, Smart Phone, Tablet, and Social Networking Best Practices Rod Tosten 1
2 Welcome and Intention For everyone to make informed choices about their engagement and citizenship in their virtual communities
Today Virtual Communities and Services have replaced the traditional “community and business centers” in the social and work life of teens, young adults, and many others People are not aware of the timeless and global nature of these new virtual communities People are making uninformed decisions 3
4 Living in a Virtual Space Forever and Global nature of content Impacts of bad social networking choices Appropriate and inappropriate content Understanding Privacy Settings Intellectual Property and Copyright Social networking agreements Social networks share personal profiles with advertisers Apps are everywhere!! NOTHING is FREE … You will pay with Your Money, Your Intellectual Property, or Your Being Foundation of safety and healthy social networking Awareness
5
Topics Smart Phone / Tablet Other Devices Data Security (Web, Cloud, Passwords) Social Networking 6
Etiquette / Best Practices Assume everyone will see your Allow only one round trip before picking up the phone Not a comedy venue is a record of a conversation 7
Unsubscribing / SPAM Use unsubscribing wisely Filter SPAM with rules as needed (Rules exist in most systems) Never respond to password requests 8
Personal s Have a personal account Have a junk account 9
Organizing with Folders and Rules Use folders to organize (Topic, User, Event) Leverage rules in system 10
Scams How can you tell if the is a Scams? it suggests tragic consequences for not performing some action it promises money or gift certificates for performing some action it offers instructions or attachments claiming to protect you from a virus that is undetected by anti-virus software 11
Attachments Some hints to avoid problems: Be wary of unsolicited attachments, even from people you know Keep software up to date Trust your instincts Save and scan any attachments before opening them Turn off the option to automatically download attachments 12
Smart Phone/Tablet Best Practices Phone/Tablet is YOU!!! Have a password Set phone/tablet to clear data after failed attempts Know how to deactivate phone/tablet Set location services to be requested Texts, Images, Videos are forever 13
App Best Practices Be careful of Apps Set location services to be requested Read Reviews (Google App Name) Know what the App tracks Free Version versus Pay Version 14
Potentially Dangerous Apps Whisper - This app allows you to post secrets anonymously and also allows you to chat with other users in your geographic area. YikYak - All Yik Yak users are anonymous. They don’t create a profile or account, but they can post comments that are accessible to the nearest 500 people (within a 1-5 mile radius). Kik - A free app-based alternative texting service that allows texts/pictures to be sent without being logged in the phone history. (Similar apps: Viber, WhatsApp, TextNow) 15
Potentially Dangerous Apps Snapchat – Allows you to capture an image or video and make it available to a recipient for a specific time. After that time limit is up, the picture/video automatically disappears forever…or so Snapchat claims. (Similar apps: Poke, Wire, and Wickr) Vine – Allows users to watch and post six second videos. ChatRoulette and Omegle – These apps allow you to video chat with strangers. 16
Potentially Dangerous Apps Tinder – Users post pictures and scroll through the images of other users. When they think someone is attractive they can “flag” the image. If that person has also “flagged” them in return, the app allows you to contact them. Poof – Hides other apps on your phone. You select which apps you would like to hide and their icons will no longer show up on your smartphone screen. Ask.fm – Parent-free digital space where kids go to goof off and escape the built-in accountability of Facebook. 17
Other Devices Digital Cameras o Internet uploading Flickr and other photo sites o Ownership of photos E-Readers o Internet safety USB Memory Sticks o Viruses and lose of data 18
Home Wireless Networks Shared communication Change default passwords Restrict access by MAC address Encrypt the data on your network - WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) Protect your SSID Install a firewall Maintain anti-virus software 19
Data Security Best Practices Encrypt Data When Possible Use difficult passwords Remove downloads Be careful of public wireless (WiFi) Be careful of public computers Be careful of printers, copiers, and fax machines Backup, Backup, Backup 20
Best Password ever! Your password must: - be 15 to 30 characters long - contain at least two uppercase letters (A-Z) - contain at least two lowercase letters (a-z) - contain at least two numbers (0-9) - contain at least two of the following special characters: $ % ^ ! * + = _ - change at least four characters from your previous password Your password cannot: - contain spaces -be one of your last ten previous password 21
Web Browsing Viruses, Malware, and Adware Use software protection Avoid clicking unknown links Avoid clicking unknown attachments and links within s Be thoughtful about using the Cloud 22
What social networking sites do you use? 23 - Reddit - Pinterest - 4Chan(image board) - Facebook - Twitter - Free Texting Apps - Clam Text (Anonymous texting) - Tumblr - Chat Roulette - Instagram—pictures and captions - Google Plus - Gaming online - YouTube - FourSquare Others you have heard of?
What is Cyberbullying? Insulting –Posting false information that is hurtful to a person and their reputation Targeting –Singling someone out and inviting others to attack or make fun of him or her Impersonation –Pretending to be someone else 24
What is Cyberbullying? Uploading –Sharing someone’s text or pictures without their permission Excluding –Pressuring others to omit someone from an activity Harassment –Repeatedly sending someone unwanted messages 25
26 Your Webutation What should YOU consider? Forever and Global nature of content Impacts of bad social networking choices Appropriate and inappropriate content Social networking agreements Social networks share personal profiles with advertisers Understanding Privacy Settings Understanding Social App(lications)
27 Your Webutation What should YOU consider - continued? Intellectual Property and Copyright Scams Identity Theft Keeping Home Computers Up-to-date Family and Home Safety Jobs ( Exercising Judgment ) Professional Decisions Related to inappropriate content Related to information describing illegal situations
28 Your Webutation Online Reputation Management (ORM) Google Yourself Consider Creating Your Online Presence ReputationDefender.com GoGoStat.com SocialShield.com ReputationHawk.com Think Bumper Stickers
29
30
31
32 Your Webutation Think Bumper Stickers
When you use Virtual Communities and Services, YOU give a piece of YOURSELF to companies to make a PROFIT from YOUR BEING 30
Good Resources Department of Homeland Security's Stop.Think.Connect.™ Campaign US-CERT: US Computer Emergency Readiness Team 34