SlideShare a Scribd company logo
Defense Media Activity
Guide To Keeping
Your Social Media
Accounts Secure
Table of ConTenTS
PRoTeCTIVe MeaSUReS 3
PRePaRaTIon CHeCKlIST 3
TWITTeR 4
faCebooK 5
GooGle + anD YoUTUbe 6
PROHIBITIVE MEASURES 6
InSTaGRaM 7
flICKR 7
Guide To Keeping Your Social Media Accounts Secure • 2015
3
Defense Media Activity
Social media is an integral part of the strategic communications and public affairs missions of the
Department of Defense. Like any asset, it is something to defend and protect with vigilance. Cyber
attacks are a real and present threat to the cyber security of government social media accounts. In this
guide you will find the steps and contacts needed in order to be protective, preventative, prohibitive and
proactive against cyber-attacks.
If you suspect that your organization is being targeted or compromised by a malicious cyber-attack, you
must be proactive and swift to mitigate this threat. The steps you take can help to greatly reduce the risk
of exposure and vulnerability of attack to your organization.
PRoTeCTIVe MeaSUReS
Use a strong password. At least 20 characters long, that is either randomly-generated (like
LauH6maicaza1Neez3zi) or a random string of words (like “hewn cloths titles yachts refine”). Use a unique
password for each website or service you use; that way, if one account gets compromised, the rest are
safe.
Use a government e-mail address, also with a strong password. A .gov or other private-domain account
will generally be more secure than a public service, and will reduce the possibility of password-reset and
other emails being intercepted. If you must use a public email provider, consider added precautions such
as Gmail’s two-factor authentication.
Don’t give your username and password out to untrusted third parties, especially
those promising to get you followers or make you money.
Select third-party applications with care. There are thousands of applications built by external
developers that allow you to do an array of neat things with your account. However, you should be
cautious before giving up control of your account to someone else. Revoke access for any third-party
application that you don’t recognize by visiting the Applications tab in your account settings.
Make sure your computer and operating system is up-to-date with the most recent patches, upgrades,
and anti-virus software, and that all your computers and mobile devices are protected by secure
passwords.
PRePaRaTIon CHeCKlIST
Change your Twitter account passwords. Never send passwords via email, even internally.
Keep your email accounts secure. Twitter, Facebook, Google+, etc use email for password resets and
official communication. Change your email passwords, and use a password different from your social
media account passwords.
Review your authorized applications. Log in to Twitter or Facebook and review the applications
authorized to access your accounts. If you don’t recognize any of the applications on Twitter, contact
Guide To Keeping Your Social Media Accounts Secure • 2015
4
Defense Media Activity
them immediately by filing a security ticket and emailing hacked@twitter.com.
Use extra security features. This will help keep your accounts protected. Facebook has a whole section
on how to do that located here.
Build a plan. Create a formal incident response plan. If your organization is a target for a phishing
campaign or has been hacked, you’ll be prepared to take action and resolve the issue immediately.
Talk with your security team about ensuring that your email system is as safe as possible.
Minimize the number of people who have access to the account. Even if you use a third-party platform
to avoid sharing the actual account passwords, each of these people is a possible avenue for phishing or
other compromise.
Log out of Facebook and Twitter when you use a computer
you share with other people. If you forget, you can log out remotely.
Check for signs of compromise. Checking your email address and authorized apps weekly or monthly
can help detect unauthorized access and address the problem before access is abused.
Change your password regularly. Changing your social media passwords quarterly or yearly can reset
the clock if a password has leaked.
Using a Password Manager integrated into your browser can help prevent successful phishing attacks.
Third-party solutions such as 1PaSSWoRD or laSTPaSS make it much easier to use a very strong
password. Password managers, as well as the browser’s built-in password manager, will only auto-fill
passwords on the correct website. If the password manager does not auto-fill, this might indicate a
phishing attempt.
IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED,
THe folloWInG aCTIonS aRe aDVISeD:
1. Notify your chain of command immediately
2. If possible, suspend all accounts to prohibit further illicit activity
3. Take the following action on the following platforms to stop the hack from proceeding
TWITTeR
If you suspect your organization is being targeted by a phishing campaign or has been compromised by a
phishing attack, contact us immediately at hacked@twitter.com with the word “Hacking” in the subject.
Include copies of suspected phishing emails.
Guide To Keeping Your Social Media Accounts Secure • 2015
5
Defense Media Activity
1. Immediately change your Twitter password and the password on the email associated with the
account, following the tips at right.
2. Delete any unwanted Tweets that may have been sent without your permission.
3. Go to the Applications tab of your account settings and revoke access to any apps you don’t
recognize. To be absolutely sure, revoke them all and reauthorize known apps and devices by logging
in from them one-by-one.
4. You should also check the Mobile tab of your account settings. If the phone number associated with
the account is not yours, click the “Delete my phone” link at the bottom of the page.
5. Remind anyone with authorized access to your account to follow the precautions outlined on this
page.
6. If you can’t access your account, file a support ticket at https://support.twitter.com/forms/hacked
and email the ticket number to hacked@twitter.com.
faCebooK
If you suspect your organization is being targeted by a phishing campaign or has been compromised
by a phishing attack, contact them immediately at Katie.Harbath@fb.com (government Facebook
representative) to explain the situation.
If you think your account was taken over by someone else, Facebook can help you secure it. This process
can also help if your account or computer has been affected by a virus or malware.
For more information about staying safe on Facebook, please visit the Security Page or our Help Centre.
Here are a few things you can do to keep your account safe:
• Pick a unique, strong password. Use combinations of at least 6 letters, numbers and punctuation
marks and don’t use this password for any of your other accounts. You can also use a password safe
like laSTPaSS, KeePaSS or 1PaSSWoRD to set and remember unique passwords for your account.
Learn how to change your password.
• Think before you click. Never click suspicious links, even if they come from a friend or a company you
know. This includes links sent on Facebook (ex: in a chat or story) or in emails. If one of your friends
clicks a spam link, they could accidentally send you or tag you in spammy posts. If you see something
suspicious on Facebook, report it. You also shouldn’t download things (ex: a .exe file) if you aren’t
sure what they are. Learn more aboutrecognizing suspicious emails.
• Watch out for fake Pages and apps/games. Be suspicious of Pages promoting offers that are too good
