This document discusses the dark side of social networking and how to protect yourself. It includes a bio of an ethical computer hacker who has worked in forensics and cybersecurity. It also outlines the basic steps of a hacking attack and lists some social media and data analysis tools, as well as recommendations to limit the information you share and put policies in place to protect your company.