Your SlideShare is downloading. ×
0
Ten Ways to Shockproof Your Use of Social Media<br />Ben Woelk<br />Policy and Awareness Analyst<br />Rochester Institute ...
Introduction<br />Everyone is a target<br />Identity theft is big business<br />You can’t rely on others to protect you<br...
Avert Labs Malware Research<br />3<br />Retrieved July 24, 2009 from:http://www.avertlabs.com/research/blog/index.php/2009...
Phishing on Social Network Sites<br />http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf<br />4<br />
Tip # 1 Passwords/Passphrases<br />Length more important than complexity<br />It was a dark and stormy night<br />			becom...
Password Safes<br />6<br />
7<br />Tip # 2 Keep up to date!<br />Operating System<br />Applications<br />
Tip #3 Security Software<br />Layers of Security<br />Anti-Virus Protection<br />Firewall<br />Anti-Spyware Protection<br ...
9<br />Tip #4 Recognize Phishing/Scams<br />
Phishing Tips<br />10<br />
11<br />Tip #5 Use Social Networks Safely<br />Don’t:<br />Post personal information<br />Post schedules or whereabouts<br...
Tip #6 Remember Who Else is There<br />Who else uses social networking?<br />Employers<br />Identity Thieves<br />Online P...
What You Post Can Be Used To…<br />Make judgments about your character<br />Impersonate you to financial institutions<br /...
Tip #7 Be wary of others<br />Choose your friends carefully<br />"41% of Facebook users agreed to be friends with this pla...
Is this really your friend?<br />Just because it’s your friend’s account does not mean that it’s your friend!<br />15<br />
Tip #8 Search for your name<br />Do a vanity search<br />Set up a Google Alert<br />16<br />
Tip #9 Guard Your Personal Information!<br />Watch out for Facebook Applications!!<br />A 2008 study found that 90.7% of a...
Tip #10 Use Privacy Settings<br />Default settings are set to _________?<br />Adjust ______________to help protect your id...
The First Line of Defense<br />Stay alert—you will be the first to know if something goes wrong<br />
Practice Digital Self Defense<br />@bwoelk<br />@RIT_Infosec<br />20<br />
Upcoming SlideShare
Loading in...5
×

Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)

590

Published on

This is a five minute version of my 25 minute presentation. The video is available on YouTube at http://youtu.be/bBX8t_ZAEn4

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
590
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Per the MarkMonitor Brandjacking Index for Spring 2009:Phish attacks targeting social networks have grown 241 percent from Q1 2008 to Q1 2009 and have grown 1,500-fold since we first started tracking the category in 2007.
  • Weak passwords can be guessedAutomated programsPersonal detailsUse different passwordsHow many accounts can be accessed with just one of your passwords?Password vaultsPassphrases
  • Transcript of "Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)"

    1. 1. Ten Ways to Shockproof Your Use of Social Media<br />Ben Woelk<br />Policy and Awareness Analyst<br />Rochester Institute of Technology<br />585.475.4122<br />fbwis@rit.edu<br />
    2. 2. Introduction<br />Everyone is a target<br />Identity theft is big business<br />You can’t rely on others to protect you<br />2<br />
    3. 3. Avert Labs Malware Research<br />3<br />Retrieved July 24, 2009 from:http://www.avertlabs.com/research/blog/index.php/2009/07/22/malware-is-their-businessand-business-is-good/<br />
    4. 4. Phishing on Social Network Sites<br />http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf<br />4<br />
    5. 5. Tip # 1 Passwords/Passphrases<br />Length more important than complexity<br />It was a dark and stormy night<br /> becomes<br />ItwasaDark215andStormyNight<br />5<br />
    6. 6. Password Safes<br />6<br />
    7. 7. 7<br />Tip # 2 Keep up to date!<br />Operating System<br />Applications<br />
    8. 8. Tip #3 Security Software<br />Layers of Security<br />Anti-Virus Protection<br />Firewall<br />Anti-Spyware Protection<br />8<br />
    9. 9. 9<br />Tip #4 Recognize Phishing/Scams<br />
    10. 10. Phishing Tips<br />10<br />
    11. 11. 11<br />Tip #5 Use Social Networks Safely<br />Don’t:<br />Post personal information<br />Post schedules or whereabouts<br />Post inappropriate photos<br />http://www.sileo.com/facebook-status-update-leads-to-robbery/<br />
    12. 12. Tip #6 Remember Who Else is There<br />Who else uses social networking?<br />Employers<br />Identity Thieves<br />Online Predators<br />Facebook Stalker<br />(http://www.youtube.com/watch?v=wCh9bmg0zGg)<br />12<br />
    13. 13. What You Post Can Be Used To…<br />Make judgments about your character<br />Impersonate you to financial institutions<br />Monitor what you do and where you go<br />13<br />
    14. 14. Tip #7 Be wary of others<br />Choose your friends carefully<br />"41% of Facebook users agreed to be friends with this plastic frog, opening themselves up to the risk of identity theft."<br />The frog’s name was FreddiStaur<br />http://podcasts.sophos.com/en/sophos-podcasts-019.mp3<br />14<br />
    15. 15. Is this really your friend?<br />Just because it’s your friend’s account does not mean that it’s your friend!<br />15<br />
    16. 16. Tip #8 Search for your name<br />Do a vanity search<br />Set up a Google Alert<br />16<br />
    17. 17. Tip #9 Guard Your Personal Information!<br />Watch out for Facebook Applications!!<br />A 2008 study found that 90.7% of apps had access to private user data (only 9.3% actually used the data)<br />17<br />
    18. 18. Tip #10 Use Privacy Settings<br />Default settings are set to _________?<br />Adjust ______________to help protect your identity<br />Show "limited friends" a _____________of your profile<br />Disable _________, then open them one by one<br />http://www.sophos.com/security/best-practice/facebook.html<br />
    19. 19. The First Line of Defense<br />Stay alert—you will be the first to know if something goes wrong<br />
    20. 20. Practice Digital Self Defense<br />@bwoelk<br />@RIT_Infosec<br />20<br />
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×