SlideShare a Scribd company logo
+
Social Media Security Plan
Adrie Newton
+
What Needs To Be Done
 Establish a social media policy
 Identify potential reputation risk
 Only appropriate content is published on your website
 Develop strong password policies
 Ensure appropriate steps are taken to protect your web content
from unauthorized access or modification
 Don’t fall for fake offers/ads
+
Step 1: Establishing a Social Media
Policy
 Before even making any social media account the users own
personal policies should be determined
 How much time will I spend on the social media site per day?
 Should downloading the social media app be allowed on my smart
phone?
 Am I going to allow anyone to follow/friend me? Or am I only going to
accept and request people I actually know?
 What type of information am I going to allow my friends/followers to
read about me?
 Phone number
 Address
 Where I work or attend school
 Who I am in a relationship with and my family is
 What my hobbies, interests, favorite books and movies are
 Email address
+
Step 2: Identify Potential
Reputational Risks
 Realize that everything that is posted Online, is never to be
forgotten. Once you have shared that picture, status, video, etc.
to the world, it is no longer truly just yours.
 Only post things that you wouldn’t mind your Grandmother
seeing, or being on the front page of the paper.
 Try to limit the amount of time/posts on social media, while
intoxicated.
 Cyber bulling is a serious crime, and leaves paper trails.
+
Step 3- Develop Strong Password
Polices
 Most social media sites now are requiring that a password be
eight characters long, with an uppercase letter, and some sort
of symbol or number.
 Even with this enforced by the site, take it upon yourself to
change your password periodically.
 Don’t choice a password that is too easy:
 Password, with any type of number or symbol after it
 Your first, or last name
 Don’t share your password with anyone or leave your account
signed in on anyone else's devices.
+ Step 4: Ensure Appropriate Steps are Taken to
Protect Your Web Content from Unauthorized
Access or Modification
 Social Media sites are giving more security options. The tricky
part is to find them, and alter them to your comfortably. When
first making a website, all security settings are turned off. Go to
settings and choice what you would like to share to friends, the
world and what would like to be kept private. Like:
 Photos, posts, comments and personal information
 After setting the appropriate security, check to see “what others
see” when they look at your page.
 This can be with friends, the public, or someone that you have hid
things from. Just to verify everything is how you intended them to
be.
+
Step 5- Don’t Fall for Fake
Ads/Offers
 Many times on facebook, twitter, and instragram, ads are
posted to your newsfeeds. Most of them saying “You just won a
free iPhone! Click here to claim your prize” This is a scam, and
it will compromise your account.
 Also messages, friends of your who’s accounts have been
compromised will most often send you messages trying to get
you to click on a link.
 For example: “OMG, have you heard what they did to your picture?!
Look at this,” And they include some type of link
 This is a type of fraud, and will cause you too, to have this virus on
your account
+
Becoming Second Nature..
 If more people thought about there social media plan before
making an account, they wouldn’t be in such distress later
down the road.
 Social media is becoming part of our everyday lives, not just for
social actives, but work and school related too.
 Business's are not just looking at your resume to find out what kind
of work ethic or person you are, they are turning to a more reliable
source: social media. Whether or not you get the job is now highly
congruent with who you are on social media.
 If you are a big partier, who never has anything good to say on
their site, you can think again before getting that dream job you
wanted.
+
Becoming Second Nature. Continued
 Now colleges and even high schools are looking more deep
into students social media websites. Teenagers and young
adults need to understand that sometimes privacy is a good
thing.
 Everyone does not need to know that you were at a underage party,
or that you do drugs. Better yet, YOU shouldn’t want anyone to
know. These types of posts, are not only getting you in trouble, but
limiting your chances of getting into the dream college you always
wanted. Its not just business that look at social media sites for more
personal information, it schools too.
+
Lets Get Serious..
 If people started to realize that social media’s isn’t just a site to
be “cool” or to brag about how amazing your life is, that it’s
sites to reconnect and express yourself. Social media is Online.
Once information is Online, it is never forgotten. Privacy, is
real. Security is out there helping to protect us, only if we are
smart enough to wake up and see it. Facebook, twitter and etc.
are trying to help make Online a safer place. Now as people, it
is our turn to not only take what is available to us, but learn
from previous lessons. Don’t make the same mistakes that we
have read about, witnessed with our own eyes. Instead stand
up and realize that social media is a privilege.

