SlideShare a Scribd company logo
1 of 1
Download to read offline
5 Simple Steps for Safe Social Networking

  I. Type The URL Yourself
       •   When visiting websites that require a username and password (like
           Facebook, Twitter and your online back account) always type out the entire
           URL yourself. Don’t follow someone else’s link or a bookmark. Most
           phishing and hacking occur when criminals trick your computer’s
           bookmarks or webpage history into redirecting you to a phony site. Once
           you’re there and enter your login information, they have it and will use it.
  II. Limit The Number Administrators On Your Social Networking
       •   Every person with Administrative privileges on your social networking
           accounts can put your pages at risk. If any of your Administrative accounts
           are compromised, Hackers will also have access to your campaign’s social
           networking groups and pages.
  III. Watch What You Download
       •   90% of PC infections (virus or spyware) occur because you opened the
           door and invited them in. Just like you would only allow a licensed and
           credible plumber into your house to fix your toilet, whenever something
           asks to be downloaded or installed on your PC, ask yourself, “Would I let
           these people in my house?” If the answer is no, don’t download the
           software. If you need the software or update, it will be available from a
           website or company you trust (Microsoft, Adobe, etc.).
  IV. Avoid Easy Targets - Use Web Browsers Wisely
       •   Most phishing, hacking and viruses target the most common web browser,
           Microsoft Internet Explorer. By using other programs, most viruses can’t
           get in. GrassRoots 2.0 recommends Google Chrome and Mozilla FireFox
           which are available for free.
  V. Scan Your Computer For Viruses and Spyware Weekly
       •   The longer these fun friends sit on you computer, the more trouble they will
           cause you. Often criminals trying to gain access to your social networking
           accounts use Spyware which monitors your movements. Scanning your PC
           weekly for these threats can dramatically reduce the risk of someone
           gaining access. Many versions of Windows come with anti-spyware tools
           or we recommend Lavasoft’s AdAware which is available for free.




                                 Bryan Bedera
                           bbedera@grassroots20.com
                                (775) 750.5223

More Related Content

More from aporrazzo

More from aporrazzo (15)

Loopnet Report Year End 2009 Sacramento
Loopnet Report Year End 2009 SacramentoLoopnet Report Year End 2009 Sacramento
Loopnet Report Year End 2009 Sacramento
 
Loopnet Local Quarterly Insight Report Q1, 2009
Loopnet Local Quarterly Insight Report Q1, 2009Loopnet Local Quarterly Insight Report Q1, 2009
Loopnet Local Quarterly Insight Report Q1, 2009
 
Irem Spring Newsletter 4 8 09
Irem Spring Newsletter 4 8 09Irem Spring Newsletter 4 8 09
Irem Spring Newsletter 4 8 09
 
Mt. Rose Rw Membership Form
Mt. Rose Rw Membership FormMt. Rose Rw Membership Form
Mt. Rose Rw Membership Form
 
Ipx Exchange Addendum
Ipx Exchange AddendumIpx Exchange Addendum
Ipx Exchange Addendum
 
Copart Purchase Thomas Creek I
Copart Purchase Thomas Creek ICopart Purchase Thomas Creek I
Copart Purchase Thomas Creek I
 
At&T Support Center Opens
At&T Support Center OpensAt&T Support Center Opens
At&T Support Center Opens
 
Tri Net Center Completed 4 20 09
Tri Net Center Completed 4 20 09Tri Net Center Completed 4 20 09
Tri Net Center Completed 4 20 09
 
Rgj 236 Jobs Created In Reno 2009 04 01
Rgj   236 Jobs Created In Reno 2009 04 01Rgj   236 Jobs Created In Reno 2009 04 01
Rgj 236 Jobs Created In Reno 2009 04 01
 
Cbre Northern Nevada Investment Report
Cbre Northern Nevada Investment ReportCbre Northern Nevada Investment Report
Cbre Northern Nevada Investment Report
 
Loopnet Q4 2009 Insight Report 1 16 09
Loopnet Q4 2009 Insight Report 1 16 09Loopnet Q4 2009 Insight Report 1 16 09
Loopnet Q4 2009 Insight Report 1 16 09
 
Brian Bonnenfants Nevada Business Outlook 1 23 09
Brian Bonnenfants Nevada Business Outlook 1 23 09Brian Bonnenfants Nevada Business Outlook 1 23 09
Brian Bonnenfants Nevada Business Outlook 1 23 09
 
Agc Of Americas Chief Economist Outlook Report 1 23 09
Agc Of Americas Chief Economist Outlook Report 1 23 09Agc Of Americas Chief Economist Outlook Report 1 23 09
Agc Of Americas Chief Economist Outlook Report 1 23 09
 
Year End Guide For Sales Leaders
Year End Guide For Sales LeadersYear End Guide For Sales Leaders
Year End Guide For Sales Leaders
 
Ralph Spencer Training Session Handbook 10 23 08
Ralph Spencer Training Session Handbook 10 23 08Ralph Spencer Training Session Handbook 10 23 08
Ralph Spencer Training Session Handbook 10 23 08
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

5 Steps To Safe Social Networking

  • 1. 5 Simple Steps for Safe Social Networking I. Type The URL Yourself • When visiting websites that require a username and password (like Facebook, Twitter and your online back account) always type out the entire URL yourself. Don’t follow someone else’s link or a bookmark. Most phishing and hacking occur when criminals trick your computer’s bookmarks or webpage history into redirecting you to a phony site. Once you’re there and enter your login information, they have it and will use it. II. Limit The Number Administrators On Your Social Networking • Every person with Administrative privileges on your social networking accounts can put your pages at risk. If any of your Administrative accounts are compromised, Hackers will also have access to your campaign’s social networking groups and pages. III. Watch What You Download • 90% of PC infections (virus or spyware) occur because you opened the door and invited them in. Just like you would only allow a licensed and credible plumber into your house to fix your toilet, whenever something asks to be downloaded or installed on your PC, ask yourself, “Would I let these people in my house?” If the answer is no, don’t download the software. If you need the software or update, it will be available from a website or company you trust (Microsoft, Adobe, etc.). IV. Avoid Easy Targets - Use Web Browsers Wisely • Most phishing, hacking and viruses target the most common web browser, Microsoft Internet Explorer. By using other programs, most viruses can’t get in. GrassRoots 2.0 recommends Google Chrome and Mozilla FireFox which are available for free. V. Scan Your Computer For Viruses and Spyware Weekly • The longer these fun friends sit on you computer, the more trouble they will cause you. Often criminals trying to gain access to your social networking accounts use Spyware which monitors your movements. Scanning your PC weekly for these threats can dramatically reduce the risk of someone gaining access. Many versions of Windows come with anti-spyware tools or we recommend Lavasoft’s AdAware which is available for free. Bryan Bedera bbedera@grassroots20.com (775) 750.5223