SlideShare a Scribd company logo
1 of 24
Social Media:
Coping with the
Risks
TechTalk for JCCC
Retirees Association
March 27, 2019
Problem: Data
Loss
• Nov. 2018 Marriott 500m
• Oct. 2018 Facebook 29m
• Sept. 2017 Equinox 143m
• May 2016 LinkedIn 117m
• Aug. 2013 Yahoo 3b
Passwords
Credit card numbers
Email addresses
Phone numbers
Dates of birth
Security questions
Check https://haveibeenpwned.com/
Problem: Identity
Theft
• Unsolicited phone
calls and scams
• IRS money due
phone calls (not
legit)
• Unsolicited calls or
email offering a
technical fix
• Unsolicited calls
offering medical
equipment for
Medicare or
Medicaid
recipients
Problem: Fake
Requests From
Spam Profiles
Clues to fake Facebook
friend requests
• Do you know
requestor or have
friends in common?
• Is request from an
unknown attractive
member of opposite
sex?
• Profile has limited
Facebook history or
timeline?
• Already Facebook
friends?
Suspect a Fake
Facebook Request?
• Process to report
face Facebook friend
request:
https://www.socme
dsean.com/answere
d-how-do-i-report-a-
fake-facebook-
friend-request/
Problem: Risks in
Social Sharing
• Facebook, Instagram, and
Snapchat can reveal your
location
• Posting while traveling (Do you
want folks to know your house
or apartment is empty?)
• Photo metadata can identify
your location
Note: sites like metapicz.com,
whereisthepicture.com and
www.pic2map.com can identify
map locations unless geo-tagging
is turned off on the
camera/smartphone.
Pic2Map Example
• Displays photo image, camera used, date, address, city, country,
satellite image and standard map of location
Problem: Profile Hacking
• Cracking social
media user account
passwords: most
common way to
hack one’s profile
• Solution: Use
complex and
frequently changed
passwords
• Beware of Facebook
Chat (Messenger)
messages even
from people you
know
Profile
Hacking
Apps and websites can be
used to create fake
Facebook chats online
In Case You’re Hacked:
Symptoms
• Your device slows down
• You’re using far more data with ISP
than expected
• Videos suddenly buffer, web pages
take longer to load
• Programs and apps keep crashing
• Your device (computer, mobile
device, phone) suddenly reboots
• Unexplained online activity
In Case You’re
Hacked: Solutions
• Run your antivirus
software
• Install any Operating
System upgrades
• Check Task Manager
(Windows) or
Activity Manager
(Mac) – unknown
apps
• Check ISP data
usage for unusual
spikes
• Reboot system see if
problem persists
• Constantly check
your accounts for
unauthorized
activity
Check For Unusual
Activity:
• Unauthorized
financial
transactions
• Credit card charges
or purchases you
didn’t make
• Movies on Netflix
you didn’t stream
• Songs on Spotify or
Pandora you didn’t
play
• Unrecognized
Facebook activity
Think Your Account Is
Hacked?
• Change your passwords, even for old
accounts that may use a common password
• Stop using the hacked
password…everywhere!
• Monitor statements (credit cards and
financial institutions) for charges you don’t
recognize.
• Alert financial institutions that you’ve been
hacked, if you find any evidence.
• Use distinctive passwords, especially for
accounts with personal, health and
financial data.
• Use a cross-platform password manager to
store passwords. Some apps generate
complex passwords for you.
Your Facebook
Account Hacked?
• Check out
m.facebook.com/help/20330589
3040179/
• Explore link to Step by step guide
m.facebook.com/help/13067254
09382822
• If someone tried to change email
associated with a Facebook
account, Facebook sends a
message to the previous email
account with a special link. You
can click the link to reverse the
email change and secure your
account.
Google Account
Hacked?
Report suspicious mail to
Google
productforums.google.co
m/forum/#!msg/gmail/RI
yIm0v-
xnA/py_QQyH4BwAJ
Twitter Account
Hacked?
If you think your Twitter
account has been hacked
help.twitter.com/en/safet
y-and-security/twitter-
account-compromised
Problem: Malicious Links
and Attachments
• Email with fake embedded email
addresses or links
• Email with unsolicited images or video
attached
• If you receive unexpected email or text
attachment (photo, video, link), always
check with sender to verify
Starts out as an innocent: “How are you?”
Don’t volunteer personal details
unless you know who you are
communicating with.
Check the real address
Your Best Defense
• Use strong, complex
passwords or pass
phrases
• Use two-factor
authentication for
important accounts
(Google, Apple,
financial, health)
• Don’t accept requests
from unknown
individuals
• Beware unexpected
links or attachments
• Download apps from
recognized safe sites
(App Store, Google
Play, Microsoft Store)
Be Safe, Be Proactive
• Think before you
share anything!
• Don't include birthday,
address, phone on
your profile
www.facebook.com/h
elp/101765758165199
4/
• Review and update
social media privacy
settings
www.facebook.com/h
elp/115450405225661
• Use Facebook Privacy
Checkup
www.facebook.com/a
bout/basics/manage-
your-privacy/posts#16
Resources
10 Worst Social Media Hacks
https://www.infosecurity-
magazine.com/blogs/top-10-worst-
social-media-cyber/
18 Biggest Data Breaches of 20th
Century
https://www.csoonline.com/article/213
0877/the-biggest-data-breaches-of-the-
21st-century.html
Has Your Phone Been Hacked?
https://www.usatoday.com/story/tech/
columnist/komando/2018/05/04/has-
your-computer-phone-been-hacked-
heres-how-tell/559136002/
Privacy/Security Risks of Social Media
https://www.rswebsols.com/tutorials/in
ternet/privacy-security-risks-social-
media
Resources
How do I spot and Report a Fake
Facebook Friend Request?
https://www.socmedsean.com/ans
wered-how-do-i-report-a-fake-
facebook-friend-request/
Find Location from Photo
https://www.guidingtech.com/find
-location-from-photo/
How to Spot a Fake Friend Request
https://www.lifewire.com/how-to-
spot-a-fake-friend-request-
2487747
Assembled by Jonathan
Bacon for the Johnson
County Community
College Retirees
Association, March 2019
Questions or Comments?

