This document provides guidance on preventing social media hacks and responding if hacking occurs. To prevent hacking, it recommends using robust passwords, limiting account access, controlling cookies, educating users, and being careful with mobile devices. If hacked, the five steps are: 1) regain control by resetting passwords; 2) protect other platforms; 3) get accounts back to normal by deleting unwanted content and checking settings; 4) let your audience and employees know; and 5) thoroughly review security measures.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
This is a presentation that I shared with a group of College students on Cyber Security.
This was part of the Cyber Safe Tamil Nadu 2009 program organized jointly by NASSCOM, DSCI and the Tamil Nadu police.
This month, Community IT presents basic IT security training for end users. Learn about common threats and the best techniques for dealing with them. This webinar is intended for a broad audience of both technical and non-technical staff.
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
This is a basic presentation about cybersecurity to share awareness about various security threats and how you can protect yourself from them. In the preview window the formatting is off, but when downloaded it can be viewed with no problems. This is for my Info Security Policy Management class at Governors State University.
14 tips to increase cybersecurity awarenessMichel Bitter
We used this presentation within our company to increase the cybersecurity awareness of our employees. These 14 tips should help everybody to protect themselves against the most obvious cyber attacks.
This is a presentation that I shared with a group of College students on Cyber Security.
This was part of the Cyber Safe Tamil Nadu 2009 program organized jointly by NASSCOM, DSCI and the Tamil Nadu police.
This month, Community IT presents basic IT security training for end users. Learn about common threats and the best techniques for dealing with them. This webinar is intended for a broad audience of both technical and non-technical staff.
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
This is a basic presentation about cybersecurity to share awareness about various security threats and how you can protect yourself from them. In the preview window the formatting is off, but when downloaded it can be viewed with no problems. This is for my Info Security Policy Management class at Governors State University.
In a world so connected, cyber security awareness is key to a safe online experience, because the weakest information security link to any organisation is the users of technology. This presentation speaks to basic cyber security awareness for everyday internet users
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
Note: There is an updated version of this slide deck available on SlideShare at
https://www.slideshare.net/DallasHaselhorst/cybersecurity-awareness-training-presentation-v11
--
Do you want an cybersecurity awareness training you can present at *your* business or in *your* community? Awesome!
We spent months putting together this training presentation on cybersecurity awareness. We then presented it multiple times and continued modifying the presentation based on feedback from attendees as well as feedback from those in the information security community. We are now releasing this in the hope it is a call to action for others in their communities.
The slides are available for download on our website. Download it and please present it in your own communities, e.g. at your local library, business events, co-working spaces, schools, etc. We also have a free cybersecurity quiz available on the site that is also based on the material.
Download the latest version as a Microsoft PowerPoint presentation (.pptx) or 'Make a Copy' in Google Slides.
https://www.treetopsecurity.com/slides
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to educate them on ways to avoid scams and attacks and become more security aware. This slide deck is based on version 1.3 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, it was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have worksheets free and downloadable worksheets referenced in the training. We have a free cybersecurity quiz that is based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
We also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Want to take this content and present it in your own community? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or using ‘Make a Copy’ in Google Slides.
https://www.treetopsecurity.com/slides
The complete guide on how to prevent an IT security breach.
Some of the tips include:
♦ Why keeping a clean desk matters
♦ How to avoid email threats, including five ways to block phishing attack
♦ How your employees can secure their mobile devices
♦ Website browsing best practices.
Content:
What is phishing, history, how it works, statistics, types of phishing, how to identify it, how to take countermeasures, phishing kit, example of phishing attack.
A short informational presentation for educators on the role and responsiblity they have to educate students on Cyber Safety. Includes link to lessons.
In a world so connected, cyber security awareness is key to a safe online experience, because the weakest information security link to any organisation is the users of technology. This presentation speaks to basic cyber security awareness for everyday internet users
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
Note: There is an updated version of this slide deck available on SlideShare at
https://www.slideshare.net/DallasHaselhorst/cybersecurity-awareness-training-presentation-v11
--
Do you want an cybersecurity awareness training you can present at *your* business or in *your* community? Awesome!
We spent months putting together this training presentation on cybersecurity awareness. We then presented it multiple times and continued modifying the presentation based on feedback from attendees as well as feedback from those in the information security community. We are now releasing this in the hope it is a call to action for others in their communities.