to be true. If in doubt, check to see if a Page is verified. Also be mindful when you install new apps or
games. Sometimes scammers use bad apps and games to gain access to your Facebook account.
• Don’t accept friend requests from people you don’t know. Sometimes scammers will create fake
accounts to friend people. Becoming friends with scammers allows them access to spam your
Timeline, tag you in posts and send you malicious messages. Your real friends may also end up being
targeted.
Guide To Keeping Your Social Media Accounts Secure • 2015
6
Defense Media Activity
• Never give out your login info (ex: email address and password). Sometimes people or pages
will promise you something (ex: free poker chips) if you share your login info with them. These
types of deals are carried out by cybercriminals and violate the Facebook Statement of Rights and
Responsibilities. If you’re ever asked to re-enter your password on Facebook (ex: you’re making
changes to your account settings) check to make sure the address of the page still has facebook.com/
in the URL (web address).
• Log in at www.facebook.com. Sometimes scammers will set up a fake page to look like a Facebook
login page, hoping to get you to enter your email address and password. Make sure you check the
page’s URL before you enter your login info. When in doubt, you can always type facebook.com into
your browser to get back to the real Facebook. Learn more about phishing.
• Update your browser. The newest versions of internet browsers have built-in security protections.
For example, they might be able to warn you if you’re about to go to a suspected phishing site.
Facebook supports:
» Mozilla Firefox
» Safari
» Google Chrome
» Internet Explorer
• Run anti-virus software. To protect yourself from viruses and malware, scan your computer. You can
learn more and download this software for free:
» For Windows
» for Mac oS
GooGle + anD YoUTUbe
If your Google + and/or YouTube account has been hacked, you will need to take immediate action.
Change the password for this platform immediately (through Google +).
Contact the government account reps at Google to inform them of the hack: cfincham@google.com or
yt-hijack@google.com
PRoHIbITIVe MeaSUReS
Recommend added precautions such as Gmail’s two-factor authentication.
Any of these common actions could put you at risk of having your password stolen:
• Using the same password on more than one site
• Downloading software from the Internet
• Clicking on links in email messages
2-Step Verification can help keep bad guys out, even if they have your password.
An extra layer of security. Most people only have one layer – their password – to protect their account.
With 2-Step Verification, if a bad guy hacks through your password layer, he’ll still need your phone or
Security Key to get into your account.
Guide To Keeping Your Social Media Accounts Secure • 2015
7
Defense Media Activity
Sign in will require something you know and something you have. With 2-Step Verification, you’ll
protect your account with something you know (your password) and something you have (your phone or
Security Key).
Verification codes made just for you. Codes are uniquely crafted for your account when you need them.
If you choose to use verification codes, they will be sent to your phone via text, voice call, or our mobile
app. Each code can only be used once. See Features to learn about backup options for times when your
phone is not available.
For more information, and to get access to the steps you might need to take if your account is
compromised, here is the Google Safety Center link.
InSTaGRaM
If you think your account has been hacked and you’re no longer able to log in, let Instagram know.
If your account is leaving comments or sharing things that you haven’t posted, your password may be
compromised.
To secure your account:
• Change your password or send yourself a password reset email
• Revoke access to any suspicious third-party apps
Note: Never grant third-party access to a website or apps that aren’t following our Community
Guidelines or Terms of Use (including websites selling or promising free followers or likes), as it’s likely an
attempt to use your account in an inappropriate way.
flICKR
Flickr is a photo and video-sharing community run by Yahoo. Millions of members from all over the world
are uploading photos and video that they have created, each sharing their unique view of the world.
When using Flickr you can post, sort, and share photos and videos you have created with friends, family,
and folks from across the globe.
How to customize your privacy controls: Flickr empowers the community to control access to content
by providing multiple options for adjusting privacy settings on photos, your Flickr profile, and even on
commenting and contact preferences. To review these settings, visit your Flickr account page. Some
important sections:
4. Profile settings. You can control your profile privacy settings to dictate who is able to see different
parts of your profile.
Guide To Keeping Your Social Media Accounts Secure • 2015
8
Defense Media Activity
Change a password. For a Yahoo account, you can change your password at https://edit.yahoo.com/
config/change_pw. If you can no longer access your account, you can get a new password at https://edit.
yahoo.com/forgotroot/.
Commenting controls. You control who can comment on your public photos and videos. By default,
anyone is able to comment on your photos. You can change this in the privacy setting for comments. If
someone posts a comment you don’t like, you can just delete it.
Post with care: The Flickr community is ever growing. As you upload content, be sure to know which
privacy settings you have selected and how visible the content will be to the general public. You can also
choose to opt out of your content being searchable on third-party sites.
Block unwanted individuals: Sometimes we just don’t want to interact with someone. By blocking a
community member, that person can no longer interact with you or your photos. There are three ways
to block a person:
1. Click the “Block [membername]” link on the Person menu.
2. Click the “Block this person?” link on the person’s profile page.
3. Delete a comment on one of your photos. (You’ll see the option to block the person, too.)
To see the people you’ve blocked, click the link at the bottom of your contact list.
SafeSearch: You can control what kind of content shows up on your Flickr searches. By default,
SafeSearch is enabled on your account, which leaves restricted and moderate content out of the results.
When you are signed in, this feature can help ensure that your audience is not exposed to “adult
content”. Learn more about SafeSearch.
Report abuse: The Flickr staff works with the community to ensure an enjoyable experience for all. If you
see something you feel violates the Terms of Service or the Community Guidelines, report it by doing the
following:
Flagging a photo
1. Go to the photo’s page.
2. At the bottom-right corner of the page, click Flag this photo.
3. Check the “I don’t think this photo is flagged at the appropriate level” checkbox.
4. Click Submit.
The Flickr staff will review the photo in question.
If you come across content that you think might be illegal or prohibited, use the Report Abuse system
instead.
Guide To Keeping Your Social Media Accounts Secure • 2015
9
Defense Media Activity
Reporting abuse
1. At the bottom of any Flickr page under “Community,” click Report abuse.
2. Select the issue from the pull-down menu.
For more information about Yahoo Flickr, visit Yahoo Help.

