Michael S. Williams 1. “Gentlemen don’t read each other’s mail.” - Henry L. Stimson 2.

Slides:



Advertisements
Similar presentations
Your Online Footprint. What is Facebook? Facebook is an online social networking site in which young adults can have discussions, connect with friends,
Advertisements

Social Media and Security: A look at whats happening on campus Bev Erickson Online Community Manager.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Developed by Technology Services 1:1 Laptop Initiative
Being Good Digital Citizens with Today’s Technologies.
Don’t be bullied, or be a bully.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Naval OPSEC Support Team Navy Information Operations Command, Norfolk #Don’tDoThat: Social Media Trends.
Internet Online Safety How to have FUN and Stay in Control.
Social media threats. Warning! May contain mild peril.
What you don’t know CAN hurt you!
Using internet and cell phones safely
Netiquette Rules.
Social Media: FACEBOOK Kristin Martin Professional Development.
UNCLASSIFIED. Your loved one has the training, leadership and equipment needed to perform the mission and come back home to you. But did you know that.
Facebook: teaching, communicating and collaborating Tony Brett Head of IT Support Staff Services OUCS Tuesday 6 November 2007.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Do you know how to keep yourself safe?
Awareness raising session for Parents and Carers.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Internet Safety.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Use and Regulation of Social Media April 5, 2011 – Destin, Florida.
Anti- bullying week Year 4.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Safety! Jessica Brown. What Is the Point of Having an Online Space? It needs to be Safe Clean And Efficient.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Safe Use of Social Media Cadets – Air Force’s Future.
Social Media. Monitoring your usage Employers have a right to monitor their computing system usage: – – Phone – Internet usage – Accessing social.
Safety Rules for the Internet Christy Vaughn EDU 384.
Staying Safe Online A Practical Guide for Middle School Students.
INTERNET SAFTEY AND CYBER BULLYING By your internet protection go to guys… Lukas Richters and Raymond Weaver.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Steve Allen Marc Greco Michael Dennis. 
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Panther Forum Activity Week 9. Things to remember when you are using social media to communicate with others.
HOW TO BE SAFE ONLINE By :Sarah Quarles. The internet is a great tool when used with caution!  The internet is an amazing tool that connects people from.
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
Library Technology Hub
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Guide to web safety for Key Stage 1. Being safe on the internet is really important. If you follow these rules at all times you can still have lots of.
MANY WAYS TO COMMUNICATE ELECTRONICALLY Advantages vs Disadvantages Created by Karma Lattin.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Top tips for our students: 1.Protect your online reputation: use the services provided to manage your digital footprints and ‘think before you.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
The Dangers and Usefulness of Social Communication.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
1. Guard your privacy. What people know about you is up to you. 2. Protect your reputation. Self-reflect before you self-reveal. What’s funny or edgy.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Goal: By the end of this lesson you should understand how social media are taking away your privacy rights.
Aristotle, a great thinker, once said: “We are what we repeatedly do.”
Technological Awareness for Teens and Young Adults.
Safety.
What does your digital footprint say about you?
Ogletree, Deakins, Nash, Smoak & Stewart PC
Sharing on the Internet
Internet Safety.
How to prevent internet snooping!
Internet Safety Part I Social Media
ICT Communications Lesson 3: Internet Life and Privacy
Everything you need to know about… WIKI’S
Presentation transcript:

Michael S. Williams 1

“Gentlemen don’t read each other’s mail.” - Henry L. Stimson 2

Good news - and bad - travels at 186,000 miles a second. How fast can you run? 3

4

 Friend or Foe?  Asset or Liability?  Risk v. Gain 5

News vs. Entertainment Need to know vs. Want to know 6

Your employer Government Foreign governments IP service providers Businesses Your significant other Private third parties (hackers) Your friends Your enemies 7

8

“The first rule of any technology used in a business is that automation applied to an efficient operation will magnify the efficiency. The second is that automation applied to an inefficient operation will magnify the inefficiency.” - Bill Gates 9

The greatest intelligence tool ever created. 10

If it is free it is likely dangerous If in doubt – don’t! Use of the Internet requires real discipline Don’t assume what you see is what you see Once you send or post something you no longer control it Delete does not delete Never post anything you would not say or give in person Don’t become the emergency 11

12

What is on your Facebook page? 13

What would happen if your computer was seized or it’s contents subject to a discovery subpoena? 14

Could your or Social Media site(s) be used against you? What would a background investigator think? Do you give away too much useful information? Can someone profile you from your Social Media? 15

What is in your Internet History cache? 16

Do you know your company/agency Internet and Social Media policy? 17

What are your document control policies? 18

Does your company/agency scan and Internet communications? 19

Most companies back-up everything including . What do you have that you would not want found? Remember, your work computer is not yours. 20

Does anyone need to know what you are sending? If what you are sending is something you would not want others to read – don’t send it. Privileged and confidential materials do not belong on the Internet. Don’t be lazy. The U.S. mail still works. Fax machines are not yet extinct. Anyone can post most anything. Do you want what you are sending posted for the world to see? 21

Take note and use caution: You can be held liable for what you write and post. Don’t think for a moment you can not be found. 22

You must monitor your Social Media as a consumer and as a business. Do not view its as just an expense. Protect revenue Grow revenue Image and crisis management Corporate security 23

National OPSEC Program Interagency OPSEC Support Staff Fanx 3, Suite Savage Rd. Ft G.C. Mead, MD iad.gov/ioss 24

25