SlideShare a Scribd company logo
1 of 35
Using Social Media Safely
DO’S AND DON’TS FOR WORKERS
ANDY DIAMENT
Outline
• Scope of Social Networking
• Social Networking at work
• Social Networking for life
• Cybersecurity – protecting your identity
Is this your workplace?
• IT Crowd FriendFace 1 Video
• https://www.youtube.com/watch?v=j4o2PDwKdcA (offline
version)
Scope of Social
Networking
Discussion – what’s your social media?
• In small groups what do you use?
• List all the social media you are signed up for
• Included anything you do online that you consider social.
• If you’re not sure if it’s social, write it down
◦ If it’s got a profile where people can see your photo – it’s a kind of social
media
◦ If you can express some kind of opinion – it’s a kind of social media
◦ If you got really annoyed when he or she wrote ‘that’ about you, it’s social
media
What’s your social media?
• Facebook
• Twitter
• Instagram
• Pinterest
• Whatsapp
• Snapchat
• Google+
• LinkedIn
• Youtube
• Blogs
• Myspace – still there
• Bedo – sort of there
• Friends Reunited – Gone
• Dating sites
• Anything you can leave comments
• Anything with a forum
• Anything you can add comments
I asked… What’s your social media
• I nearly asked
◦ What’s your poison?
• What do you say to that?
Getting stated with Social Media
• Get a phone / tablet / phablet / device
• Probably going to be an Apple iDevice / Android
• Might be Windows
• Download your apps – Google Play or Apple AppStore
• Make your accounts
◦ Cool name
◦ Photo for your profile – you never grow old on the internet
◦ Check your privacy
And it’s ready to roll
Facebook suggestion
• Facebook app eats batteries on iPhones/iPads/Android
• Search for Metal on AppStore / Google Play
• Free alternative and uses a lot less power
Social Networking at
work
Your workspace
• Office
• Home
• Customer facing
• Workshop
• Out and about
• Ward
• Classroom
• What are you allowed to do?
◦ Mobile Phones out or away
◦ Social networking allowed/limited/banned?
Social networking for work
• Promotion of events/services
• Recruitment
• Communication with clients and stakeholders
• News and emergencies
• Internal
◦ Noticeboards
◦ Forums
◦ Instant Messaging
◦ Private Social Network (Yammer)
• Social Exclusion
•
2 questions for you to discuss
• What are the benefits of using personal social
media at work?
• What are the downsides of using personal social
media at work?
Social networking issues at work
• Plenty of topics to choose from
◦ Access to devices/social networking at work
◦ Time management / Interference with productivity
◦ Recruitment – screening candidates
◦ Privacy
◦ Policies
◦ Bullying and discrimination – victim may not be aware
◦ Defamation
◦ Discussing the company
◦ NSFW
◦
Linkedin – professional networking
• Who’s on it?
• Is it up to date?
• How have you benefited from it
Policy and training
• Acceptable use policy
• Do you feel trained?
• What is your company policy on:
◦ Strength of password
◦ Leaving machine logged in
◦ Use of work laptops/devices
◦ Using home computer for work
◦ Deleting data
◦ Encrypting data
◦ Use of USB sticks (phones etc)
◦ Personal use of organisation equipment
◦ Keeping emails
Social Networking for
life
Who are you friends?
• Real Friends?
• Old school friends
• Acquaintances?
• Friends of friends?
• Colleagues?
• Bosses?
• Clients?
• People you’ve never met?
How do you appear on social media?
• Anyone like to give me a portrait of how the kinds of things they
post?
• And the kinds of things they self edit?
Would you get a promotion
If your boss could see your profile?
Facebook privacy
Deleting your account
• Nothing ever goes
• Facebook – keep data after you stop using
• Snapchat
◦ ‘Deleted’ 10 seconds after viewing
◦ ‘Deleted’ means hidden on your phone and on their servers (as of 2013)
Welcome to the Internet
Your data never leaves
Admiral Firstcarquote
• For young drivers – scheme to reduce insurance based on Facebook history
• Good risk
◦ Conscientious
◦ Well organised
◦ Well written – short, concise sentences
• Poor risk
◦ More spontaneous
◦ Overconfident
◦ EXCLAMATION MARKS!!!!
• Pulled by Facebook
Tips
• Write your posts carefully
◦ Will someone get the joke?
◦ Will they keep returning to it?
• Do you need an anonymous account?
◦ BTL – Below the Line – Comments (e.g. Newspapers)
◦ Discussion Forums
◦ Negative feedback
◦ Twitter
• If you offend a stranger on the web, do you want them to know where
you live?
Cybersecurity
Passwords
• Strong passwords (work policy?)
• Changing
• Remembering lots of passwords
◦ How many?
◦ All different?
◦ Written down?
◦ App solutions – Password managers with strong master password
• Sharing passwords
◦ Employer policy
◦ Computer Misuse Act
• https://howsecureismypassword.net/ [Subject to internet access]
Example password secure things
Most common passwords
• http://www.passwordrandom.com/most-
popular-passwords
Social Engineering
• Tricking you into giving information away
• Phishing – emails looking for bank logins
• Phone calls
◦ Bank transfers
◦ Sarah Palin email access
◦ We’re from Microsoft - your computer has a virus….
• Typing your password into a webpage on your trainer’s computer
We’re from Microsoft – you have a virus
• My son got this message 2 weeks ago
• He had the sense to phone me to ask for advice
• No! No! No! No! No!
◦ Me and the new kitchen sink were not getting along
• If they say Press Windows key – R
◦ Hang up
Protecting mobile devices
• Password / Pin / Pattern
• Biometrics
◦ Eye scan
◦ Finger print
• What are the consequences of losing your phone
• Track your phone
Android Device Manager
iCloud Locate your Device
Backing up
• What happens if your computer or device disappears or dies?
• Syncing
◦ Contacts/emails/calendar
◦ Files & photos (iCloud / Google drive / Dropbox / Onedrive)
◦ Hard disk backup / Hard disk image
• But if it’s synced to the cloud, is there anything you don’t want a
hacker to see
Wifi
• Secure Network – WPA2 – at home
◦ You need a password to connect, normally enter once
◦ It’s probably written under the router
◦ Your data is protected - encrypted
• Public networks
◦ Open Network – your data can be intercepted
◦ May need to make an account
◦ Closed Network – You need a password
Do’s and Don’ts
• Write on stickie notes
◦ Do’s
◦ Don’ts
• based on what I have said
• Slides at http://www.slideshare.net/andydiament
• Contact – andy.diament@gmail.com
• Search for Andy Diament on at linkedin.com
• Facebook – http://facebook.com/PoppyAndPals
• ACAS advice
http://www.acas.org.uk/index.aspx?articleid=3375
Any questions?
Don’t forget your 5 a day!
• IT Crowd Friendface 2 video
• https://www.youtube.com/watch?v=z8xbgdw9uvY (Offline
version)

