SlideShare a Scribd company logo
Social Media and Security Risks
http://www.isaca.lk/ info@isaca.lk
Parakum Pathirana
Principal Consultant – LOLC Technologies, President – ISACA Sri Lanka Chapter
MSc, FBCS, CISA, CISM, CGEIT, CISSP, ISO 27001 LA, MCP, CHFI, QCS, ITIL, CCSK
Disclaimer
• I’m employed in the #infosec industry, however not
authorized to speak on behalf of my employer/
clients
• Everything I say can be blamed on the voices in
your head
My credentials
• 9+ years in #Infosec field
• Tutor, consultant/ advisor,
auditor, head of InfoSec
• Sectors: financial, leisure,
manufacturing, advertising,
gov, insurance, etc.
• Crazy about #cycling, #infosec,
#socialmedia
• Still learning and not an expert
at anything
• lk.linkedin.com/pub/parakum-
pathirana/2/a52/2a2/
Agenda
• Key facts
• Sri Lanka digital overview
• Security threats
• Case study
• Facebook graph search
• Threats arising from third party applications
• TMI
• Defense
Social Media Jungle !!!
Facebook
Twitter
Key facts
• Facebook has over 1.11 billion monthly active
users, and daily active users passed 665 million 1
• Research suggests that only 14% of consumers
trust advertisements 2
• Social media & Arab spring
• Impact on Sri Lanka Presidential Elections 2015
• Free wi-fi
• Impact on individuals, organizations, etc.
Sri Lanka digital overview
Attribute Sri Lanka Indonesia Malaysia
Total population 21,675,648 251,160,124 29,628,392
Internet users 3,927,948 72,700,000 19,200,408
Internet penetration 18% 29% 65%
Active Facebook accounts 2,000,000 62,000,000 15,600,000
Facebook penetration 9% 25% 53%
Active mobile subscriptions 20,324,070 281,963,665 41,324,700
Mobile subscription penetration 94% 112% 139%
Percentage of mobile subscriptions
that are 3G connections
13% 22% 43%
Number of active mobile broadband
subscriptions
953,000 80,100,000 4,000,000
Mobile broadband subscriptions as a
percentage of the total population
4.4% 32% 14%
Active social media users accessing
social media on a mobile device
1,400,000 52,000,000 13,000,000
Penetration of mobile social as a
percentage of the total population
6.6% 21% 44%
Security threats
• Malware distribution
• Koobface - a worm masquerading as Adobe Flash Player update
• Started in 2009, users were enticed to watch a funny video, then
conned into “updating” Flash
• Koobface connected infected computers to botnet, served
machines ads for fake antivirus software
• Estimated 400,000–800,000 bots in 2010
• Cyber stalking/ harassment
• Privacy concerns
• Impact on employment, reputation, etc.
• Concerns for organizations: brand reputation, laws
and regulations
Security threats
Case Study
Case Study
•Not the first time Sir
John has been left red-
faced over photos posted
on Facebook.
• His wife, Lady Sawers,
put up a picture of Sir
John wearing skimpy
swimming shorts on her
Facebook page last May
when he was appointed
to the MI6 top job.
News Highlights
Facebook Graph Search
Social Networking – Local context
Cricket Sri Lanka
J.P. Morgan
Threats arising from third party applications
• Anyone can write one…No assurance on security
or privacy
• No complete Terms and Conditions – either allow
or deny
• Once installed, developers will have access rights
to look at your profile and overrides your privacy
settings!
TMI
• Lack of common sense: it’s very difficult to delete
information after it’s been posted online
• Indiscreet information can adversely affect college
employment, your personal life, etc.
“Connor Riley: “Cisco just offered me a job! Now I have to weigh
the utility of a [big] paycheck against the daily commute to San
Jose and hating the work.”
• Location services, be careful when you check-in
• URL shortner services
• E.g. bit.ly
How to defend yourself?
• Reasonable “Common sense” measures
• Use strong, unique passwords
• Provide minimal personal information: avoid entering birthdate,
address, etc.
• Review privacy settings, set them to “maximum privacy”
• “Friends of friends” includes far more people than “friends only”
• Exercise discretion about posted material:
• Pictures, videos, etc.
• Opinions on controversial issues
• Anything involving coworkers, bosses, classmates
• Anything related to employer (unless authorized to do so)
• Be wary of third party apps
• Supervise children on social media
How to defend yourself?
• “If it sounds too good to be true, it probably is”
• Use browser security tools for protection:
• Anti-phishing filters (IE, Firefox, Chrome)
• Web of Trust
• AdBlock/NoScript
• Personal reputation management:
• Search for yourself online, look at the results…
• Google Alerts
• Extreme cases:
• Cease using, delete accounts?
• Contact law enforcement
How to defend yourself?
• Combatting url shortners
• Think before you click?
Defense strategy for organizations
• Monitoring & Responding
• Formulating the necessary policy framework
• Awareness
….
Thank you

More Related Content

What's hot

Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
rayarren06
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 

What's hot (20)

Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Social engineering
Social engineering Social engineering
Social engineering
 

Viewers also liked

Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
Pink Elephant
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
Jackseen Jeyaluck
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
Challenge:Future
 

