Time
1 hour 44 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:01
hi and welcome to lessen to death three of the end user cyber fundamentals course.
00:09
This lesson will focus on how to safely use social media.
00:15
In this lesson, you will learn how to safely use social media.
00:20
We will talk about things you should and should not do to protect yourself while using social media
00:27
security. Best practices always apply whether you are on social media, browsing the Web,
00:35
on your email and even at work.
00:39
Let's review some steps you can take to safely use social media,
00:45
use a strong password or pass phrase and ensure it is different for every account.
00:53
If you have social media app on your phone, be sure to password. Protect your device.
01:00
Used two factor authentication if offered.
01:03
If you attempt to log into your accounts from an unknown device, you will receive a pin to your phone.
01:11
This will prevent bad actors from accessing your account.
01:15
Do not download unsolicited software. Click on pop ups that appear while you are browsing.
01:26
Use current and updated anti virus software.
01:30
There are even free versions for your mobile devices.
01:36
Do not click links or unknown retail ads as you may be taken to a fake website
01:42
and or have malware installed on your device.
01:49
Do not click on surveys or anything that is requesting access to your profile.
01:56
Set up your security questions if available,
01:59
and do not choose the questions that are considered personal information.
02:05
Such as What street did you grow up on?
02:07
What high school did you go to?
02:12
What was the model of your first car?
02:15
Jews? Instead, questions like What is your favorite color?
02:21
This way. If the website is breached, your personal information will not be exposed.
02:28
This is important as thes type of questions are generally used to verify your identity when you are applying for a loan or any line of credit.
02:40
Be aware of your company's social media policy and end user acceptable use policy.
02:51
Be selective with friend requests.
02:53
If you don't know the person, don't accept their request.
02:58
It could be a fake account and also block unfriendly followers.
03:06
Be careful about what you share.
03:07
Do not share too much personal information,
03:10
such as your address, place of birth, phone number or when you will be away on vacation.
03:17
I know you think you are only sharing this information with your friends or people, you know.
03:23
But as we previously discussed, that may not always be true,
03:28
as people are not always who they say they are.
03:30
The more you post, the easier it is to have your identity stolen.
03:38
Turn off all location tracking.
03:39
You do not want anyone targeting your home.
03:44
And also don't announce when you will be away on vacation.
03:50
Become familiar with the privacy policies of the Social Media site to use
03:54
and customize your security and privacy settings to control Who sees what,
04:00
as they will generally share mawr than maybe you're comfortable with by default.
04:05
We will talk more about security and privacy settings in the next lesson.
04:11
Remember, log off when you were done using social media. If you are using a Web browser,
04:19
what security question should you choose?
04:24
A. What is your favorite color
04:27
be?
04:28
What was the model of your first car?
04:30
See, What is the name of the street you grew up on?
04:34
De. What is your mother's maiden name?
04:42
A. Is the safest security question to use
04:46
answers. B, C and D can be used for identity theft.
04:53
Have you ever applied for a loan? Were signed into one of the credit unions.
04:59
These are the types of questions they will ask you to verify your identity.
05:08
In today's lesson, we discussed several tips you can use to limit your risk while using social media.
05:15
Some important items We talked about war,
05:19
security questions, selection,
05:21
information, sharing,
05:25
the use of passwords
05:27
and, of course, don't click the link.
05:30
Thank you, and I will see you in the next lesson.

Up Next

End User Cyber Fundamentals

This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by downloads, Malvertising, and how to protect yourself using security best practices.

Instructed By

Instructor Profile Image
Lisa Martino
Director, Information Security Governance, Risk & Compliance
Instructor