More Related Content

Viewers also liked

tu ropa deportiva podra ser tu propio entrenador
tu ropa deportiva podra ser tu propio entrenadortu ropa deportiva podra ser tu propio entrenador
tu ropa deportiva podra ser tu propio entrenadorkeylimar25
 
Social Networking: Should it be more about Relationship Building than Selling...
Social Networking: Should it be more about Relationship Building than Selling...Social Networking: Should it be more about Relationship Building than Selling...
Social Networking: Should it be more about Relationship Building than Selling...Mary S. Butler
 
Google Safe Linkbuilding for Small and Large Businesses
Google Safe Linkbuilding for Small and Large BusinessesGoogle Safe Linkbuilding for Small and Large Businesses
Google Safe Linkbuilding for Small and Large BusinessesJoe Youngblood
 
10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School StudentsYour College Concierge
 
The Do's and Don'ts of Social Media
The Do's and Don'ts of Social MediaThe Do's and Don'ts of Social Media
The Do's and Don'ts of Social MediaNitin Karkara
 
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015PeopleBrowsr
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Do's And Don'ts of Social Media
Do's And Don'ts of Social MediaDo's And Don'ts of Social Media
Do's And Don'ts of Social MediaTodd Earwood
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityBen Liu
 
social networking sites
social networking sitessocial networking sites
social networking sitesAnant Agarwal
 
Whatsapp PPT Presentation
Whatsapp PPT PresentationWhatsapp PPT Presentation
Whatsapp PPT PresentationVOCCE ICT
 

Viewers also liked (20)

Social networking
Social networkingSocial networking
Social networking
 
Social networking ppt
Social networking pptSocial networking ppt
Social networking ppt
 
whatsapp
whatsappwhatsapp
whatsapp
 
tu ropa deportiva podra ser tu propio entrenador
tu ropa deportiva podra ser tu propio entrenadortu ropa deportiva podra ser tu propio entrenador
tu ropa deportiva podra ser tu propio entrenador
 
Social Networking: Should it be more about Relationship Building than Selling...
Social Networking: Should it be more about Relationship Building than Selling...Social Networking: Should it be more about Relationship Building than Selling...
Social Networking: Should it be more about Relationship Building than Selling...
 
