SlideShare a Scribd company logo
1 of 22
Download to read offline
Ten Ways to
                          Shockproof Your
                          Use of Social Media


Ben Woelk
Policy and Awareness Analyst
Rochester Institute of Technology
585.475.4122
fbwis@rit.edu
Introduction
 • Everyone is a target
 • Identity theft is big business
 • You can’t rely on others to protect you




                                             2
Identity Theft




 • What’s the problem with this picture?




                                           3
General Trends




https://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_2010.pdf
Digital Self Defense
 • Protect yourself and everyone else
 • Use the right tools
 • Do the right things




                                        5
Avert Labs Malware Research




                                                                                                     6
Retrieved July 24, 2009 from:
http://www.avertlabs.com/research/blog/index.php/2009/07/22/malware-is-their-businessand-business-is-good/
Tip # 1 Passwords
 • Weak passwords can be guessed
   – Automated programs
   – Personal details
 • Use different passwords
   – How many accounts can be accessed with
     just one of your passwords?
   – Password vaults
 • Passphrases

                                              7
Tip # 2 Patching/Updating
 Patching:
 • Fixes “vulnerabilities” in software
 You need to:
 • Turn on auto-updating (Windows, Mac OS X)
 • Check regularly for application updates
   (Adobe, Microsoft Office, etc.)
 • ESPECIALLY ADOBE (malicious PDFs)



                                               8
Tip #3 Security Software
 • Anti-Virus Protection
 • Firewall
 • Anti-Spyware Protection




                             9
Tip #4 Recognize Phishing/Scams
 • Purpose
   – “verify/confirm/authorize” account or
     personal information
 • Source
   – Appear to come from PayPal, banks, ISPs,
     IT departments, other official or
     authoritative sources
 • Tone
   – Appeals to fear, greed, urgency,
     sympathy
                                                10
Phishing Tips
 • Does it seem credible?
   – Misspellings, bad grammar,
     formatting errors
 • File attachments
   – Is it expected? If not, ignore it!
 • Never respond directly to e-mail
   requests for private information
   – Verify with company
   – Don’t click on links
                                          11
Phishing on Social Network Sites




                                                                            12
 http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf
Tip #5 Use Social Networks Safely
Do:
• Make friends
• Use privacy settings
• Be conscious of the
  image you project

Don’t:
• Post personal information
• Post schedules or whereabouts
• Post inappropriate photos
                                  13
Tip #6 Remember Who Else is There

 • Who else uses social networking?
   – Employers
   – Identity Thieves
   – Online Predators
 • Facebook Stalker
  (http://www.youtube.com/watch?v=wCh9bmg0zGg)




                                                 14
What You Post Can Be Used To…
 • Make judgments about your character
 • Impersonate you to financial institutions
 • Monitor what you do and where you go
   – Theft
   – Harassment
   – Assault




                                               15
Not YourSpace
 Would I be comfortable if this
 were posted on a billboard?

 The Internet is public space!
 • Search results
 • Photo “tagging”




                                  16
Tip #7 Be wary of others
 • Choose your friends carefully
 • "41% of Facebook users agreed to be
   friends with this plastic frog,
   opening themselves up to the risk
   of identity theft."
 • The frog’s name was Freddi Staur
   – http://podcasts.sophos.com/en/sophos-
     podcasts-019.mp3



                                             17
Is this really your friend?
 When “friends” ask for money online
 • Do they speak/write like your friend?
 • Do they know any details about you or
   themselves that do NOT appear on Facebook
   profile pages?
 • Do they refuse other forms of help, phone call
   requests, etc.?


 Just because it is your friend’s account does not
 mean that it’s your friend!
                                                     18
Tip #8 Search for your name
 • Do a vanity search
 • Set up a Google Alert




                              19
Tip #9 Guard Your Personal
Information!
 • Even less sensitive information can
   be exploited by an attacker!
 • Don’t post it in public places
 • Know to whom you’re giving it
 • Watch out for Facebook Applications!!
   – A 2008 study found that 90.7% of apps had
     access to private user data (only 9.3% actually
     used the data)


                                                       20
Tip #10 Use Privacy Settings
 • Default settings are set to sharing information

 • Adjust Facebook privacy settings to help
   protect your identity

 • Think carefully about who you allow to
   become your friend

 • Show "limited friends" a cut-down version of
   your profile

 • Disable options, then open them one by one
http://www.sophos.com/security/best-practice/facebook.html
The First Line of Defense
  Stay alert—you will be the first to know if
    something goes wrong
    – Are you receiving odd communications from
      someone?
    – Is your computer sounding strange or slower
      than normal?
    – Has there been some kind of incident or warning
      in the news?
  Do something about it!
    – Run a scan
    – Ask for help

