260 likes | 283 Views
Stay informed about crucial information security topics such as phishing schemes, mobile device security, social networking, and personal branding to protect your online identity. Learn from real-world examples like hacked social media posts to enhance your digital safety practices.
E N D
Topics That Will Be Covered • Survey Results • Social Networking • Mobile Device Security • Phishing Schemes • Information Privacy and Protection • Personal Branding
Result/Learning Point • Riley was arrested for the death threat on Tom. • Legal implications were discussed regarding fines and jail time for the tweet. • This could have future implications on his life. • If anyone can see the message they can share it. • Hashtags and name tagging increase who can see the message. • Think twice before posting. • If you don’t want anyone to find out about the message. DON’T POST IT!
Hacked Social Media Posts NMMI post from hacked Facebook profile of student in leadership role.
Result/Learning Point • Incited a riot on NMMI campus. • Defamed the character of the individual whose profile was hacked. • Could affect the individuals future when they did not even post the message. • Don’t share your passwords with other people. • Focus on password complexity when you are making them. • Have more than one password. • Use two-step authentication to help keep Hackers out.
Keep your accounts safe with 2 factor authentication https://www.youtube.com/watch?v=2Qs09ID_s90
Learning Point • Know the site whose information you are looking at. • Do not put personal information into these untrusted sites. • By clicking on these links you can be hacked, or get a virus on your device. • Do not share links unless you know they are authentic.
Mobile Device Security Incidents • Changing and misusing Mobile Configurations. • Downloading and maintaining unnecessary apps. • Sharing information through text messages. • Risks of using a camera. • Being unaware of what information that your Apps take from your phone or save when you use them.
Learning Point • Standard configuration settings are for your safety. • Repackaged apps can look real and may have good ratings, but you should look for apps by companies that you trust. • Anything you send from your phone can be seen by anyone. • Be aware of camera settings. • Don’t take videos or photos of things that you do not want someone else to see. • Read through what you are agreeing that an app can take from your phone before agreeing. • Know that no app can promise 100% discretion.
How are People Phishing for Information? • Request for reauthentication of any account. • Something has happened to one of your accounts. • Offer great awards that you need to do something simple to receive. • Appearing to be a trusted friend that found something amazing.
Phishing Tip-offs Outlook spelled with 0. Should I trust this sender? Generic Greeting Easy Click Here Short time of action
Learning Point • NEVER click on anything in an email unless you can completely trust what you are receiving. • Do not give any information to the sender of a suspicious email. • Call proper contact point for whom the sender is trying to imitate, do not use any email or phone number they provide you. • Keep your antivirus and software up to date in case of downloading malware. • Limit what information you share so that attacker does not seem as legitimate. • If you do not know who to contact send it to a local expert at your school or work so that they can verify if it is a legitimate email.
What is Encryption? In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor.
What you should Encrypt • Emails that contain sensitive information. • Files that contain password information. • Files that contain Financial Information or Social Security Number. • Health Documents. • Any easily stolen device such as a Flash drive.
Information Privacy and Protection • The person in control of your information is YOU! It is up to you to decide how much you disclose. • Keep your social networking activity and settings private. • Have multiple passwords and ensure they are strong by making them less standard and adding complexity. • When posting photos make sure that there is not information on them, and check with people in them before posting for their privacy. • Know that nothing is private when it leaves your possession. • Encrypt and require additional authentication for data that you want to be protected.
How this Information affects my Personal Brand? • Show the version of you that you want everybody to see. • Look responsible because of your awareness of what you are doing online. • Don’t leave yourself vulnerable for an attack that could have negative affects on you. • Your chances of being victim of a cyber attack only increase with age, so learning early offers best source of protection. • Your image and your security starts and ends with your choices.