SlideShare a Scribd company logo
Facebook Security #SMCMIDMO2.19.11
About Me	 Jerry Gamblin Network Security Specialist  Missouri House of Representatives  Jerry.Gamblin@gmail.com @jgamblin www.facebook.com/jgamblin
What Could Happen?
This….
This…
Or Yes Even This…
Who Cares Your Facebook Was Hacked?
NO ONE! No one in Law Enforcement.* No one at Facebook.* No one at your ISP.* *Unless money was actually stolen or another more serious crime was committed.
Top 8 Facebook Security Tips
USE SSL
USE SSL OH NO FIRE SHEEP!!!!  You Should Turn On SSL
Use A Good Password
Pick the best password facebook fac3b00k! H6erKNc() I want to talk to my friends!
Use A Good Password Choose a long password. Pass Phrases are WAY BETTER. 16 Characters Or Better Please!   Change it often. Facebook never has you change your password.  Make it hard to guess. “You weren't hacked you were guessed.”
Monitor Your Logins
Monitor Logins Turn on Facebook Login Alerts.
Where to login?
 Who Can Post on your wall?
Allow “Friends” to Post On Your Wall? You may consider limiting what you allow people to comment on or post on your wall at all.
White Wall-ing?
White Wall-ing I remove post after about 48 hours.
TAG Your it!
Stop Tag-barrassment
It Could Get Your Fired…
Contact Information
Hide Contact Information
Questions
Contact Info	 Jerry Gamblin Network Security Specialist  Missouri House of Representatives  Jerry.Gamblin@gmail.com @jgamblin www.facebook.com/jgamblin
Thank You!

More Related Content

What's hot

Emily Slocombe E-Safty Quiz
Emily Slocombe E-Safty QuizEmily Slocombe E-Safty Quiz
Emily Slocombe E-Safty Quiztonybattista
 
Certificate rating
Certificate ratingCertificate rating
Certificate rating
03rgurney
 
Questionnaire results
Questionnaire resultsQuestionnaire results
Questionnaire results
joshbaugh97
 
Classification ratings
Classification ratingsClassification ratings
Classification ratings
mollymeyer10
 
BBFC Ratings
BBFC RatingsBBFC Ratings
BBFC RatingsBeccca
 
Certificate ratings google docs
Certificate ratings   google docsCertificate ratings   google docs
Certificate ratings google docs
BiancaCozma1
 
Techno etiquette final copy
Techno etiquette final copyTechno etiquette final copy
Techno etiquette final copy
Marcelline Chitolie
 
Donovan W ilson Esaftey Quiz
Donovan W ilson Esaftey QuizDonovan W ilson Esaftey Quiz
Donovan W ilson Esaftey Quiztonybattista
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiztonybattista
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiztonybattista
 
Bbfc research
Bbfc researchBbfc research
Bbfc research
Josh-West
 
BBFC Research
BBFC ResearchBBFC Research
BBFC Research
HarryScarbrough
 
Certificate ratings
Certificate ratingsCertificate ratings
Certificate ratings
Francesca Ziccardi
 
Who would be the audience for your media product?
Who would be the audience for your media product?Who would be the audience for your media product?
Who would be the audience for your media product?LGarner94
 

What's hot (14)

Emily Slocombe E-Safty Quiz
Emily Slocombe E-Safty QuizEmily Slocombe E-Safty Quiz
Emily Slocombe E-Safty Quiz
 
Certificate rating
Certificate ratingCertificate rating
Certificate rating
 
Questionnaire results
Questionnaire resultsQuestionnaire results
Questionnaire results
 
Classification ratings
Classification ratingsClassification ratings
Classification ratings
 
BBFC Ratings
BBFC RatingsBBFC Ratings
BBFC Ratings
 
Certificate ratings google docs
Certificate ratings   google docsCertificate ratings   google docs
Certificate ratings google docs
 
Techno etiquette final copy
Techno etiquette final copyTechno etiquette final copy
Techno etiquette final copy
 
Donovan W ilson Esaftey Quiz
Donovan W ilson Esaftey QuizDonovan W ilson Esaftey Quiz
Donovan W ilson Esaftey Quiz
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 
Lewis Allens Esafety Quiz
Lewis Allens Esafety QuizLewis Allens Esafety Quiz
Lewis Allens Esafety Quiz
 
Bbfc research
Bbfc researchBbfc research
Bbfc research
 
BBFC Research
BBFC ResearchBBFC Research
BBFC Research
 
Certificate ratings
Certificate ratingsCertificate ratings
Certificate ratings
 
Who would be the audience for your media product?
Who would be the audience for your media product?Who would be the audience for your media product?
Who would be the audience for your media product?
 