More Related Content

What's hot

Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety pptmcmullan
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsEllie Simons
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social mediaKwazi Communications
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementaryjaimejoyh
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsBen Woelk, CISSP, CPTC
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
SOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHSOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHCBD College
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet SafetyKigose
 
Internet safety
Internet safetyInternet safety
Internet safetywalsh008
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullyingYumna Ali
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling finalKaren Brooks
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101Chad Richards
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpointMsCCostello
 

What's hot (20)

Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Internet safety ppt
Internet safety pptInternet safety ppt
Internet safety ppt
 
Cyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school studentsCyber safety: internet safety presentation for middle school students
Cyber safety: internet safety presentation for middle school students
 
How to keep your teens safe on social media
How to keep your teens safe on social mediaHow to keep your teens safe on social media
How to keep your teens safe on social media
 
Heads up!
Heads up!Heads up!
Heads up!
 
Internet Safety Elementary
Internet Safety ElementaryInternet Safety Elementary
Internet Safety Elementary
 
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and ParentsCyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
SOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTHSOCIAL MEDIA AWARENESS MONTH
SOCIAL MEDIA AWARENESS MONTH
 
5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety5 Donts, Why and How - Internet Safety
5 Donts, Why and How - Internet Safety
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Keeping our kids e safe parents
Keeping our kids e safe parentsKeeping our kids e safe parents
Keeping our kids e safe parents
 
Internet safety and cyber bulling final
Internet safety and cyber bulling finalInternet safety and cyber bulling final
Internet safety and cyber bulling final
 
Social Media & Children's Safety 101
Social Media & Children's Safety 101Social Media & Children's Safety 101
Social Media & Children's Safety 101
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Parents' Guide to Instagram - for kids
Parents' Guide to Instagram - for kidsParents' Guide to Instagram - for kids
Parents' Guide to Instagram - for kids
 
Internet safety
Internet safety Internet safety
Internet safety
 
Cybersafety powerpoint
Cybersafety powerpointCybersafety powerpoint
Cybersafety powerpoint
 

Similar to Project

Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of TeensKate Gukeisen
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshareLoreto Normanurst
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSIMNchannel
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sitesner1eje
 
Social media responsibility
Social media responsibilitySocial media responsibility
Social media responsibilityShwetaSBhatia
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and AdvantageTechno World 4 U
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
How Protected Are You?
How Protected Are You?How Protected Are You?
How Protected Are You?Alyssa Lewis
 
Social Media and the Job World
Social Media and the Job WorldSocial Media and the Job World
Social Media and the Job WorldMike Schaffer
 
digital-footprint.pptx
digital-footprint.pptxdigital-footprint.pptx
digital-footprint.pptxCatherine Seo
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 

Similar to Project (20)

Social Media for Parents of Teens
Social Media for Parents of TeensSocial Media for Parents of Teens
Social Media for Parents of Teens
 
Social networking and student wellbeing slideshare
Social networking and student wellbeing slideshareSocial networking and student wellbeing slideshare
Social networking and student wellbeing slideshare
 
Security and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptxSecurity and Privacy in Social Networks.pptx
Security and Privacy in Social Networks.pptx
 
Proper use of social networking sites
Proper use of social networking sitesProper use of social networking sites
Proper use of social networking sites
 
Social media responsibility
Social media responsibilitySocial media responsibility
Social media responsibility
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Social media
Social mediaSocial media
Social media
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
How Protected Are You?
How Protected Are You?How Protected Are You?
How Protected Are You?
 
Social Media and the Job World
Social Media and the Job WorldSocial Media and the Job World
Social Media and the Job World
 
digital-footprint.pptx
digital-footprint.pptxdigital-footprint.pptx
digital-footprint.pptx
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsCol Mukteshwar Prasad
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryEugene Lysak
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...Sayali Powar
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportAvinash Rai
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Abhinav Gaur Kaptaan
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointELaRue0
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesTechSoup
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 

Recently uploaded (20)

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
UNIT – IV_PCI Complaints: Complaints and evaluation of complaints, Handling o...
 
Industrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training ReportIndustrial Training Report- AKTU Industrial Training Report
Industrial Training Report- AKTU Industrial Training Report
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
Research Methods in Psychology | Cambridge AS Level | Cambridge Assessment In...
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 

Project

  • 1. + Social Media Security Plan Adrie Newton
  • 2. + What Needs To Be Done  Establish a social media policy  Identify potential reputation risk  Only appropriate content is published on your website  Develop strong password policies  Ensure appropriate steps are taken to protect your web content from unauthorized access or modification  Don’t fall for fake offers/ads
  • 3. + Step 1: Establishing a Social Media Policy  Before even making any social media account the users own personal policies should be determined  How much time will I spend on the social media site per day?  Should downloading the social media app be allowed on my smart phone?  Am I going to allow anyone to follow/friend me? Or am I only going to accept and request people I actually know?  What type of information am I going to allow my friends/followers to read about me?  Phone number  Address  Where I work or attend school  Who I am in a relationship with and my family is  What my hobbies, interests, favorite books and movies are  Email address
  • 4. + Step 2: Identify Potential Reputational Risks  Realize that everything that is posted Online, is never to be forgotten. Once you have shared that picture, status, video, etc. to the world, it is no longer truly just yours.  Only post things that you wouldn’t mind your Grandmother seeing, or being on the front page of the paper.  Try to limit the amount of time/posts on social media, while intoxicated.  Cyber bulling is a serious crime, and leaves paper trails.
  • 5. + Step 3- Develop Strong Password Polices  Most social media sites now are requiring that a password be eight characters long, with an uppercase letter, and some sort of symbol or number.  Even with this enforced by the site, take it upon yourself to change your password periodically.  Don’t choice a password that is too easy:  Password, with any type of number or symbol after it  Your first, or last name  Don’t share your password with anyone or leave your account signed in on anyone else's devices.
  • 6. + Step 4: Ensure Appropriate Steps are Taken to Protect Your Web Content from Unauthorized Access or Modification  Social Media sites are giving more security options. The tricky part is to find them, and alter them to your comfortably. When first making a website, all security settings are turned off. Go to settings and choice what you would like to share to friends, the world and what would like to be kept private. Like:  Photos, posts, comments and personal information  After setting the appropriate security, check to see “what others see” when they look at your page.  This can be with friends, the public, or someone that you have hid things from. Just to verify everything is how you intended them to be.
  • 7. + Step 5- Don’t Fall for Fake Ads/Offers  Many times on facebook, twitter, and instragram, ads are posted to your newsfeeds. Most of them saying “You just won a free iPhone! Click here to claim your prize” This is a scam, and it will compromise your account.  Also messages, friends of your who’s accounts have been compromised will most often send you messages trying to get you to click on a link.  For example: “OMG, have you heard what they did to your picture?! Look at this,” And they include some type of link  This is a type of fraud, and will cause you too, to have this virus on your account
  • 8. + Becoming Second Nature..  If more people thought about there social media plan before making an account, they wouldn’t be in such distress later down the road.  Social media is becoming part of our everyday lives, not just for social actives, but work and school related too.  Business's are not just looking at your resume to find out what kind of work ethic or person you are, they are turning to a more reliable source: social media. Whether or not you get the job is now highly congruent with who you are on social media.  If you are a big partier, who never has anything good to say on their site, you can think again before getting that dream job you wanted.
  • 9. + Becoming Second Nature. Continued  Now colleges and even high schools are looking more deep into students social media websites. Teenagers and young adults need to understand that sometimes privacy is a good thing.  Everyone does not need to know that you were at a underage party, or that you do drugs. Better yet, YOU shouldn’t want anyone to know. These types of posts, are not only getting you in trouble, but limiting your chances of getting into the dream college you always wanted. Its not just business that look at social media sites for more personal information, it schools too.
  • 10. + Lets Get Serious..  If people started to realize that social media’s isn’t just a site to be “cool” or to brag about how amazing your life is, that it’s sites to reconnect and express yourself. Social media is Online. Once information is Online, it is never forgotten. Privacy, is real. Security is out there helping to protect us, only if we are smart enough to wake up and see it. Facebook, twitter and etc. are trying to help make Online a safer place. Now as people, it is our turn to not only take what is available to us, but learn from previous lessons. Don’t make the same mistakes that we have read about, witnessed with our own eyes. Instead stand up and realize that social media is a privilege.