This document provides guidance on securing social media accounts from cyber attacks. It begins with an overview of protective measures like using strong, unique passwords and reviewing authorized third party applications. It then provides step-by-step instructions for what to do if specific accounts like Twitter, Facebook, Google+, Instagram or Flickr become compromised. The guidelines emphasize immediately changing passwords, deleting unauthorized posts, and reporting any suspicious activity to the relevant social media platform.
How to avoid facebook scams
With more than 800 million users all over the world, Facebook is the perfect breeding ground for scam artists. Every Facebook user has their account interlinked with hundreds or even thousands of their friends. With the exponential amount of users connected to each other Facebook scams require only a few clicks to reach to colossal levels. The peril arises when a scam is spread through someone’s account using the friend list as a medium as this considerably lowers the unsuspecting users guard. So in effect, all it takes is one moment of weakness by one individual on your friend’s list to start off a chain of events that can prove harmful to one and all.
This phenomenon has been termed ‘Social Engineering’ since it involves predicting human behavior based on a study of common user habits and general psychological traits. Piquing a user’s curiosity with a sensational headline can cause one to fall prey to legitimate looking scams. Some scams take the user to a page that asks for their Facebook login credentials, some ask for personal details about the user which are then misused, some direct the user to install a program that is malware in disguise, some ask for money while some account for a lot of spam.
Final slide show for basic training for Facebook, with Beginning Twitter information and industry updates for other platforms. Taken from Coldwell Banker Bain training 6/23/15
How to avoid facebook scams
With more than 800 million users all over the world, Facebook is the perfect breeding ground for scam artists. Every Facebook user has their account interlinked with hundreds or even thousands of their friends. With the exponential amount of users connected to each other Facebook scams require only a few clicks to reach to colossal levels. The peril arises when a scam is spread through someone’s account using the friend list as a medium as this considerably lowers the unsuspecting users guard. So in effect, all it takes is one moment of weakness by one individual on your friend’s list to start off a chain of events that can prove harmful to one and all.
This phenomenon has been termed ‘Social Engineering’ since it involves predicting human behavior based on a study of common user habits and general psychological traits. Piquing a user’s curiosity with a sensational headline can cause one to fall prey to legitimate looking scams. Some scams take the user to a page that asks for their Facebook login credentials, some ask for personal details about the user which are then misused, some direct the user to install a program that is malware in disguise, some ask for money while some account for a lot of spam.
Final slide show for basic training for Facebook, with Beginning Twitter information and industry updates for other platforms. Taken from Coldwell Banker Bain training 6/23/15
Have you even been a victim of hacking? Hacking hurts, especially when your Fan page itself is hacked. A 7 Tips how to protect your Facebook page with your account.
These slides are from an online security class I taught at Darien Library in Darien, CT. They are the property of Darien Library.
Originally everything was nicely aligned, but then sending this up to Slideshare messed up the alignment, so I gave up! :-)
7 Cyber Crimes on Social Media Against Women [India]Sorav Jain
Its time people are aware of the rising Social Media crimes. While we look at the positives, we should also be looking at the negatives of this industry. This article will throw some insights on what are some of the most commonly faced threats by women in India. Cyber safety has become extremely important and this is just a lesson.
It is extremely simple to use a Facebook Hack tool. A tool is consumer friendly and available choices are kept to least, since such tool is built for use by persons who were not actual hackers or still computer experts, but usual people who want some aid with in what way to hack Facebook profile.
Lawyers are constantly on the go and rely on technology in their office, on the road and in the cloud for anywhere, anytime access. Recent news stories reinforce the dangers that exist in the digital world. We'll explore how to practice safe computing to protect your digital assets, stay out of the news and disciplinary hot-water.
How to check a suspicious link without clicking on it?Ankush Sarkar
We often come across hyperlinks that lead us to another page on the internet. But how can we understand if the destination is reliable or not? Here's how you can spot malicious links.
October is observed as Cyber Security Month which is an annual campaign organized to raise awareness about the importance of cybersecurity. Here’s an infographic that puts together 31 tips on Internet Security that will help you protect your digital devices, identity, and personal information from all types of threats on the Internet.
