SlideShare a Scribd company logo
1 of 17
Social Media Security 
District IV TRTA 
Hindie Becker Dershowitz 
October 17, 2014
Protect Yourself 
1. Secure your WiFi 
2. Think before you share 
3. Stop, Look and Review before clicking 
4. Secure Passwords 
5. Two Step Verifications 
6. Lock your device 
7. Log off computer 
8. Use your own device/computer for personal data 
9. Be an online Detective 
10.Run Antivirus software on devices and computers
Password Programs 
1Password: Mac, Windows, IDevice, Androids 
Dashlane: Mac, Windows, IDevice, Androids
Protect your Privacy 
● Don’t include ALL your information 
● Set strict Privacy Settings 
● Don’t tag post with specific location 
● Be Aware of who you friend or follow 
● Log out on public devices 
● Internet security software
Cyber Safety 
http://goo.gl/I2CIZ3
Free WiFi
Credit Card/Debit Card Fraud 
● Check your online credit card statements 
and bank statements 
● Request credit profile 
o Equifax 
o Experian 
o TransUnion 
o Innovis 
● Add Fraud alerts to your credit
SCAM 
● S: Be stingy with your personal information 
● C: Check your financial information regularly 
● A: Ask for copy of your credit report annually 
● M: Maintain careful records of all of your 
accounts 
Forbes: http://www.forbes.com/sites/abegarver/2012/09/11/the-top-five-dangers-of-online- 
shopping-precautions-to-take/
Online Shopping 
● Use encrypted websites: https 
● Only shop when on secure networks 
● Only shop at known stores/websites 
o Be a detective if you are not sure 
● Read online reviews very carefully
More Social Media 
● Follow your Passion 
o FlipBoard 
o Twitter 
o StumbleUpon 
● Coupons 
o Grocery Stores 
o Groupon, 
o RetailMeNot 
o SnipSnap 
o Snap by Groupon 
o QR codes
How much do you really know about Social Media: 
Buzz Feed 
http://goo.gl/zoY7cc
TRTA 2014 Social Media Handout 
http://goo.gl/t0AYFP
Facebook Privacy Setting 
Settings 
Privacy 
Who Can See My Stuff? 
Who Can Contact Me? 
Who Can Look Me Up?
Facebook Follower Settings 
Who can see most of your posts 
Each time you post you can change
Caller ID 
● Type phone number into internet 
o 800notes.com
Pinterest 
http://www.pinterest.com/hindie/retired-educators/

More Related Content

Viewers also liked (6)

How to teach speaking
How to teach speakingHow to teach speaking
How to teach speaking
 
Text to speech and word predicition tagged
Text to speech and word predicition taggedText to speech and word predicition tagged
Text to speech and word predicition tagged
 
Byot in a differentiated classroom
Byot in a differentiated classroomByot in a differentiated classroom
Byot in a differentiated classroom
 
Technology tools that students can use to help with their executive functioni...
Technology tools that students can use to help with their executive functioni...Technology tools that students can use to help with their executive functioni...
Technology tools that students can use to help with their executive functioni...
 
Text to speech and word predicition
Text to speech and word predicitionText to speech and word predicition
Text to speech and word predicition
 
Byot in a differentiated classroom
Byot in a differentiated classroomByot in a differentiated classroom
Byot in a differentiated classroom
 

Similar to Social media security

Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
Alexine Marier
 

Similar to Social media security (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Tips to secure yourself from identity thefts
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity thefts
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Securing Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safetySecuring Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safety
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Security for Small Business
Security for Small BusinessSecurity for Small Business
Security for Small Business
 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | Cybersecurity
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Social media security

  • 1. Social Media Security District IV TRTA Hindie Becker Dershowitz October 17, 2014
  • 2. Protect Yourself 1. Secure your WiFi 2. Think before you share 3. Stop, Look and Review before clicking 4. Secure Passwords 5. Two Step Verifications 6. Lock your device 7. Log off computer 8. Use your own device/computer for personal data 9. Be an online Detective 10.Run Antivirus software on devices and computers
  • 3. Password Programs 1Password: Mac, Windows, IDevice, Androids Dashlane: Mac, Windows, IDevice, Androids
  • 4. Protect your Privacy ● Don’t include ALL your information ● Set strict Privacy Settings ● Don’t tag post with specific location ● Be Aware of who you friend or follow ● Log out on public devices ● Internet security software
  • 7. Credit Card/Debit Card Fraud ● Check your online credit card statements and bank statements ● Request credit profile o Equifax o Experian o TransUnion o Innovis ● Add Fraud alerts to your credit
  • 8. SCAM ● S: Be stingy with your personal information ● C: Check your financial information regularly ● A: Ask for copy of your credit report annually ● M: Maintain careful records of all of your accounts Forbes: http://www.forbes.com/sites/abegarver/2012/09/11/the-top-five-dangers-of-online- shopping-precautions-to-take/
  • 9. Online Shopping ● Use encrypted websites: https ● Only shop when on secure networks ● Only shop at known stores/websites o Be a detective if you are not sure ● Read online reviews very carefully
  • 10.
  • 11. More Social Media ● Follow your Passion o FlipBoard o Twitter o StumbleUpon ● Coupons o Grocery Stores o Groupon, o RetailMeNot o SnipSnap o Snap by Groupon o QR codes
  • 12. How much do you really know about Social Media: Buzz Feed http://goo.gl/zoY7cc
  • 13. TRTA 2014 Social Media Handout http://goo.gl/t0AYFP
  • 14. Facebook Privacy Setting Settings Privacy Who Can See My Stuff? Who Can Contact Me? Who Can Look Me Up?
  • 15. Facebook Follower Settings Who can see most of your posts Each time you post you can change
  • 16. Caller ID ● Type phone number into internet o 800notes.com

Editor's Notes

  1. cautious of suspicious email. send it to spam if it sounds too good to be true, it is Location services on pictures? secure password program: Dashlane two step verification
  2. Click on picture and it will give you a brief synopsis
  3. make sure your only go to https websites
  4. request free credit check once a year
  5. look for fake reviews, be skeptical that lack detail and are too positive, look for similar reviews. see where their review link takes you
  6. TRTA is on Facebook Be Aware of your settings, be wary when info on sites try sending you to other sites.