SlideShare uma empresa Scribd logo
1 de 28
5 tips to be safe
on Social Media
Presented By:
Nayan Banik
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
“The art and science of asking questions is the source of
all knowledge”
-Thomas Berger
“I can no other answer make, but, thanks, and thanks.”
-Wiliam Shakespeare

Mais conteúdo relacionado

Semelhante a 5 tips to be safe on social media

Social media user guide
Social media user guideSocial media user guide
Social media user guideWhitney Moore
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalismDan Kennedy
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
M+r storytelling-webinar-final
M+r storytelling-webinar-finalM+r storytelling-webinar-final
M+r storytelling-webinar-finalaeske
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVAdam Compton
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion trainingIrene Mackintosh
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safetyreideva
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Consumer Behavior Secrets
Consumer Behavior SecretsConsumer Behavior Secrets
Consumer Behavior SecretsSIXTY
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and uxEric Reiss
 

Semelhante a 5 tips to be safe on social media (20)

Social media user guide
Social media user guideSocial media user guide
Social media user guide
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalism
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Mike Carden
Mike CardenMike Carden
Mike Carden
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
M+r storytelling-webinar-final
M+r storytelling-webinar-finalM+r storytelling-webinar-final
M+r storytelling-webinar-final
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion training
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Riverview
RiverviewRiverview
Riverview
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safety
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Consumer Behavior Secrets
Consumer Behavior SecretsConsumer Behavior Secrets
Consumer Behavior Secrets
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and ux
 

Mais de nayanbanik

IoT for Digital Bangladesh
IoT for Digital BangladeshIoT for Digital Bangladesh
IoT for Digital Bangladeshnayanbanik
 
Introduction to Data Structures
Introduction to Data StructuresIntroduction to Data Structures
Introduction to Data Structuresnayanbanik
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cyclenayanbanik
 
Introduction to Android
Introduction to AndroidIntroduction to Android
Introduction to Androidnayanbanik
 
Bachelor's thesis defence presentation
Bachelor's thesis defence presentationBachelor's thesis defence presentation
Bachelor's thesis defence presentationnayanbanik
 
Career of mark zuckerberg
Career of mark zuckerbergCareer of mark zuckerberg
Career of mark zuckerbergnayanbanik
 

Mais de nayanbanik (6)

IoT for Digital Bangladesh
IoT for Digital BangladeshIoT for Digital Bangladesh
IoT for Digital Bangladesh
 
Introduction to Data Structures
Introduction to Data StructuresIntroduction to Data Structures
Introduction to Data Structures
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Introduction to Android
Introduction to AndroidIntroduction to Android
Introduction to Android
 
Bachelor's thesis defence presentation
Bachelor's thesis defence presentationBachelor's thesis defence presentation
Bachelor's thesis defence presentation
 
Career of mark zuckerberg
Career of mark zuckerbergCareer of mark zuckerberg
Career of mark zuckerberg
 

Último

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 

Último (20)

Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

5 tips to be safe on social media

  • 1. 5 tips to be safe on Social Media Presented By: Nayan Banik
  • 2.
  • 3.
  • 4. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 5. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 6. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 7. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 8. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 9. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 10. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 11. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 12. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 13. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 14. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 15. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 16. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 17. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 18. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 19. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 20. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 21. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 22. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 23. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 24. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 25. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 26. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 27. “The art and science of asking questions is the source of all knowledge” -Thomas Berger
  • 28. “I can no other answer make, but, thanks, and thanks.” -Wiliam Shakespeare