SlideShare a Scribd company logo
SOCIAL MEDIA
SECURITY ,
PRIVACY , RISKS
AND CHALLENGES
SANDEEP THONIPARAMBIL
HERE WE
DISCUSS
 The evolution of social media has created a new
paradigm of communication and interaction. It has
become a part of our social life that helps us
connect to friends, family, colleagues, or others
 Issues involving Cybersecurity for social
media
 Risks & Challenges
 Solutions To Social Media Threats
PRIVACY OF
DATA:
 Users share their personal information on social
media, which can cause privacy breaches. It can
also sometimes cause personal data loss or
instigate hackers to leverage the same for
malicious reasons. For example, a user’s
information can be viewed by everyone if the
user’s default setting is public.
DATA MINING:
 We all leave a data trail behind on the internet.
When someone creates a new social
media account and provides details such as date
of birth, name, location, and personal habits, and
without our knowledge, all these data are
leveraged and shared with third-party for targeting
advertising. It can cause security concerns as
third-party may collect real-time updates on the
user’s location.
VIRUS AND
MALWARE
ATTACKS:
 Malware and viruses quite often find a way into
the computer system through annoying ads. Once
gaining access to the network, the attacker steals
confidential data or causes complete disruption to
the computer system. This often causes the loss
of all kinds of data – personal, professional,
financial, etc.
ISSUES
INVOLVING
THE USE OF
3RD PARTY
APPLICATIONS
:
 Most applications nowadays ask permission from
users to access personal information such as
contacts, pictures, and current geographic
location before installing, and some of these
applications which are running in the background
might download malware on the user’s phone or
smart devices without their knowledge.
LEGAL
ISSUES:
 There are legal risks associated with the use
of social media, like posting offensive content
towards any individual, community, or country.
Often, legal actions can be and are taken when
such offensive posts are made and uploaded by
any individual or organization.
IDENTITY
THEFT:
 As millions share their personal information to get
registered on one or more social media platforms,
this data becomes vulnerable as hackers and
identity thieves use this information to reset
passwords, apply for loans, or other malicious
objectives.
CYBER
BULLYING:
CYBER TERRORISM:
 It refers to bullying through the digital medium. It
can take place on social media, gaming, and
messaging platforms. It is aimed at scaring,
shaming, or annoying the targeted victim.
 Cyber Terrorism: Nowadays, social media is also
used to facilitate terrorism-related activities. It can
support, promote, engage, and spread terrorism
propaganda like incitement to terrorism,
recruitment, radicalizing training, and planning of
terrorist attacks.
SOLUTIONS ON
SOCIAL MEDIA
THREATS
Creating strong
passwords is the
primary option to
ensure the privacy of
your information.
Ensure passwords
are complex,
including upper &
lower case, numbers
and special
characters. It should
be memorized and
never be written on
paper.
We need to be
sensitive in what we
upload/share on our
social networking
accounts and avoid
sharing personal
information like date
of birth, social
security details,
phone numbers,
names, and pictures
of family members.
Use security and
privacy options
provided by social
media platforms viz:
2-factor
authentication
system, access
control.
Connect our devices only to
authorized wifi access, use
privacy options provided by
various mobile operating
systems, use auto-lock features,
and download apps only from
authorized app stores.
Keep the operating system
updated with the latest patches,
turn on the firewall, and avoid
installing cracked software.
Ensure our antivirus is updated
and scans are performed
frequently.
We need to be smart using the
internet and avoid visiting
untrusted websites; referral links
to visit websites are never to be
clicked; instead, type in the
browser’s URL address.
We must accept friend requests
only from people we know and
block those who post upsetting
content or comments.
SECURITY SETTINGS IN FACEBOOK
 1. Clear your history using ‘Off-Facebook Activity’
 2. Hide your location
 Disable Facial Recognition
 Get rid of apps that track you off Facebook
 5. Enable two-factor authentication to lock out hackers
 6. Stop search engines from showing your Facebook account
 7. Limit the audience for your personal posts
 8. Stop your activity from being advertised
 9. Avoid those Like and Share buttons on other parts of the web
 10. Clean up your Friends’ List
SECURITY SETTINGS IN WHATSAPP
 1. Who can see my profile?
2. WHO CAN SEE MY LAST SEEN?
3. STATUS PRIVACY
4. WHATSAPP GROUP PRIVACY AND SECURITY NOTIFICATION
5. HIDE ABOUT / LEGACY PROFILE STATUS
6. TWO-STEP VERIFICATION
7. LIVE LOCATION
THANKS