This is a great PowerPoint to help individuals identify and prevent infecting their computers and identity from Malware programs. I found it on the internet and thought it was so good for people to view. The original document was created by the Consumer Jungle and can be found at: http://www.consumerjungle.org/content/view/55/1146/
Location: Building 1500, 1st Floor, Room 119B
Store Hours:Tuesday, Wednesday, Thursday
0700-0800 & 1400-1600
Store Phone:396-8159
Point of Contact:
Joyce Evans - 396-9506
Dorassa Fields - 396-3672
Rachel Frye - 396-9530
to shop after hours make an appointment by calling 396-8159 or 396-9530
{not all items may be available}
Have you even been a victim of hacking? Hacking hurts, especially when your Fan page itself is hacked. A 7 Tips how to protect your Facebook page with your account.
These slides are from an online security class I taught at Darien Library in Darien, CT. They are the property of Darien Library.
Originally everything was nicely aligned, but then sending this up to Slideshare messed up the alignment, so I gave up! :-)
7 Cyber Crimes on Social Media Against Women [India]Sorav Jain
Its time people are aware of the rising Social Media crimes. While we look at the positives, we should also be looking at the negatives of this industry. This article will throw some insights on what are some of the most commonly faced threats by women in India. Cyber safety has become extremely important and this is just a lesson.
It is extremely simple to use a Facebook Hack tool. A tool is consumer friendly and available choices are kept to least, since such tool is built for use by persons who were not actual hackers or still computer experts, but usual people who want some aid with in what way to hack Facebook profile.
Lawyers are constantly on the go and rely on technology in their office, on the road and in the cloud for anywhere, anytime access. Recent news stories reinforce the dangers that exist in the digital world. We'll explore how to practice safe computing to protect your digital assets, stay out of the news and disciplinary hot-water.
How to check a suspicious link without clicking on it?Ankush Sarkar
We often come across hyperlinks that lead us to another page on the internet. But how can we understand if the destination is reliable or not? Here's how you can spot malicious links.
October is observed as Cyber Security Month which is an annual campaign organized to raise awareness about the importance of cybersecurity. Here’s an infographic that puts together 31 tips on Internet Security that will help you protect your digital devices, identity, and personal information from all types of threats on the Internet.
This is a great PowerPoint to help individuals identify and prevent infecting their computers and identity from Malware programs. I found it on the internet and thought it was so good for people to view. The original document was created by the Consumer Jungle and can be found at: http://www.consumerjungle.org/content/view/55/1146/
Location: Building 1500, 1st Floor, Room 119B
Store Hours:Tuesday, Wednesday, Thursday
0700-0800 & 1400-1600
Store Phone:396-8159
Point of Contact:
Joyce Evans - 396-9506
Dorassa Fields - 396-3672
Rachel Frye - 396-9530
to shop after hours make an appointment by calling 396-8159 or 396-9530
{not all items may be available}
I025 - Submission for Russell Egnor Media Awards - Writing - Feature - Michael Brayshaw, NNSY Lead Public Affairs Specialist - Shipyard Spotlight: Marcus Robbins - Released 7/1/14
For the 2011 Black history Month, NAVSEA
is Focusing on African American’s contributions
during the civil war. The following
account highlights some of the major contributions
of their brave efforts to preserve our
nation.
I025 - Submission for Russell Egnor Media Awards - Writing - Feature - Michael Brayshaw, NNSY Lead Public Affairs Specialist - Shipyard Spotlight: Mark Carey - Released 3/1/14
I025 - Submission for Russell Egnor Media Awards - Writing - Feature - Kristi Britt, NNSY Public Affairs Specialist - Striving For Minimum Impact - Released 4/1/14
This PP takes you through the process of applying for USAJOBS-- Just for clarity: This provides information on the App Manager process which is one of several agency application sites that link to, but are not part of USAJOBS.
