SlideShare uma empresa Scribd logo
1 de 28
5 tips to be safe
on Social Media
Presented By:
Nayan Banik
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #1 Don’t share Sensitive Personal Info
• Read the TOC/EULA of the
service first.
• Stop sharing data deliberately.
• Don’t be an identity thief.
• Don’t share anything about
anyone without prior consent.
• Share your personal information
only when the situation demands.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #2 Pick your toughest key
• Don’t make fool assumption.
• Pretend yourself as a hacker.
• Make combination of
UPPERCASE, lowercase, digits
and special symbols for
password.
• Use online password generator if
you can.
• Never use same password for
different services.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #3 Ensure Security and Privacy
• Check available security option.
• Inspect activities regularly.
• Use 2-step authentication.
• Apply appropriate privacy
option while sharing.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #4 Choose your Company wisely
• Be cautious about Fake profiles.
• Look over the recent activities.
• Check the interest.
• Control your appetite for being
popular.
• Be positive about a long
relationship.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
Tip #5 Don’t just click away
• Be careful about phishing,
spamming, hacking.
• Check the source and destination
of the URL.
• Keep in mind “Nothing comes
for free”
• Stop resharing without verifying
the truth by yourself.
“The art and science of asking questions is the source of
all knowledge”
-Thomas Berger
“I can no other answer make, but, thanks, and thanks.”
-Wiliam Shakespeare

Mais conteúdo relacionado

Semelhante a 5 tips to be safe on social media

Social media user guide
Social media user guideSocial media user guide
Social media user guideWhitney Moore
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalismDan Kennedy
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital AgeMarian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and studentsRayane Hazimeh
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
M+r storytelling-webinar-final
M+r storytelling-webinar-finalM+r storytelling-webinar-final
M+r storytelling-webinar-finalaeske
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVAdam Compton
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion trainingIrene Mackintosh
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safetyreideva
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Consumer Behavior Secrets
Consumer Behavior SecretsConsumer Behavior Secrets
Consumer Behavior SecretsSIXTY
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and uxEric Reiss
 

Semelhante a 5 tips to be safe on social media (20)

Social media user guide
Social media user guideSocial media user guide
Social media user guide
 
Ethics in journalism
Ethics in journalismEthics in journalism
Ethics in journalism
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Mike Carden
Mike CardenMike Carden
Mike Carden
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Phishing
PhishingPhishing
Phishing
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
M+r storytelling-webinar-final
M+r storytelling-webinar-finalM+r storytelling-webinar-final
M+r storytelling-webinar-final
 
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWVA HillyBilly's Guide to Staying Anonymous Online - SecureWV
A HillyBilly's Guide to Staying Anonymous Online - SecureWV
 
Finalised refresh digital champion training
Finalised  refresh digital champion trainingFinalised  refresh digital champion training
Finalised refresh digital champion training
 
How to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security Flaw
 
Riverview
RiverviewRiverview
Riverview
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
2008 Cyber Safety
2008 Cyber Safety2008 Cyber Safety
2008 Cyber Safety
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Consumer Behavior Secrets
Consumer Behavior SecretsConsumer Behavior Secrets
Consumer Behavior Secrets
 
EthUX - ethics and ux
EthUX - ethics and uxEthUX - ethics and ux
EthUX - ethics and ux
 

Mais de nayanbanik

IoT for Digital Bangladesh
IoT for Digital BangladeshIoT for Digital Bangladesh
IoT for Digital Bangladeshnayanbanik
 
Introduction to Data Structures
Introduction to Data StructuresIntroduction to Data Structures
Introduction to Data Structuresnayanbanik
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cyclenayanbanik
 
Introduction to Android
Introduction to AndroidIntroduction to Android
Introduction to Androidnayanbanik
 
Bachelor's thesis defence presentation
Bachelor's thesis defence presentationBachelor's thesis defence presentation
Bachelor's thesis defence presentationnayanbanik
 
Career of mark zuckerberg
Career of mark zuckerbergCareer of mark zuckerberg
Career of mark zuckerbergnayanbanik
 

Mais de nayanbanik (6)

IoT for Digital Bangladesh
IoT for Digital BangladeshIoT for Digital Bangladesh
IoT for Digital Bangladesh
 
Introduction to Data Structures
Introduction to Data StructuresIntroduction to Data Structures
Introduction to Data Structures
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Introduction to Android
Introduction to AndroidIntroduction to Android
Introduction to Android
 
Bachelor's thesis defence presentation
Bachelor's thesis defence presentationBachelor's thesis defence presentation
Bachelor's thesis defence presentation
 
Career of mark zuckerberg
Career of mark zuckerbergCareer of mark zuckerberg
Career of mark zuckerberg
 

Último

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 

Último (20)

80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 

5 tips to be safe on social media

  • 1. 5 tips to be safe on Social Media Presented By: Nayan Banik
  • 2.
  • 3.
  • 4. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 5. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 6. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 7. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 8. Tip #1 Don’t share Sensitive Personal Info • Read the TOC/EULA of the service first. • Stop sharing data deliberately. • Don’t be an identity thief. • Don’t share anything about anyone without prior consent. • Share your personal information only when the situation demands.
  • 9. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 10. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 11. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 12. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 13. Tip #2 Pick your toughest key • Don’t make fool assumption. • Pretend yourself as a hacker. • Make combination of UPPERCASE, lowercase, digits and special symbols for password. • Use online password generator if you can. • Never use same password for different services.
  • 14. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 15. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 16. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 17. Tip #3 Ensure Security and Privacy • Check available security option. • Inspect activities regularly. • Use 2-step authentication. • Apply appropriate privacy option while sharing.
  • 18. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 19. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 20. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 21. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 22. Tip #4 Choose your Company wisely • Be cautious about Fake profiles. • Look over the recent activities. • Check the interest. • Control your appetite for being popular. • Be positive about a long relationship.
  • 23. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 24. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 25. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 26. Tip #5 Don’t just click away • Be careful about phishing, spamming, hacking. • Check the source and destination of the URL. • Keep in mind “Nothing comes for free” • Stop resharing without verifying the truth by yourself.
  • 27. “The art and science of asking questions is the source of all knowledge” -Thomas Berger
  • 28. “I can no other answer make, but, thanks, and thanks.” -Wiliam Shakespeare