SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Simple Safeguards:                                                         Presented by Retired
                                                                                                FBI Special Agent
           Preventing Social Media Fraud                                                                Jeff Lanza

 Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we
        have of our connections on these sites to gain access to your accounts and commit fraud.

                    Current Threats                                        Specific Actions to Avoid
Fake Notification E-mails                                             1.    Don’t click on a message that seems
Look out for fake emails that look like they came from                      weird. If it seems unusual for a friend to
Facebook. These typically include links to phony pages that                 write on your Wall and post a link, that
attempt to steal your login information or prompt you to                    friend may have gotten phished.
download malware. Never click on links in suspicious                  2.    Don’t enter your password through a
emails. Log-in to a site directly.                                          link. Just because a page on the Internet
                                                                            looks like Facebook, it doesn't mean it is.
Suspicious Posts and Messages                                               It is best to go the Facebook log-in page
Wall posts or messages that appear to come from a friend                    through your browser.
asking you to click on a link to check out a new photo or             3.    Don't use the same password on
video that doesn't actually exist. The link is typically for a              Facebook that you use in other places
phony login page or a site that will put a virus on your                    on the web. If you do this, phishers or
computer to steal your passwords.                                           hackers who gain access to one of your
Money Transfer Scams                                                        accounts will easily be able to access
Messages that appear to come from friends or others                         your others as well, including your bank.
claiming to be stranded and asking for money. These                   4.    Don’t share your password with
messages are typically from scammers. Ask them a                            anyone. Social sites will never ask for
question that only they would be able to answer. Or                         your password through any form of
contact the person by phone to verify the situation,                        communication.
even if they say not to call them.                                    5.    Don't click on links or open
                                                                            attachments in suspicious emails. Fake
                                                                            emails can be very convincing, and
                General Online Safety Rules                                 hackers can spoof the "From:" address so
       Be wary of strangers - The internet makes it easy for               the email looks like it's from a social site.
        people to misrepresent their identities and motives. If             If the e-mail looks weird, don't trust it,
        you interact with strangers, be cautious about the
                                                                            and delete it from your inbox.
        amount of information you reveal or agreeing to meet
        them in person.                                               6.    Don’t send money anywhere unless
       Be skeptical - People may post false or misleading                  you have verified the story of someone
        information about various topics, including their own. Try          who says they are your friend or relative.
        to verify the authenticity of any information before taking   7.    Don’t provide your cell phone number
        any action.
                                                                            to verify the results of a Facebook
       Evaluate your settings - Use privacy settings. The
        default settings for some sites may allow anyone to see             game or survey without reading the
        your profile. Even private information could be exposed,            terms and conditions. It may result in
        so don't post anything that you wouldn't want the public            recurring charges on your cell phone bill.
        to see.
       Use strong passwords - Protect your account with                      More resource Information:
        passwords that cannot easily be guessed. If your
        password is compromised, someone else may be able to          www.us-cert.gov or www.fbi.gov
        access your account and pretend to be you.
                                                                                 Speaker Information:
       Security Information For Social Networking Sites                                Jeff Lanza
                  www.facebook.com/security                                       Phone: 816-853-3929
         www.twitip.com/twitter-security-dos-and-donts                     Email:jefflanza@thelanzagroup.com
                www.linkedin.com/secure/settings                           Web Site: www.thelanzagroup.com

Más contenido relacionado

La actualidad más candente

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpumajcullishpum
 
Internet saftey
Internet safteyInternet saftey
Internet safteyryanbud
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Celia Bandelier
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Parenting & Education
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safetyguestd5e1d2
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet SafetyBobbi Newman
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniperhellishyard9256
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety PresentationLJ Henshell
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parentssafetyseminar
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safeTSageer
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersRajesh Soundararajan
 

La actualidad más candente (17)

Jonathan cullishpuma
Jonathan cullishpumaJonathan cullishpuma
Jonathan cullishpuma
 
Internet saftey
Internet safteyInternet saftey
Internet saftey
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)Staying safe on_the_internet_presentation (2)
Staying safe on_the_internet_presentation (2)
 
MindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental ControlMindMake - Online Safety Talking to your Kids Parental Control
MindMake - Online Safety Talking to your Kids Parental Control
 
Social Networking Safety
Social Networking SafetySocial Networking Safety
Social Networking Safety
 
The Basics Of Internet Safety
The Basics Of Internet SafetyThe Basics Of Internet Safety
The Basics Of Internet Safety
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
Facebook Password Sniper
Facebook Password SniperFacebook Password Sniper
Facebook Password Sniper
 
Cyber safety tips
Cyber safety tipsCyber safety tips
Cyber safety tips
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Internet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for ParentsInternet Safety & Cyberbullying Workshop for Parents
Internet Safety & Cyberbullying Workshop for Parents
 
How to keep your digital identity safe
How to keep your digital identity safeHow to keep your digital identity safe
How to keep your digital identity safe
 
Internet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and BeginnersInternet Safety for 1950s Adults and Beginners
Internet Safety for 1950s Adults and Beginners
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Online Security
Online SecurityOnline Security
Online Security
 

Destacado

Destacado (7)

ICD- 10 is coming -Brenda Edwards
ICD- 10 is coming -Brenda EdwardsICD- 10 is coming -Brenda Edwards
ICD- 10 is coming -Brenda Edwards
 
Polozhenie o konkurse__moya_malaya_rodina
Polozhenie o konkurse__moya_malaya_rodinaPolozhenie o konkurse__moya_malaya_rodina
Polozhenie o konkurse__moya_malaya_rodina
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Glrb2010 auvi
Glrb2010 auviGlrb2010 auvi
Glrb2010 auvi
 
Lawrence mm june 2011
Lawrence mm june 2011Lawrence mm june 2011
Lawrence mm june 2011
 
Medical identity theft handout june 2011
Medical identity theft handout june 2011Medical identity theft handout june 2011
Medical identity theft handout june 2011
 
Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011Jeff lanza id theft handout business march 2011
Jeff lanza id theft handout business march 2011
 

Similar a Social networking fraud handout june 2011

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptxTanvir Amin
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountKANKIPATI KISHORE
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxvdgtkhdh
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxamby3
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacksNamik Heydarov
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxErrorError22
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquetteEmmanuelaSernicul
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 

Similar a Social networking fraud handout june 2011 (20)

IS Presetation.pptx
IS Presetation.pptxIS Presetation.pptx
IS Presetation.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
S_A_T.pptx
S_A_T.pptxS_A_T.pptx
S_A_T.pptx
 
Facebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook AccountFacebook Hacked, Protect Your Facebook Account
Facebook Hacked, Protect Your Facebook Account
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Online privacy
Online privacy Online privacy
Online privacy
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Security-Awareness-Training.pptx
Security-Awareness-Training.pptxSecurity-Awareness-Training.pptx
Security-Awareness-Training.pptx
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
phishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptxphishing-awareness-powerpoint.pptx
phishing-awareness-powerpoint.pptx
 
Heads up!
Heads up!Heads up!
Heads up!
 
10 tips to prevent phishing attacks
10 tips to prevent phishing attacks10 tips to prevent phishing attacks
10 tips to prevent phishing attacks
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
phishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptxphishing-awareness-powerpoint [Autosaved].pptx
phishing-awareness-powerpoint [Autosaved].pptx
 
Phishing
PhishingPhishing
Phishing
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Lesson 2 rules of netiquette
Lesson 2 rules of netiquetteLesson 2 rules of netiquette
Lesson 2 rules of netiquette
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 

Más de Lawrence Medical Managers

Más de Lawrence Medical Managers (11)

Accountable care organizations lawrence 101211
Accountable care organizations lawrence 101211Accountable care organizations lawrence 101211
Accountable care organizations lawrence 101211
 
Cms aco information
Cms aco informationCms aco information
Cms aco information
 
Social networking fraud handout june 2011
Social networking fraud handout june 2011Social networking fraud handout june 2011
Social networking fraud handout june 2011
 
Id theft handout individual june 2011
Id theft handout individual june 2011Id theft handout individual june 2011
Id theft handout individual june 2011
 
