Time
1 hour 44 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:02
hi and welcome to lessen to death. Four. Off the End User Cyber Fundamentals course.
00:09
This lesson will focus on social media, privacy settings,
00:14
watch to look for and how to use them.
00:18
Since we use social media to instantly share information and lots of times personal information with friends and family, it is extremely important to take the time to review, understands and configure your privacy settings.
00:35
To ensure Onley audience you intend
00:38
has access to your data and on Lee the data you want them to see.
00:46
In this course, we will review some of the security and privacy settings and how to use that.
00:53
First, we will review basic security settings, and then we will talk specifically about security and privacy settings on a couple of common social media sites such as Facebook and Twitter.
01:06
Although the security and privacy settings are different on every social media site,
01:12
hopefully this will give you an understanding of what to look for,
01:17
what it means and how to find the settings.
01:23
Okay, let's review basic security and privacy settings.
01:27
We mentions most of these in the previous lesson, so I will just quickly mention them before we review in detail
01:36
Onley except friend or follow requests from friends or people you know.
01:41
Do not overshare
01:44
turn off tagging and turn on notifications to alert you to log in attempts and changes to your profile.
01:56
Do not rely on default privacy settings
02:00
as they share too much.
02:04
Check what APS or websites A linked to your account.
02:09
Do not set and forget. Security and privacy settings can change without notice.
02:17
Select the optional two factor authentication if offered.
02:25
Let's review some of the Facebook privacy settings in detail.
02:30
First, log into Facebook
02:34
and just search for the words privacy settings.
02:38
Let us review the first item that comes up
02:42
settings. Colon privacy
02:45
as pictured here on this slide.
02:51
Using the privacy settings, you can control your activity.
02:54
You can decide who can see your past and future posts.
02:59
You can also review all the posts who have been tapped in.
03:04
If you do not want to be tagged in the post, you can highlight the tag picture
03:08
and click on tech.
03:12
You can also configure how people can find you using these settings.
03:19
After setting your privacy settings, continue down the list on the left hand side and select timeline and tagging and so on.
03:29
Review and change each setting to a level of sharing that is comfortable for you.
03:35
I personally turn off location,
03:38
facial recognition and do not share much at all.
03:44
Next Goetschi of profile settings
03:46
Just click on your name where your picture is and select profile.
03:53
Review the information you have included in this section.
03:55
Each section also has its own privacy settings, so you can decide who convey you that specific data.
04:04
I never use my correct birthdate, either.
04:12
Next you can click the photos tab
04:15
and do the same.
04:16
You can select who has visibility to your photos.
04:20
As you can see, I do not have any photos, but if I did, they would be here, and you can again select who can and cannot see your photos.
04:31
Take the time to review the Privacy Basics tab
04:35
as this will ensure you understand the settings and what you can and cannot do and how to do it.
04:46
Now let's review Twitter privacy settings.
04:49
After you log in on the left hand side menu, select s'more, then select settings,
04:57
then go to privacy and safety.
05:01
This is where you can allow who can see your tweets. If you select to protect your tweets, you will be prompted to approve each follower.
05:13
You can also turn your location on or off.
05:16
Decide who can tag you in photos. Decide who you can receive messages from and so on.
05:25
Take the time to go through these settings and follow all the security best practices and recommendations we discussed in this course
05:33
and again. Once you are done with reviewing and changing your privacy settings,
05:39
view your accounts as another user,
05:42
meaning,
05:44
Do not log in. Just search for yourself and see what you find and what information you can see.
05:53
If you have a business or corporate social media accounts.
05:58
Most of the same recommendations apply.
06:01
Obviously, you will want more people to see your posts and photos.
06:08
Be sure to limit access Onley. Allow the minimum people necessary to have access to post.
06:15
Always separate your personal and business postings.
06:20
Use strong passwords or past phrases, and do not write them down or share.
06:27
If other tools or APS require access to the social media accounts,
06:32
be sure to always be aware of which ones they are and remove the ones that are no longer required.
06:41
Always monitor your accounts and posts.
06:48
Can I decide who can follow or friends? Me?
06:55
Yes, you can.
06:57
Most, if not all social media sites have a configuration setting for this.
07:03
You can configure your account so you have to accept a friend or follow request.
07:14
In today's lesson, we discussed social media privacy settings.
07:18
We reviewed specific settings in Facebook and Twitter.
07:24
After this, you should feel comfortable enough to do the same on other social media websites if you choose to
07:30
thank you and I will see you in the next lesson.

Up Next

End User Cyber Fundamentals

This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by downloads, Malvertising, and how to protect yourself using security best practices.

Instructed By

Instructor Profile Image
Lisa Martino
Director, Information Security Governance, Risk & Compliance
Instructor