Enviar búsqueda
Cargar
Top Ten Tips to Shockproof Your Use of Social Media 2012
•
Descargar como PPTX, PDF
•
0 recomendaciones
•
508 vistas
Ben Woelk, CISSP, CPTC
Seguir
2012 #stc12 Lightning Talk
Leer menos
Leer más
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 20
Descargar ahora
Recomendados
Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014
Ben Woelk, CISSP, CPTC
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Ben Woelk, CISSP, CPTC
Security tips
Security tips
Diana López Pérez
1
1
BjrnJohansen9
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Ben Woelk, CISSP, CPTC
Internet safety
Internet safety
Sofia Cennini Zezere
Internet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
Top10 Biggest Security Threats
Top10 Biggest Security Threats
Kim Jensen
Recomendados
Shockproofing your Use of Social Media: 2014
Shockproofing your Use of Social Media: 2014
Ben Woelk, CISSP, CPTC
Shockproofing Your Use of Social Media (professional development progression)
Shockproofing Your Use of Social Media (professional development progression)
Ben Woelk, CISSP, CPTC
Security tips
Security tips
Diana López Pérez
1
1
BjrnJohansen9
Staying Safe Online for HR Professionals
Staying Safe Online for HR Professionals
Ben Woelk, CISSP, CPTC
Internet safety
Internet safety
Sofia Cennini Zezere
Internet safety gerard and saul
Internet safety gerard and saul
Saul Vidal Swales
Top10 Biggest Security Threats
Top10 Biggest Security Threats
Kim Jensen
Twitter tipps online11
Twitter tipps online11
Katrin Weller
Jitsi meet
Jitsi meet
Jorge Luis Sierra
7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
Aaron Vick
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
EC-Council
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
Richard Fitzwarine-Smith
10 most important cyber security tips for your users
10 most important cyber security tips for your users
Simpliv LLC
Selling Elephant Whistles
Selling Elephant Whistles
jaysonstreet
Digital Brain Primary - The Rule Book
Digital Brain Primary - The Rule Book
stephenwalder
Smartphone safety
Smartphone safety
Ernest Staats
Parents Guide to Smartphone Safety
Parents Guide to Smartphone Safety
- Mark - Fullbright
Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)
Bonnie Brzozowski
infosec_for_journalists_2016
infosec_for_journalists_2016
Justin Giles
Internet security
Internet security
Carmen Gorda
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
Carolina Chapter of STC
Opsec for families
Opsec for families
Lindy Kyzer
AMMU
AMMU
DILEEPKUMAR A V
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
Ben Woelk, CISSP, CPTC
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Scott Wright
Social media security
Social media security
Hindie Dershowitz
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
Más contenido relacionado
La actualidad más candente
Twitter tipps online11
Twitter tipps online11
Katrin Weller
Jitsi meet
Jitsi meet
Jorge Luis Sierra
7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
Aaron Vick
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
EC-Council
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
Richard Fitzwarine-Smith
10 most important cyber security tips for your users
10 most important cyber security tips for your users
Simpliv LLC
Selling Elephant Whistles
Selling Elephant Whistles
jaysonstreet
Digital Brain Primary - The Rule Book
Digital Brain Primary - The Rule Book
stephenwalder
Smartphone safety
Smartphone safety
Ernest Staats
Parents Guide to Smartphone Safety
Parents Guide to Smartphone Safety
- Mark - Fullbright
Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)
Bonnie Brzozowski
infosec_for_journalists_2016
infosec_for_journalists_2016
Justin Giles
Internet security
Internet security
Carmen Gorda
La actualidad más candente
(13)
Twitter tipps online11
Twitter tipps online11
Jitsi meet
Jitsi meet
7 Steps for Law Firms to Combat Cyber Threats
7 Steps for Law Firms to Combat Cyber Threats
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
Extreme Hacking: Encrypted Networks SWAT style - Wayne Burke
AmazingICT_eSafety_2018
AmazingICT_eSafety_2018