More Related Content

What's hot

Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesday
Molly Immendorf
 
How social media can make or break you
How social media can make or break youHow social media can make or break you
How social media can make or break you
ssjmauro
 
Facebook: Assignment 2a: Policy Primer
Facebook: Assignment 2a: Policy PrimerFacebook: Assignment 2a: Policy Primer
Facebook: Assignment 2a: Policy Primer
james24587
 

What's hot (20)

Danger of facebook
Danger of facebookDanger of facebook
Danger of facebook
 
Dangers of Facebook
Dangers of FacebookDangers of Facebook
Dangers of Facebook
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Social media
Social mediaSocial media
Social media
 
Protecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesdayProtecting your privacy online june 2012 tech tuesday
Protecting your privacy online june 2012 tech tuesday
 
31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month Ocotober
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
Hs facebook pwrpoint
Hs facebook pwrpointHs facebook pwrpoint
Hs facebook pwrpoint
 
PHISHING attack
PHISHING attack PHISHING attack
PHISHING attack
 
Blake Morgan's SEO brand seminar - reputational risk
Blake Morgan's SEO brand seminar - reputational riskBlake Morgan's SEO brand seminar - reputational risk
Blake Morgan's SEO brand seminar - reputational risk
 
How social media can make or break you
How social media can make or break youHow social media can make or break you
How social media can make or break you
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Conducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - WebinarConducting Anonymous Online Investigations - Webinar
Conducting Anonymous Online Investigations - Webinar
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
Media Law
Media LawMedia Law
Media Law
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Facebook: Assignment 2a: Policy Primer
Facebook: Assignment 2a: Policy PrimerFacebook: Assignment 2a: Policy Primer
Facebook: Assignment 2a: Policy Primer
 
Deep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia HetheringtonDeep Web Search Part 2 by Cynthia Hetherington
Deep Web Search Part 2 by Cynthia Hetherington
 
Smjobhunterwebnar3
Smjobhunterwebnar3Smjobhunterwebnar3
Smjobhunterwebnar3
 

Similar to Social Media Risks

Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
Luis Grangeia
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1
Pedro Serrano
 
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptTechnological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.ppt
ssuserc4a497
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
DoubleXDS
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
DoubleXDS
 

Similar to Social Media Risks (20)

Online Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and SecurityOnline Discussion: Ways to Address Online Privacy and Security
Online Discussion: Ways to Address Online Privacy and Security
 
Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
 
It security in healthcare
It security in healthcareIt security in healthcare
It security in healthcare
 
2016 Secure World Expo - Security Awareness
2016 Secure World Expo - Security Awareness2016 Secure World Expo - Security Awareness
2016 Secure World Expo - Security Awareness
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Day 2
Day 2Day 2
Day 2
 
ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1ISSA - Security Awareness 2016-1
ISSA - Security Awareness 2016-1
 
How To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber MondayHow To Keep the Grinch From Ruining Your Cyber Monday
How To Keep the Grinch From Ruining Your Cyber Monday
 
Technological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.pptTechnological Awareness for Teens and Young Adults.ppt
Technological Awareness for Teens and Young Adults.ppt
 
social networking .pptx
social networking .pptxsocial networking .pptx
social networking .pptx
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
PROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACYPROTECTION PERSONAL PRIVACY
PROTECTION PERSONAL PRIVACY
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Shopping and banking online
Shopping and banking onlineShopping and banking online
Shopping and banking online
 