The slides are available for download on our website. Download it and please present it in your own communities, e.g. at your local library, business events, co-working spaces, schools, etc. We also have a free cybersecurity quiz available on the site that is also based on the material.
Download the latest version as a Microsoft PowerPoint presentation (.pptx) or 'Make a Copy' in Google Slides.
https://www.treetopsecurity.com/slides
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to educate them on ways to avoid scams and attacks and become more security aware. This slide deck is based on version 1.3 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, it was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have worksheets free and downloadable worksheets referenced in the training. We have a free cybersecurity quiz that is based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
We also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Want to take this content and present it in your own community? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or using ‘Make a Copy’ in Google Slides.
https://www.treetopsecurity.com/slides
The complete guide on how to prevent an IT security breach.
Some of the tips include:
♦ Why keeping a clean desk matters
♦ How to avoid email threats, including five ways to block phishing attack
♦ How your employees can secure their mobile devices
♦ Website browsing best practices.
Content:
What is phishing, history, how it works, statistics, types of phishing, how to identify it, how to take countermeasures, phishing kit, example of phishing attack.
A short informational presentation for educators on the role and responsiblity they have to educate students on Cyber Safety. Includes link to lessons.
Social Media: The Good, The Bad, and The Ugly
People are social creatures and have communicated for centuries using various means and methods. Now with the explosion of global tele-communications and data networks, people can rapidly communicate using multiple social media virtual communities and powerful mobile platforms. Significant news and sporting events are often reported in a real-time impacting the effectiveness of traditional communication channels (i.e., network TV news broadcasts). Students are collaborating on homework and activities through the use of social media virtual communities. Job seekers and employers are exploiting social media virtual communities. We will discuss tips for avoiding the top 9 most common Facebook scams will be shared. My presentation will highlight examples of social media use within the DCCCD community. I will share a personal story from my volunteer child advocate experience,
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
Step right into a realm where cyber security meets the enchanting world of Harry Potter! Join Brian Pichman, our fearless Defense Against the Dark Arts wizard, as he unveils the secrets to safeguarding our digital realms. Prepare to be captivated as Brian illuminates the spellbinding techniques of encryption, firewalls, and intrusion detection, equipping us to fortify our cherished data against the sinister forces of the digital realm.
But beware! Just like in the magical world, treacherous adversaries prowl the shadows. Brian will expose the dark arts of phishing, ransomware, and social engineering, empowering us to defend our digital castles. Engrossed in tales of peril and armed with ancient cyber security spells, this captivating presentation promises to leave you spellbound and ready to protect yourself in this ever-evolving landscape. So grab your wands and brace yourselves as Brian Pichman conjures a shield of protection, ensuring the safety of our digital realms against the forces of darkness. Together, we shall prevail in this journey of cyber security and magic.
CyberSecurity - Computers In Libraries 2024Brian Pichman
Protecting privacy and security while leveraging technology to accomplish positive change is becoming a serious challenge for individuals, communities, and businesses. This workshop, led by expert leaders and practitioners, covers personal and organizational privacy as well as top security issues for libraries and their communities, especially the implications of AI. If you don’t have a security plan in place, are unsure of where to even start to make sure your library is secure, or have an existing plan in place but want to cross your T’s and dot your I’s, come to this interactive workshop.
Help your employees become cyber security experts! This slideshow will present: Threats overview, password safety, web protection, email protection, and preventive measures.
Craig McGill, Comms for PwC in Scotland, was invited to speak at #PRFest about cyber security and how PR had to be involved from the outset. www.prfest.co.uk
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
This presentation contains Introduction of Phishing attack, its types and Various techniques, their impact with real live example, after that its Avoidance, Prevention and Solution. Also it contains brief introduction of SSL and HTTPS with their working.
Securing and Safeguarding Your Library SetupBrian Pichman
We will explore various tools, techniques, & procedures to ensure our environment's safety & security. Leave with a list of ideas you can use today within your library.
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
Ever wonder what you should or shouldn’t share on the internet? Do you see users who are posting everything thing they possibly could on the internet and wonder how to help educate them to protect themselves?
All of this collective sharing, creates a data gold mine for hackers to do their evil bidding. In this session we will talk about what to post on the internet and what not too. We will also look into what hackers can use from the information you’ve posted on the internet and how they can use it to gain access to your and your users personal lives, accounts, credit cards, and more. During this session, we’ll dive into building a strategy plan to help limit and hopefully eliminate these references from your digital footprint to help ensure you are more secure than you were when you first started this session.
