SlideShare a Scribd company logo
Social Media Security 
District IV TRTA 
Hindie Becker Dershowitz 
October 17, 2014
Protect Yourself 
1. Secure your WiFi 
2. Think before you share 
3. Stop, Look and Review before clicking 
4. Secure Passwords 
5. Two Step Verifications 
6. Lock your device 
7. Log off computer 
8. Use your own device/computer for personal data 
9. Be an online Detective 
10.Run Antivirus software on devices and computers
Password Programs 
1Password: Mac, Windows, IDevice, Androids 
Dashlane: Mac, Windows, IDevice, Androids
Protect your Privacy 
● Don’t include ALL your information 
● Set strict Privacy Settings 
● Don’t tag post with specific location 
● Be Aware of who you friend or follow 
● Log out on public devices 
● Internet security software
Cyber Safety 
http://goo.gl/I2CIZ3
Free WiFi
Credit Card/Debit Card Fraud 
● Check your online credit card statements 
and bank statements 
● Request credit profile 
o Equifax 
o Experian 
o TransUnion 
o Innovis 
● Add Fraud alerts to your credit
SCAM 
● S: Be stingy with your personal information 
● C: Check your financial information regularly 
● A: Ask for copy of your credit report annually 
● M: Maintain careful records of all of your 
accounts 
Forbes: http://www.forbes.com/sites/abegarver/2012/09/11/the-top-five-dangers-of-online- 
shopping-precautions-to-take/
Online Shopping 
● Use encrypted websites: https 
● Only shop when on secure networks 
● Only shop at known stores/websites 
o Be a detective if you are not sure 
● Read online reviews very carefully
More Social Media 
● Follow your Passion 
o FlipBoard 
o Twitter 
o StumbleUpon 
● Coupons 
o Grocery Stores 
o Groupon, 
o RetailMeNot 
o SnipSnap 
o Snap by Groupon 
o QR codes
How much do you really know about Social Media: 
Buzz Feed 
http://goo.gl/zoY7cc
TRTA 2014 Social Media Handout 
http://goo.gl/t0AYFP
Facebook Privacy Setting 
Settings 
Privacy 
Who Can See My Stuff? 
Who Can Contact Me? 
Who Can Look Me Up?
Facebook Follower Settings 
Who can see most of your posts 
Each time you post you can change
Caller ID 
● Type phone number into internet 
o 800notes.com
Pinterest 
http://www.pinterest.com/hindie/retired-educators/

More Related Content

Viewers also liked

How to teach speaking
How to teach speakingHow to teach speaking
How to teach speakingDanuta Kowal
 
Text to speech and word predicition tagged
Text to speech and word predicition taggedText to speech and word predicition tagged
Text to speech and word predicition tagged
Hindie Dershowitz
 
Byot in a differentiated classroom
Byot in a differentiated classroomByot in a differentiated classroom
Byot in a differentiated classroom
Hindie Dershowitz
 
Technology tools that students can use to help with their executive functioni...
Technology tools that students can use to help with their executive functioni...Technology tools that students can use to help with their executive functioni...
Technology tools that students can use to help with their executive functioni...
Hindie Dershowitz
 
Text to speech and word predicition
Text to speech and word predicitionText to speech and word predicition
Text to speech and word predicition
Hindie Dershowitz
 
Byot in a differentiated classroom
Byot in a differentiated classroomByot in a differentiated classroom
Byot in a differentiated classroomHindie Dershowitz
 

Viewers also liked (6)

How to teach speaking
How to teach speakingHow to teach speaking
How to teach speaking
 
Text to speech and word predicition tagged
Text to speech and word predicition taggedText to speech and word predicition tagged
Text to speech and word predicition tagged
 
Byot in a differentiated classroom
Byot in a differentiated classroomByot in a differentiated classroom
Byot in a differentiated classroom
 
Technology tools that students can use to help with their executive functioni...
Technology tools that students can use to help with their executive functioni...Technology tools that students can use to help with their executive functioni...
Technology tools that students can use to help with their executive functioni...
 