Cybersecurity for King County Public Educators
Cybersecurity for King County Public EducatorsCybersecurity for King County Public Educators
Cybersecurity for King County Public Educators
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

More from Jonathan Bacon

Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Jonathan Bacon
 

More from Jonathan Bacon (20)

Chapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and PlantingChapter 5 Jeremiah: Plucking Up and Planting
Chapter 5 Jeremiah: Plucking Up and Planting
 
The Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 EditionThe Naked Truth About Retirement 2021 Edition
The Naked Truth About Retirement 2021 Edition
 
Johnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General MeetingJohnson County Community College Fall 2020 General Meeting
Johnson County Community College Fall 2020 General Meeting
 
Walking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson CountyWalking, Hiking, Cycling Trails of Johnson County
Walking, Hiking, Cycling Trails of Johnson County
 
The Naked Truth About Retirement - 2020 Edition
The Naked Truth About  Retirement - 2020 EditionThe Naked Truth About  Retirement - 2020 Edition
The Naked Truth About Retirement - 2020 Edition
 
Mobile Photo Editing with Snapseed
Mobile Photo Editing with SnapseedMobile Photo Editing with Snapseed
Mobile Photo Editing with Snapseed
 
Fake News and Mainstream Media Bias
Fake News and Mainstream Media BiasFake News and Mainstream Media Bias
Fake News and Mainstream Media Bias
 
400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch400+ Channels & Nothing to Watch
400+ Channels & Nothing to Watch
 
iPhone Tips for Everyday Users
iPhone Tips for Everyday Users iPhone Tips for Everyday Users
iPhone Tips for Everyday Users
 
Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019Notes Included: Naked Truth About Retirement 2019
Notes Included: Naked Truth About Retirement 2019
 
Naked Truth About Retirement 2019
Naked Truth About Retirement 2019Naked Truth About Retirement 2019
Naked Truth About Retirement 2019
 
The Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and PrivacyThe Ten Commandments of Online Security and Privacy
The Ten Commandments of Online Security and Privacy
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Exploring Travel Apps and Tools
Exploring Travel Apps and Tools Exploring Travel Apps and Tools
Exploring Travel Apps and Tools
 
Athanasius of Alexandria
Athanasius of AlexandriaAthanasius of Alexandria
Athanasius of Alexandria
 
Exploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security SystemsExploring Do-It-Yourself and Installed Home Security Systems
Exploring Do-It-Yourself and Installed Home Security Systems
 
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
Rapid-fire Ed Tech Forums #1 & #2: 7 Presenters Offer 7 Slides in 7 Minutes
 
Quick Guide to Google Photos
Quick Guide to Google PhotosQuick Guide to Google Photos
Quick Guide to Google Photos
 
Cutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media CostsCutting the Cable and Reducing Your Media Costs
Cutting the Cable and Reducing Your Media Costs
 
Privacy: Protecting Personal Information
Privacy: Protecting Personal InformationPrivacy: Protecting Personal Information
Privacy: Protecting Personal Information
 

Recently uploaded

Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
Health
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 

Recently uploaded (20)

Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
Interpreting the brief for the media IDY
Interpreting the brief for the media IDYInterpreting the brief for the media IDY
Interpreting the brief for the media IDY
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
+971565801893>> ORIGINAL CYTOTEC ABORTION PILLS FOR SALE IN DUBAI AND ABUDHABI<<
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic HappensIgnite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
Ignite Your Online Influence: Sociocosmos - Where Social Media Magic Happens
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 