Viewers also liked

G3 Social Media Security
G3 Social Media SecurityG3 Social Media Security
G3 Social Media SecurityJerry Gamblin
 
Why your password sucks
Why your password sucksWhy your password sucks
Why your password sucks
Jerry Gamblin
 
NightLight Social Media and You
NightLight  Social Media and YouNightLight  Social Media and You
NightLight Social Media and You
Jerry Gamblin
 
WordPress Security Begins With Good Posture
WordPress Security Begins With Good PostureWordPress Security Begins With Good Posture
WordPress Security Begins With Good PostureTony Perez
 
Building a Security Framework for Websites
Building a Security Framework for WebsitesBuilding a Security Framework for Websites
Building a Security Framework for Websites
Tony Perez
 
Hacked - What do you do now?
Hacked - What do you do now?Hacked - What do you do now?
Hacked - What do you do now?
Tony Perez
 
WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityTony Perez
 
Facebook security
Facebook securityFacebook security
Facebook security
PRESENTATIONSFORESL
 
WordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, DefensesWordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, DefensesTony Perez
 
Information security
Information securityInformation security
Information security
LJ PROJECTS
 
Vocabulary notebook
Vocabulary notebookVocabulary notebook
Vocabulary notebookjt861906mhs
 
Older Consumers - The Golden Economy
Older Consumers - The Golden EconomyOlder Consumers - The Golden Economy
Older Consumers - The Golden Economy
ILC- UK
 
цахим тест1
цахим тест1цахим тест1
цахим тест1Zaya80
 
Soko ppt
Soko pptSoko ppt
Soko pptSoko_92
 
New week 7
New week 7New week 7
New week 7nglaze10
 
зурагт үзүүлэн1
зурагт үзүүлэн1зурагт үзүүлэн1
зурагт үзүүлэн1Zaya80
 
Can Spam Act: What You Should Know
Can Spam Act: What You Should KnowCan Spam Act: What You Should Know
Can Spam Act: What You Should Know
Email Delivered
 

Viewers also liked (20)

G3 Social Media Security
G3 Social Media SecurityG3 Social Media Security
G3 Social Media Security
 
Why your password sucks
Why your password sucksWhy your password sucks
Why your password sucks
 
NightLight Social Media and You
NightLight  Social Media and YouNightLight  Social Media and You
NightLight Social Media and You
 
WordPress Security Begins With Good Posture
WordPress Security Begins With Good PostureWordPress Security Begins With Good Posture
WordPress Security Begins With Good Posture
 
Building a Security Framework for Websites
Building a Security Framework for WebsitesBuilding a Security Framework for Websites
Building a Security Framework for Websites
 
Hacked - What do you do now?
Hacked - What do you do now?Hacked - What do you do now?
Hacked - What do you do now?
 
Beyonce
BeyonceBeyonce
Beyonce
 
WordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of SecurityWordPress Security 2014 - The Basics of Security
WordPress Security 2014 - The Basics of Security
 
Facebook security
Facebook securityFacebook security
Facebook security
 
WordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, DefensesWordPress Website Security - Trends, Threats, Defenses
WordPress Website Security - Trends, Threats, Defenses
 
Information security
Information securityInformation security
Information security
 
Vocabulary notebook
Vocabulary notebookVocabulary notebook
Vocabulary notebook
 
Older Consumers - The Golden Economy
Older Consumers - The Golden EconomyOlder Consumers - The Golden Economy
Older Consumers - The Golden Economy
 
цахим тест1
цахим тест1цахим тест1
цахим тест1
 
Soko ppt
Soko pptSoko ppt
Soko ppt
 
New week 7
New week 7New week 7
New week 7
 
canovaccio_app_final_crit
canovaccio_app_final_critcanovaccio_app_final_crit
canovaccio_app_final_crit
 
зурагт үзүүлэн1
зурагт үзүүлэн1зурагт үзүүлэн1
зурагт үзүүлэн1
 
NetWitness Overview
NetWitness OverviewNetWitness Overview
NetWitness Overview
 
Can Spam Act: What You Should Know
Can Spam Act: What You Should KnowCan Spam Act: What You Should Know
Can Spam Act: What You Should Know
 

Recently uploaded

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

Facebook Security SMCMIDMO