1 / 18

Social Media Safety

Social Media Safety. Trevor Nelson. About Me. B.S. in Computer Information Systems from Bradley Concentration in Security and Distributed Systems Application Security Analyst at Pearl Technology Software Analysis Systems Testing Consulting and Contract Management Certified Ethical Hacker.

nerina
Download Presentation

Social Media Safety

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Media Safety Trevor Nelson

  2. About Me • B.S. in Computer Information Systems from Bradley • Concentration in Security and Distributed Systems • Application Security Analyst at Pearl Technology • Software Analysis • Systems Testing • Consulting and Contract Management • Certified Ethical Hacker

  3. Outline • Why is privacy important? • “Being Found” • Tools of location • Facebook and Twitter privacy • Best practices • Examples • Internet Visibility • Reducing your “footprint” • Preventative Measures • General Security tips • Good passwords, spotting hacking attempts, open connections

  4. Why is privacy important? • Your data is valuable to companies • If the product is free, YOU are the product! • Social relationships are not flat! • There’s no UNDO button • Once its out, it stays out • Who’s looking at you? • Administrative officials, co-workers, students? • HR researches prospective candidates • Obscurity is NOT security!

  5. “Being Found” – Methods of Location • Oversharing is common • Google Searches (with logical operators) • Ex: “Trevor Nelson” AND “Bradley University” OR “Galesburg High School” OR “2009” • People Search Engines • Spokeo.com, whitepages.com • Social Media Search • Username Checkers • Namechk.com

  6. Namechk.com

  7. Being Found • Cyber stalking • The act of using the internet to aggressively tail someone against their will • Cyber stalkers love location services! • Facebook “check-ins”, Location-based Tweets, Foursquare, Google Location • People may maliciously attempt to use information against you based on beliefs or words

  8. Facebook – Best Practices • Build Lists • Friends, Acquaintances, Family, Professionals • Create your OWN lists, don’t use defaults • Don’t accept all friend requests! • Set profile to “Friends Only” • Turn off search engine indexing • Remove unused apps • Name obfuscation? (Personal preference) • Obscure your profile picture • Unlike irrelevant pages, leave old groups

  9. Facebook Best Practices Cont’d. • Disable Instant Personalization • Disallow using your likeness in ads • Disallow third party sites from using you in ads • Set Review tagged posts before allowing them to ON • Disclaimer: This does not REMOVE the tag from the original poster, just from your own wall. • Edit your profile, define limits of who sees what (have you made your lists?) • And of course, watch what you post!

  10. Facebook Best Practices Cont’d • View your profile through the eyes of others:

  11. Review settings • Look things over carefully and often:

  12. Bad “app”les

  13. Limit your audience

  14. Twitter Best practices • Do not use your full name! • Use an ambiguous photo • Do not link your account to untrusted websites • News comments, untrusted apps, sites requiring a sign-in • Protect your Tweets • Disable location tagging • Does everyone need to know where you are at every moment?

  15. Twitter best practices

  16. What about other sites? • Major services outside of Facebook and Twitter • LinkedIn, Foursquare, Yelp, Instagram, Vine • Use your best judgment, assume everything is public • The LinkedIn Problem • By its nature, you want your resume-related information visible • Avoid connecting to Facebook in any way!

  17. Reduce your online “footprint” • Footprint is defined as your online presence • Number of social profiles, appearances on websites and searches, “searchability” • Hide these profiles from Google! • If you cannot do that… • CHANGE information such as names, locations, education, workplace • Delete old profiles • Are you seriously using MySpace?

  18. General security tips • Set good passwords • Avoid dictionary words and personal information: your first/last name, birthday, hometown • Most common passwords: 123456, password, cats, music etc. • Do not trust everything! Apps especially • If it sounds too good to be true, it is • Safe apps will not spam friends lists when you use them • Never give out a password! No service will ask for your password directly • Do not connect to open Wi-Fi • Like broadcasting your information on the radio • Use HTTPS / Encryption

More Related