10 most important cyber security tips for your users
10 most important cyber security tips for your users
Selling Elephant Whistles
Selling Elephant Whistles
Digital Brain Primary - The Rule Book
Digital Brain Primary - The Rule Book
Smartphone safety
Smartphone safety
Parents Guide to Smartphone Safety
Parents Guide to Smartphone Safety
Internet Privacy Presentation (In Service)
Internet Privacy Presentation (In Service)
infosec_for_journalists_2016
infosec_for_journalists_2016
Internet security
Internet security
Similar a Top Ten Tips to Shockproof Your Use of Social Media 2012
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
Carolina Chapter of STC
Opsec for families
Opsec for families
Lindy Kyzer
AMMU
AMMU
DILEEPKUMAR A V
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
Ben Woelk, CISSP, CPTC
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Scott Wright
Social media security
Social media security
Hindie Dershowitz
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
JayMarkBandoy1
September 2014 cyber safety presentation
September 2014 cyber safety presentation
jaurisch
Online privacy
Online privacy
jo-jo23
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
NoelBuctot1
Lesson 2 rules of netiquette
Lesson 2 rules of netiquette
EmmanuelaSernicul
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Ben Woelk, CISSP, CPTC
Student book key unit3
Student book key unit3
jesusmlaz
Slideshow - Lil Rat
Slideshow - Lil Rat
megg16
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
Shaun Bent
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
Shaun Bent
Internet safety
Internet safety
kohlerj
15 Dangerous Apps
15 Dangerous Apps
Amy Hollingsworth
Similar a Top Ten Tips to Shockproof Your Use of Social Media 2012
(20)
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Shockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
Opsec for families
Opsec for families
AMMU
AMMU
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009
Social media security
Social media security
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
September 2014 cyber safety presentation
September 2014 cyber safety presentation
Online privacy
Online privacy
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
Lesson 2 rules of netiquette
Lesson 2 rules of netiquette
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Student book key unit3
Student book key unit3
Slideshow - Lil Rat
Slideshow - Lil Rat
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
10 Rules To Keep Your Child Safe
Internet safety
Internet safety
15 Dangerous Apps
15 Dangerous Apps
Más de Ben Woelk, CISSP, CPTC
Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce
Ben Woelk, CISSP, CPTC
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Ben Woelk, CISSP, CPTC
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership Opportunities
Ben Woelk, CISSP, CPTC
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
Ben Woelk, CISSP, CPTC
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
Ben Woelk, CISSP, CPTC
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for Success
Ben Woelk, CISSP, CPTC
Building a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
Ben Woelk, CISSP, CPTC
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted Leadership
Ben Woelk, CISSP, CPTC
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
Ben Woelk, CISSP, CPTC
Digital self defense 101 me rit
Digital self defense 101 me rit
Ben Woelk, CISSP, CPTC
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
Ben Woelk, CISSP, CPTC
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and Yourself
Ben Woelk, CISSP, CPTC
An Introvert's Journey to Leadership
An Introvert's Journey to Leadership
Ben Woelk, CISSP, CPTC
Digital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminar
Ben Woelk, CISSP, CPTC
Digital Self Defense at RIT
Digital Self Defense at RIT
Ben Woelk, CISSP, CPTC
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Ben Woelk, CISSP, CPTC
Succession Planning and Volunteering
Succession Planning and Volunteering
Ben Woelk, CISSP, CPTC
Digital Self Defense
Digital Self Defense
Ben Woelk, CISSP, CPTC