Social Media Risks

  • 1. Social Media: Coping with the Risks TechTalk for JCCC Retirees Association March 27, 2019
  • 2. Problem: Data Loss • Nov. 2018 Marriott 500m • Oct. 2018 Facebook 29m • Sept. 2017 Equinox 143m • May 2016 LinkedIn 117m • Aug. 2013 Yahoo 3b Passwords Credit card numbers Email addresses Phone numbers Dates of birth Security questions Check https://haveibeenpwned.com/
  • 3. Problem: Identity Theft • Unsolicited phone calls and scams • IRS money due phone calls (not legit) • Unsolicited calls or email offering a technical fix • Unsolicited calls offering medical equipment for Medicare or Medicaid recipients
  • 4. Problem: Fake Requests From Spam Profiles Clues to fake Facebook friend requests • Do you know requestor or have friends in common? • Is request from an unknown attractive member of opposite sex? • Profile has limited Facebook history or timeline? • Already Facebook friends?
  • 5. Suspect a Fake Facebook Request? • Process to report face Facebook friend request: https://www.socme dsean.com/answere d-how-do-i-report-a- fake-facebook- friend-request/
  • 6. Problem: Risks in Social Sharing • Facebook, Instagram, and Snapchat can reveal your location • Posting while traveling (Do you want folks to know your house or apartment is empty?) • Photo metadata can identify your location Note: sites like metapicz.com, whereisthepicture.com and www.pic2map.com can identify map locations unless geo-tagging is turned off on the camera/smartphone.
  • 7. Pic2Map Example • Displays photo image, camera used, date, address, city, country, satellite image and standard map of location
  • 8. Problem: Profile Hacking • Cracking social media user account passwords: most common way to hack one’s profile • Solution: Use complex and frequently changed passwords • Beware of Facebook Chat (Messenger) messages even from people you know
  • 9. Profile Hacking Apps and websites can be used to create fake Facebook chats online
  • 10. In Case You’re Hacked: Symptoms • Your device slows down • You’re using far more data with ISP than expected • Videos suddenly buffer, web pages take longer to load • Programs and apps keep crashing • Your device (computer, mobile device, phone) suddenly reboots • Unexplained online activity
  • 11. In Case You’re Hacked: Solutions • Run your antivirus software • Install any Operating System upgrades • Check Task Manager (Windows) or Activity Manager (Mac) – unknown apps • Check ISP data usage for unusual spikes • Reboot system see if problem persists • Constantly check your accounts for unauthorized activity
  • 12. Check For Unusual Activity: • Unauthorized financial transactions • Credit card charges or purchases you didn’t make • Movies on Netflix you didn’t stream • Songs on Spotify or Pandora you didn’t play • Unrecognized Facebook activity
  • 13. Think Your Account Is Hacked? • Change your passwords, even for old accounts that may use a common password • Stop using the hacked password…everywhere! • Monitor statements (credit cards and financial institutions) for charges you don’t recognize. • Alert financial institutions that you’ve been hacked, if you find any evidence. • Use distinctive passwords, especially for accounts with personal, health and financial data. • Use a cross-platform password manager to store passwords. Some apps generate complex passwords for you.
  • 14. Your Facebook Account Hacked? • Check out m.facebook.com/help/20330589 3040179/ • Explore link to Step by step guide m.facebook.com/help/13067254 09382822 • If someone tried to change email associated with a Facebook account, Facebook sends a message to the previous email account with a special link. You can click the link to reverse the email change and secure your account.
  • 15. Google Account Hacked? Report suspicious mail to Google productforums.google.co m/forum/#!msg/gmail/RI yIm0v- xnA/py_QQyH4BwAJ
  • 16. Twitter Account Hacked? If you think your Twitter account has been hacked help.twitter.com/en/safet y-and-security/twitter- account-compromised
  • 17. Problem: Malicious Links and Attachments • Email with fake embedded email addresses or links • Email with unsolicited images or video attached • If you receive unexpected email or text attachment (photo, video, link), always check with sender to verify
  • 18. Starts out as an innocent: “How are you?” Don’t volunteer personal details unless you know who you are communicating with.
  • 19. Check the real address
  • 20. Your Best Defense • Use strong, complex passwords or pass phrases • Use two-factor authentication for important accounts (Google, Apple, financial, health) • Don’t accept requests from unknown individuals • Beware unexpected links or attachments • Download apps from recognized safe sites (App Store, Google Play, Microsoft Store)
  • 21. Be Safe, Be Proactive • Think before you share anything! • Don't include birthday, address, phone on your profile www.facebook.com/h elp/101765758165199 4/ • Review and update social media privacy settings www.facebook.com/h elp/115450405225661 • Use Facebook Privacy Checkup www.facebook.com/a bout/basics/manage- your-privacy/posts#16
  • 22. Resources 10 Worst Social Media Hacks https://www.infosecurity- magazine.com/blogs/top-10-worst- social-media-cyber/ 18 Biggest Data Breaches of 20th Century https://www.csoonline.com/article/213 0877/the-biggest-data-breaches-of-the- 21st-century.html Has Your Phone Been Hacked? https://www.usatoday.com/story/tech/ columnist/komando/2018/05/04/has- your-computer-phone-been-hacked- heres-how-tell/559136002/ Privacy/Security Risks of Social Media https://www.rswebsols.com/tutorials/in ternet/privacy-security-risks-social- media
  • 23. Resources How do I spot and Report a Fake Facebook Friend Request? https://www.socmedsean.com/ans wered-how-do-i-report-a-fake- facebook-friend-request/ Find Location from Photo https://www.guidingtech.com/find -location-from-photo/ How to Spot a Fake Friend Request https://www.lifewire.com/how-to- spot-a-fake-friend-request- 2487747 Assembled by Jonathan Bacon for the Johnson County Community College Retirees Association, March 2019