Text to speech and word predicition
Text to speech and word predicitionText to speech and word predicition
Text to speech and word predicition
 
Byot in a differentiated classroom
Byot in a differentiated classroomByot in a differentiated classroom
Byot in a differentiated classroom
 

Similar to Social media security

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Jay Nagar
 
Tips to secure yourself from identity thefts
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity thefts
weblinkindia1
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
Carolina Chapter of STC
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
Chad Warner
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
Ujjwal Acharya
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Ben Woelk, CISSP, CPTC
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
Ben Woelk, CISSP, CPTC
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
Simpliv LLC
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
ACE Software n Web Solutions
 
Securing Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safetySecuring Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safety
LeonardMensah5
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
Jay Nagar
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & PrivacyAlexine Marier
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
DjTechs
 
Security for Small Business
Security for Small BusinessSecurity for Small Business
Security for Small Business
Frontier Small Business
 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyberambessador
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
Excellence Foundation for South Sudan
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 

Similar to Social media security (20)

Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Tips to secure yourself from identity thefts
Tips to secure yourself from identity theftsTips to secure yourself from identity thefts
Tips to secure yourself from identity thefts
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety15 Security & Privacy Tips for Social Media Safety
15 Security & Privacy Tips for Social Media Safety
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
10 most important cyber security tips for your users
10 most important cyber security tips for your users10 most important cyber security tips for your users
10 most important cyber security tips for your users
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Securing Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safetySecuring Your Digital Life;Tips and Tools for online safety
Securing Your Digital Life;Tips and Tools for online safety
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Internet Safety & Privacy
Internet Safety & PrivacyInternet Safety & Privacy
Internet Safety & Privacy
 
Internet safety and security
Internet safety and securityInternet safety and security
Internet safety and security
 
Security for Small Business
Security for Small BusinessSecurity for Small Business
Security for Small Business
 
Cyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | CybersecurityCyber Safety | Cyber Safety Tips | Cybersecurity
Cyber Safety | Cyber Safety Tips | Cybersecurity
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 

Recently uploaded

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Social media security

  • 1. Social Media Security District IV TRTA Hindie Becker Dershowitz October 17, 2014
  • 2. Protect Yourself 1. Secure your WiFi 2. Think before you share 3. Stop, Look and Review before clicking 4. Secure Passwords 5. Two Step Verifications 6. Lock your device 7. Log off computer 8. Use your own device/computer for personal data 9. Be an online Detective 10.Run Antivirus software on devices and computers
  • 3. Password Programs 1Password: Mac, Windows, IDevice, Androids Dashlane: Mac, Windows, IDevice, Androids
  • 4. Protect your Privacy ● Don’t include ALL your information ● Set strict Privacy Settings ● Don’t tag post with specific location ● Be Aware of who you friend or follow ● Log out on public devices ● Internet security software
  • 7. Credit Card/Debit Card Fraud ● Check your online credit card statements and bank statements ● Request credit profile o Equifax o Experian o TransUnion o Innovis ● Add Fraud alerts to your credit
  • 8. SCAM ● S: Be stingy with your personal information ● C: Check your financial information regularly ● A: Ask for copy of your credit report annually ● M: Maintain careful records of all of your accounts Forbes: http://www.forbes.com/sites/abegarver/2012/09/11/the-top-five-dangers-of-online- shopping-precautions-to-take/
  • 9. Online Shopping ● Use encrypted websites: https ● Only shop when on secure networks ● Only shop at known stores/websites o Be a detective if you are not sure ● Read online reviews very carefully
  • 10.
  • 11. More Social Media ● Follow your Passion o FlipBoard o Twitter o StumbleUpon ● Coupons o Grocery Stores o Groupon, o RetailMeNot o SnipSnap o Snap by Groupon o QR codes
  • 12. How much do you really know about Social Media: Buzz Feed http://goo.gl/zoY7cc
  • 13. TRTA 2014 Social Media Handout http://goo.gl/t0AYFP
  • 14. Facebook Privacy Setting Settings Privacy Who Can See My Stuff? Who Can Contact Me? Who Can Look Me Up?
  • 15. Facebook Follower Settings Who can see most of your posts Each time you post you can change
  • 16. Caller ID ● Type phone number into internet o 800notes.com

Editor's Notes

  1. cautious of suspicious email. send it to spam if it sounds too good to be true, it is Location services on pictures? secure password program: Dashlane two step verification
  2. Click on picture and it will give you a brief synopsis
  3. make sure your only go to https websites
  4. request free credit check once a year
  5. look for fake reviews, be skeptical that lack detail and are too positive, look for similar reviews. see where their review link takes you
  6. TRTA is on Facebook Be Aware of your settings, be wary when info on sites try sending you to other sites.