Download presentation
Presentation is loading. Please wait.
1
Social Media: What You Should Know
2
Overview Survey Results Video: 6 Degrees of Information
What is our digital identity? Methods for gaining access to our personal information Video: Think Before You Post How to Protect Yourself
3
Time Spent on Internet
4
Social Media Sites
5
Six Degrees of Information
Think before you post:
6
Your Digital Identity Face Ethnicity Voice Address Fingerprint
Education Gender Language Date of Birth Affiliations Place of Birth Interests Mother’s Maiden Name Hobbies Family Averages: 61 text messages 121 s Per day 26 apps used per month 5 social media accounts This means, we are constantly putting data and information out on the internet and we may not realize what we are sharing
7
Your Personal Information
Open source – You post it online…or your friends/family do People can gain quit a bit just by searching your social media accounts. Most common are date of birth, address, mother’s maiden name, school, schedules and places you visit
8
Your Personal Information
Theft Think of all the information on your phone and computer Phishing Criminals s or friend you pretending to be someone else Clicking on an – can be targeted to you specifically
9
Your Personal Information
Hacking Large scale data breaches can reveal your data and PII
10
Your Personal Information
Passwords Easy passwords like password123 Phishing scams Same password used for all sites Locations Check in features Filters used with the location Embedded in photos Pictures with personal belongings
11
Think Before You Post
12
How to Protect Yourself
Remove personal information Do a sweep through all of your social media accounts and remove your PII Update your privacy settings Set your profile to private Remove 3rd party apps Hide your friends list
13
How to Protect Yourself
Setup a different that is only for social media Do not share your location Do not let others tag you
14
How to Protect Yourself
Strong Passwords! Create a strong password 8+ characters long Include numbers, capital letters and symbols Use a different password for each account Change it often Consider using multi-factor authentication Never give it out!
15
6 Clicks Demo
17
Project Resources Applied Fundamentals Consulting LLC presentation on information security Cybertipline.com Coby Persin – The Dangers of Social Media
18
GPS Info Sites that Remove GPS (EXIF) Data
Sites that do not remove EXIF Data Instagram Snapchat Facebook Tumblr Twitter* Picasa Pinterest Photobucket eBay Dropbox Google+ When unsure, it is always best to remove your GPS location from all images shared on the internet
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.