SlideShare a Scribd company logo
1 of 1
Download to read offline
5 Simple Steps for Safe Social Networking

  I. Type The URL Yourself
       •   When visiting websites that require a username and password (like
           Facebook, Twitter and your online back account) always type out the entire
           URL yourself. Don’t follow someone else’s link or a bookmark. Most
           phishing and hacking occur when criminals trick your computer’s
           bookmarks or webpage history into redirecting you to a phony site. Once
           you’re there and enter your login information, they have it and will use it.
  II. Limit The Number Administrators On Your Social Networking
       •   Every person with Administrative privileges on your social networking
           accounts can put your pages at risk. If any of your Administrative accounts
           are compromised, Hackers will also have access to your campaign’s social
           networking groups and pages.
  III. Watch What You Download
       •   90% of PC infections (virus or spyware) occur because you opened the
           door and invited them in. Just like you would only allow a licensed and
           credible plumber into your house to fix your toilet, whenever something
           asks to be downloaded or installed on your PC, ask yourself, “Would I let
           these people in my house?” If the answer is no, don’t download the
           software. If you need the software or update, it will be available from a
           website or company you trust (Microsoft, Adobe, etc.).
  IV. Avoid Easy Targets - Use Web Browsers Wisely
       •   Most phishing, hacking and viruses target the most common web browser,
           Microsoft Internet Explorer. By using other programs, most viruses can’t
           get in. GrassRoots 2.0 recommends Google Chrome and Mozilla FireFox
           which are available for free.
  V. Scan Your Computer For Viruses and Spyware Weekly
       •   The longer these fun friends sit on you computer, the more trouble they will
           cause you. Often criminals trying to gain access to your social networking
           accounts use Spyware which monitors your movements. Scanning your PC
           weekly for these threats can dramatically reduce the risk of someone
           gaining access. Many versions of Windows come with anti-spyware tools
           or we recommend Lavasoft’s AdAware which is available for free.




                                 Bryan Bedera
                           bbedera@grassroots20.com
                                (775) 750.5223

More Related Content

More from aporrazzo

Loopnet Report Year End 2009 Sacramento
Loopnet Report Year End 2009 SacramentoLoopnet Report Year End 2009 Sacramento
Loopnet Report Year End 2009 Sacramentoaporrazzo
 
Loopnet Local Quarterly Insight Report Q1, 2009
Loopnet Local Quarterly Insight Report Q1, 2009Loopnet Local Quarterly Insight Report Q1, 2009
Loopnet Local Quarterly Insight Report Q1, 2009aporrazzo
 
Irem Spring Newsletter 4 8 09
Irem Spring Newsletter 4 8 09Irem Spring Newsletter 4 8 09
Irem Spring Newsletter 4 8 09aporrazzo
 
Mt. Rose Rw Membership Form
Mt. Rose Rw Membership FormMt. Rose Rw Membership Form
Mt. Rose Rw Membership Formaporrazzo
 
Ipx Exchange Addendum
Ipx Exchange AddendumIpx Exchange Addendum
Ipx Exchange Addendumaporrazzo
 
Copart Purchase Thomas Creek I
Copart Purchase Thomas Creek ICopart Purchase Thomas Creek I
Copart Purchase Thomas Creek Iaporrazzo
 
At&T Support Center Opens
At&T Support Center OpensAt&T Support Center Opens
At&T Support Center Opensaporrazzo
 
Tri Net Center Completed 4 20 09
Tri Net Center Completed 4 20 09Tri Net Center Completed 4 20 09
Tri Net Center Completed 4 20 09aporrazzo
 
Rgj 236 Jobs Created In Reno 2009 04 01
Rgj   236 Jobs Created In Reno 2009 04 01Rgj   236 Jobs Created In Reno 2009 04 01
Rgj 236 Jobs Created In Reno 2009 04 01aporrazzo
 
Cbre Northern Nevada Investment Report
Cbre Northern Nevada Investment ReportCbre Northern Nevada Investment Report
Cbre Northern Nevada Investment Reportaporrazzo
 
Loopnet Q4 2009 Insight Report 1 16 09
Loopnet Q4 2009 Insight Report 1 16 09Loopnet Q4 2009 Insight Report 1 16 09
Loopnet Q4 2009 Insight Report 1 16 09aporrazzo
 
Brian Bonnenfants Nevada Business Outlook 1 23 09
Brian Bonnenfants Nevada Business Outlook 1 23 09Brian Bonnenfants Nevada Business Outlook 1 23 09
Brian Bonnenfants Nevada Business Outlook 1 23 09aporrazzo
 
Agc Of Americas Chief Economist Outlook Report 1 23 09
Agc Of Americas Chief Economist Outlook Report 1 23 09Agc Of Americas Chief Economist Outlook Report 1 23 09
Agc Of Americas Chief Economist Outlook Report 1 23 09aporrazzo
 
Year End Guide For Sales Leaders
Year End Guide For Sales LeadersYear End Guide For Sales Leaders
Year End Guide For Sales Leadersaporrazzo
 