By the end of this webinar, attendees will have a virtual toolkit and strategies to help educate users on protecting themselves while online.
Planning successful social media marketing campaignsMosoco Ltd
Outline four-step process for planning social media campaigns: setting smart objectives, developing innovative content, generating engagement, measuring and learning
Introduction to user experience research (TechUK Designing Digital Health sem...Mosoco Ltd
Charts delivered to TechUK's January 2014 Designing Digital Health conference. The charts are intended to provide an introduction to the user centred design process and are aimed at non specialists, The initial set of charts are the presentation charts and the second set of charts are the explanations which were left behind for the delegates
The key differences between the MDR and IVDR in the EUAllensmith572606
In the European Union (EU), two significant regulations have been introduced to enhance the safety and effectiveness of medical devices – the In Vitro Diagnostic Regulation (IVDR) and the Medical Device Regulation (MDR).
https://mavenprofserv.com/comparison-and-highlighting-of-the-key-differences-between-the-mdr-and-ivdr-in-the-eu/
Buy Verified PayPal Account | Buy Google 5 Star Reviewsusawebmarket
Buy Verified PayPal Account
Looking to buy verified PayPal accounts? Discover 7 expert tips for safely purchasing a verified PayPal account in 2024. Ensure security and reliability for your transactions.
PayPal Services Features-
🟢 Email Access
🟢 Bank Added
🟢 Card Verified
🟢 Full SSN Provided
🟢 Phone Number Access
🟢 Driving License Copy
🟢 Fasted Delivery
Client Satisfaction is Our First priority. Our services is very appropriate to buy. We assume that the first-rate way to purchase our offerings is to order on the website. If you have any worry in our cooperation usually You can order us on Skype or Telegram.
24/7 Hours Reply/Please Contact
usawebmarketEmail: support@usawebmarket.com
Skype: usawebmarket
Telegram: @usawebmarket
WhatsApp: +1(218) 203-5951
USA WEB MARKET is the Best Verified PayPal, Payoneer, Cash App, Skrill, Neteller, Stripe Account and SEO, SMM Service provider.100%Satisfection granted.100% replacement Granted.
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
3. Why are social media hacks a problem?
• You are the CEO of a bank, tweeting regularly,
and generally being hip
• And then your Twitter account is hacked.
There’s a tweet in your name that says the bank
has made huge losses and doesn’t have enough
money to pay account holders
• People panic and there is a run on the bank…
4. How do hacks happen?
• People who want to cause mischief can get
access to your password in a number of ways:
– Passwords are hacked using “brute force” software that runs
through all the possible combinations of letters and numbers
– People steal (or find) unprotected portable devices
– Devices are infected with spyware (often after a phishing attack)
– Passwords are not changed when an employee who knows
them leaves the company
– The password is stored on a shared personal device which
allows access by non-authorised people
– Password lists are made available to non-authorised people
• So what can you do about this?
5. How can you stop hacking?
• You can’t be sure of preventing hacking
• But you can take some basic steps to make it
less likely that people will succeed:
– Use robust passwords
– Limit access to social media accounts
– Limit direct access to social media accounts
– Keep in control
– Watch out for Cookies
– Educate people to avoid phishing attacks
– Take care with mobile devices
6. Use robust passwords
• Ensure passwords are strong
– minimum of 12 characters including at least one each of capital
letter, lower case letter, number, keyboard symbol (e.g. ! $ % &)
• Don’t use words or names in the password
– Password isn’t a great password
– And people realise that numbers are commonly substituted for
letters: So P455w0rd isn’t great either!
• Think of a phrase and use the first letters:
– I love my wife Delvina and my two boys Caspar and Tarquin!
becomes IlmwD&m2bC&T!
