How To Protect Your Company From Legal Threats on Social Media
Social media-threats
-
Upload
andreas-hiller -
Category
Documents
-
view
42 -
download
0
Transcript of Social media-threats
![Page 1: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/1.jpg)
Social media threats
![Page 2: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/2.jpg)
Warning! May contain mild peril
![Page 3: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/3.jpg)
• What is social media?
• Risks associated with social media
• How the threats work
• Social media spam
• Social media phishing
• Social media malware
• Using social media safely
Contents
![Page 4: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/4.jpg)
What is social media?
![Page 5: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/5.jpg)
Social media has arrived
Social networking sites are now more popular than web-based email
![Page 6: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/6.jpg)
• Allows users to become a member of an online community
• Key features are “Profiles” and “Friend lists”
• The most commonly used social network is still Facebook
• 2009 saw the rapid emergence of Twitter
• Also called social networking
Social media – key features
![Page 7: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/7.jpg)
Risks associated with social media
![Page 8: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/8.jpg)
Userspublishing information
Socialnetworking
attacks
Two main types of threat
![Page 9: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/9.jpg)
• Reveal sensitive information
• Defamation of others/school system
This can be inadvertent or deliberate
And the repercussions include:
• Reputation damage
• Fines
Users publishing information
![Page 10: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/10.jpg)
Hobby/showing off
Financially-motivatedorganized crime
Social networking attacks
![Page 11: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/11.jpg)
Social networking accounts
are valuable to hackers
They can use them to send spam,
spread malware, steal identities...
… in the quest to acquire personal
information for financial gain
Social networking attacks
![Page 12: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/12.jpg)
Data = $$$
• Steal your money directly
• Sell your data
• Trick your friends and family into
supplying personal data
• Sell your identity
• Use your accounts to spread spam,
malware and more data theft scams!
• Sell your school’s data or
sensitive information
• Blackmail individuals and organizations
![Page 13: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/13.jpg)
How the threats work
![Page 14: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/14.jpg)
How the threats work
• Spam
• Phishing
• Malware
![Page 15: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/15.jpg)
Social networking spam
![Page 16: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/16.jpg)
Social networking spam
![Page 17: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/17.jpg)
Social networking spam
![Page 18: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/18.jpg)
Social networking spam
![Page 19: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/19.jpg)
Social networking spam
![Page 20: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/20.jpg)
Social networking spam
![Page 21: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/21.jpg)
of social networking usersreport being hit by spamvia the services
57%
70.6%That’s an increase of
from a year ago
Social networking spam
![Page 22: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/22.jpg)
Social networking phishing
![Page 23: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/23.jpg)
Social networking phishing
![Page 24: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/24.jpg)
Social networking phishing
![Page 25: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/25.jpg)
Social networking phishing
![Page 26: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/26.jpg)
of social networking usersreport phishing attacksvia the sites
30%
42.9%That’s an increase of
from a year ago
Social networking phishing
![Page 27: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/27.jpg)
Social networking malware
![Page 28: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/28.jpg)
Social networking malware
![Page 29: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/29.jpg)
Social networking malware
![Page 30: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/30.jpg)
Social networking malware
![Page 31: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/31.jpg)
Social networking malware
![Page 32: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/32.jpg)
Social networking malware
![Page 33: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/33.jpg)
Using social media safely
![Page 34: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/34.jpg)
• KNOW THE RULES - check your organization’s policy on social networking
• USE SECURE PASSWORDS - minimum 14 characters including non-letters
• CHECK THE DEFAULT SETTINGS - don’t providing personal information by default
• BE PICTURE PRUDENT - think before posting images that might cause embarrassment
• BEWARE OF BIG BROTHER - assume everyone can read your posts, including hackers!
• SECURE YOUR COMPUTERS - use up-to-date security software and firewalls
• THINK BEFORE YOU CLICK - if the email looks dodgy it probably is
• STRANGER DANGER - beware of unsolicited invitations from spammers
Top tips for staying secure
![Page 35: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/35.jpg)
• Financially-motivated criminals are increasingly using social
media sites to steal identities, spread malware and send spam
• Social networks are getting better at protecting users against
these threats – but there’s a long way to go
• The onus is on YOU to use social media sites safely –
follow the top tips for staying secure
Summary
![Page 36: Social media-threats](https://reader033.fdocuments.in/reader033/viewer/2022052906/5589e86ad8b42abd378b460d/html5/thumbnails/36.jpg)
Thank you