More Related Content

Similar to Social media: Issues

Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
AbirAhmed48
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
Gaurav Patel
 
unit 2.pptx
unit 2.pptxunit 2.pptx
unit 2.pptx
ThangamaniR3
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
Jahangirnagar University
 
Social Media Security
Social Media Security Social Media Security
Social Media Security
kamranrazzaq8
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
seadeloitte
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
Liberteks
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
devashishicai
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 
ESC Information Booklet EN
ESC Information Booklet ENESC Information Booklet EN
ESC Information Booklet EN
Pavel26766
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
Andrew_Braza
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
Abhinav Pathak
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
Preethi Kumaresh
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
RinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
RajviNikeetaRathore
 

Similar to Social media: Issues (20)

Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
 
Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
unit 2.pptx
unit 2.pptxunit 2.pptx
unit 2.pptx
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Social Media Security
Social Media Security Social Media Security
Social Media Security
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
ESC Information Booklet EN
ESC Information Booklet ENESC Information Booklet EN
ESC Information Booklet EN
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
How to safe online (presented by abhinav pathak)
How to safe online (presented by  abhinav pathak)How to safe online (presented by  abhinav pathak)
How to safe online (presented by abhinav pathak)
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Users guide
Users guideUsers guide
Users guide
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 

More from Sandeep Thoniparambil

IPR AD.pptx
IPR AD.pptxIPR AD.pptx
Intellectual property rights (IPR)
Intellectual property rights (IPR) Intellectual property rights (IPR)
Intellectual property rights (IPR)
Sandeep Thoniparambil
 
weasel words.docx
weasel words.docxweasel words.docx
weasel words.docx
Sandeep Thoniparambil
 
DIRECTIVE PRINCIPLES Fundamental Duties.pptx
DIRECTIVE PRINCIPLES Fundamental Duties.pptxDIRECTIVE PRINCIPLES Fundamental Duties.pptx
DIRECTIVE PRINCIPLES Fundamental Duties.pptx
Sandeep Thoniparambil
 
Directive principles of state policy
Directive principles of state policyDirective principles of state policy
Directive principles of state policy
Sandeep Thoniparambil
 
Indian constitution
Indian constitutionIndian constitution
Indian constitution
Sandeep Thoniparambil
 
Collection of media laws simplified
Collection of media laws simplifiedCollection of media laws simplified
Collection of media laws simplified
Sandeep Thoniparambil
 
Media research methodology terms
Media research methodology termsMedia research methodology terms
Media research methodology terms
Sandeep Thoniparambil
 

More from Sandeep Thoniparambil (8)

IPR AD.pptx
IPR AD.pptxIPR AD.pptx
IPR AD.pptx
 
Intellectual property rights (IPR)
Intellectual property rights (IPR) Intellectual property rights (IPR)
Intellectual property rights (IPR)
 
weasel words.docx
weasel words.docxweasel words.docx
weasel words.docx
 
DIRECTIVE PRINCIPLES Fundamental Duties.pptx
DIRECTIVE PRINCIPLES Fundamental Duties.pptxDIRECTIVE PRINCIPLES Fundamental Duties.pptx
DIRECTIVE PRINCIPLES Fundamental Duties.pptx
 
Directive principles of state policy
Directive principles of state policyDirective principles of state policy
Directive principles of state policy
 
Indian constitution
Indian constitutionIndian constitution
Indian constitution
 
Collection of media laws simplified
Collection of media laws simplifiedCollection of media laws simplified
Collection of media laws simplified
 
Media research methodology terms
Media research methodology termsMedia research methodology terms
Media research methodology terms
 

Recently uploaded

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 

Recently uploaded (16)