Viewers also liked (20)

Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
The Lanka Gate Initiative
The Lanka Gate InitiativeThe Lanka Gate Initiative
The Lanka Gate Initiative
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri Lanka
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way Forward
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri Lanka
 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic Commerce
 
Guide to-social-media--2016
Guide to-social-media--2016Guide to-social-media--2016
Guide to-social-media--2016
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
Ict act in sri lanka
Ict act in sri lankaIct act in sri lanka
Ict act in sri lanka
 
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURESRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 

Similar to Social media and Security risks

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 

Similar to Social media and Security risks (20)

Cyber security
Cyber security Cyber security
Cyber security
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Security beyond compliance
Security beyond complianceSecurity beyond compliance
Security beyond compliance
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Building a professional digital identity
Building a professional digital identityBuilding a professional digital identity
Building a professional digital identity
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
 

More from Parakum Pathirana

More from Parakum Pathirana (10)

Cyber Threat Landscape - A Local Perspective
Cyber Threat Landscape - A Local PerspectiveCyber Threat Landscape - A Local Perspective
Cyber Threat Landscape - A Local Perspective
 
Unplug Yourself
Unplug YourselfUnplug Yourself
Unplug Yourself
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters?
 
IoT Adoption
IoT AdoptionIoT Adoption
IoT Adoption
 
Social Media Adoption among the Banking Sector in Sri Lanka: Paper presented ...
Social Media Adoption among the Banking Sector in Sri Lanka: Paper presented ...Social Media Adoption among the Banking Sector in Sri Lanka: Paper presented ...
Social Media Adoption among the Banking Sector in Sri Lanka: Paper presented ...
 
Social Media Governance
Social Media GovernanceSocial Media Governance
Social Media Governance
 
Disruptive Technologies
Disruptive TechnologiesDisruptive Technologies
Disruptive Technologies
 
Software Standards
Software StandardsSoftware Standards
Software Standards
 
Social media & the Financial Sector
Social media & the Financial SectorSocial media & the Financial Sector
Social media & the Financial Sector
 
digital tattoo
digital tattoodigital tattoo
digital tattoo
 

Recently uploaded

“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
AJHSSR Journal
 
How to blow up on social media simple di
How to blow up on social media simple diHow to blow up on social media simple di
How to blow up on social media simple di
RachaelOnuche
 

Recently uploaded (16)

Social Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfklSocial Media kdjhadhnjbdsjbdff fjkjasfkl
Social Media kdjhadhnjbdsjbdff fjkjasfkl
 
“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...“To be integrated is to feel secure, to feel connected.” The views and experi...
“To be integrated is to feel secure, to feel connected.” The views and experi...
 
Experience genuine and sustainable growth on TikTok.
Experience genuine and sustainable growth on TikTok.Experience genuine and sustainable growth on TikTok.
Experience genuine and sustainable growth on TikTok.
 
How to blow up on social media simple di
How to blow up on social media simple diHow to blow up on social media simple di
How to blow up on social media simple di
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE TRELLO.pptx
 
Children's Data Privacy_April-22_2024.pdf
Children's Data Privacy_April-22_2024.pdfChildren's Data Privacy_April-22_2024.pdf
Children's Data Privacy_April-22_2024.pdf
 
7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy7 Tips on Social Media Marketing strategy
7 Tips on Social Media Marketing strategy
 
Multilingual SEO Services | Multilingual Keyword Research | Filose
Multilingual SEO Services |  Multilingual Keyword Research | FiloseMultilingual SEO Services |  Multilingual Keyword Research | Filose
Multilingual SEO Services | Multilingual Keyword Research | Filose
 
How social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdfHow social media marketing helps businesses in 2024.pdf
How social media marketing helps businesses in 2024.pdf
 
Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...
 
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
Call Girls Dehradun | ₹,9500 Pay Cash 9719300533 Free Home Delivery Escorts S...
 
Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....Get Ahead with YouTube Growth Services....
Get Ahead with YouTube Growth Services....
 
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm RiskNon-Financial Information and Firm Risk Non-Financial Information and Firm Risk
Non-Financial Information and Firm Risk Non-Financial Information and Firm Risk
 
Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........Grow Your Reddit Community Fast.........
Grow Your Reddit Community Fast.........
 
Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..Unlock TikTok Success with Sociocosmos..
Unlock TikTok Success with Sociocosmos..
 