Cyber Security aware society is the need of the hour, there is a growing need for Cyber Security awareness, every user of internet should know at least the basics of cyber security, an educated and aware user can help in minimizing the impact and rate of cyber crimes, particularly of those that are related with online transactions and phishing…
Imagine you wake up early in the morning, just to find that you couldn’t log on to your Facebook account. While you are just wondering about the reason for this lockout problem, your friend calls you to check if you are fine seeing your weird Facebook status. At times like these, how do you say your account is secure enough? How do you protect your Facebook account from hackers?
If you received an email from Instagram letting you know that your email address was changed, you may be able to undo this by using the revert this change option in that message. If additional information was also changed (example: your password), and you're unable to change your email address, please report the account to Instagram.
Under section 43, a simple civil offense where a person without permission of the owner accesses the computer and extracts any data or damages the data contained therein will come under civil liability. The hacker shall be liable to pay a fine to the affected party. Under the Information Technology Act, 2000, the maximum cap for compensation was fine at Rs. 1 crore. However in the amendment made in 2008, this ceiling was removed.
Description: In this article, we provide you with ten invaluable tips to ensure your safety and protect your personal information while engaging on social media platforms. Discover how to secure your privacy settings, avoid suspicious links and phishing attacks, think before you click or comment, exercise caution when accepting friend requests, be mindful of what you share, regularly review and clean up your friend list, educate yourself about privacy controls and features, use strong and unique passwords, stay updated with platform policies, and enable two-factor authentication. By implementing these tips, you can enjoy the benefits of social media while maintaining control over your privacy and security. Safeguard your online presence and explore the world of virtual entertainment with confidence.
Help your employees become cyber security experts! This slideshow will present: Threats overview, password safety, web protection, email protection, and preventive measures.
Social Media: The Good, The Bad, and The Ugly
People are social creatures and have communicated for centuries using various means and methods. Now with the explosion of global tele-communications and data networks, people can rapidly communicate using multiple social media virtual communities and powerful mobile platforms. Significant news and sporting events are often reported in a real-time impacting the effectiveness of traditional communication channels (i.e., network TV news broadcasts). Students are collaborating on homework and activities through the use of social media virtual communities. Job seekers and employers are exploiting social media virtual communities. We will discuss tips for avoiding the top 9 most common Facebook scams will be shared. My presentation will highlight examples of social media use within the DCCCD community. I will share a personal story from my volunteer child advocate experience,
The Norfolk Naval Shipyard Apprentice Program is opening a job announcement beginning Monday, April 8, through Monday, April 22, for 2020 hiring. More information is available in this information package. Please share with family and friends who may be interested.
Apprentice Information Package - Announcement Period Feb. 1 - Apr. 5, 2019Norfolk Naval Shipyard
The Norfolk Naval Shipyard Apprenticeship Program will be opening the application period from Feb. 1 to April 5, 2019. Learn more about the program and what to expect in this information package.
Visit https://www.tcc.edu/about-tcc/apprenticeship-institute/nnsy for more information regarding the NNSY Apprenticeship Program.
In these winter months especially, please take special caution to your surroundings. Slips, Trips, and Falls are very common occurrences, especially with ice on the ground. Remember Safety First!
Here is the latest FAQs for the OPM Data Breach, provided by the Department of the Navy. As the OPM Data Breach is under federal investigation, this is an ongoing document that will continue to be updated as more information becomes available. Current questions/answers may be found at www.opm.gov.
Summary - In April 2015, the Office of Personnel Management (OPM) became aware of a cybersecurity incident affecting its systems and data that may have compromised the personal information of current and former federal employees. The breach pre-dates OPM’s adoption of tougher security controls.
Since the incident was identified, OPM has partnered with the U.S. Department of Homeland Security U.S. Computer Emergency Readiness Team (US-CERT), and the Federal Bureau of Investigation to determine the impact to current and former to Federal personnel.
Between June 8 and June 19, OPM will send notifications to those individuals whose personal information may have been compromised. OPM estimates that up to 4 million individuals may have been impacted.
In the course of the ongoing investigation into the cyber intrusion that compromised personnel records of current and former federal employees (announced June 4), it was discovered that additional OPM systems were compromised. These systems contain information related to background investigations. OPM, the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) are working as part of an ongoing investigation to determine the number of people affected by this separate intrusion. OPM will notify those individuals whose information may have been compromised as soon as practicable.