Google Safe Linkbuilding for Small and Large Businesses
Google Safe Linkbuilding for Small and Large BusinessesGoogle Safe Linkbuilding for Small and Large Businesses
Google Safe Linkbuilding for Small and Large Businesses
 
Whatsapp
WhatsappWhatsapp
Whatsapp
 
10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students10 Social Media Do's and Don'ts for High School Students
10 Social Media Do's and Don'ts for High School Students
 
WhatsApp Forensic
WhatsApp ForensicWhatsApp Forensic
WhatsApp Forensic
 
The Do's and Don'ts of Social Media
The Do's and Don'ts of Social MediaThe Do's and Don'ts of Social Media
The Do's and Don'ts of Social Media
 
The Do's and Don'ts of Social Media
The Do's and Don'ts of Social MediaThe Do's and Don'ts of Social Media
The Do's and Don'ts of Social Media
 
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
PeopleBrowsr Presents A Brief Cartoon History of Social Networking 1930-2015
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Do's And Don'ts of Social Media
Do's And Don'ts of Social MediaDo's And Don'ts of Social Media
Do's And Don'ts of Social Media
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Whatsapp project work
Whatsapp project workWhatsapp project work
Whatsapp project work
 
Social Media Trends in 2017
Social Media Trends in 2017 Social Media Trends in 2017
Social Media Trends in 2017
 
social networking sites
social networking sitessocial networking sites
social networking sites
 
Whatsapp PPT Presentation
Whatsapp PPT PresentationWhatsapp PPT Presentation
Whatsapp PPT Presentation
 

Similar to Using Social Media Safely

Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...
Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...
Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...Nicola Osborne
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Carl B. Forkner, Ph.D.
 
Social Technologies Presentation CPCU I Day 2010
Social Technologies Presentation CPCU I Day 2010Social Technologies Presentation CPCU I Day 2010
Social Technologies Presentation CPCU I Day 2010Sandra Masters
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology reportMarq2014
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulAndrew Schwabe
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptxsaththiyans1
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSOodit Jethwa
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadTom Eston
 
Technology and Business Growth! - What Companies Need To Know
Technology and Business Growth! -  What Companies Need To KnowTechnology and Business Growth! -  What Companies Need To Know
Technology and Business Growth! - What Companies Need To KnowBrian Bluff
 
Linked In 101 Workshop
Linked In 101 WorkshopLinked In 101 Workshop
Linked In 101 Workshoprocklandweb
 
Florida REALTORS Association 2011 Winter Meetings
Florida REALTORS Association 2011 Winter MeetingsFlorida REALTORS Association 2011 Winter Meetings
Florida REALTORS Association 2011 Winter MeetingsDoug Devitre
 
Consumer_Device_Privacy
Consumer_Device_PrivacyConsumer_Device_Privacy
Consumer_Device_PrivacyMatthew Hoy
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Smart social networking
Smart social networkingSmart social networking
Smart social networkingKim Grewe
 
Davy lunch & learn 281114 2
Davy lunch & learn 281114 2Davy lunch & learn 281114 2
Davy lunch & learn 281114 2Maryrose Lyons
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High SchoolLiftPotential
 

Similar to Using Social Media Safely (20)

Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...
Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...
Managing Your Digital Footprint presentation for #5Rights Youth Leadership Gr...
 
Internet security
Internet securityInternet security
Internet security
 
Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...Social Media Security: What to Watch out for...
Social Media Security: What to Watch out for...
 
Social Technologies Presentation CPCU I Day 2010
Social Technologies Presentation CPCU I Day 2010Social Technologies Presentation CPCU I Day 2010
Social Technologies Presentation CPCU I Day 2010
 
Meaghan technology report
Meaghan technology reportMeaghan technology report
Meaghan technology report
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Mobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech MogulMobile Security for the Modern Tech Mogul
Mobile Security for the Modern Tech Mogul
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
DIGITAL FOOTPRINTS
DIGITAL FOOTPRINTSDIGITAL FOOTPRINTS
DIGITAL FOOTPRINTS
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
Care and Repair iPad APR12
Care and Repair iPad APR12Care and Repair iPad APR12
Care and Repair iPad APR12
 