A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14
Ben Woelk, CISSP, CPTC
A Techcomm Bestiary Spectrum14
A Techcomm Bestiary Spectrum14
Ben Woelk, CISSP, CPTC
Más de Ben Woelk, CISSP, CPTC
(20)
Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Creating a Sense of Belonging--Engaging the Virtual Workforce Summit.pptx
Saying "Yes, and...?" to Leadership Opportunities
Saying "Yes, and...?" to Leadership Opportunities
Perspectives on Mentoring: Selected Stories
Perspectives on Mentoring: Selected Stories
We're All Winners--Gamification and Security Awareness
We're All Winners--Gamification and Security Awareness
The Introvert in the Workplace--Strategies for Success
The Introvert in the Workplace--Strategies for Success
Building a Culture of Digital Self Defense
Building a Culture of Digital Self Defense
Harnessing Your Innate Strengths--Introverted Leadership
Harnessing Your Innate Strengths--Introverted Leadership
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
The Introvert in the Workplace: Becoming an Influencer and Leader #STC18
Digital self defense 101 me rit
Digital self defense 101 me rit
Follow the yellow brick road: A Leadership Journey to the Emerald City
Follow the yellow brick road: A Leadership Journey to the Emerald City
Collaborating securely: Protecting Your Community and Yourself
Collaborating securely: Protecting Your Community and Yourself
An Introvert's Journey to Leadership
An Introvert's Journey to Leadership
Digital self defense iia isaca it audit seminar
Digital self defense iia isaca it audit seminar
Digital Self Defense at RIT
Digital Self Defense at RIT
Cyber Safety for Middle School Students and Parents
Cyber Safety for Middle School Students and Parents
Succession Planning and Volunteering
Succession Planning and Volunteering
Digital Self Defense
Digital Self Defense
A Techcomm Bestiary Summit14
A Techcomm Bestiary Summit14
A Techcomm Bestiary Spectrum14
A Techcomm Bestiary Spectrum14
Último
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
The Digital Insurer
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
Antenna Manufacturer Coco
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Drew Madelung
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Último
(20)
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Top Ten Tips to Shockproof Your Use of Social Media 2012
1.
TEN TIPS TO SHOCKPROOFING
YOUR USE OF SOCIAL MEDIA 2012 BEN WOELK POLICY AND AWARENESS ANALYST ROCHESTER INSTITUTE OF TECHNOLOGY
2.
INTRODUCTION
2
3.
AWARENESS IS THE KEY Everyone
is a target Organized crime funds the attacks
4.
TIP # 1
STRONG PASSWORDS/ PASSPHRASES Length > complexity It was a dark and stormy night becomes ItwasaDark215andStormyNight 4
5.
PASSWORD SAFES
5
6.
TIP # 2
KEEP UP TO DATE! 6
7.
TIP #3 USE PROTECTION Layers
of Security Anti-Virus Protection Firewall Anti-Spyware Protection Don’t overlook mobile devices! 7
8.
TIP #4 RECOGNIZE PHISHING/SCAMS
9.
PHISHING TIPS
9
10.
TIP #5 USE
SOCIAL NETWORKS SAFELY Don’t post schedules or whereabouts http://www.sileo.com/facebook-status-update-leads-to-robbery/ 10
11.
PHISHING ON SOCIAL NETWORK
SITES Don’t post personal information 11
12.
TIP #6 REMEMBER WHO
ELSE IS THERE • Employers • Identity Thieves • Online Predators 12
13.
WHAT YOU POST
CAN BE USED TO… • Judge • Impersonate • Monitor Don’t post inappropriate photos 13
14.
TIP #7 BE
WARY OF OTHERS Is this really your friend? 14
15.
TIP #8 SEARCH
FOR YOUR NAME Use Google Dashboard Set up an alert 15
16.
TIP #9 GUARD
YOUR PERSONAL INFORMATION! Watch out for Facebook Applications! 16
17.
TIP #10: DON’T ASSUME
PRIVACY Do you care if Facebook captures where you’ve been? 17
18.
DON’T ROLL THE
DICE WITH ONLINE PRIVACY Use Privacy Settings! 18
19.
THE FIRST LINE
OF DEFENSE Stay alert—you will be the first to know if something goes wrong
20.
PRACTICE DIGITAL SELF DEFENSE Infosec
Communicator blog @benwoelk @RIT_Infosec 20
Notas del editor
Weak passwords can be guessedAutomated programsPersonal detailsUse different passwordsHow many accounts can be accessed with just one of your passwords?Password vaultsPassphrases
Descargar ahora