SlideShare a Scribd company logo
1 of 1
Download to read offline
Simple Safeguards:                                                         Presented by Retired
                                                                                                FBI Special Agent
           Preventing Social Media Fraud                                                                Jeff Lanza

 Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we
        have of our connections on these sites to gain access to your accounts and commit fraud.

                    Current Threats                                        Specific Actions to Avoid
Fake Notification E-mails                                             1.    Don’t click on a message that seems
Look out for fake emails that look like they came from                      weird. If it seems unusual for a friend to
Facebook. These typically include links to phony pages that                 write on your Wall and post a link, that
attempt to steal your login information or prompt you to                    friend may have gotten phished.
download malware. Never click on links in suspicious                  2.    Don’t enter your password through a
emails. Log-in to a site directly.                                          link. Just because a page on the Internet
                                                                            looks like Facebook, it doesn't mean it is.
Suspicious Posts and Messages                                               It is best to go the Facebook log-in page
Wall posts or messages that appear to come from a friend                    through your browser.
asking you to click on a link to check out a new photo or             3.    Don't use the same password on
video that doesn't actually exist. The link is typically for a              Facebook that you use in other places
phony login page or a site that will put a virus on your                    on the web. If you do this, phishers or
computer to steal your passwords.                                           hackers who gain access to one of your
Money Transfer Scams                                                        accounts will easily be able to access
Messages that appear to come from friends or others                         your others as well, including your bank.
claiming to be stranded and asking for money. These                   4.    Don’t share your password with
messages are typically from scammers. Ask them a                            anyone. Social sites will never ask for
question that only they would be able to answer. Or                         your password through any form of
contact the person by phone to verify the situation,                        communication.
even if they say not to call them.                                    5.    Don't click on links or open
                                                                            attachments in suspicious emails. Fake
                                                                            emails can be very convincing, and
                General Online Safety Rules                                 hackers can spoof the "From:" address so
       Be wary of strangers - The internet makes it easy for               the email looks like it's from a social site.
        people to misrepresent their identities and motives. If             If the e-mail looks weird, don't trust it,
        you interact with strangers, be cautious about the
                                                                            and delete it from your inbox.
        amount of information you reveal or agreeing to meet
        them in person.                                               6.    Don’t send money anywhere unless
       Be skeptical - People may post false or misleading                  you have verified the story of someone
        information about various topics, including their own. Try          who says they are your friend or relative.
        to verify the authenticity of any information before taking   7.    Don’t provide your cell phone number
        any action.
                                                                            to verify the results of a Facebook
       Evaluate your settings - Use privacy settings. The
        default settings for some sites may allow anyone to see             game or survey without reading the
        your profile. Even private information could be exposed,            terms and conditions. It may result in
        so don't post anything that you wouldn't want the public            recurring charges on your cell phone bill.
        to see.
       Use strong passwords - Protect your account with                      More resource Information:
        passwords that cannot easily be guessed. If your
        password is compromised, someone else may be able to          www.us-cert.gov or www.fbi.gov
        access your account and pretend to be you.
                                                                                 Speaker Information:
       Security Information For Social Networking Sites                                Jeff Lanza
                  www.facebook.com/security                                       Phone: 816-853-3929
         www.twitip.com/twitter-security-dos-and-donts                     Email:jefflanza@thelanzagroup.com
                www.linkedin.com/secure/settings                           Web Site: www.thelanzagroup.com

More Related Content

What's hot

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
jcullishpum
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
Celia Bandelier
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
megg16
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
safetyseminar
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
TSageer
 

What's hot (17)

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Internet saftey
Internet safteyInternet saftey
Internet saftey
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Online Security
Online SecurityOnline Security
Online Security
 

Viewers also liked (7)

Accountable care organizations lawrence 101211
Accountable care organizations lawrence 101211Accountable care organizations lawrence 101211
Accountable care organizations lawrence 101211
 
Cms aco information
Cms aco informationCms aco information
Cms aco information
 
ICD-10 action plan-revised
ICD-10 action plan-revisedICD-10 action plan-revised
ICD-10 action plan-revised
 
Creating a Front Desk Professional Action Plan - Round Table Summary
Creating a Front Desk Professional Action Plan - Round Table SummaryCreating a Front Desk Professional Action Plan - Round Table Summary
Creating a Front Desk Professional Action Plan - Round Table Summary
 
Front office manager performance appraisal
Front office manager performance appraisalFront office manager performance appraisal
Front office manager performance appraisal
 
Ritz carlton hotel
Ritz carlton hotelRitz carlton hotel
Ritz carlton hotel
 
Hotel management report
Hotel management reportHotel management report
Hotel management report
 

Similar to Social networking fraud handout june 2011

phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
amby3
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
ErrorError22
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 