• Ensure passwords are different for all accounts
• Change passwords a couple of times a year
7. Limit access
• Audit number of people who have access (check
for 3rd
parties like agencies)
• Severely limit the people who have access
– If necessary appoint an “editor” who uploads content
written by other people
– Ensure that the contracts of people with access stipulate that
passwords must not be shared
– Keep a record of who has access
8. Manage access
• If you can, implement Single Sign On technology
to manage access to your social media accounts
• This means that people don’t have to sign onto
social media accounts directly
– they get access when they sign into your company network
• Preventing direct access means that fewer
people need to know or remember passwords
and that passwords can be changed at any time
9. Cookie attacks
• Some platforms (e.g. Twitter, Facebook) are
designed to remain open continuously
– This is so that you get access every time you go to your
computer or mobile phone
• Keeping an account open all the time gives
people an easy way into your account
– If it is open on a mobile device which subsequently gets lost
– if you are using a shared device and forget to log out.
• The most secure way to handle this is to require
access to corporate social media only via fixed
company equipment
10. Ensure you have control
• Some platforms (e.g. Facebook) say business
pages must be set up by private accounts
– Don’t allow individuals to set up these pages: create an account
representing your “corporate personality” instead
– If private accounts have been used, you may have to start afresh
even if it means sacrificing assets such as Likes
• If you ask people to Tweet or Post for you make
sure the accounts they set up are owned and
capable of being managed by the company
11. Avoid phishing attacks
• Phishing: a hacker sends you message “from”
your social network, asking you to log in to your
account and provides you with a handy link
• You enter username and password into a fake
login page, which promptly captures the data
– Often these attacks are personalised with your name and job
title (“spear-fishing”) and look very credible
• Prevent this through education. Train people to:
– Recognise suspicious emails
– Check the address of the site in the browser address bar
– Avoid links in emails and navigate directly to their account
12. Mobile devices
• Mobile devices represent a risk because they
can be lost or stolen
• Limit access to corporate social media accounts
via fixed computers in secure office locations
• If you need access outside the office (e.g. for
tweets at a conference):
– Protect the device with a robust password
– Make sure you have the ability to lock or wipe it remotely
– Avoid using password vaults that remember passwords for you
• If you are logging on to Twitter or Facebook on a
mobile device log off after you finish
13. Wi-Fi
• Wi-fi connections may be insecure or dangerous
• Check to make sure you are using the official
wi-fi (check the exact name)
– Don’t be tempted to use an alternative wi-fi even if seems to
offer easy access
• Don’t use the corporate account to tweet on wi-fi
– Set up a secondary account and use it for out-of-office events
– Use the event hashtag in tweets to ensure that people find your
posts
– Get colleagues to follow the secondary account and share your
posts via the main corporate account as soon as possible
14. Educate
• Most protection can be gained through
education
• Help people understand where the risks lie, what
they can do to minimise them, and why it is
important
15. 2. Five steps for2. Five steps for
managing if you aremanaging if you are
hackedhacked
16. Step 1. Regain control by resetting
passwords
• Change the password on the account (to
something harder to hack)
• If the hackers have changed the password, reset
it using the forgotten password link on the site
– At the same time change the password of the account
administrator’s email address as this may have been hacked too
• If the hackers have locked you out of your
account contact the social platform directly:
– Search [platform name] AND hacked OR compromised to find
the right page
17. Step 2. Protect your other platforms
• Now check all your other social media platforms
and ensure they have not been hacked as well
• If they are safe check that they have a secure
password and that this is different from the
passwords on your other social media sites
18. Step 3. Get back to normal
• Get your social media accounts back to the state
they were in before the hacking incident
• Delete unwanted content
– Delete any content sent out without your authorisation
• This doesn’t guarantee it will disappear completely and for
ever as other people may have saved or shared it
• Check your account settings
– Make sure there aren’t any nasty surprises waiting for you
• Have any automated responses been altered?
• Does your profile contain strange links?
• Have any Twitter lists been tampered with?
• Do you have unexpected new some “friends”?
19. Step 4. Let people know
• Tell your audience
– Post messages to followers apologising for any offence caused
• Pay to promote these messages if the hack was serious
– Put a message on your website and any other content such as
blogs and social media profiles
• Tell your employees
– Reassure them and tell them what to do and say if they are
asked about the crisis by friends or peers
• Tell the media
– Especially if the breach is potentially damaging you will want to
make sure the media have your version of events
20. 5. Review your security
• Review security to reduce the risk of anything
similar happening again
– Ensure that you have followed the advice in the first part of this
presentation
• Review any applications that have access to
your accounts; remove any you don’t recognize
• Run a virus scan on devices that have accessed
your accounts including mobile devices
• If available, set up “2-factor authentication”
(unless you have Single Sign On software)
• Make sure employees are properly educated