slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Social media threats PowerPoint Presentation
Download Presentation
Social media threats

Loading in 2 Seconds...

play fullscreen
1 / 36

Social media threats - PowerPoint PPT Presentation


  • 1096 Views
  • Uploaded on

Social media threats. Warning! May contain mild peril. Contents. What is social media? Risks associated with social media How the threats work Social media spam Social media phishing Social media malware Using social media safely. What is social media?. Social media has arrived.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Social media threats


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Social media threats

    2. Warning! May contain mild peril

    3. Contents • What is social media? • Risks associated with social media • How the threats work • Social media spam • Social media phishing • Social media malware • Using social media safely

    4. What is social media?

    5. Social media has arrived Social networking sites are now more popular than web-based email

    6. Social media – key features • Allows users to become a member of an online community • Key features are “Profiles” and “Friend lists” • The most commonly used social network is still Facebook • 2009 saw the rapid emergence of Twitter • Also called social networking

    7. Risks associated with social media

    8. Two main types of threat Users publishing information Social networking attacks

    9. Users publishing information • Reveal sensitive information • Defamation of others/school system • This can be inadvertent or deliberate • And the repercussions include: • Reputation damage • Fines

    10. Social networking attacks Financially-motivated organized crime Hobby/ showing off

    11. Social networking attacks Social networking accounts are valuable to hackers They can use them to send spam, spread malware, steal identities... … in the quest to acquire personal information for financial gain

    12. Data = $$$ • Steal your money directly • Sell your data • Trick your friends and family intosupplying personal data • Sell your identity • Use your accounts to spread spam, malware and more data theft scams! • Sell your school’s data or sensitive information • Blackmail individuals and organizations

    13. How the threats work

    14. How the threats work • Spam • Phishing • Malware

    15. Social networking spam

    16. Social networking spam

    17. Social networking spam

    18. Social networking spam

    19. Social networking spam

    20. Social networking spam

    21. Social networking spam 57% of social networking users report being hit by spam via the services That’s an increase of from a year ago 70.6%

    22. Social networking phishing

    23. Social networking phishing

    24. Social networking phishing

    25. Social networking phishing

    26. Social networking phishing 30% of social networking users report phishing attacks via the sites That’s an increase of from a year ago 42.9%

    27. Social networking malware

    28. Social networking malware

    29. Social networking malware

    30. Social networking malware

    31. Social networking malware

    32. Social networking malware

    33. Using social media safely

    34. Top tips for staying secure • KNOW THE RULES - check your organization’s policy on social networking • USE SECURE PASSWORDS - minimum 14 characters including non-letters • CHECK THE DEFAULT SETTINGS - don’t providing personal information by default • BE PICTURE PRUDENT - think before posting images that might cause embarrassment • BEWARE OF BIG BROTHER - assume everyone can read your posts, including hackers! • SECURE YOUR COMPUTERS - use up-to-date security software and firewalls • THINK BEFORE YOU CLICK - if the email looks dodgy it probably is  • STRANGER DANGER - beware of unsolicited invitations from spammers

    35. Summary • Financially-motivated criminals are increasingly using social media sites to steal identities, spread malware and send spam • Social networks are getting better at protecting users against these threats – but there’s a long way to go • The onus is on YOU to use social media sites safely – follow the top tips for staying secure

    36. Thank you