Top 10 Best Motivational Movies Of Bollywood
Top 10 Best Motivational Movies Of BollywoodTop 10 Best Motivational Movies Of Bollywood
Top 10 Best Motivational Movies Of Bollywood
 

Social media and Security risks

  • 1. Social Media and Security Risks http://www.isaca.lk/ info@isaca.lk Parakum Pathirana Principal Consultant – LOLC Technologies, President – ISACA Sri Lanka Chapter MSc, FBCS, CISA, CISM, CGEIT, CISSP, ISO 27001 LA, MCP, CHFI, QCS, ITIL, CCSK
  • 2. Disclaimer • I’m employed in the #infosec industry, however not authorized to speak on behalf of my employer/ clients • Everything I say can be blamed on the voices in your head
  • 3. My credentials • 9+ years in #Infosec field • Tutor, consultant/ advisor, auditor, head of InfoSec • Sectors: financial, leisure, manufacturing, advertising, gov, insurance, etc. • Crazy about #cycling, #infosec, #socialmedia • Still learning and not an expert at anything • lk.linkedin.com/pub/parakum- pathirana/2/a52/2a2/
  • 4. Agenda • Key facts • Sri Lanka digital overview • Security threats • Case study • Facebook graph search • Threats arising from third party applications • TMI • Defense
  • 8. Key facts • Facebook has over 1.11 billion monthly active users, and daily active users passed 665 million 1 • Research suggests that only 14% of consumers trust advertisements 2 • Social media & Arab spring • Impact on Sri Lanka Presidential Elections 2015 • Free wi-fi • Impact on individuals, organizations, etc.
  • 9. Sri Lanka digital overview Attribute Sri Lanka Indonesia Malaysia Total population 21,675,648 251,160,124 29,628,392 Internet users 3,927,948 72,700,000 19,200,408 Internet penetration 18% 29% 65% Active Facebook accounts 2,000,000 62,000,000 15,600,000 Facebook penetration 9% 25% 53% Active mobile subscriptions 20,324,070 281,963,665 41,324,700 Mobile subscription penetration 94% 112% 139% Percentage of mobile subscriptions that are 3G connections 13% 22% 43% Number of active mobile broadband subscriptions 953,000 80,100,000 4,000,000 Mobile broadband subscriptions as a percentage of the total population 4.4% 32% 14% Active social media users accessing social media on a mobile device 1,400,000 52,000,000 13,000,000 Penetration of mobile social as a percentage of the total population 6.6% 21% 44%
  • 10. Security threats • Malware distribution • Koobface - a worm masquerading as Adobe Flash Player update • Started in 2009, users were enticed to watch a funny video, then conned into “updating” Flash • Koobface connected infected computers to botnet, served machines ads for fake antivirus software • Estimated 400,000–800,000 bots in 2010 • Cyber stalking/ harassment • Privacy concerns • Impact on employment, reputation, etc. • Concerns for organizations: brand reputation, laws and regulations
  • 13. Case Study •Not the first time Sir John has been left red- faced over photos posted on Facebook. • His wife, Lady Sawers, put up a picture of Sir John wearing skimpy swimming shorts on her Facebook page last May when he was appointed to the MI6 top job.
  • 15.
  • 17. Social Networking – Local context
  • 20. Threats arising from third party applications • Anyone can write one…No assurance on security or privacy • No complete Terms and Conditions – either allow or deny • Once installed, developers will have access rights to look at your profile and overrides your privacy settings!
  • 21. TMI • Lack of common sense: it’s very difficult to delete information after it’s been posted online • Indiscreet information can adversely affect college employment, your personal life, etc. “Connor Riley: “Cisco just offered me a job! Now I have to weigh the utility of a [big] paycheck against the daily commute to San Jose and hating the work.” • Location services, be careful when you check-in • URL shortner services • E.g. bit.ly
  • 22. How to defend yourself? • Reasonable “Common sense” measures • Use strong, unique passwords • Provide minimal personal information: avoid entering birthdate, address, etc. • Review privacy settings, set them to “maximum privacy” • “Friends of friends” includes far more people than “friends only” • Exercise discretion about posted material: • Pictures, videos, etc. • Opinions on controversial issues • Anything involving coworkers, bosses, classmates • Anything related to employer (unless authorized to do so) • Be wary of third party apps • Supervise children on social media
  • 23. How to defend yourself? • “If it sounds too good to be true, it probably is” • Use browser security tools for protection: • Anti-phishing filters (IE, Firefox, Chrome) • Web of Trust • AdBlock/NoScript • Personal reputation management: • Search for yourself online, look at the results… • Google Alerts • Extreme cases: • Cease using, delete accounts? • Contact law enforcement
  • 24. How to defend yourself? • Combatting url shortners • Think before you click?
  • 25. Defense strategy for organizations • Monitoring & Responding • Formulating the necessary policy framework • Awareness
  • 26.
  • 27. ….

Editor's Notes

  1. PR Newswire. (2013, May 1) Facebook Reports First Quarter 2013 Results. Retrieved August 15th, 2013, from http://www.prnewswire.com/news-releases/205652631.html. Qualman, E. (2012) Digital Leader. McGraw-Hill Gunawardene, N. (2015) Was #PresPollSL 2015 Sri Lanka’s first Cyber Election?, accessed on 13th January 2015, available at http://groundviews.org/2015/01/13/was-prespollsl-2015-sri-lankas-first-cyber-election/
  2. We are Social's 2014 Asia-Pacific Digital Overview (2014). Retrieved March18th, 2014, from http://www.slideshare.net/wearesocialsg/social-digital-mobile-in-apac
  3. Alexa Dell posing with her father 2012: dell spends 2.7million/ year on family security The Twitter account of Michael Dell’s daughter has been closed with speculation blaming the teen’s habit of carelessly broadcasting her family’s movements, including that of her father, in a way that undermined security