OPM will offer impacted individuals 18 months of credit monitoring services and identity theft insurance through CSID® – a company that specializes in identify theft protection and fraud resolution. The 18-month CSID® membership will be offered to those individuals identified by OPM at no cost.
Since the investigation is on-going, additional exposures may come to light; if this occurs, OPM will conduct additional notifications as necessary.
Life’s short. Why not make the most of it?
As you have likely experienced, sometimes life gets hectic—even chaotic. Learning to step back and be fully present in the here and now can have an overwhelmingly positive impact. From less stress, to better memory and focus, to savoring life’s simple joys, mindfulness can serve your mind, body, and soul.
Your Department of the Navy Civilian Employee Assistance Program (DONCEAP) can help you find your inner balance and improve your sense of well-being.
I025 - Writing - Feature - Your Federal Employee Health Benefits Options - Mc...Norfolk Naval Shipyard
I025 - Submission for Russell Egnor Media Awards - Writing - Feature - Brian Mcneal, NNSY Public Affairs Specialist - Your Federal Employee Health Benefit Options: Don't Just Check The Box - Released 11/1/14
I007 - Submission for Russell Egnor Media Awards - Graphics - Publication - Chris Watt, NNSY Public Affairs Specialist - NNSY: The Yardbirds - Released 10/3/14
I025 - Submission for Russell Egnor Media Awards - Writing - Feature - Chris Watt, NNSY Public Affairs Specialist - Finding The Balance - Released 11/1/14
I025 - Submission for Russell Egnor Media Awards - Writing - Feature - Michael Brayshaw, NNSY Lead Public Affairs Specialist - Welding the Welders - Released 10/1/14
I025 - Submission for Russell Egnor Media Awards - Writing - Feature - Michael Brayshaw, NNSY Lead Public Affairs Specialist - Tool Fixtures - Released 9/1/14
Get Ahead with YouTube Growth Services....SocioCosmos
Get noticed on YouTube by buying authentic engagement. Sociocosmos helps you grow your channel quickly and effectively.
https://www.sociocosmos.com/product-category/youtube/
Enhance your social media strategy with the best digital marketing agency in Kolkata. This PPT covers 7 essential tips for effective social media marketing, offering practical advice and actionable insights to help you boost engagement, reach your target audience, and grow your online presence.
Exploring Factors Affecting the Success of TVET-Industry Partnership: A Case ...AJHSSR Journal
ABSTRACT: The purpose of this study was to explore factors affecting the success of TVET-industry
partnerships. A case study design of the qualitative research method was used to achieve this objective. For the
study, one polytechnic college of Oromia regional state, and two industries were purposively selected. From the
sample polytechnic college and industries, a total of 17 sample respondents were selected. Out of 17
respondents, 10 respondents were selected using the snowball sampling method, and the rest 7 respondents were
selected using the purposive sampling technique. The qualitative data were collected through an in-depth
interview and document analysis. The data were analyzed using thematic approaches. The findings revealed that
TVET-industry partnerships were found weak. Lack of key stakeholder‟s awareness shortage of improved
training equipment and machines in polytechnic colleges, absence of trainee health insurance policy, lack of
incentive mechanisms for private industries, lack of employer industries involvement in designing and
developing occupational standards, and preparation of curriculum were some of the impediments of TVETindustry partnership. Based on the findings it was recommended that the Oromia TVET bureau in collaboration
with other relevant concerned regional authorities and TVET colleges, set new strategies for creating strong
awareness for industries, companies, and other relevant stakeholders on the purpose and advantages of
implementing successful TVET-industry partnership. Finally, the Oromia regional government in collaboration
with the TVET bureau needs to create policy-supported incentive strategies such as giving occasional privileges
of duty-free import, tax reduction, and regional government recognition awards based on the level of partnership
contribution to TVET institutions in promoting TVET-industry partnership.