Presentation by Sheila Richmeier
Presentation by Sheila RichmeierPresentation by Sheila Richmeier
Presentation by Sheila Richmeier
 
Software vendor 5010 checklist
Software vendor 5010 checklistSoftware vendor 5010 checklist
Software vendor 5010 checklist
 
Clearinghouse payer 5010 checklist
Clearinghouse payer 5010 checklistClearinghouse payer 5010 checklist
Clearinghouse payer 5010 checklist
 
ICD-10 action plan-revised
ICD-10 action plan-revisedICD-10 action plan-revised
ICD-10 action plan-revised
 
ICD-10, Brenda Edwards 07.14.2010
ICD-10, Brenda Edwards 07.14.2010ICD-10, Brenda Edwards 07.14.2010
ICD-10, Brenda Edwards 07.14.2010
 
Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities  Disaster Planning Local state-federal roles and responsibilities
Disaster Planning Local state-federal roles and responsibilities
 
Secretary Rod Bremby Presentation
Secretary Rod  Bremby  PresentationSecretary Rod  Bremby  Presentation
Secretary Rod Bremby Presentation
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Social networking fraud handout june 2011

  • 1. Simple Safeguards: Presented by Retired FBI Special Agent Preventing Social Media Fraud Jeff Lanza Keep your guard up on sites like Facebook, LinkedIn and Twitter. Scammers are exploiting the trust we have of our connections on these sites to gain access to your accounts and commit fraud. Current Threats Specific Actions to Avoid Fake Notification E-mails 1. Don’t click on a message that seems Look out for fake emails that look like they came from weird. If it seems unusual for a friend to Facebook. These typically include links to phony pages that write on your Wall and post a link, that attempt to steal your login information or prompt you to friend may have gotten phished. download malware. Never click on links in suspicious 2. Don’t enter your password through a emails. Log-in to a site directly. link. Just because a page on the Internet looks like Facebook, it doesn't mean it is. Suspicious Posts and Messages It is best to go the Facebook log-in page Wall posts or messages that appear to come from a friend through your browser. asking you to click on a link to check out a new photo or 3. Don't use the same password on video that doesn't actually exist. The link is typically for a Facebook that you use in other places phony login page or a site that will put a virus on your on the web. If you do this, phishers or computer to steal your passwords. hackers who gain access to one of your Money Transfer Scams accounts will easily be able to access Messages that appear to come from friends or others your others as well, including your bank. claiming to be stranded and asking for money. These 4. Don’t share your password with messages are typically from scammers. Ask them a anyone. Social sites will never ask for question that only they would be able to answer. Or your password through any form of contact the person by phone to verify the situation, communication. even if they say not to call them. 5. Don't click on links or open attachments in suspicious emails. Fake emails can be very convincing, and General Online Safety Rules hackers can spoof the "From:" address so  Be wary of strangers - The internet makes it easy for the email looks like it's from a social site. people to misrepresent their identities and motives. If If the e-mail looks weird, don't trust it, you interact with strangers, be cautious about the and delete it from your inbox. amount of information you reveal or agreeing to meet them in person. 6. Don’t send money anywhere unless  Be skeptical - People may post false or misleading you have verified the story of someone information about various topics, including their own. Try who says they are your friend or relative. to verify the authenticity of any information before taking 7. Don’t provide your cell phone number any action. to verify the results of a Facebook  Evaluate your settings - Use privacy settings. The default settings for some sites may allow anyone to see game or survey without reading the your profile. Even private information could be exposed, terms and conditions. It may result in so don't post anything that you wouldn't want the public recurring charges on your cell phone bill. to see.  Use strong passwords - Protect your account with More resource Information: passwords that cannot easily be guessed. If your password is compromised, someone else may be able to www.us-cert.gov or www.fbi.gov access your account and pretend to be you. Speaker Information: Security Information For Social Networking Sites Jeff Lanza www.facebook.com/security Phone: 816-853-3929 www.twitip.com/twitter-security-dos-and-donts Email:jefflanza@thelanzagroup.com www.linkedin.com/secure/settings Web Site: www.thelanzagroup.com