Similar to Social networking fraud handout june 2011 (20)

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Online privacy
Online privacy Online privacy
Online privacy
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Heads up!
Heads up!Heads up!
Heads up!
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Phishing
PhishingPhishing
Phishing
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 

More from Lawrence Medical Managers

Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011
Lawrence Medical Managers
 

More from Lawrence Medical Managers (13)

Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Medical identity theft handout june 2011
Medical identity theft handout june 2011Medical identity theft handout june 2011
Medical identity theft handout june 2011
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011
 
Id theft handout individual june 2011
Id theft handout individual june 2011Id theft handout individual june 2011
Id theft handout individual june 2011
 
Lawrence mm june 2011
Lawrence mm june 2011Lawrence mm june 2011
Lawrence mm june 2011
 
Presentation by Sheila Richmeier
Presentation by Sheila RichmeierPresentation by Sheila Richmeier
Presentation by Sheila Richmeier
 
ICD- 10 is coming -Brenda Edwards
ICD- 10 is coming -Brenda EdwardsICD- 10 is coming -Brenda Edwards
ICD- 10 is coming -Brenda Edwards
 
Software vendor 5010 checklist
Software vendor 5010 checklistSoftware vendor 5010 checklist
Software vendor 5010 checklist
 
Clearinghouse payer 5010 checklist
Clearinghouse payer 5010 checklistClearinghouse payer 5010 checklist
Clearinghouse payer 5010 checklist
 
ICD-10, Brenda Edwards 07.14.2010
ICD-10, Brenda Edwards 07.14.2010ICD-10, Brenda Edwards 07.14.2010
ICD-10, Brenda Edwards 07.14.2010
 
Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities  Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities
 
Secretary Rod Bremby Presentation
Secretary Rod  Bremby  PresentationSecretary Rod  Bremby  Presentation
Secretary Rod Bremby Presentation
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Social networking fraud handout june 2011

  • 1. Simple Safeguards: Presented by Retired FBI Special Agent Preventing Social Media Fraud Jeff Lanza Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we have of our connections on these sites to gain access to your accounts and commit fraud. Current Threats Specific Actions to Avoid Fake Notification E-mails 1. Don’t click on a message that seems Look out for fake emails that look like they came from weird. If it seems unusual for a friend to Facebook. These typically include links to phony pages that write on your Wall and post a link, that attempt to steal your login information or prompt you to friend may have gotten phished. download malware. Never click on links in suspicious 2. Don’t enter your password through a emails. Log-in to a site directly. link. Just because a page on the Internet looks like Facebook, it doesn't mean it is. Suspicious Posts and Messages It is best to go the Facebook log-in page Wall posts or messages that appear to come from a friend through your browser. asking you to click on a link to check out a new photo or 3. Don't use the same password on video that doesn't actually exist. The link is typically for a Facebook that you use in other places phony login page or a site that will put a virus on your on the web. If you do this, phishers or computer to steal your passwords. hackers who gain access to one of your Money Transfer Scams accounts will easily be able to access Messages that appear to come from friends or others your others as well, including your bank. claiming to be stranded and asking for money. These 4. Don’t share your password with messages are typically from scammers. Ask them a anyone. Social sites will never ask for question that only they would be able to answer. Or your password through any form of contact the person by phone to verify the situation, communication. even if they say not to call them. 5. Don't click on links or open attachments in suspicious emails. Fake emails can be very convincing, and General Online Safety Rules hackers can spoof the "From:" address so  Be wary of strangers - The internet makes it easy for the email looks like it's from a social site. people to misrepresent their identities and motives. If If the e-mail looks weird, don't trust it, you interact with strangers, be cautious about the and delete it from your inbox. amount of information you reveal or agreeing to meet them in person. 6. Don’t send money anywhere unless  Be skeptical - People may post false or misleading you have verified the story of someone information about various topics, including their own. Try who says they are your friend or relative. to verify the authenticity of any information before taking 7. Don’t provide your cell phone number any action. to verify the results of a Facebook  Evaluate your settings - Use privacy settings. The default settings for some sites may allow anyone to see game or survey without reading the your profile. Even private information could be exposed, terms and conditions. It may result in so don't post anything that you wouldn't want the public recurring charges on your cell phone bill. to see.  Use strong passwords - Protect your account with More resource Information: passwords that cannot easily be guessed. If your password is compromised, someone else may be able to www.us-cert.gov or www.fbi.gov access your account and pretend to be you. Speaker Information: Security Information For Social Networking Sites Jeff Lanza www.facebook.com/security Phone: 816-853-3929 www.twitip.com/twitter-security-dos-and-donts Email:jefflanza@thelanzagroup.com www.linkedin.com/secure/settings Web Site: www.thelanzagroup.com