More Related Content

What's hot

Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
KANKIPATI KISHORE
 
Online Security
Online SecurityOnline Security
Online Security
Amanda L. Goodman
 
Danger of facebook
Danger of facebookDanger of facebook
Danger of facebook
amir khaled
 
Dangers of Facebook
Dangers of FacebookDangers of Facebook
Dangers of Facebook
amir khaled
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
Momina Mateen
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
Sorav Jain
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
guadalinfoyunquera
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebook
Shweta Agarwal
 
Internet issues
Internet issuesInternet issues
Internet issuesCJ900
 
How to use a Tool to Hack Facebook?
How to use a Tool to Hack Facebook?How to use a Tool to Hack Facebook?
How to use a Tool to Hack Facebook?
Thought096
 
Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...
Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...
Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...
Clio - Cloud-Based Legal Technology
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
Ankush Sarkar
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
Naval OPSEC
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
Naval OPSEC
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
Naval OPSEC
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
Quick Heal Technologies Ltd.
 
Facebook
FacebookFacebook
Facebook
STOBARTEVANS
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
Jason S
 

What's hot (19)

Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
 
Online Security
Online SecurityOnline Security
Online Security
 
Danger of facebook
Danger of facebookDanger of facebook
Danger of facebook
 
Dangers of Facebook
Dangers of FacebookDangers of Facebook
Dangers of Facebook
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]7 Cyber Crimes on Social Media Against Women [India]
7 Cyber Crimes on Social Media Against Women [India]
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
Presentation on the optimal usage of facebook
Presentation on the optimal usage of facebookPresentation on the optimal usage of facebook
Presentation on the optimal usage of facebook
 
Test
TestTest
Test
 
Internet issues
Internet issuesInternet issues
Internet issues
 
How to use a Tool to Hack Facebook?
How to use a Tool to Hack Facebook?How to use a Tool to Hack Facebook?
How to use a Tool to Hack Facebook?
 
Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...
Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...
Nerino Petro - Protecting your Digital ASSets: What we can learn from recent ...
 
How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?How to check a suspicious link without clicking on it?
How to check a suspicious link without clicking on it?
 
Twitter 11 mar15
Twitter 11 mar15Twitter 11 mar15
Twitter 11 mar15
 
Child safety 16 jun14
Child safety 16 jun14Child safety 16 jun14
Child safety 16 jun14
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Facebook
FacebookFacebook
Facebook
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 

Viewers also liked

Earn store catalog (6 10-11)
Earn store catalog (6 10-11)Earn store catalog (6 10-11)
Earn store catalog (6 10-11)
Norfolk Naval Shipyard
 
Earn store catalog (6 10-11)
Earn store catalog (6 10-11)Earn store catalog (6 10-11)
Earn store catalog (6 10-11)
Norfolk Naval Shipyard
 
Presentation1
Presentation1Presentation1
Presentation1nikinik25
 
YARDLINES
YARDLINESYARDLINES
Yardlines no. 20
Yardlines no. 20Yardlines no. 20
Yardlines no. 20
Norfolk Naval Shipyard
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
Norfolk Naval Shipyard
 
I025 - Writing - Feature - Shipyard Spotlight: Robbins - Brayshaw
I025 - Writing - Feature - Shipyard Spotlight: Robbins - BrayshawI025 - Writing - Feature - Shipyard Spotlight: Robbins - Brayshaw
I025 - Writing - Feature - Shipyard Spotlight: Robbins - Brayshaw
Norfolk Naval Shipyard
 
Yardlines no. 21
Yardlines no. 21Yardlines no. 21
Yardlines no. 21
Norfolk Naval Shipyard
 
Hurricane information
Hurricane informationHurricane information
Hurricane information
Norfolk Naval Shipyard
 
Civilian Benefits Center - Federal Flexible Spending Account Open Season
Civilian Benefits Center - Federal Flexible Spending Account Open SeasonCivilian Benefits Center - Federal Flexible Spending Account Open Season
Civilian Benefits Center - Federal Flexible Spending Account Open Season
Norfolk Naval Shipyard
 
Yardlines--Black History Month
Yardlines--Black History MonthYardlines--Black History Month
Yardlines--Black History Month
Norfolk Naval Shipyard
 
NNSY 2015 Fitness and Sports Calendar MWR
NNSY 2015 Fitness and Sports Calendar MWRNNSY 2015 Fitness and Sports Calendar MWR
NNSY 2015 Fitness and Sports Calendar MWR
Norfolk Naval Shipyard
 
U002 funded news publication b brian mc neal with kristi britt and michael br...
U002 funded news publication b brian mc neal with kristi britt and michael br...U002 funded news publication b brian mc neal with kristi britt and michael br...
U002 funded news publication b brian mc neal with kristi britt and michael br...Norfolk Naval Shipyard
 
I025 - Writing - Feature - Shipyard Spotlight: Carey - Brayshaw
I025 - Writing - Feature - Shipyard Spotlight: Carey - BrayshawI025 - Writing - Feature - Shipyard Spotlight: Carey - Brayshaw
I025 - Writing - Feature - Shipyard Spotlight: Carey - Brayshaw
Norfolk Naval Shipyard
 
I025 - Writing - Feature - Striving For Minimum Impact - Britt
I025 - Writing - Feature - Striving For Minimum Impact - BrittI025 - Writing - Feature - Striving For Minimum Impact - Britt
I025 - Writing - Feature - Striving For Minimum Impact - Britt
Norfolk Naval Shipyard
 
