSP, CPTC

More from Ben Woelk, CISSP, CPTC (20)

Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual WorkforceCreating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce
 
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptxCreating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
 
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership OpportunitiesSaying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership Opportunities
 
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected StoriesPerspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
 
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security AwarenessWe're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
 
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for SuccessThe Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for Success
 
Building a Culture of Digital Self Defense
Building a Culture of Digital Self DefenseBuilding a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
 
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted LeadershipHarnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted Leadership
 
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
 
Digital self defense 101 me rit
Digital self defense 101 me ritDigital self defense 101 me rit
Digital self defense 101 me rit
 
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald CityFollow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
 
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and YourselfCollaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and Yourself
 
An Introvert's Journey to Leadership
An Introvert's Journey to LeadershipAn Introvert's Journey to Leadership
An Introvert's Journey to Leadership
 
Digital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminarDigital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminar
 
Digital Self Defense at RIT
Digital Self Defense at RITDigital Self Defense at RIT
Digital Self Defense at RIT
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 
Staying Safe Online for HR Professionals
Staying Safe Online for HR ProfessionalsStaying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
 
Succession Planning and Volunteering
Succession Planning and VolunteeringSuccession Planning and Volunteering
Succession Planning and Volunteering
 
Digital Self Defense
Digital Self DefenseDigital Self Defense
Digital Self Defense
 
Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011

  • 1. Ten Tips to Shockproof Your Use of Social Media Ben Woelk Policy and Awareness Analyst Rochester Institute of Technology ben.woelk@gmail.com @benwoelk
  • 2. Introduction • Everyone is a target • Organized crime funds the attacks 2
  • 3. Avert Labs Malware Research 3 Retrieved July 24, 2009 from: http://www.avertlabs.com/research/blog/index.php/2009/07/22/malware-is-their-businessand-business-is-good/
  • 4. Tip # 1 Strong Passwords/ Passphrases • Length more important than complexity It was a dark and stormy night becomes ItwasaDark215andStormyNight 4
  • 6. Tip # 2 Keep up to date! • Operating Systems • Applications 6
  • 7. Tip #3 Use Security Software Layers of Security • Anti-Virus Protection • Firewall • Anti-Spyware Protection Don’t overlook mobile devices! 7
  • 8. Tip #4 Recognize Phishing/Scams 8
  • 10. Tip #5 Use Social Networks Safely Don’t: • Post personal information • Post schedules or whereabouts • Post inappropriate photos http://www.sileo.com/facebook-status-update-leads-to-robbery/ 10
  • 11. Phishing on Social Network Sites 11 http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf
  • 12. Tip #6 Remember Who Else is There • Who else uses social networking? – Employers – Identity Thieves – Online Predators • Facebook Stalker (http://www.youtube.com/watch?v=wCh9bmg0zGg) 12
  • 13. What You Post Can Be Used To… • Make judgments about your character • Impersonate you to financial institutions • Monitor what you do and where you go 13
  • 14. Tip #7 Be wary of others Is this really your friend? • Just because it’s your friend’s account does not mean that it’s your friend! 14
  • 15. Tip #8 Search for your name • Do a vanity search • Set up a Google Alert 15
  • 16. Tip #9 Guard Your Personal Information! • Watch out for Facebook Applications!! – A 2008 study found that 90.7% of apps had access to private user data (only 9.3% actually used the data) 16
  • 17. Tip #10: Don’t Assume Privacy • Do you care if Facebook captures where you’ve been? 17
  • 18. Use Privacy Settings • Default settings are set to sharing information • Adjust Facebook privacy settings to help protect your identity • Show "limited friends" a cut-down version of your profile • Disable options, then open them one by one http://www.sophos.com/security/best-practice/facebook.html
  • 19. The First Line of Defense Stay alert—you will be the first to know if something goes wrong – Are you receiving odd communications from someone? – Is your computer sounding strange or slower than normal?
  • 20. Practice Digital Self Defense • Infosec Communicator blog • @benwoelk • @RIT_Infosec 20