Technology and Business Growth! - What Companies Need To Know
Technology and Business Growth! -  What Companies Need To KnowTechnology and Business Growth! -  What Companies Need To Know
Technology and Business Growth! - What Companies Need To Know
 
Linked In 101 Workshop
Linked In 101 WorkshopLinked In 101 Workshop
Linked In 101 Workshop
 
Florida REALTORS Association 2011 Winter Meetings
Florida REALTORS Association 2011 Winter MeetingsFlorida REALTORS Association 2011 Winter Meetings
Florida REALTORS Association 2011 Winter Meetings
 
Consumer_Device_Privacy
Consumer_Device_PrivacyConsumer_Device_Privacy
Consumer_Device_Privacy
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Smart social networking
Smart social networkingSmart social networking
Smart social networking
 
Davy lunch & learn 281114 2
Davy lunch & learn 281114 2Davy lunch & learn 281114 2
Davy lunch & learn 281114 2
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Using Social Media Safely

  • 1. Using Social Media Safely DO’S AND DON’TS FOR WORKERS ANDY DIAMENT
  • 2. Outline • Scope of Social Networking • Social Networking at work • Social Networking for life • Cybersecurity – protecting your identity
  • 3. Is this your workplace? • IT Crowd FriendFace 1 Video • https://www.youtube.com/watch?v=j4o2PDwKdcA (offline version)
  • 5. Discussion – what’s your social media? • In small groups what do you use? • List all the social media you are signed up for • Included anything you do online that you consider social. • If you’re not sure if it’s social, write it down ◦ If it’s got a profile where people can see your photo – it’s a kind of social media ◦ If you can express some kind of opinion – it’s a kind of social media ◦ If you got really annoyed when he or she wrote ‘that’ about you, it’s social media
  • 6. What’s your social media? • Facebook • Twitter • Instagram • Pinterest • Whatsapp • Snapchat • Google+ • LinkedIn • Youtube • Blogs • Myspace – still there • Bedo – sort of there • Friends Reunited – Gone • Dating sites • Anything you can leave comments • Anything with a forum • Anything you can add comments
  • 7. I asked… What’s your social media • I nearly asked ◦ What’s your poison? • What do you say to that?
  • 8. Getting stated with Social Media • Get a phone / tablet / phablet / device • Probably going to be an Apple iDevice / Android • Might be Windows • Download your apps – Google Play or Apple AppStore • Make your accounts ◦ Cool name ◦ Photo for your profile – you never grow old on the internet ◦ Check your privacy And it’s ready to roll
  • 9. Facebook suggestion • Facebook app eats batteries on iPhones/iPads/Android • Search for Metal on AppStore / Google Play • Free alternative and uses a lot less power
  • 11. Your workspace • Office • Home • Customer facing • Workshop • Out and about • Ward • Classroom • What are you allowed to do? ◦ Mobile Phones out or away ◦ Social networking allowed/limited/banned?
  • 12. Social networking for work • Promotion of events/services • Recruitment • Communication with clients and stakeholders • News and emergencies • Internal ◦ Noticeboards ◦ Forums ◦ Instant Messaging ◦ Private Social Network (Yammer) • Social Exclusion •
  • 13. 2 questions for you to discuss • What are the benefits of using personal social media at work? • What are the downsides of using personal social media at work?
  • 14. Social networking issues at work • Plenty of topics to choose from ◦ Access to devices/social networking at work ◦ Time management / Interference with productivity ◦ Recruitment – screening candidates ◦ Privacy ◦ Policies ◦ Bullying and discrimination – victim may not be aware ◦ Defamation ◦ Discussing the company ◦ NSFW ◦
  • 15. Linkedin – professional networking • Who’s on it? • Is it up to date? • How have you benefited from it
  • 16. Policy and training • Acceptable use policy • Do you feel trained? • What is your company policy on: ◦ Strength of password ◦ Leaving machine logged in ◦ Use of work laptops/devices ◦ Using home computer for work ◦ Deleting data ◦ Encrypting data ◦ Use of USB sticks (phones etc) ◦ Personal use of organisation equipment ◦ Keeping emails
  • 18. Who are you friends? • Real Friends? • Old school friends • Acquaintances? • Friends of friends? • Colleagues? • Bosses? • Clients? • People you’ve never met?