APPLICATION PROCESS for USAJOBS
APPLICATION PROCESS for USAJOBSAPPLICATION PROCESS for USAJOBS
APPLICATION PROCESS for USAJOBS
Norfolk Naval Shipyard
 
Claims Package
Claims Package Claims Package
Claims Package
Norfolk Naval Shipyard
 

Viewers also liked (20)

Earn store catalog (6 10-11)
Earn store catalog (6 10-11)Earn store catalog (6 10-11)
Earn store catalog (6 10-11)
 
Earn store catalog (6 10-11)
Earn store catalog (6 10-11)Earn store catalog (6 10-11)
Earn store catalog (6 10-11)
 
Presentation1
Presentation1Presentation1
Presentation1
 
YARDLINES
YARDLINESYARDLINES
YARDLINES
 
Yardlines no. 20
Yardlines no. 20Yardlines no. 20
Yardlines no. 20
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
I025 - Writing - Feature - Shipyard Spotlight: Robbins - Brayshaw
I025 - Writing - Feature - Shipyard Spotlight: Robbins - BrayshawI025 - Writing - Feature - Shipyard Spotlight: Robbins - Brayshaw
I025 - Writing - Feature - Shipyard Spotlight: Robbins - Brayshaw
 
Yardlines no. 21
Yardlines no. 21Yardlines no. 21
Yardlines no. 21
 
Hurricane information
Hurricane informationHurricane information
Hurricane information
 
Civilian Benefits Center - Federal Flexible Spending Account Open Season
Civilian Benefits Center - Federal Flexible Spending Account Open SeasonCivilian Benefits Center - Federal Flexible Spending Account Open Season
Civilian Benefits Center - Federal Flexible Spending Account Open Season
 
Navy Ball Info
Navy Ball InfoNavy Ball Info
Navy Ball Info
 
Yardlines no. 24
Yardlines no. 24Yardlines no. 24
Yardlines no. 24
 
QOWL information
QOWL informationQOWL information
QOWL information
 
Yardlines--Black History Month
Yardlines--Black History MonthYardlines--Black History Month
Yardlines--Black History Month
 
NNSY 2015 Fitness and Sports Calendar MWR
NNSY 2015 Fitness and Sports Calendar MWRNNSY 2015 Fitness and Sports Calendar MWR
NNSY 2015 Fitness and Sports Calendar MWR
 
U002 funded news publication b brian mc neal with kristi britt and michael br...
U002 funded news publication b brian mc neal with kristi britt and michael br...U002 funded news publication b brian mc neal with kristi britt and michael br...
U002 funded news publication b brian mc neal with kristi britt and michael br...
 
I025 - Writing - Feature - Shipyard Spotlight: Carey - Brayshaw
I025 - Writing - Feature - Shipyard Spotlight: Carey - BrayshawI025 - Writing - Feature - Shipyard Spotlight: Carey - Brayshaw
I025 - Writing - Feature - Shipyard Spotlight: Carey - Brayshaw
 
I025 - Writing - Feature - Striving For Minimum Impact - Britt
I025 - Writing - Feature - Striving For Minimum Impact - BrittI025 - Writing - Feature - Striving For Minimum Impact - Britt
I025 - Writing - Feature - Striving For Minimum Impact - Britt
 
APPLICATION PROCESS for USAJOBS
APPLICATION PROCESS for USAJOBSAPPLICATION PROCESS for USAJOBS
APPLICATION PROCESS for USAJOBS
 
Claims Package
Claims Package Claims Package
Claims Package
 

Similar to DoD Social Media Guide

Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
Joint Base Myer-Henderson Hall
 
Social media security
Social media securitySocial media security
Social media security
Mosoco Ltd
 
security procedures
security procedures
security procedures
security procedures
puffyarson5604
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
offbeatnominee633
 
How to protect your facebook account from hackers
How to protect your facebook account from hackersHow to protect your facebook account from hackers
How to protect your facebook account from hackers
Dinesh Gunathilaka
 
INSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPSINSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPS
Rohan Nyayadhish
 
Social Media Security
Social Media Security Social Media Security
Social Media Security
kamranrazzaq8
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Facebook & Instagram Safety Guide
Facebook & Instagram Safety GuideFacebook & Instagram Safety Guide
Facebook & Instagram Safety Guide
Vittorio Pasteris
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
North Texas Chapter of the ISSA
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Hootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media securityHootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media security
FlutterbyBarb
 
Log off from the internet, step by step
Log off from the internet, step by stepLog off from the internet, step by step
Log off from the internet, step by step
niraj joshi
 
Using Social networks for Recruiting
Using Social networks for RecruitingUsing Social networks for Recruiting
Using Social networks for Recruiting
Jason Frostholm
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
Liberteks
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
sajeena81
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your program
Sarah K Miller
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
QuiMo3
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
Namik Heydarov
 

Similar to DoD Social Media Guide (20)

Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
Social media security
Social media securitySocial media security
Social media security
 
security procedures
security procedures
security procedures
security procedures
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
obtain additional security
obtain additional security 
obtain additional security
obtain additional security
 
How to protect your facebook account from hackers
How to protect your facebook account from hackersHow to protect your facebook account from hackers
How to protect your facebook account from hackers
 
INSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPSINSTAGRAM – HACKING AND PREVENTION TIPS
INSTAGRAM – HACKING AND PREVENTION TIPS
 
Social Media Security
Social Media Security Social Media Security
Social Media Security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Facebook & Instagram Safety Guide
Facebook & Instagram Safety GuideFacebook & Instagram Safety Guide
Facebook & Instagram Safety Guide
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Hootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media securityHootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media security
 
Log off from the internet, step by step
Log off from the internet, step by stepLog off from the internet, step by step
Log off from the internet, step by step
 