KEY WORDS: employability skills, industries, and partnership
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
Multilingual SEO services are essential for businesses aiming to expand their global presence. They involve optimizing a website for search engines in multiple languages, enhancing visibility, and reaching diverse audiences. Filose offers comprehensive multilingual SEO services designed to help businesses optimize their websites for search engines in various languages, enhancing their global reach and market presence. These services ensure that your content is not only translated but also culturally and contextually adapted to resonate with local audiences.
Visit us at -https://www.filose.com/
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
How social media marketing helps businesses in 2024.pdfpramodkumar2310
Social media marketing refers to the process of utilizing social media platforms to promote products, services, or brands. It involves creating and sharing valuable content, engaging with followers, analyzing data, and running targeted advertising campaigns.
www.nidmindia.com
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskAJHSSR Journal
ABSTRACT: This research aims to examine how ESG disclosure and risk disclosure affect the total risk of
companies. Using cross section data from 355 companies listed in Indonesia Stock Exchange, data regarding
ESG disclosure and risk was collected. In this research, ESG and risk disclosures are measured based on content
analysis using GRI 4 guidelines for ESG disclosures and COSO ERM for risk disclosures. Using multiple
regression, it is concluded that only risk disclosure can reduce the company's total risk, while ESG disclosure
cannot affect the company's total risk. This shows that only risk disclosure is relevant in determining a
company's total risk.
KEYWORDS: ESG disclosure, risk disclosure, firm risk
The Challenges of Good Governance and Project Implementation in Nigeria: A Re...AJHSSR Journal
ABSTRACT : This study reveals that systemic corruption and other factors including poor leadership,
leadership recruitment processes, ethnic and regional politics, tribalism and mediocrity, poor planning, and
variation of project design have been the causative factors that undermine projects implementation in postindependence African states, particularly in Nigeria. The study, thus, argued that successive governments of
African states, using Nigeria as a case study, have been deeply engrossed in this obnoxious practice that has
undermined infrastructure sector development as well as enthroned impoverishment and mass poverty in these
African countries. This study, therefore, is posed to examine the similarities in causative factors, effects and
consequences of corruption and how it affects governance, projects implementation and national growth. To
achieve this, the study adopted historical research design which is qualitative and explorative in nature. The
study among others suggests that the governments of developing countries should shun corruption and other
forms of obnoxious practices in order to operate effective and efficient systems that promote good governance
and ensure there is adequate projects implementation which are the attributes of a responsible government and
good leadership. Policy makers should also prioritize policy objectives and competence to ensure that policies
are fully implemented within stipulated time frame.
KEYWORDS: Developing Countries, Nigeria, Government, Project Implementation, Project Failure
Social media refers to online platforms and tools that enable users to create, share, and exchange information, ideas, and content in virtual communities and networks. These platforms have revolutionized the way people communicate, interact, and consume information. Here are some key aspects and descriptions of social media:
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
ABSTRACT: Although a significant amount of literature exists on Morocco's migration policies and their
successes and failures since their implementation in 2014, there is limited research on the integration of subSaharan African children into schools. This paperis part of a Ph.D. research project that aims to fill this gap. It
reports the main findings of a study conducted with migrant children enrolled in two public schools in Rabat,
Morocco, exploring how integration is defined by the children themselves and identifying the obstacles that they
have encountered thus far. The following paper uses an inductive approach and primarily focuses on the
relationships of children with their teachers and peers as a key aspect of integration for students with a migration
background. The study has led to several crucial findings. It emphasizes the significance of speaking Colloquial
Moroccan Arabic (Darija) and being part of a community for effective integration. Moreover, it reveals that the
use of Modern Standard Arabic as the language of instruction in schools is a source of frustration for students,
indicating the need for language policy reform. The study underlines the importanceof considering the
children‟s agency when being integrated into mainstream public schools.
.
