SlideShare une entreprise Scribd logo
1  sur  41
Télécharger pour lire hors ligne
© 2015 Quick Heal Technologies Ltd.
WEBINAR
How Much Should
You Reveal on
Social Media?
© 2015 Quick Heal Technologies Ltd.
We all love sharing stuff on social
media, especially Facebook -
funny pics, hilarious videos, witty
jokes and what not.
© 2015 Quick Heal Technologies Ltd.
But, do we know how much
should be shared and what
shouldn't be?
© 2015 Quick Heal Technologies Ltd.
In today’s webinar, we will
discuss:
# The type of information that should not be made
public.
# Consequences of sharing too much on social media.
# Tips on protecting your online privacy.
# How Quick Heal helps you use social media safely.
© 2015 Quick Heal Technologies Ltd.
Type of information that
should not be made public.
© 2015 Quick Heal Technologies Ltd.
Remember, we’re always
being watched on Social
Media.
© 2015 Quick Heal Technologies Ltd.
And among the people who
could be watching us are
Cyber Criminals.
© 2015 Quick Heal Technologies Ltd.
And that’s why, you should
never reveal this type of
information in public on social
media:
© 2015 Quick Heal Technologies Ltd.
1. Your home’s address.
© 2015 Quick Heal Technologies Ltd.
2. Your phone number.
© 2015 Quick Heal Technologies Ltd.
3. Your date of birth.
© 2015 Quick Heal Technologies Ltd.
4. Your vacation plans.
© 2015 Quick Heal Technologies Ltd.
5. Photos of all your
belongings.
© 2015 Quick Heal Technologies Ltd.
6. Information about your kids.
© 2015 Quick Heal Technologies Ltd.
7. Grudges about your work.
© 2015 Quick Heal Technologies Ltd.
8. Intimate or personal photos.
© 2015 Quick Heal Technologies Ltd.
9. Any financial information.
© 2015 Quick Heal Technologies Ltd.
Consequences of sharing too
much on social media.
© 2015 Quick Heal Technologies Ltd.
Sharing too much information
on social media has the
following risks:
© 2015 Quick Heal Technologies Ltd.
1. You could be exposing
yourself to online predators.
© 2015 Quick Heal Technologies Ltd.
2. You are more likely to
become a victim of identity
fraud.
© 2015 Quick Heal Technologies Ltd.
3. Home burglary while you
are out.
© 2015 Quick Heal Technologies Ltd.
4. Risk of being cyber bullied.
© 2015 Quick Heal Technologies Ltd.
5. You may fall prey to social
engineering schemes.
© 2015 Quick Heal Technologies Ltd.
6. Damaged reputation.
© 2015 Quick Heal Technologies Ltd.
Tips on protecting your privacy on
Social Media.
© 2015 Quick Heal Technologies Ltd.
You can protect your privacy
on Facebook by following
these tips:
© 2015 Quick Heal Technologies Ltd.
1. Control who can
see your timeline
posts on Facebook.
© 2015 Quick Heal Technologies Ltd.
2. Control who can
get in touch with
you via messages.
© 2015 Quick Heal Technologies Ltd.
3. Control the privacy of
the details in the ‘About’
section.
© 2015 Quick Heal Technologies Ltd.
4. Control who can find you on
Facebook using your email
address and telephone number.
© 2015 Quick Heal Technologies Ltd.
5. Know when your account is
accessed from an unknown
device.
© 2015 Quick Heal Technologies Ltd.
6. Some More Tips on Privacy:
# Encrypt your hard drive.
# Consider using Private Browsing.
# Always Log Out once done.
# Read Privacy Policies of sites you share
your information with.
# Avoid using public WiFi for logging into
sites.
© 2015 Quick Heal Technologies Ltd.
How Quick Heal helps you use
Social Media safely
© 2015 Quick Heal Technologies Ltd.
Quick Heal helps you stay safe
against online threats including
dangers on Social Media with
these security features:
© 2015 Quick Heal Technologies Ltd.
Helps restrict users (especially
children) from visiting potentially
dangerous social media sites like
dating sites, unmonitored chat
sites, etc.
Parental Control
© 2015 Quick Heal Technologies Ltd.
Automatically blocks websites that
are designed to steal user
information by using social media
scams.
Web Security
© 2015 Quick Heal Technologies Ltd.
Blocks emails designed to trick
users into revealing personal and
financial information.
Email Security
© 2015 Quick Heal Technologies Ltd.
Write to us at:
CorporateCommunications@quickheal.co.in
Follow us on:
Facebook: www.facebook.com/quickhealav
Twitter: www.twitter.com/quickheal
Google Plus: bit.ly/QuickHealGooglePlus
YouTube: www.youtube.com/quickheal
SlideShare: http://www.slideshare.net/QuickHealPPTs
Visit us:
Website: www.quickheal.com
Official Blog: blogs.quickheal.com
Got any queries regarding this
webinar?
© 2015 Quick Heal Technologies Ltd.
Thank You!
© 2015 Quick Heal Technologies Ltd.
References
http://blogs.quickheal.com/wp/how-much-should-you-reveal-on-facebook/
http://blogs.quickheal.com/wp/how-much-should-you-reveal-on-facebook-part-ii/
http://blogs.quickheal.com/wp/5-tips-to-make-your-facebook-account-hackproof-updated/
http://blogs.quickheal.com/wp/facebook-security-easy-tips-for-user-privacy/