Using Social networks for Recruiting
Using Social networks for RecruitingUsing Social networks for Recruiting
Using Social networks for Recruiting
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Utilizing social media to build your program
Utilizing social media to build your programUtilizing social media to build your program
Utilizing social media to build your program
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 

More from Norfolk Naval Shipyard

Norfolk Naval Shipyard Apprenticeship Hiring Package for Apr. 8 - 22, 2019 Jo...
Norfolk Naval Shipyard Apprenticeship Hiring Package for Apr. 8 - 22, 2019 Jo...Norfolk Naval Shipyard Apprenticeship Hiring Package for Apr. 8 - 22, 2019 Jo...
Norfolk Naval Shipyard Apprenticeship Hiring Package for Apr. 8 - 22, 2019 Jo...
Norfolk Naval Shipyard
 
Apprentice Information Package - Announcement Period Feb. 1 - Apr. 5, 2019
Apprentice Information Package - Announcement Period Feb. 1 - Apr. 5, 2019Apprentice Information Package - Announcement Period Feb. 1 - Apr. 5, 2019
Apprentice Information Package - Announcement Period Feb. 1 - Apr. 5, 2019
Norfolk Naval Shipyard
 
OPSEC Bulletin - April 2016
OPSEC Bulletin - April 2016OPSEC Bulletin - April 2016
OPSEC Bulletin - April 2016
Norfolk Naval Shipyard
 
Winter Fire Safety - Safety Tips For Your Home
Winter Fire Safety - Safety Tips For Your HomeWinter Fire Safety - Safety Tips For Your Home
Winter Fire Safety - Safety Tips For Your Home
Norfolk Naval Shipyard
 
NNSY's Winter Weather Watch
NNSY's Winter Weather Watch NNSY's Winter Weather Watch
NNSY's Winter Weather Watch
Norfolk Naval Shipyard
 
NNSY - Winter Weather Watch
NNSY - Winter Weather WatchNNSY - Winter Weather Watch
NNSY - Winter Weather Watch
Norfolk Naval Shipyard
 
Give Falls The Slip - Safety First
Give Falls The Slip - Safety FirstGive Falls The Slip - Safety First
Give Falls The Slip - Safety First
Norfolk Naval Shipyard
 
DoN OPM Breach FAQs (UPDATED 6-17-15)
DoN OPM Breach FAQs (UPDATED 6-17-15)DoN OPM Breach FAQs (UPDATED 6-17-15)
DoN OPM Breach FAQs (UPDATED 6-17-15)
Norfolk Naval Shipyard
 
DONCEAP April Newsletter
DONCEAP April NewsletterDONCEAP April Newsletter
DONCEAP April Newsletter
Norfolk Naval Shipyard
 
DONCEAP - Live in the Moment
DONCEAP - Live in the MomentDONCEAP - Live in the Moment
DONCEAP - Live in the Moment
Norfolk Naval Shipyard
 
NNSY SAAPM Proclamation
NNSY SAAPM ProclamationNNSY SAAPM Proclamation
NNSY SAAPM Proclamation
Norfolk Naval Shipyard
 
Remembering USS Thresher - STTF April 2014
Remembering USS Thresher - STTF April 2014Remembering USS Thresher - STTF April 2014
Remembering USS Thresher - STTF April 2014
Norfolk Naval Shipyard
 
E009 - William Shayne Hensley - Nomination Letter
E009 - William Shayne Hensley - Nomination LetterE009 - William Shayne Hensley - Nomination Letter
E009 - William Shayne Hensley - Nomination Letter
Norfolk Naval Shipyard
 
I025 - Writing - Feature - Your Federal Employee Health Benefits Options - Mc...
I025 - Writing - Feature - Your Federal Employee Health Benefits Options - Mc...I025 - Writing - Feature - Your Federal Employee Health Benefits Options - Mc...
I025 - Writing - Feature - Your Federal Employee Health Benefits Options - Mc...
Norfolk Naval Shipyard
 
I007 - Graphics - Publication - NNSY: The Yardbirds - Watt
I007 - Graphics - Publication - NNSY: The Yardbirds - Watt I007 - Graphics - Publication - NNSY: The Yardbirds - Watt
I007 - Graphics - Publication - NNSY: The Yardbirds - Watt
Norfolk Naval Shipyard
 
I025 - Writing - Feature - Finding the Balance - Watt
I025 - Writing - Feature - Finding the Balance - WattI025 - Writing - Feature - Finding the Balance - Watt
I025 - Writing - Feature - Finding the Balance - Watt
Norfolk Naval Shipyard
 
I025 - Writing - Feature - All In Albany - Britt
I025 - Writing - Feature - All In Albany - BrittI025 - Writing - Feature - All In Albany - Britt
I025 - Writing - Feature - All In Albany - Britt
Norfolk Naval Shipyard
 
I025 - Writing - Feature - Welding the Welders - Brayshaw
I025 - Writing - Feature - Welding the Welders - BrayshawI025 - Writing - Feature - Welding the Welders - Brayshaw
I025 - Writing - Feature - Welding the Welders - Brayshaw
Norfolk Naval Shipyard
 
I024 - Writing - Commentary - Confessions of a TQM Refugee - Watt
I024 - Writing - Commentary - Confessions of a TQM Refugee - WattI024 - Writing - Commentary - Confessions of a TQM Refugee - Watt
I024 - Writing - Commentary - Confessions of a TQM Refugee - Watt
Norfolk Naval Shipyard
 
I025 - Writing - Feature - Tool Fixtures - Brayshaw
I025 - Writing - Feature - Tool Fixtures - BrayshawI025 - Writing - Feature - Tool Fixtures - Brayshaw
I025 - Writing - Feature - Tool Fixtures - Brayshaw
Norfolk Naval Shipyard
 

More from Norfolk Naval Shipyard (20)

Norfolk Naval Shipyard Apprenticeship Hiring Package for Apr. 8 - 22, 2019 Jo...
Norfolk Naval Shipyard Apprenticeship Hiring Package for Apr. 8 - 22, 2019 Jo...Norfolk Naval Shipyard Apprenticeship Hiring Package for Apr. 8 - 22, 2019 Jo...
Norfolk Naval Shipyard Apprenticeship Hiring Package for Apr. 8 - 22, 2019 Jo...
 