KEYWORDS: migration, education, integration, sub-Saharan African children, public school
2. Table of ConTenTS
PRoTeCTIVe MeaSUReS 3
PRePaRaTIon CHeCKlIST 3
TWITTeR 4
faCebooK 5
GooGle + anD YoUTUbe 6
PROHIBITIVE MEASURES 6
InSTaGRaM 7
flICKR 7
3. Guide To Keeping Your Social Media Accounts Secure • 2015
3
Defense Media Activity
Social media is an integral part of the strategic communications and public affairs missions of the
Department of Defense. Like any asset, it is something to defend and protect with vigilance. Cyber
attacks are a real and present threat to the cyber security of government social media accounts. In this
guide you will find the steps and contacts needed in order to be protective, preventative, prohibitive and
proactive against cyber-attacks.
If you suspect that your organization is being targeted or compromised by a malicious cyber-attack, you
must be proactive and swift to mitigate this threat. The steps you take can help to greatly reduce the risk
of exposure and vulnerability of attack to your organization.
PRoTeCTIVe MeaSUReS
Use a strong password. At least 20 characters long, that is either randomly-generated (like
LauH6maicaza1Neez3zi) or a random string of words (like “hewn cloths titles yachts refine”). Use a unique
password for each website or service you use; that way, if one account gets compromised, the rest are
safe.
Use a government e-mail address, also with a strong password. A .gov or other private-domain account
will generally be more secure than a public service, and will reduce the possibility of password-reset and
other emails being intercepted. If you must use a public email provider, consider added precautions such
as Gmail’s two-factor authentication.
Don’t give your username and password out to untrusted third parties, especially
those promising to get you followers or make you money.
Select third-party applications with care. There are thousands of applications built by external
developers that allow you to do an array of neat things with your account. However, you should be
cautious before giving up control of your account to someone else. Revoke access for any third-party
application that you don’t recognize by visiting the Applications tab in your account settings.
Make sure your computer and operating system is up-to-date with the most recent patches, upgrades,
and anti-virus software, and that all your computers and mobile devices are protected by secure
passwords.
PRePaRaTIon CHeCKlIST
Change your Twitter account passwords. Never send passwords via email, even internally.
Keep your email accounts secure. Twitter, Facebook, Google+, etc use email for password resets and
official communication. Change your email passwords, and use a password different from your social
media account passwords.
Review your authorized applications. Log in to Twitter or Facebook and review the applications
authorized to access your accounts. If you don’t recognize any of the applications on Twitter, contact
4. Guide To Keeping Your Social Media Accounts Secure • 2015
4
Defense Media Activity
them immediately by filing a security ticket and emailing hacked@twitter.com.
Use extra security features. This will help keep your accounts protected. Facebook has a whole section
on how to do that located here.
Build a plan. Create a formal incident response plan. If your organization is a target for a phishing
campaign or has been hacked, you’ll be prepared to take action and resolve the issue immediately.
Talk with your security team about ensuring that your email system is as safe as possible.
Minimize the number of people who have access to the account. Even if you use a third-party platform
to avoid sharing the actual account passwords, each of these people is a possible avenue for phishing or
other compromise.
Log out of Facebook and Twitter when you use a computer
you share with other people. If you forget, you can log out remotely.
Check for signs of compromise. Checking your email address and authorized apps weekly or monthly
can help detect unauthorized access and address the problem before access is abused.
Change your password regularly. Changing your social media passwords quarterly or yearly can reset
the clock if a password has leaked.
Using a Password Manager integrated into your browser can help prevent successful phishing attacks.
Third-party solutions such as 1PaSSWoRD or laSTPaSS make it much easier to use a very strong
password. Password managers, as well as the browser’s built-in password manager, will only auto-fill
passwords on the correct website. If the password manager does not auto-fill, this might indicate a
phishing attempt.
IF YOU SUSPECT YOUR ACCOUNT IS COMPROMISED,
THe folloWInG aCTIonS aRe aDVISeD:
1. Notify your chain of command immediately
2. If possible, suspend all accounts to prohibit further illicit activity
3. Take the following action on the following platforms to stop the hack from proceeding
TWITTeR
If you suspect your organization is being targeted by a phishing campaign or has been compromised by a
phishing attack, contact us immediately at hacked@twitter.com with the word “Hacking” in the subject.
Include copies of suspected phishing emails.