Ralph Spencer Training Session Handbook 10 23 08
Ralph Spencer Training Session Handbook 10 23 08Ralph Spencer Training Session Handbook 10 23 08
Ralph Spencer Training Session Handbook 10 23 08aporrazzo
 

More from aporrazzo (15)

Loopnet Report Year End 2009 Sacramento
Loopnet Report Year End 2009 SacramentoLoopnet Report Year End 2009 Sacramento
Loopnet Report Year End 2009 Sacramento
 
Loopnet Local Quarterly Insight Report Q1, 2009
Loopnet Local Quarterly Insight Report Q1, 2009Loopnet Local Quarterly Insight Report Q1, 2009
Loopnet Local Quarterly Insight Report Q1, 2009
 
Irem Spring Newsletter 4 8 09
Irem Spring Newsletter 4 8 09Irem Spring Newsletter 4 8 09
Irem Spring Newsletter 4 8 09
 
Mt. Rose Rw Membership Form
Mt. Rose Rw Membership FormMt. Rose Rw Membership Form
Mt. Rose Rw Membership Form
 
Ipx Exchange Addendum
Ipx Exchange AddendumIpx Exchange Addendum
Ipx Exchange Addendum
 
Copart Purchase Thomas Creek I
Copart Purchase Thomas Creek ICopart Purchase Thomas Creek I
Copart Purchase Thomas Creek I
 
At&T Support Center Opens
At&T Support Center OpensAt&T Support Center Opens
At&T Support Center Opens
 
Tri Net Center Completed 4 20 09
Tri Net Center Completed 4 20 09Tri Net Center Completed 4 20 09
Tri Net Center Completed 4 20 09
 
Rgj 236 Jobs Created In Reno 2009 04 01
Rgj   236 Jobs Created In Reno 2009 04 01Rgj   236 Jobs Created In Reno 2009 04 01
Rgj 236 Jobs Created In Reno 2009 04 01
 
Cbre Northern Nevada Investment Report
Cbre Northern Nevada Investment ReportCbre Northern Nevada Investment Report
Cbre Northern Nevada Investment Report
 
Loopnet Q4 2009 Insight Report 1 16 09
Loopnet Q4 2009 Insight Report 1 16 09Loopnet Q4 2009 Insight Report 1 16 09
Loopnet Q4 2009 Insight Report 1 16 09
 
Brian Bonnenfants Nevada Business Outlook 1 23 09
Brian Bonnenfants Nevada Business Outlook 1 23 09Brian Bonnenfants Nevada Business Outlook 1 23 09
Brian Bonnenfants Nevada Business Outlook 1 23 09
 
Agc Of Americas Chief Economist Outlook Report 1 23 09
Agc Of Americas Chief Economist Outlook Report 1 23 09Agc Of Americas Chief Economist Outlook Report 1 23 09
Agc Of Americas Chief Economist Outlook Report 1 23 09
 
Year End Guide For Sales Leaders
Year End Guide For Sales LeadersYear End Guide For Sales Leaders
Year End Guide For Sales Leaders
 
Ralph Spencer Training Session Handbook 10 23 08
Ralph Spencer Training Session Handbook 10 23 08Ralph Spencer Training Session Handbook 10 23 08
Ralph Spencer Training Session Handbook 10 23 08
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

5 Steps To Safe Social Networking

  • 1. 5 Simple Steps for Safe Social Networking I. Type The URL Yourself • When visiting websites that require a username and password (like Facebook, Twitter and your online back account) always type out the entire URL yourself. Don’t follow someone else’s link or a bookmark. Most phishing and hacking occur when criminals trick your computer’s bookmarks or webpage history into redirecting you to a phony site. Once you’re there and enter your login information, they have it and will use it. II. Limit The Number Administrators On Your Social Networking • Every person with Administrative privileges on your social networking accounts can put your pages at risk. If any of your Administrative accounts are compromised, Hackers will also have access to your campaign’s social networking groups and pages. III. Watch What You Download • 90% of PC infections (virus or spyware) occur because you opened the door and invited them in. Just like you would only allow a licensed and credible plumber into your house to fix your toilet, whenever something asks to be downloaded or installed on your PC, ask yourself, “Would I let these people in my house?” If the answer is no, don’t download the software. If you need the software or update, it will be available from a website or company you trust (Microsoft, Adobe, etc.). IV. Avoid Easy Targets - Use Web Browsers Wisely • Most phishing, hacking and viruses target the most common web browser, Microsoft Internet Explorer. By using other programs, most viruses can’t get in. GrassRoots 2.0 recommends Google Chrome and Mozilla FireFox which are available for free. V. Scan Your Computer For Viruses and Spyware Weekly • The longer these fun friends sit on you computer, the more trouble they will cause you. Often criminals trying to gain access to your social networking accounts use Spyware which monitors your movements. Scanning your PC weekly for these threats can dramatically reduce the risk of someone gaining access. Many versions of Windows come with anti-spyware tools or we recommend Lavasoft’s AdAware which is available for free. Bryan Bedera bbedera@grassroots20.com (775) 750.5223