More Related Content

What's hot

Digital Citizenship Initiative1
Digital Citizenship Initiative1Digital Citizenship Initiative1
Digital Citizenship Initiative1kathyschmo
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimesmarkgernale24
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersMark White
 
Secure social networking
Secure social networkingSecure social networking
Secure social networkingOsaid To'meh
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram communityMohammed Adam
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and ChldrenJoe Drumgoole
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Eanes isd
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safetyErnest Staats
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Onlinetomasztopa
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Velma
 

What's hot (20)

Internet savety
Internet savetyInternet savety
Internet savety
 
Digital Citizenship Initiative1
Digital Citizenship Initiative1Digital Citizenship Initiative1
Digital Citizenship Initiative1
 
Bully
BullyBully
Bully
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Internet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & TeachersInternet Safety; A Guide for Parents & Teachers
Internet Safety; A Guide for Parents & Teachers
 
Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu Power Point Presentation by Auwalu Adamu
Power Point Presentation by Auwalu Adamu
 
Secure social networking
Secure social networkingSecure social networking
Secure social networking
 
CyberSafety
CyberSafetyCyberSafety
CyberSafety
 
Introduction to null villupuram community
Introduction to null villupuram communityIntroduction to null villupuram community
Introduction to null villupuram community
 
Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Davy Lunch & Learn
Davy Lunch & LearnDavy Lunch & Learn
Davy Lunch & Learn
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Surfer Dude
Surfer DudeSurfer Dude
Surfer Dude
 
Internet Safety and Chldren
Internet Safety and ChldrenInternet Safety and Chldren
Internet Safety and Chldren
 
Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet Keeping Your Child Safe On The Internet
Keeping Your Child Safe On The Internet
 
Social mobile safety
Social mobile safetySocial mobile safety
Social mobile safety
 
Social media security challenges
Social media security challengesSocial media security challenges
Social media security challenges
 
Teen Privacy Online
Teen Privacy OnlineTeen Privacy Online
Teen Privacy Online
 
Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02Becybersmart 110605083310-phpapp02
Becybersmart 110605083310-phpapp02
 

Viewers also liked

Viewers also liked (6)

STC SIG Benefits
STC SIG BenefitsSTC SIG Benefits
STC SIG Benefits
 
Sig benefits formatted 11 16 final-1
Sig benefits formatted 11 16 final-1Sig benefits formatted 11 16 final-1
Sig benefits formatted 11 16 final-1
 
Effect of dissemination of evidence
Effect of dissemination of evidenceEffect of dissemination of evidence
Effect of dissemination of evidence
 
Stc sm mlockwood-portfolio-pres-1-20-11
Stc sm mlockwood-portfolio-pres-1-20-11Stc sm mlockwood-portfolio-pres-1-20-11
Stc sm mlockwood-portfolio-pres-1-20-11
 
More betterlabs stc-ux-101-slides
More betterlabs stc-ux-101-slidesMore betterlabs stc-ux-101-slides
More betterlabs stc-ux-101-slides
 
STC Technial Editing SIG - SIGs on Parade
STC Technial Editing SIG - SIGs on ParadeSTC Technial Editing SIG - SIGs on Parade
STC Technial Editing SIG - SIGs on Parade
 

Similar to 10 Ways to Shockproof Your Use of Social Media

Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaBen Woelk, CISSP, CPTC
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Smart social networking
Smart social networkingSmart social networking
Smart social networkingKim Grewe
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayanehaz
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Scott Wright
 
Social Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewSocial Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewPeter Wood
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentNicholas Davis
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentNicholas Davis
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxSheenaAFuentes
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxsheena711714
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 

Similar to 10 Ways to Shockproof Your Use of Social Media (20)

Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Smart social networking
Smart social networkingSmart social networking
Smart social networking
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
 
Social Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's ViewSocial Networking - An Ethical Hacker's View
Social Networking - An Ethical Hacker's View
 
6 online identity
6 online identity6 online identity
6 online identity
 
6 online identity
6 online identity6 online identity
6 online identity
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research Environment
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research Environment
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptxL2 Rules of Netiquette.pptx
L2 Rules of Netiquette.pptx
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 

More from Carolina Chapter of STC

From Job Description to Job Offer - A Hiring Manager's Journey
From Job Description to Job Offer - A Hiring Manager's JourneyFrom Job Description to Job Offer - A Hiring Manager's Journey
From Job Description to Job Offer - A Hiring Manager's JourneyCarolina Chapter of STC
 
Finding the right authoring tool - STC Carolina Event 2018
Finding the right authoring tool - STC Carolina Event 2018Finding the right authoring tool - STC Carolina Event 2018
Finding the right authoring tool - STC Carolina Event 2018Carolina Chapter of STC
 