5. Guide To Keeping Your Social Media Accounts Secure • 2015
5
Defense Media Activity
1. Immediately change your Twitter password and the password on the email associated with the
account, following the tips at right.
2. Delete any unwanted Tweets that may have been sent without your permission.
3. Go to the Applications tab of your account settings and revoke access to any apps you don’t
recognize. To be absolutely sure, revoke them all and reauthorize known apps and devices by logging
in from them one-by-one.
4. You should also check the Mobile tab of your account settings. If the phone number associated with
the account is not yours, click the “Delete my phone” link at the bottom of the page.
5. Remind anyone with authorized access to your account to follow the precautions outlined on this
page.
6. If you can’t access your account, file a support ticket at https://support.twitter.com/forms/hacked
and email the ticket number to hacked@twitter.com.
faCebooK
If you suspect your organization is being targeted by a phishing campaign or has been compromised
by a phishing attack, contact them immediately at Katie.Harbath@fb.com (government Facebook
representative) to explain the situation.
If you think your account was taken over by someone else, Facebook can help you secure it. This process
can also help if your account or computer has been affected by a virus or malware.
For more information about staying safe on Facebook, please visit the Security Page or our Help Centre.
Here are a few things you can do to keep your account safe:
• Pick a unique, strong password. Use combinations of at least 6 letters, numbers and punctuation
marks and don’t use this password for any of your other accounts. You can also use a password safe
like laSTPaSS, KeePaSS or 1PaSSWoRD to set and remember unique passwords for your account.
Learn how to change your password.
• Think before you click. Never click suspicious links, even if they come from a friend or a company you
know. This includes links sent on Facebook (ex: in a chat or story) or in emails. If one of your friends
clicks a spam link, they could accidentally send you or tag you in spammy posts. If you see something
suspicious on Facebook, report it. You also shouldn’t download things (ex: a .exe file) if you aren’t
sure what they are. Learn more aboutrecognizing suspicious emails.
• Watch out for fake Pages and apps/games. Be suspicious of Pages promoting offers that are too good
to be true. If in doubt, check to see if a Page is verified. Also be mindful when you install new apps or
games. Sometimes scammers use bad apps and games to gain access to your Facebook account.
• Don’t accept friend requests from people you don’t know. Sometimes scammers will create fake
accounts to friend people. Becoming friends with scammers allows them access to spam your
Timeline, tag you in posts and send you malicious messages. Your real friends may also end up being
targeted.
6. Guide To Keeping Your Social Media Accounts Secure • 2015
6
Defense Media Activity
• Never give out your login info (ex: email address and password). Sometimes people or pages
will promise you something (ex: free poker chips) if you share your login info with them. These
types of deals are carried out by cybercriminals and violate the Facebook Statement of Rights and
Responsibilities. If you’re ever asked to re-enter your password on Facebook (ex: you’re making
changes to your account settings) check to make sure the address of the page still has facebook.com/
in the URL (web address).
• Log in at www.facebook.com. Sometimes scammers will set up a fake page to look like a Facebook
login page, hoping to get you to enter your email address and password. Make sure you check the
page’s URL before you enter your login info. When in doubt, you can always type facebook.com into
your browser to get back to the real Facebook. Learn more about phishing.
• Update your browser. The newest versions of internet browsers have built-in security protections.
For example, they might be able to warn you if you’re about to go to a suspected phishing site.
Facebook supports:
» Mozilla Firefox
» Safari
» Google Chrome
» Internet Explorer
• Run anti-virus software. To protect yourself from viruses and malware, scan your computer. You can
learn more and download this software for free:
» For Windows
» for Mac oS
GooGle + anD YoUTUbe
If your Google + and/or YouTube account has been hacked, you will need to take immediate action.
Change the password for this platform immediately (through Google +).
Contact the government account reps at Google to inform them of the hack: cfincham@google.com or
yt-hijack@google.com
PRoHIbITIVe MeaSUReS
Recommend added precautions such as Gmail’s two-factor authentication.
Any of these common actions could put you at risk of having your password stolen:
• Using the same password on more than one site
• Downloading software from the Internet
• Clicking on links in email messages
2-Step Verification can help keep bad guys out, even if they have your password.