Apprentice Information Package - Announcement Period Feb. 1 - Apr. 5, 2019
Apprentice Information Package - Announcement Period Feb. 1 - Apr. 5, 2019Apprentice Information Package - Announcement Period Feb. 1 - Apr. 5, 2019
Apprentice Information Package - Announcement Period Feb. 1 - Apr. 5, 2019
 
OPSEC Bulletin - April 2016
OPSEC Bulletin - April 2016OPSEC Bulletin - April 2016
OPSEC Bulletin - April 2016
 
Winter Fire Safety - Safety Tips For Your Home
Winter Fire Safety - Safety Tips For Your HomeWinter Fire Safety - Safety Tips For Your Home
Winter Fire Safety - Safety Tips For Your Home
 
NNSY's Winter Weather Watch
NNSY's Winter Weather Watch NNSY's Winter Weather Watch
NNSY's Winter Weather Watch
 
NNSY - Winter Weather Watch
NNSY - Winter Weather WatchNNSY - Winter Weather Watch
NNSY - Winter Weather Watch
 
Give Falls The Slip - Safety First
Give Falls The Slip - Safety FirstGive Falls The Slip - Safety First
Give Falls The Slip - Safety First
 
DoN OPM Breach FAQs (UPDATED 6-17-15)
DoN OPM Breach FAQs (UPDATED 6-17-15)DoN OPM Breach FAQs (UPDATED 6-17-15)
DoN OPM Breach FAQs (UPDATED 6-17-15)
 
DONCEAP April Newsletter
DONCEAP April NewsletterDONCEAP April Newsletter
DONCEAP April Newsletter
 
DONCEAP - Live in the Moment
DONCEAP - Live in the MomentDONCEAP - Live in the Moment
DONCEAP - Live in the Moment
 
NNSY SAAPM Proclamation
NNSY SAAPM ProclamationNNSY SAAPM Proclamation
NNSY SAAPM Proclamation
 
Remembering USS Thresher - STTF April 2014
Remembering USS Thresher - STTF April 2014Remembering USS Thresher - STTF April 2014
Remembering USS Thresher - STTF April 2014
 
E009 - William Shayne Hensley - Nomination Letter
E009 - William Shayne Hensley - Nomination LetterE009 - William Shayne Hensley - Nomination Letter
E009 - William Shayne Hensley - Nomination Letter
 
I025 - Writing - Feature - Your Federal Employee Health Benefits Options - Mc...
I025 - Writing - Feature - Your Federal Employee Health Benefits Options - Mc...I025 - Writing - Feature - Your Federal Employee Health Benefits Options - Mc...
I025 - Writing - Feature - Your Federal Employee Health Benefits Options - Mc...
 
I007 - Graphics - Publication - NNSY: The Yardbirds - Watt
I007 - Graphics - Publication - NNSY: The Yardbirds - Watt I007 - Graphics - Publication - NNSY: The Yardbirds - Watt
I007 - Graphics - Publication - NNSY: The Yardbirds - Watt
 
I025 - Writing - Feature - Finding the Balance - Watt
I025 - Writing - Feature - Finding the Balance - WattI025 - Writing - Feature - Finding the Balance - Watt
I025 - Writing - Feature - Finding the Balance - Watt
 
I025 - Writing - Feature - All In Albany - Britt
I025 - Writing - Feature - All In Albany - BrittI025 - Writing - Feature - All In Albany - Britt
I025 - Writing - Feature - All In Albany - Britt
 
I025 - Writing - Feature - Welding the Welders - Brayshaw
I025 - Writing - Feature - Welding the Welders - BrayshawI025 - Writing - Feature - Welding the Welders - Brayshaw
I025 - Writing - Feature - Welding the Welders - Brayshaw
 
I024 - Writing - Commentary - Confessions of a TQM Refugee - Watt
I024 - Writing - Commentary - Confessions of a TQM Refugee - WattI024 - Writing - Commentary - Confessions of a TQM Refugee - Watt
I024 - Writing - Commentary - Confessions of a TQM Refugee - Watt
 
I025 - Writing - Feature - Tool Fixtures - Brayshaw
I025 - Writing - Feature - Tool Fixtures - BrayshawI025 - Writing - Feature - Tool Fixtures - Brayshaw
I025 - Writing - Feature - Tool Fixtures - Brayshaw
 

Recently uploaded

Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....
SocioCosmos
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
Digital Marketing Lab
 
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
AJHSSR Journal
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
grogshiregames
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
grogshiregames
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLOLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
lorraineandreiamcidl
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
madisonsmith478075
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
SocioCosmos
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
SocioCosmos
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
SocioCosmos
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
Virtual Real Design
 
How social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfHow social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdf
pramodkumar2310
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
AJHSSR Journal
 
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
AJHSSR Journal
 
Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfkl
mdigitalmarketing001
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
AJHSSR Journal
 

Recently uploaded (16)

Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...
 
SluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor ProposalSluggerPunk Final Angel Investor Proposal
SluggerPunk Final Angel Investor Proposal
 
SluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final ProposalSluggerPunk Angel Investor Final Proposal
SluggerPunk Angel Investor Final Proposal
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLOLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
Your Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts HereYour Path to YouTube Stardom Starts Here
Your Path to YouTube Stardom Starts Here
 
Social Media Marketing Strategies .
Social Media Marketing Strategies                     .Social Media Marketing Strategies                     .
Social Media Marketing Strategies .
 
How social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfHow social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdf
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
 
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...
 
Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfkl
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 

DoD Social Media Guide

  • 1. Defense Media Activity Guide To Keeping Your Social Media Accounts Secure
  • 2. Table of ConTenTS PRoTeCTIVe MeaSUReS 3 PRePaRaTIon CHeCKlIST 3 TWITTeR 4 faCebooK 5 GooGle + anD YoUTUbe 6 PROHIBITIVE MEASURES 6 InSTaGRaM 7 flICKR 7
  • 3. Guide To Keeping Your Social Media Accounts Secure • 2015 3 Defense Media Activity Social media is an integral part of the strategic communications and public affairs missions of the Department of Defense. Like any asset, it is something to defend and protect with vigilance. Cyber attacks are a real and present threat to the cyber security of government social media accounts. In this guide you will find the steps and contacts needed in order to be protective, preventative, prohibitive and proactive against cyber-attacks. If you suspect that your organization is being targeted or compromised by a malicious cyber-attack, you must be proactive and swift to mitigate this threat. The steps you take can help to greatly reduce the risk of exposure and vulnerability of attack to your organization. PRoTeCTIVe MeaSUReS Use a strong password. At least 20 characters long, that is either randomly-generated (like LauH6maicaza1Neez3zi) or a random string of words (like “hewn cloths titles yachts refine”). Use a unique password for each website or service you use; that way, if one account gets compromised, the rest are safe. Use a government e-mail address, also with a strong password. A .gov or other private-domain account will generally be more secure than a public service, and will reduce the possibility of password-reset and other emails being intercepted. If you must use a public email provider, consider added precautions such as Gmail’s two-factor authentication. Don’t give your username and password out to untrusted third parties, especially those promising to get you followers or make you money. Select third-party applications with care. There are thousands of applications built by external developers that allow you to do an array of neat things with your account. However, you should be cautious before giving up control of your account to someone else. Revoke access for any third-party application that you don’t recognize by visiting the Applications tab in your account settings. Make sure your computer and operating system is up-to-date with the most recent patches, upgrades, and anti-virus software, and that all your computers and mobile devices are protected by secure passwords. PRePaRaTIon CHeCKlIST Change your Twitter account passwords. Never send passwords via email, even internally. Keep your email accounts secure. Twitter, Facebook, Google+, etc use email for password resets and official communication. Change your email passwords, and use a password different from your social media account passwords. Review your authorized applications. Log in to Twitter or Facebook and review the applications authorized to access your accounts. If you don’t recognize any of the applications on Twitter, contact
  • 4. Guide To Keeping Your Social Media Accounts Secure • 2015 4 Defense Media Activity them immediately by filing a security ticket and emailing hacked@twitter.com. Use extra security features. This will help keep your accounts protected. Facebook has a whole section on how to do that located here. Build a plan. Create a formal incident response plan. If your organization is a target for a phishing campaign or has been hacked, you’ll be prepared to take action and resolve the issue immediately. Talk with your security team about ensuring that your email system is as safe as possible. Minimize the number of people who have access to the account. Even if you use a third-party platform to avoid sharing the actual account passwords, each of these people is a possible avenue for phishing or other compromise. Log out of Facebook and Twitter when you use a computer you share with other people. If you forget, you can log out remotely. Check for signs of compromise. Checking your email address and authorized apps weekly or monthly can help detect unauthorized access and address the problem before access is abused. Change your password regularly. Changing your social media passwords quarterly or yearly can reset the clock if a password has leaked. Using a Password Manager integrated into your browser can help prevent successful phishing attacks. Third-party solutions such as 1PaSSWoRD or laSTPaSS make it much easier to use a very strong password. Password managers, as well as the browser’s built-in password manager, will only auto-fill passwords on the correct website. If the password manager does not auto-fill, this might indicate a phishing attempt. IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED, THe folloWInG aCTIonS aRe aDVISeD: 1. Notify your chain of command immediately 2. If possible, suspend all accounts to prohibit further illicit activity 3. Take the following action on the following platforms to stop the hack from proceeding TWITTeR If you suspect your organization is being targeted by a phishing campaign or has been compromised by a phishing attack, contact us immediately at hacked@twitter.com with the word “Hacking” in the subject. Include copies of suspected phishing emails.
  • 5. Guide To Keeping Your Social Media Accounts Secure • 2015 5 Defense Media Activity 1. Immediately change your Twitter password and the password on the email associated with the account, following the tips at right. 2. Delete any unwanted Tweets that may have been sent without your permission. 3. Go to the Applications tab of your account settings and revoke access to any apps you don’t recognize. To be absolutely sure, revoke them all and reauthorize known apps and devices by logging in from them one-by-one. 4. You should also check the Mobile tab of your account settings. If the phone number associated with the account is not yours, click the “Delete my phone” link at the bottom of the page. 5. Remind anyone with authorized access to your account to follow the precautions outlined on this page. 6. If you can’t access your account, file a support ticket at https://support.twitter.com/forms/hacked and email the ticket number to hacked@twitter.com. faCebooK If you suspect your organization is being targeted by a phishing campaign or has been compromised by a phishing attack, contact them immediately at Katie.Harbath@fb.com (government Facebook representative) to explain the situation. If you think your account was taken over by someone else, Facebook can help you secure it. This process can also help if your account or computer has been affected by a virus or malware. For more information about staying safe on Facebook, please visit the Security Page or our Help Centre. Here are a few things you can do to keep your account safe: • Pick a unique, strong password. Use combinations of at least 6 letters, numbers and punctuation marks and don’t use this password for any of your other accounts. You can also use a password safe like laSTPaSS, KeePaSS or 1PaSSWoRD to set and remember unique passwords for your account. Learn how to change your password. • Think before you click. Never click suspicious links, even if they come from a friend or a company you know. This includes links sent on Facebook (ex: in a chat or story) or in emails. If one of your friends clicks a spam link, they could accidentally send you or tag you in spammy posts. If you see something suspicious on Facebook, report it. You also shouldn’t download things (ex: a .exe file) if you aren’t sure what they are. Learn more aboutrecognizing suspicious emails. • Watch out for fake Pages and apps/games. Be suspicious of Pages promoting offers that are too good to be true. If in doubt, check to see if a Page is verified. Also be mindful when you install new apps or games. Sometimes scammers use bad apps and games to gain access to your Facebook account. • Don’t accept friend requests from people you don’t know. Sometimes scammers will create fake accounts to friend people. Becoming friends with scammers allows them access to spam your Timeline, tag you in posts and send you malicious messages. Your real friends may also end up being targeted.