STC Carolina Summit 2018 Recap: Jamie Gillenwater
STC Carolina Summit 2018 Recap: Jamie GillenwaterSTC Carolina Summit 2018 Recap: Jamie Gillenwater
STC Carolina Summit 2018 Recap: Jamie GillenwaterCarolina Chapter of STC
 
STC Carolina Summit 2018 Recap: Larry Kunz
STC Carolina Summit 2018 Recap: Larry KunzSTC Carolina Summit 2018 Recap: Larry Kunz
STC Carolina Summit 2018 Recap: Larry KunzCarolina Chapter of STC
 
STC Carolina Summit 2018 Recap: Nate Wolf
STC Carolina Summit 2018 Recap: Nate WolfSTC Carolina Summit 2018 Recap: Nate Wolf
STC Carolina Summit 2018 Recap: Nate WolfCarolina Chapter of STC
 
Beyond writing content strategy in technical communication
Beyond writing  content strategy in technical communicationBeyond writing  content strategy in technical communication
Beyond writing content strategy in technical communicationCarolina Chapter of STC
 
STC Summit 2017 - Gamification of ID Recap
STC Summit 2017 - Gamification of ID RecapSTC Summit 2017 - Gamification of ID Recap
STC Summit 2017 - Gamification of ID RecapCarolina Chapter of STC
 
StC Summit 2017 Highlights Presenteted by STC Carolina
StC Summit 2017 Highlights Presenteted by STC CarolinaStC Summit 2017 Highlights Presenteted by STC Carolina
StC Summit 2017 Highlights Presenteted by STC CarolinaCarolina Chapter of STC
 

More from Carolina Chapter of STC (19)

From Job Description to Job Offer - A Hiring Manager's Journey
From Job Description to Job Offer - A Hiring Manager's JourneyFrom Job Description to Job Offer - A Hiring Manager's Journey
From Job Description to Job Offer - A Hiring Manager's Journey
 
Finding the right authoring tool - STC Carolina Event 2018
Finding the right authoring tool - STC Carolina Event 2018Finding the right authoring tool - STC Carolina Event 2018
Finding the right authoring tool - STC Carolina Event 2018
 
STC Carolina Summit 2018 Recap: Jamie Gillenwater
STC Carolina Summit 2018 Recap: Jamie GillenwaterSTC Carolina Summit 2018 Recap: Jamie Gillenwater
STC Carolina Summit 2018 Recap: Jamie Gillenwater
 
STC Carolina Summit 2018 Recap: Larry Kunz
STC Carolina Summit 2018 Recap: Larry KunzSTC Carolina Summit 2018 Recap: Larry Kunz
STC Carolina Summit 2018 Recap: Larry Kunz
 
STC Carolina Summit 2018 Recap: Nate Wolf
STC Carolina Summit 2018 Recap: Nate WolfSTC Carolina Summit 2018 Recap: Nate Wolf
STC Carolina Summit 2018 Recap: Nate Wolf
 
STC Carolina Career day 2018 checklist
STC Carolina Career day 2018 checklistSTC Carolina Career day 2018 checklist
STC Carolina Career day 2018 checklist
 
Resume work sample_careerday2018 (1)
Resume work sample_careerday2018 (1)Resume work sample_careerday2018 (1)
Resume work sample_careerday2018 (1)
 
Preparing for an interview
Preparing for an interviewPreparing for an interview
Preparing for an interview
 
Beyond writing content strategy in technical communication
Beyond writing  content strategy in technical communicationBeyond writing  content strategy in technical communication
Beyond writing content strategy in technical communication
 
Make contentassetstc slides
Make contentassetstc slidesMake contentassetstc slides
Make contentassetstc slides
 
STC Summit 2017 - Gamification of ID Recap
STC Summit 2017 - Gamification of ID RecapSTC Summit 2017 - Gamification of ID Recap
STC Summit 2017 - Gamification of ID Recap
 
StC Summit 2017 Highlights Presenteted by STC Carolina
StC Summit 2017 Highlights Presenteted by STC CarolinaStC Summit 2017 Highlights Presenteted by STC Carolina
StC Summit 2017 Highlights Presenteted by STC Carolina
 
STC UUX SIG - SIGs on Parade
STC UUX SIG - SIGs on ParadeSTC UUX SIG - SIGs on Parade
STC UUX SIG - SIGs on Parade
 
STC AccessAbility SIG - SIGs on Parade
STC AccessAbility SIG - SIGs on ParadeSTC AccessAbility SIG - SIGs on Parade
STC AccessAbility SIG - SIGs on Parade
 
STC Academic SIG - SIGs on Parade
STC Academic SIG - SIGs on ParadeSTC Academic SIG - SIGs on Parade
STC Academic SIG - SIGs on Parade
 