An extra layer of security. Most people only have one layer – their password – to protect their account.
With 2-Step Verification, if a bad guy hacks through your password layer, he’ll still need your phone or
Security Key to get into your account.
7. Guide To Keeping Your Social Media Accounts Secure • 2015
7
Defense Media Activity
Sign in will require something you know and something you have. With 2-Step Verification, you’ll
protect your account with something you know (your password) and something you have (your phone or
Security Key).
Verification codes made just for you. Codes are uniquely crafted for your account when you need them.
If you choose to use verification codes, they will be sent to your phone via text, voice call, or our mobile
app. Each code can only be used once. See Features to learn about backup options for times when your
phone is not available.
For more information, and to get access to the steps you might need to take if your account is
compromised, here is the Google Safety Center link.
InSTaGRaM
If you think your account has been hacked and you’re no longer able to log in, let Instagram know.
If your account is leaving comments or sharing things that you haven’t posted, your password may be
compromised.
To secure your account:
• Change your password or send yourself a password reset email
• Revoke access to any suspicious third-party apps
Note: Never grant third-party access to a website or apps that aren’t following our Community
Guidelines or Terms of Use (including websites selling or promising free followers or likes), as it’s likely an
attempt to use your account in an inappropriate way.
flICKR
Flickr is a photo and video-sharing community run by Yahoo. Millions of members from all over the world
are uploading photos and video that they have created, each sharing their unique view of the world.
When using Flickr you can post, sort, and share photos and videos you have created with friends, family,
and folks from across the globe.
How to customize your privacy controls: Flickr empowers the community to control access to content
by providing multiple options for adjusting privacy settings on photos, your Flickr profile, and even on
commenting and contact preferences. To review these settings, visit your Flickr account page. Some
important sections:
4. Profile settings. You can control your profile privacy settings to dictate who is able to see different
parts of your profile.
8. Guide To Keeping Your Social Media Accounts Secure • 2015
8
Defense Media Activity
Change a password. For a Yahoo account, you can change your password at https://edit.yahoo.com/
config/change_pw. If you can no longer access your account, you can get a new password at https://edit.
yahoo.com/forgotroot/.
Commenting controls. You control who can comment on your public photos and videos. By default,
anyone is able to comment on your photos. You can change this in the privacy setting for comments. If
someone posts a comment you don’t like, you can just delete it.
Post with care: The Flickr community is ever growing. As you upload content, be sure to know which
privacy settings you have selected and how visible the content will be to the general public. You can also
choose to opt out of your content being searchable on third-party sites.
Block unwanted individuals: Sometimes we just don’t want to interact with someone. By blocking a
community member, that person can no longer interact with you or your photos. There are three ways
to block a person:
1. Click the “Block [membername]” link on the Person menu.
2. Click the “Block this person?” link on the person’s profile page.
3. Delete a comment on one of your photos. (You’ll see the option to block the person, too.)
To see the people you’ve blocked, click the link at the bottom of your contact list.
SafeSearch: You can control what kind of content shows up on your Flickr searches. By default,
SafeSearch is enabled on your account, which leaves restricted and moderate content out of the results.
When you are signed in, this feature can help ensure that your audience is not exposed to “adult
content”. Learn more about SafeSearch.
Report abuse: The Flickr staff works with the community to ensure an enjoyable experience for all. If you
see something you feel violates the Terms of Service or the Community Guidelines, report it by doing the
following:
Flagging a photo
1. Go to the photo’s page.
2. At the bottom-right corner of the page, click Flag this photo.
3. Check the “I don’t think this photo is flagged at the appropriate level” checkbox.
4. Click Submit.
The Flickr staff will review the photo in question.
If you come across content that you think might be illegal or prohibited, use the Report Abuse system
instead.
9. Guide To Keeping Your Social Media Accounts Secure • 2015
9
Defense Media Activity
Reporting abuse
1. At the bottom of any Flickr page under “Community,” click Report abuse.
2. Select the issue from the pull-down menu.
For more information about Yahoo Flickr, visit Yahoo Help.