Contenu connexe

Tendances

Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookCyren, Inc
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?SwiftTech Solutions, Inc.
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals OutNeil Kemp
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" InfographicDavid McHale
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2Monica Hamilton
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - nowSymantec
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Sam Norallah
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentesterCláudio André
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentationredbackacademy
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber SecurityThrottleNet, Inc
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber securityAnnaVihersalo
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeEC-Council
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityviimsikool
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityNowSecure
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsKevin Fream
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterJack
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?SwiftTech Solutions, Inc.
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 

Tendances (20)

Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats YearbookWebinar: Insights from CYREN's 2015 Cyber Threats Yearbook
Webinar: Insights from CYREN's 2015 Cyber Threats Yearbook
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?
 
10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out10 Tips to Keep Criminals Out
10 Tips to Keep Criminals Out
 
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
"10 Tips To Keep Cybercriminals Out While Coronavirus Keeps You In" Infographic
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)Cyber-Leave-Behind-Brochure-Done (1)
Cyber-Leave-Behind-Brochure-Done (1)
 
A day in the life of a pentester
A day in the life of a pentesterA day in the life of a pentester
A day in the life of a pentester
 
Internet Security at Work Presentation
Internet Security at Work PresentationInternet Security at Work Presentation
Internet Security at Work Presentation
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
 
Fitsec-remote work and cyber security
Fitsec-remote work and cyber securityFitsec-remote work and cyber security
Fitsec-remote work and cyber security
 
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne BurkeExtreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The fundamentals of Android and iOS app security
The fundamentals of Android and iOS app securityThe fundamentals of Android and iOS app security
The fundamentals of Android and iOS app security
 
Cybersecurity Awareness Month Tips
Cybersecurity Awareness Month TipsCybersecurity Awareness Month Tips
Cybersecurity Awareness Month Tips
 
Microsoft Final Internet Safety Poster
Microsoft Final Internet Safety PosterMicrosoft Final Internet Safety Poster
Microsoft Final Internet Safety Poster
 
What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?What is CryptoLocker and How Can I Protect My Business From It?
What is CryptoLocker and How Can I Protect My Business From It?
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Cyber security and crime
Cyber security and crimeCyber security and crime
Cyber security and crime
 

Similaire à How much should you reveal on social media

5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.comjackpot201
 
341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdf341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdfHarkeemShaw1
 
Youthlink Scotland and Social Media
Youthlink Scotland and Social MediaYouthlink Scotland and Social Media
Youthlink Scotland and Social MediaCraig McGill
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for DummiesLiberteks
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Social media and security
Social media and securitySocial media and security
Social media and securityElvis Eromosele
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptxRACHANAB18
 
My Video Talk In U.A.E.
My Video Talk In U.A.E.My Video Talk In U.A.E.
My Video Talk In U.A.E.Noel
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Social Business Initiatives: Identification and Responsible Implementation wi...
Social Business Initiatives: Identification and Responsible Implementation wi...Social Business Initiatives: Identification and Responsible Implementation wi...
Social Business Initiatives: Identification and Responsible Implementation wi...Information Development World
 
Social media ppt
Social media pptSocial media ppt
Social media pptLeadMillion
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptxGAmarioarei
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1Julian Ranger
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? TechGenie
 
Things Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You RealizingThings Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You RealizingKiwasoft Technologies
 

Similaire à How much should you reveal on social media (20)

Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security TipsTop 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
 
5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com5 common myths that stop people from using an antivirus copypasteads.com
5 common myths that stop people from using an antivirus copypasteads.com
 
20110805
2011080520110805
20110805
 
341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdf341972038-Vulnerability-Management-2nd-edition-pdf.pdf
341972038-Vulnerability-Management-2nd-edition-pdf.pdf
 