  • 6. Guide To Keeping Your Social Media Accounts Secure • 2015 6 Defense Media Activity • Never give out your login info (ex: email address and password). Sometimes people or pages will promise you something (ex: free poker chips) if you share your login info with them. These types of deals are carried out by cybercriminals and violate the Facebook Statement of Rights and Responsibilities. If you’re ever asked to re-enter your password on Facebook (ex: you’re making changes to your account settings) check to make sure the address of the page still has facebook.com/ in the URL (web address). • Log in at www.facebook.com. Sometimes scammers will set up a fake page to look like a Facebook login page, hoping to get you to enter your email address and password. Make sure you check the page’s URL before you enter your login info. When in doubt, you can always type facebook.com into your browser to get back to the real Facebook. Learn more about phishing. • Update your browser. The newest versions of internet browsers have built-in security protections. For example, they might be able to warn you if you’re about to go to a suspected phishing site. Facebook supports: » Mozilla Firefox » Safari » Google Chrome » Internet Explorer • Run anti-virus software. To protect yourself from viruses and malware, scan your computer. You can learn more and download this software for free: » For Windows » for Mac oS GooGle + anD YoUTUbe If your Google + and/or YouTube account has been hacked, you will need to take immediate action. Change the password for this platform immediately (through Google +). Contact the government account reps at Google to inform them of the hack: cfincham@google.com or yt-hijack@google.com PRoHIbITIVe MeaSUReS Recommend added precautions such as Gmail’s two-factor authentication. Any of these common actions could put you at risk of having your password stolen: • Using the same password on more than one site • Downloading software from the Internet • Clicking on links in email messages 2-Step Verification can help keep bad guys out, even if they have your password. An extra layer of security. Most people only have one layer – their password – to protect their account. With 2-Step Verification, if a bad guy hacks through your password layer, he’ll still need your phone or Security Key to get into your account.
  • 7. Guide To Keeping Your Social Media Accounts Secure • 2015 7 Defense Media Activity Sign in will require something you know and something you have. With 2-Step Verification, you’ll protect your account with something you know (your password) and something you have (your phone or Security Key). Verification codes made just for you. Codes are uniquely crafted for your account when you need them. If you choose to use verification codes, they will be sent to your phone via text, voice call, or our mobile app. Each code can only be used once. See Features to learn about backup options for times when your phone is not available. For more information, and to get access to the steps you might need to take if your account is compromised, here is the Google Safety Center link. InSTaGRaM If you think your account has been hacked and you’re no longer able to log in, let Instagram know. If your account is leaving comments or sharing things that you haven’t posted, your password may be compromised. To secure your account: • Change your password or send yourself a password reset email • Revoke access to any suspicious third-party apps Note: Never grant third-party access to a website or apps that aren’t following our Community Guidelines or Terms of Use (including websites selling or promising free followers or likes), as it’s likely an attempt to use your account in an inappropriate way. flICKR Flickr is a photo and video-sharing community run by Yahoo. Millions of members from all over the world are uploading photos and video that they have created, each sharing their unique view of the world. When using Flickr you can post, sort, and share photos and videos you have created with friends, family, and folks from across the globe. How to customize your privacy controls: Flickr empowers the community to control access to content by providing multiple options for adjusting privacy settings on photos, your Flickr profile, and even on commenting and contact preferences. To review these settings, visit your Flickr account page. Some important sections: 4. Profile settings. You can control your profile privacy settings to dictate who is able to see different parts of your profile.
  • 8. Guide To Keeping Your Social Media Accounts Secure • 2015 8 Defense Media Activity Change a password. For a Yahoo account, you can change your password at https://edit.yahoo.com/ config/change_pw. If you can no longer access your account, you can get a new password at https://edit. yahoo.com/forgotroot/. Commenting controls. You control who can comment on your public photos and videos. By default, anyone is able to comment on your photos. You can change this in the privacy setting for comments. If someone posts a comment you don’t like, you can just delete it. Post with care: The Flickr community is ever growing. As you upload content, be sure to know which privacy settings you have selected and how visible the content will be to the general public. You can also choose to opt out of your content being searchable on third-party sites. Block unwanted individuals: Sometimes we just don’t want to interact with someone. By blocking a community member, that person can no longer interact with you or your photos. There are three ways to block a person: 1. Click the “Block [membername]” link on the Person menu. 2. Click the “Block this person?” link on the person’s profile page. 3. Delete a comment on one of your photos. (You’ll see the option to block the person, too.) To see the people you’ve blocked, click the link at the bottom of your contact list. SafeSearch: You can control what kind of content shows up on your Flickr searches. By default, SafeSearch is enabled on your account, which leaves restricted and moderate content out of the results. When you are signed in, this feature can help ensure that your audience is not exposed to “adult content”. Learn more about SafeSearch. Report abuse: The Flickr staff works with the community to ensure an enjoyable experience for all. If you see something you feel violates the Terms of Service or the Community Guidelines, report it by doing the following: Flagging a photo 1. Go to the photo’s page. 2. At the bottom-right corner of the page, click Flag this photo. 3. Check the “I don’t think this photo is flagged at the appropriate level” checkbox. 4. Click Submit. The Flickr staff will review the photo in question. If you come across content that you think might be illegal or prohibited, use the Report Abuse system instead.
  • 9. Guide To Keeping Your Social Media Accounts Secure • 2015 9 Defense Media Activity Reporting abuse 1. At the bottom of any Flickr page under “Community,” click Report abuse. 2. Select the issue from the pull-down menu. For more information about Yahoo Flickr, visit Yahoo Help.