1 / 18

Social Media: What You Should Know

Learn about the risks associated with sharing personal information on social media and discover effective methods to protect your digital identity. This overview includes survey results, a video on the six degrees of information, and practical tips for safeguarding your data. Don't let hackers or phishing scams compromise your privacy – take control of your online presence today!

velmaf
Download Presentation

Social Media: What You Should Know

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Media: What You Should Know

  2. Overview • Survey Results • Video: 6 Degrees of Information • What is our digital identity? • Methods for gaining access to our personal information • Video: Think Before You Post • How to Protect Yourself

  3. Time Spent on Internet

  4. Social Media Sites

  5. Six Degrees of Information

  6. Your Digital Identity • Face • Voice • Fingerprint • Gender • Date of Birth • Place of Birth • Mother’s Maiden Name • Ethnicity • Address • Education • Language • Affiliations • Interests • Hobbies • Family

  7. Your Personal Information • Open source – You post it online…or your friends/family do • People can gain quit a bit just by searching your social media accounts. Most common are date of birth, address, mother’s maiden name, school, schedules and places you visit

  8. Your Personal Information • Theft • Think of all the information on your phone and computer • Phishing • Criminals emails or friend you pretending to be someone else • Clicking on an email – can be targeted to you specifically

  9. Your Personal Information • Hacking • Large scale data breaches can reveal your data and PII

  10. Your Personal Information • Passwords • Easy passwords like password123 • Phishing scams • Same password used for all sites • Locations • Check in features • Filters used with the location • Embedded in photos • Pictures with personal belongings

  11. Think Before You Post

  12. How to Protect Yourself • Remove personal information • Do a sweep through all of your social media accounts and remove your PII • Update your privacy settings • Set your profile to private • Remove 3rd party apps • Hide your friends list

  13. How to Protect Yourself • Setup a different email that is only for social media • Do not share your location • Do not let others tag you

  14. How to Protect Yourself • Strong Passwords! • Create a strong password • 8+ characters long • Include numbers, capital letters and symbols • Use a different password for each account • Change it often • Consider using multi-factor authentication • Never give it out!

  15. 6 Clicks Demo

  16. Project Resources • https://www.google.com/amp/s/www.truthfinder.com/infomania/amp/safety/remove-exif-data-geotag/ • Applied Fundamentals Consulting LLC presentation on information security • http://www.netsmartz.org/SocialMedia • Cybertipline.com • Coby Persin – The Dangers of Social Media • http://www.dailymail.co.uk/news/article-2790418/hackers-release-100-000-photos-videos-intercepted-popular-app-snapchat-including-huge-trove-include-child-pornography.html

  17. GPS Info When unsure, it is always best to remove your GPS location from all images shared on the internet

More Related