Youthlink Scotland and Social Media
Youthlink Scotland and Social MediaYouthlink Scotland and Social Media
Youthlink Scotland and Social Media
 
Vulnerability Management for Dummies
Vulnerability Management for DummiesVulnerability Management for Dummies
Vulnerability Management for Dummies
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Social media and security
Social media and securitySocial media and security
Social media and security
 
social media presentation.pptx
social media presentation.pptxsocial media presentation.pptx
social media presentation.pptx
 
My Video Talk In U.A.E.
My Video Talk In U.A.E.My Video Talk In U.A.E.
My Video Talk In U.A.E.
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Social Business Initiatives: Identification and Responsible Implementation wi...
Social Business Initiatives: Identification and Responsible Implementation wi...Social Business Initiatives: Identification and Responsible Implementation wi...
Social Business Initiatives: Identification and Responsible Implementation wi...
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Social media ppt
Social media pptSocial media ppt
Social media ppt
 
media safety .pptx
media safety .pptxmedia safety .pptx
media safety .pptx
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web? Are you at risk on the World Wide Web?
Are you at risk on the World Wide Web?
 
Things Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You RealizingThings Destroying Your Online Reputation without You Realizing
Things Destroying Your Online Reputation without You Realizing
 
How lawyers use social media in 2014
How lawyers use social media in 2014How lawyers use social media in 2014
How lawyers use social media in 2014
 

Plus de Quick Heal Technologies Ltd.

31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareQuick Heal Technologies Ltd.
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossQuick Heal Technologies Ltd.
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Quick Heal Technologies Ltd.
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationQuick Heal Technologies Ltd.
 

Plus de Quick Heal Technologies Ltd. (20)

Digital Threat Landscape
Digital Threat LandscapeDigital Threat Landscape
Digital Threat Landscape
 
Cybersecurity in Banking Sector
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking Sector
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]
 
Next-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway Protection
 
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data LossSeqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
Seqrite Data Loss Prevention- Complete Protection from Data Theft and Data Loss
 
Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action Is Antivirus (AV) Dead or Just Missing in Action
Is Antivirus (AV) Dead or Just Missing in Action
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 
GITEX 2016, Dubai
GITEX 2016, Dubai GITEX 2016, Dubai
GITEX 2016, Dubai
 
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
Seqrite EPS 7.0 launched in Poland by valued distributors, IT Dystrybucja 24
 
Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016Maharashtra Cooperative Summit 2016
Maharashtra Cooperative Summit 2016
 
Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016 Seqrite Hyderabad Meet 2016
Seqrite Hyderabad Meet 2016
 
Seqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, IndiaSeqrite CXO Meet, Ahmedabad, India
Seqrite CXO Meet, Ahmedabad, India
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.Seqrite Launch Event in Athens, Greece.
Seqrite Launch Event in Athens, Greece.
 
BFSI Leadership Summit, Mumbai
BFSI Leadership Summit, MumbaiBFSI Leadership Summit, Mumbai
BFSI Leadership Summit, Mumbai
 
Jnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher educationJnana Sangama Day 1 - National convention for higher education
Jnana Sangama Day 1 - National convention for higher education
 

Dernier

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024Mind IT Systems
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...software pro Development
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionOnePlan Solutions
 

Dernier (20)

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...How to Choose the Right Laravel Development Partner in New York City_compress...
How to Choose the Right Laravel Development Partner in New York City_compress...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 