1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 

Social media: Issues

  • 1. SOCIAL MEDIA SECURITY , PRIVACY , RISKS AND CHALLENGES SANDEEP THONIPARAMBIL
  • 2. HERE WE DISCUSS  The evolution of social media has created a new paradigm of communication and interaction. It has become a part of our social life that helps us connect to friends, family, colleagues, or others  Issues involving Cybersecurity for social media  Risks & Challenges  Solutions To Social Media Threats
  • 3. PRIVACY OF DATA:  Users share their personal information on social media, which can cause privacy breaches. It can also sometimes cause personal data loss or instigate hackers to leverage the same for malicious reasons. For example, a user’s information can be viewed by everyone if the user’s default setting is public.
  • 4. DATA MINING:  We all leave a data trail behind on the internet. When someone creates a new social media account and provides details such as date of birth, name, location, and personal habits, and without our knowledge, all these data are leveraged and shared with third-party for targeting advertising. It can cause security concerns as third-party may collect real-time updates on the user’s location.
  • 5. VIRUS AND MALWARE ATTACKS:  Malware and viruses quite often find a way into the computer system through annoying ads. Once gaining access to the network, the attacker steals confidential data or causes complete disruption to the computer system. This often causes the loss of all kinds of data – personal, professional, financial, etc.
  • 6. ISSUES INVOLVING THE USE OF 3RD PARTY APPLICATIONS :  Most applications nowadays ask permission from users to access personal information such as contacts, pictures, and current geographic location before installing, and some of these applications which are running in the background might download malware on the user’s phone or smart devices without their knowledge.
  • 7. LEGAL ISSUES:  There are legal risks associated with the use of social media, like posting offensive content towards any individual, community, or country. Often, legal actions can be and are taken when such offensive posts are made and uploaded by any individual or organization.
  • 8. IDENTITY THEFT:  As millions share their personal information to get registered on one or more social media platforms, this data becomes vulnerable as hackers and identity thieves use this information to reset passwords, apply for loans, or other malicious objectives.
  • 9. CYBER BULLYING: CYBER TERRORISM:  It refers to bullying through the digital medium. It can take place on social media, gaming, and messaging platforms. It is aimed at scaring, shaming, or annoying the targeted victim.  Cyber Terrorism: Nowadays, social media is also used to facilitate terrorism-related activities. It can support, promote, engage, and spread terrorism propaganda like incitement to terrorism, recruitment, radicalizing training, and planning of terrorist attacks.
  • 11. Creating strong passwords is the primary option to ensure the privacy of your information. Ensure passwords are complex, including upper & lower case, numbers and special characters. It should be memorized and never be written on paper. We need to be sensitive in what we upload/share on our social networking accounts and avoid sharing personal information like date of birth, social security details, phone numbers, names, and pictures of family members. Use security and privacy options provided by social media platforms viz: 2-factor authentication system, access control.
  • 12. Connect our devices only to authorized wifi access, use privacy options provided by various mobile operating systems, use auto-lock features, and download apps only from authorized app stores. Keep the operating system updated with the latest patches, turn on the firewall, and avoid installing cracked software. Ensure our antivirus is updated and scans are performed frequently. We need to be smart using the internet and avoid visiting untrusted websites; referral links to visit websites are never to be clicked; instead, type in the browser’s URL address. We must accept friend requests only from people we know and block those who post upsetting content or comments.
  • 14.  1. Clear your history using ‘Off-Facebook Activity’  2. Hide your location  Disable Facial Recognition  Get rid of apps that track you off Facebook  5. Enable two-factor authentication to lock out hackers  6. Stop search engines from showing your Facebook account  7. Limit the audience for your personal posts  8. Stop your activity from being advertised  9. Avoid those Like and Share buttons on other parts of the web  10. Clean up your Friends’ List
  • 15. SECURITY SETTINGS IN WHATSAPP  1. Who can see my profile?
  • 16. 2. WHO CAN SEE MY LAST SEEN?
  • 18. 4. WHATSAPP GROUP PRIVACY AND SECURITY NOTIFICATION
  • 19. 5. HIDE ABOUT / LEGACY PROFILE STATUS