STC Lone Writer SIG - SIGs on Parade
STC Lone Writer SIG - SIGs on ParadeSTC Lone Writer SIG - SIGs on Parade
STC Lone Writer SIG - SIGs on Parade
 
Internationalizing Your Content
Internationalizing Your ContentInternationalizing Your Content
Internationalizing Your Content
 
Internationalizing Your Content
Internationalizing Your ContentInternationalizing Your Content
Internationalizing Your Content
 
STC Certification Presentation
STC Certification PresentationSTC Certification Presentation
STC Certification Presentation
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

10 Ways to Shockproof Your Use of Social Media

  • 1. Ten Ways to Shockproof Your Use of Social Media Ben Woelk Policy and Awareness Analyst Rochester Institute of Technology 585.475.4122 fbwis@rit.edu
  • 2. Introduction • Everyone is a target • Identity theft is big business • You can’t rely on others to protect you 2
  • 3. Identity Theft • What’s the problem with this picture? 3
  • 5. Digital Self Defense • Protect yourself and everyone else • Use the right tools • Do the right things 5
  • 6. Avert Labs Malware Research 6 Retrieved July 24, 2009 from: http://www.avertlabs.com/research/blog/index.php/2009/07/22/malware-is-their-businessand-business-is-good/
  • 7. Tip # 1 Passwords • Weak passwords can be guessed – Automated programs – Personal details • Use different passwords – How many accounts can be accessed with just one of your passwords? – Password vaults • Passphrases 7
  • 8. Tip # 2 Patching/Updating Patching: • Fixes “vulnerabilities” in software You need to: • Turn on auto-updating (Windows, Mac OS X) • Check regularly for application updates (Adobe, Microsoft Office, etc.) • ESPECIALLY ADOBE (malicious PDFs) 8
  • 9. Tip #3 Security Software • Anti-Virus Protection • Firewall • Anti-Spyware Protection 9
  • 10. Tip #4 Recognize Phishing/Scams • Purpose – “verify/confirm/authorize” account or personal information • Source – Appear to come from PayPal, banks, ISPs, IT departments, other official or authoritative sources • Tone – Appeals to fear, greed, urgency, sympathy 10
  • 11. Phishing Tips • Does it seem credible? – Misspellings, bad grammar, formatting errors • File attachments – Is it expected? If not, ignore it! • Never respond directly to e-mail requests for private information – Verify with company – Don’t click on links 11
  • 12. Phishing on Social Network Sites 12 http://www.markmonitor.com/download/bji/BrandjackingIndex-Spring2009.pdf
  • 13. Tip #5 Use Social Networks Safely Do: • Make friends • Use privacy settings • Be conscious of the image you project Don’t: • Post personal information • Post schedules or whereabouts • Post inappropriate photos 13
  • 14. Tip #6 Remember Who Else is There • Who else uses social networking? – Employers – Identity Thieves – Online Predators • Facebook Stalker (http://www.youtube.com/watch?v=wCh9bmg0zGg) 14
  • 15. What You Post Can Be Used To… • Make judgments about your character • Impersonate you to financial institutions • Monitor what you do and where you go – Theft – Harassment – Assault 15
  • 16. Not YourSpace Would I be comfortable if this were posted on a billboard? The Internet is public space! • Search results • Photo “tagging” 16
  • 17. Tip #7 Be wary of others • Choose your friends carefully • "41% of Facebook users agreed to be friends with this plastic frog, opening themselves up to the risk of identity theft." • The frog’s name was Freddi Staur – http://podcasts.sophos.com/en/sophos- podcasts-019.mp3 17
  • 18. Is this really your friend? When “friends” ask for money online • Do they speak/write like your friend? • Do they know any details about you or themselves that do NOT appear on Facebook profile pages? • Do they refuse other forms of help, phone call requests, etc.? Just because it is your friend’s account does not mean that it’s your friend! 18
  • 19. Tip #8 Search for your name • Do a vanity search • Set up a Google Alert 19
  • 20. Tip #9 Guard Your Personal Information! • Even less sensitive information can be exploited by an attacker! • Don’t post it in public places • Know to whom you’re giving it • Watch out for Facebook Applications!! – A 2008 study found that 90.7% of apps had access to private user data (only 9.3% actually used the data) 20
  • 21. Tip #10 Use Privacy Settings • Default settings are set to sharing information • Adjust Facebook privacy settings to help protect your identity • Think carefully about who you allow to become your friend • Show "limited friends" a cut-down version of your profile • Disable options, then open them one by one http://www.sophos.com/security/best-practice/facebook.html
  • 22. The First Line of Defense Stay alert—you will be the first to know if something goes wrong – Are you receiving odd communications from someone? – Is your computer sounding strange or slower than normal? – Has there been some kind of incident or warning in the news? Do something about it! – Run a scan – Ask for help