  • 19. How do you appear on social media? • Anyone like to give me a portrait of how the kinds of things they post? • And the kinds of things they self edit?
  • 20. Would you get a promotion If your boss could see your profile?
  • 22. Deleting your account • Nothing ever goes • Facebook – keep data after you stop using • Snapchat ◦ ‘Deleted’ 10 seconds after viewing ◦ ‘Deleted’ means hidden on your phone and on their servers (as of 2013)
  • 23. Welcome to the Internet Your data never leaves
  • 24. Admiral Firstcarquote • For young drivers – scheme to reduce insurance based on Facebook history • Good risk ◦ Conscientious ◦ Well organised ◦ Well written – short, concise sentences • Poor risk ◦ More spontaneous ◦ Overconfident ◦ EXCLAMATION MARKS!!!! • Pulled by Facebook
  • 25. Tips • Write your posts carefully ◦ Will someone get the joke? ◦ Will they keep returning to it? • Do you need an anonymous account? ◦ BTL – Below the Line – Comments (e.g. Newspapers) ◦ Discussion Forums ◦ Negative feedback ◦ Twitter • If you offend a stranger on the web, do you want them to know where you live?
  • 27. Passwords • Strong passwords (work policy?) • Changing • Remembering lots of passwords ◦ How many? ◦ All different? ◦ Written down? ◦ App solutions – Password managers with strong master password • Sharing passwords ◦ Employer policy ◦ Computer Misuse Act • https://howsecureismypassword.net/ [Subject to internet access] Example password secure things
  • 28. Most common passwords • http://www.passwordrandom.com/most- popular-passwords
  • 29. Social Engineering • Tricking you into giving information away • Phishing – emails looking for bank logins • Phone calls ◦ Bank transfers ◦ Sarah Palin email access ◦ We’re from Microsoft - your computer has a virus…. • Typing your password into a webpage on your trainer’s computer
  • 30. We’re from Microsoft – you have a virus • My son got this message 2 weeks ago • He had the sense to phone me to ask for advice • No! No! No! No! No! ◦ Me and the new kitchen sink were not getting along • If they say Press Windows key – R ◦ Hang up
  • 31. Protecting mobile devices • Password / Pin / Pattern • Biometrics ◦ Eye scan ◦ Finger print • What are the consequences of losing your phone • Track your phone Android Device Manager iCloud Locate your Device
  • 32. Backing up • What happens if your computer or device disappears or dies? • Syncing ◦ Contacts/emails/calendar ◦ Files & photos (iCloud / Google drive / Dropbox / Onedrive) ◦ Hard disk backup / Hard disk image • But if it’s synced to the cloud, is there anything you don’t want a hacker to see
  • 33. Wifi • Secure Network – WPA2 – at home ◦ You need a password to connect, normally enter once ◦ It’s probably written under the router ◦ Your data is protected - encrypted • Public networks ◦ Open Network – your data can be intercepted ◦ May need to make an account ◦ Closed Network – You need a password
  • 34. Do’s and Don’ts • Write on stickie notes ◦ Do’s ◦ Don’ts • based on what I have said • Slides at http://www.slideshare.net/andydiament • Contact – andy.diament@gmail.com • Search for Andy Diament on at linkedin.com • Facebook – http://facebook.com/PoppyAndPals • ACAS advice http://www.acas.org.uk/index.aspx?articleid=3375
  • 35. Any questions? Don’t forget your 5 a day! • IT Crowd Friendface 2 video • https://www.youtube.com/watch?v=z8xbgdw9uvY (Offline version)

Editor's Notes

  1. Game elements – each time someone says one, everyone in the other groups crosses it out if they have on. Winning group has most unique sites
  2. Discussion and do they also benefit your employer
  3. ACAS site on social media covers plenty of areas http://www.acas.org.uk/index.aspx?articleid=3375
  4. Examples of recruiters looking at profile data
  5. https://nakedsecurity.sophos.com/2013/05/10/snapchat-images-that-have-disappeared-forever-stay-right-on-your-phone/
  6. http://4.bp.blogspot.com/-iNs5HCATYAc/Twmsbd-VwhI/AAAAAAAAABk/W5JY0F7ON5Q/s1600/Royston+Vasey.bmp for views of a certain age
  7. https://www.theguardian.com/money/2016/nov/02/facebook-admiral-car-insurance-privacy-data
  8. Invite someone to test their password strength How many passwords do you think you need? Invite most common passwords
  9. If time a bit of a phishing quiz
  10. Stand up if you have a phone /tablet and are able to easily stand Sit if you have Pin/password/pattern/eye/fingerprint Who’s left staning?