How much should you reveal on social media

  • 1. © 2015 Quick Heal Technologies Ltd. WEBINAR How Much Should You Reveal on Social Media?
  • 2. © 2015 Quick Heal Technologies Ltd. We all love sharing stuff on social media, especially Facebook - funny pics, hilarious videos, witty jokes and what not.
  • 3. © 2015 Quick Heal Technologies Ltd. But, do we know how much should be shared and what shouldn't be?
  • 4. © 2015 Quick Heal Technologies Ltd. In today’s webinar, we will discuss: # The type of information that should not be made public. # Consequences of sharing too much on social media. # Tips on protecting your online privacy. # How Quick Heal helps you use social media safely.
  • 5. © 2015 Quick Heal Technologies Ltd. Type of information that should not be made public.
  • 6. © 2015 Quick Heal Technologies Ltd. Remember, we’re always being watched on Social Media.
  • 7. © 2015 Quick Heal Technologies Ltd. And among the people who could be watching us are Cyber Criminals.
  • 8. © 2015 Quick Heal Technologies Ltd. And that’s why, you should never reveal this type of information in public on social media:
  • 9. © 2015 Quick Heal Technologies Ltd. 1. Your home’s address.
  • 10. © 2015 Quick Heal Technologies Ltd. 2. Your phone number.
  • 11. © 2015 Quick Heal Technologies Ltd. 3. Your date of birth.
  • 12. © 2015 Quick Heal Technologies Ltd. 4. Your vacation plans.
  • 13. © 2015 Quick Heal Technologies Ltd. 5. Photos of all your belongings.
  • 14. © 2015 Quick Heal Technologies Ltd. 6. Information about your kids.
  • 15. © 2015 Quick Heal Technologies Ltd. 7. Grudges about your work.
  • 16. © 2015 Quick Heal Technologies Ltd. 8. Intimate or personal photos.
  • 17. © 2015 Quick Heal Technologies Ltd. 9. Any financial information.
  • 18. © 2015 Quick Heal Technologies Ltd. Consequences of sharing too much on social media.
  • 19. © 2015 Quick Heal Technologies Ltd. Sharing too much information on social media has the following risks:
  • 20. © 2015 Quick Heal Technologies Ltd. 1. You could be exposing yourself to online predators.
  • 21. © 2015 Quick Heal Technologies Ltd. 2. You are more likely to become a victim of identity fraud.
  • 22. © 2015 Quick Heal Technologies Ltd. 3. Home burglary while you are out.
  • 23. © 2015 Quick Heal Technologies Ltd. 4. Risk of being cyber bullied.
  • 24. © 2015 Quick Heal Technologies Ltd. 5. You may fall prey to social engineering schemes.
  • 25. © 2015 Quick Heal Technologies Ltd. 6. Damaged reputation.
  • 26. © 2015 Quick Heal Technologies Ltd. Tips on protecting your privacy on Social Media.
  • 27. © 2015 Quick Heal Technologies Ltd. You can protect your privacy on Facebook by following these tips:
  • 28. © 2015 Quick Heal Technologies Ltd. 1. Control who can see your timeline posts on Facebook.
  • 29. © 2015 Quick Heal Technologies Ltd. 2. Control who can get in touch with you via messages.
  • 30. © 2015 Quick Heal Technologies Ltd. 3. Control the privacy of the details in the ‘About’ section.
  • 31. © 2015 Quick Heal Technologies Ltd. 4. Control who can find you on Facebook using your email address and telephone number.
  • 32. © 2015 Quick Heal Technologies Ltd. 5. Know when your account is accessed from an unknown device.
  • 33. © 2015 Quick Heal Technologies Ltd. 6. Some More Tips on Privacy: # Encrypt your hard drive. # Consider using Private Browsing. # Always Log Out once done. # Read Privacy Policies of sites you share your information with. # Avoid using public WiFi for logging into sites.
  • 34. © 2015 Quick Heal Technologies Ltd. How Quick Heal helps you use Social Media safely
  • 35. © 2015 Quick Heal Technologies Ltd. Quick Heal helps you stay safe against online threats including dangers on Social Media with these security features:
  • 36. © 2015 Quick Heal Technologies Ltd. Helps restrict users (especially children) from visiting potentially dangerous social media sites like dating sites, unmonitored chat sites, etc. Parental Control
  • 37. © 2015 Quick Heal Technologies Ltd. Automatically blocks websites that are designed to steal user information by using social media scams. Web Security
  • 38. © 2015 Quick Heal Technologies Ltd. Blocks emails designed to trick users into revealing personal and financial information. Email Security
  • 39. © 2015 Quick Heal Technologies Ltd. Write to us at: CorporateCommunications@quickheal.co.in Follow us on: Facebook: www.facebook.com/quickhealav Twitter: www.twitter.com/quickheal Google Plus: bit.ly/QuickHealGooglePlus YouTube: www.youtube.com/quickheal SlideShare: http://www.slideshare.net/QuickHealPPTs Visit us: Website: www.quickheal.com Official Blog: blogs.quickheal.com Got any queries regarding this webinar?
  • 40. © 2015 Quick Heal Technologies Ltd. Thank You!
  • 41. © 2015 Quick Heal Technologies Ltd. References http://blogs.quickheal.com/wp/how-much-should-you-reveal-on-facebook/ http://blogs.quickheal.com/wp/how-much-should-you-reveal-on-facebook-part-ii/ http://blogs.quickheal.com/wp/5-tips-to-make-your-facebook-account-hackproof-updated/ http://blogs.quickheal.com/wp/facebook-security-easy-tips-for-user-privacy/