SlideShare a Scribd company logo
5 tips to be safe
on Social Media
Presented By:
Nayan Banik
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
“The art and science of asking questions is the source of
all knowledge”
-Thomas Berger
“I can no other answer make, but, thanks, and thanks.”
-Wiliam Shakespeare

More Related Content

Similar to 5 tips to be safe on social media

Social media user guide
Social media user guideSocial media user guide
Social media user guide
Whitney Moore
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalism
Dan Kennedy
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Mike Carden
Mike CardenMike Carden
Mike Carden
The IceHouse
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
Phishing
PhishingPhishing
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
Yumonomics
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
M+r storytelling-webinar-final
M+r storytelling-webinar-finalM+r storytelling-webinar-final
M+r storytelling-webinar-final
aeske
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
Adam Compton
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion training
Irene Mackintosh
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
ConnectSafely
 
Riverview
RiverviewRiverview
Riverview
Kathy Schrock
 
Internet Security
Internet SecurityInternet Security
Internet Security
mjelson
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safety
reideva
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
Steve Poole
 
Consumer Behavior Secrets
Consumer Behavior SecretsConsumer Behavior Secrets
Consumer Behavior Secrets
SIXTY
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and ux
Eric Reiss
 

Similar to 5 tips to be safe on social media (20)

Social media user guide
Social media user guideSocial media user guide
Social media user guide
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalism
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Mike Carden
Mike CardenMike Carden
Mike Carden
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
M+r storytelling-webinar-final
M+r storytelling-webinar-finalM+r storytelling-webinar-final
M+r storytelling-webinar-final
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion training
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Riverview
RiverviewRiverview
Riverview
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safety
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Consumer Behavior Secrets
Consumer Behavior SecretsConsumer Behavior Secrets
Consumer Behavior Secrets
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and ux
 

More from nayanbanik

IoT for Digital Bangladesh
IoT for Digital BangladeshIoT for Digital Bangladesh
IoT for Digital Bangladesh
nayanbanik
 
Introduction to Data Structures
Introduction to Data StructuresIntroduction to Data Structures
Introduction to Data Structures
nayanbanik
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
nayanbanik
 
Introduction to Android
Introduction to AndroidIntroduction to Android
Introduction to Android
nayanbanik
 
Bachelor's thesis defence presentation
Bachelor's thesis defence presentationBachelor's thesis defence presentation
Bachelor's thesis defence presentation
nayanbanik
 
Career of mark zuckerberg
Career of mark zuckerbergCareer of mark zuckerberg
Career of mark zuckerberg
nayanbanik
 

More from nayanbanik (6)

IoT for Digital Bangladesh
IoT for Digital BangladeshIoT for Digital Bangladesh
IoT for Digital Bangladesh
 
Introduction to Data Structures
Introduction to Data StructuresIntroduction to Data Structures
Introduction to Data Structures
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Introduction to Android
Introduction to AndroidIntroduction to Android
Introduction to Android
 
Bachelor's thesis defence presentation
Bachelor's thesis defence presentationBachelor's thesis defence presentation
Bachelor's thesis defence presentation
 
Career of mark zuckerberg
Career of mark zuckerbergCareer of mark zuckerberg
Career of mark zuckerberg
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 

5 tips to be safe on social media

  • 1. 5 tips to be safe on Social Media Presented By: Nayan Banik
  • 2.
  • 3.
  • 4. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 5. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 6. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 7. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 8. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 9. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 10. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 11. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 12. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 13. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 14. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 15. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 16. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 17. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 18. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 19. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 20. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 21. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 22. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 23. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 24. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 25. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 26. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 27. “The art and science of asking questions is the source of all knowledge” -Thomas Berger
  • 28. “I can no other answer make, but, thanks, and thanks.” -Wiliam Shakespeare